Russ

Author Archives: Russ

QOTW: Height

Height is the measure of littleness. The man who has not the sense of true greatness is easily exultant or easily depressed, sometimes both together. It is because the ant does not consider the giant beetle that he looks down on the tiny gnat; and it is because the walker does not feel the wind from the heights that he lingers on the mountain slopes.
Sertillanges, The Intellectual Life

LinkedInTwitterGoogle+FacebookPinterest

The post QOTW: Height appeared first on 'net work.

Sunrise on Oak Island

DSC01589
One of the neat things about Oak Island is it’s a south facing beach. You don’t get the sun over the beach in the morning, but along the beach, and both sunrise and sunset are over the water at some time in the year. Some days, the sunrise and the sunset are both over the ocean.

LinkedInTwitterGoogle+FacebookPinterest

The post Sunrise on Oak Island appeared first on 'net work.

Worth Learning: The Power Grid

Stop mulling over the latest (now dead) command line, and learn something useful. If you work in networking, you work with electricity. But how many people really know how the power grid works? Even though I have relatives and friends who’ve worked in the power industry all their lives, I’m still learning new things about the grid, and the way it works.

Four items of interest in this area for today.

A really short and simple video

A longer, boring video with lots of presentations and details

An interesting paper on coal to data

An article giving the other side of the renewable hype

LinkedInTwitterGoogle+FacebookPinterest

The post Worth Learning: The Power Grid appeared first on 'net work.

Civilization

One of the most dangerous errors instilled into us by nineteenth-century progressive optimism is the idea that civilization is automatically bound to increase and spread. The lesson of history is the opposite; civilization is a rarity, attained with difficulty and easily lost.
C.S. Lewis, Rehabilitations

LinkedInTwitterGoogle+FacebookPinterest

The post Civilization appeared first on 'net work.

Big Data for Social Engineering

First, it integrates with corporate directories such as Active Directory and social media sites like LinkedIn to map the connections between employees, as well as important outside contacts. Bell calls this the “real org chart.” Hackers can use such information to choose people they ought to impersonate while trying to scam employees. From there, AVA users can craft custom phishing campaigns, both in email and Twitter, to see how employees respond. via wired

This is a white hat tool, of course, a form of social engineering penetration testing. Two points of interest, though.

First, you can be pretty certain hackers are already using this sort of tool today to find the right person to contact, how to contact them, and to discover the things they know people will respond to. The rule of thumb you should keep in mind is — at least 80% of the time, hackers are already using the tools researchers come up with to do penetration testing. Remember all those fake people inhabiting the world of twitter, facebok, and the like? Some of them might not be just another click farm — some of them might be clickbait for hackers to find out who you Continue reading

Are Walled Gardens the Future of the ‘net?

From the very beginning, the walled garden has been the opposite of what those who work on and around the ‘net have wanted. The IETF, and the protocols it has developed over the years, have always been about free and open access to anyone who wants to learn networking, coding, or even just what the latest baseball score for their favorite team. Of course, a number of tech giants (remember Compuserve?) fought to build walled gardens using the tools of the Internet. A user would dial into a modem pool, and access the world through a small portal that would provide a consistent and controlled interface for their entire experience, from email to news to chat to…

The same battle rages in recent times, as well. Phone makers, mobile providers, and even social media networks would desperately like to make your only interface into the global Internet a single O/S or app. From this one app, you’ll be able to talk to your friends, pay your bills, save all your data, and, in general, live your entire life. And for those times when you can’t get to what you want outside the app or social network, they will gladly Continue reading

Liskov Substitution and Modularity in Network Design

Furthering the thoughts I’ve put into the forthcoming book on network complexity…

One of the hardest things for designers to wrap their heads around is the concept of unintended consequences. One of the definitional points of complexity in any design is the problem of “push button on right side, weird thing happens over on the left side, and there’s no apparent connection between the two.” This is often just a result of the complexity problem in its base form — the unsolvable triangle (fast/cheap/quality — choose two). The problem is that we often don’t see the third leg of the triangle.

The Liskov substitution principle is one of the mechanisms coders use to manage complexity in object oriented design. The general idea is this: suppose I build an object that describes rectangles. This object can hold the width and the height of the rectangle, and it can return the area of the rectangle. Now, assume I build another object called “square” that overloads the rectangle object, but it forces the width and height to be the same (a square is type of rectangle that has all equal sides, after all). This all seems perfectly normal, right?

Now let’s say Continue reading