Author Archives: Russ
Author Archives: Russ
The post Worth Reading: Journey into the hybrid cloud appeared first on rule 11 reader.
The post On the ‘web: Is it really simpler? appeared first on rule 11 reader.
The post Worth Reading: Take a pause on ransomware appeared first on rule 11 reader.
Before we get to the question of encryption and key length, I would like to point out two things. An IoT device is nothing more than an embedded system with a TCP/IP stack. It is not a magical object that is somehow protected from attackers because of how cool, interesting, or colorful it is. Second, and I can’t believe I have to point this out to people who would read or write to KV, but the Internet has a lot of stuff on it, and it’s getting bigger every day. Once upon a time, there were fewer than 100 nodes on the Internet, and that time is long past. KV has three Internet-enabled devices within arm’s reach, and, if you think a billion users of the Internet aren’t scary, try multiplying that by 10 once every fridge, microwave, and hotel alarm clock can spew packets into the ether(net). Let’s get this straight: if you attach something to a network—any network—it had better be secured as well as possible, because I am quite tired of being awakened by the sound of the gnashing of teeth caused by each and every new network security breach. The Internet reaches everywhere, and if even Continue reading
The post Worth Reading: Moving Computing to the Edge (Again) appeared first on rule 11 reader.
In recent years, we have become accustomed to—and often accosted by—the phrase software eats the world. It’s become a mantra in the networking world that software defined is the future. full stop This research paper by Microsoft, however, tells a different story. According to Baumann, hardware is the new software. Or, to put it differently, even as software eats the world, hardware is taking over an ever increasing amount of the functionality software is doing. In showing this point, the paper also points out the complexity problems involved in dissolving the thin waist of an architecture.
The specific example used in the paper is the Intel x86 Instruction Set Architecture (ISA). Many years ago, when I was a “youngster” in the information technology field, there were a number of different processor platforms; the processor wars waged in full. There were, primarily, the x86 platform, by Intel, beginning with the 8086, and its subsequent generations, the 8088, 80286, 80386, then the Pentium, etc. On the other side of the world, there were the RISC based processors, the kind stuffed into Apple products, Cisco routers, and Sun Sparc workstations (like the one that I used daily while in Cisco TAC). The argument Continue reading
The post Worth Reading: 5G and Internet Technology appeared first on rule 11 reader.
The post Worth Reading: The next generation of whois appeared first on rule 11 reader.
The post Worth Reading: Why isn’t everyone running DNSSEC? appeared first on rule 11 reader.
The post Worth Reading: Are more specifics harmful? appeared first on rule 11 reader.
It turns out that if you can hijack less than a hundred BGP prefixes (feasible) you can isolate about 50% of the mining power in the network. Once a collection of nodes are partitioned from the network the network becomes more vulnerable to double spending attacks, transaction filtering, and selfish mining attacks. —Morning Paper
The post Worth Reading: Hijacking Bitcoin appeared first on rule 11 reader.
The post Worth Reading: A brittle and fragile future appeared first on rule 11 reader.
The post Worth Reading: Subscription based networking appeared first on rule 11 reader.
The post Worth Reading: Characterizing IPv6 load balancing appeared first on rule 11 reader.