
Author Archives: Russ
Author Archives: Russ
The post Worth Reading: Free market needs some sunshine appeared first on 'net work.
In 2000, Eric Brewer was observing and discussing the various characteristics of database systems. Through this work, he observed that a database generally has three characteristics—
Brewer, in explaining the relationship between the three in a 2012 article, says—
The CAP theorem, therefore, represents a two out of three situation—yet another two out of three “set” we encounter in the real world, probably grounded someplace in the larger space of complexity. We’ll leave the relationship to complexity on the side for the moment, however, and just look at how Continue reading
The post Worth Reading: The IANA transition so far appeared first on 'net work.
Lots of good suggestions in my inbox—thanks to all who gave me some great design ideas to blog about. I eventually chose two winners, as I uncovered another copy of the book to give away! The two winners are Patrick Watson and Matthew Sabin. I’m going to try and run something like this every three or four months, so look for another one in the future.
The post Book Winners! appeared first on 'net work.
This is the second post in the two part series on BGP path validation over on the LinkedIn Engineering blog.
The post Rethinking BGP path validation (part 2) appeared first on 'net work.
The post Worth Reading: The Databerg Report appeared first on 'net work.
Last week’s Open Compute Project Summit was kinda crazy with all the announcements of new members (the big one being Google), partnerships (the big one being Mellanox and Cumulus Networks) and contributions to OCP for both hardware and software. -via Packet Pushers
The post Worth Reading: OCP recap appeared first on 'net work.
The post Worth Reading: Building a Network appeared first on 'net work.
The post Worth Reading: The FCC’s subtractive privacy rules appeared first on 'net work.
It’s not like they’re asking for a back door for every device.
If the world goes dark through encryption, we’ll be back to the wild west!
After all, if it were your daughter who had been killed in a terrorist attack, you’d want the government to get to that information, too.
While sitting on a panel this last week, I heard all three reactions to the Apple versus FBI case. But none of these reactions ring true to me.
Let’s take the first one: no, they’re not asking for a back door for every device. Under the time tested balance between privacy and government power, the specific point is that people have a reasonable expectation of privacy until they come under suspicion of wrongdoing. However, it’s very difficult to trust that, in the current environment, that such power, once granted, won’t be broadened to every case, all the time. The division between privacy and justice before the law was supposed to be at the point of suspicion. That wall, however, has already been breached, so the argument now moves to “what information should the government be able to trawl through in order to find crimes?” They are asking for Continue reading
The post Worth Reading: Utilization at ‘net interconnects appeared first on 'net work.
In a comment from last week’s post on the design mindset, which focuses on asking what through observation, Alan asked why I don’t focus on business drivers, or intent, first. This is a great question. Let me give you three answers before we actually move on to asking why?
Why can yuor barin raed tihs? Because your mind has a natural ability to recognize patterns and “unscramble” them. In reality, what you’re doing is seeing something that looks similar to what you’ve seen before, inferring that’s what is meant now, and putting the two together in a way you can understand. It’s pattern recognition at it’s finest—you’re already a master at this, even if you think you’re not. This is an important skill for assessing the world and reacting in (near) real time; if we didn’t have this skill, we wouldn’t be able to tolerate the information inflow we actually receive on a daily basis.
The danger is, of course, that you’re going to see a pattern you think you recognize and skip to the next thing to look at without realizing that you’ve mismatched the pattern. These pattern mismatches can be dangerous in the real world—like the time I Continue reading
The post Worth Reading: Improving Communication appeared first on 'net work.
BGP provides reachability for the global ‘net, as well as being used in many private networks. As a system, BGP (ultimately) isn’t very secure. But how do we go about securing BGP? This series investigates the questions, constraints, and solutions any proposal to secure BGP must deal with as a case study of asking the right questions, and working at the intersection of business and technology.
As a short review, we started off with three questions, described in the first post, each of which we’ve been considering in some detail:
Here I’m going to discuss the problem of a centralized versus distributed database to carry the Continue reading
The post Worth Reading: On collaborative blocking and filtering appeared first on 'net work.
The post Worth Reading: SSL, TLS, and difficult privacy appeared first on 'net work.