CenturyLink becomes an expert Microsoft Azure MSP; Huawei debuts a series of AI chips; Google releases its alert center for security threats.
In about a month, some of the key stakeholders in internet governance will come together in Paris and talk about the public policy challenges facing the internet in 2018 and beyond. They will do so at the Internet Governance Forum, a UN-supported platform that will meet for the thirteenth time this year.
The IGF traditionally brings different groups of stakeholders into a large conference centre, and provides for the opportunity for these different stakeholders to discuss: the idea being that understanding, consensus and collaboration will emerge between these different communities.
Join us for a pre-IGF stakeholder networking event on Tuesday, 16 October in Brussels. Learn more and register!
The IGF model of multistakeholderism is one of a plethora of different approaches to engaging with actors beyond states in questions of global governance. Some rely more on governments, other processes rely on technical expertise, others have come and gone. Others, like the Internet Society, tend to refer to multistakeholder approaches, rather than one model.
Many observers tend to think this concept was invented by the internet community, but shaping (global) policy through direct engagement with stakeholders has been an integral Continue reading
True to its location in Festival City – also known as Edmonton, Alberta – the 2018 Indigenous Connectivity Summit’s training day crackled with the energy of community networking advocates from around the world.
Held at the Faculty of Extension at the University of Alberta, the event began with a smudging ceremony led by Dr. Lana Whiskeyjack from Saddle Lake Cree Nation. Lana spoke about the role of smudging to ground ourselves through ceremony. Herman Many Guns from Piikani First Nation then said a prayer and thanked our Treaty 6 hosts for allowing us to host the event on their territories.
Returning to the main venue, Jane Coffin from the Internet Society stressed that community networks are not “pirate” initiatives but rather efforts by communities to support community development through locally-owned and operated broadband. They aim at long-term sustainability and are driven by cooperation and innovation: “They inspire us to think differently and to solve problems together.” Jane also pointed to the barriers these initiatives face, including inappropriate licensing and permits, high taxes and fees on equipment, limited access to financing and funding, and restricted spectrum. Governments and regulatory agencies play an important part in addressing these issues.
Next, I Continue reading
June 28th… wow…. lol… my last blog out here was June 28th! Too funny! So where have I been and what have I been doing?
Well June was CiscoLive in the beginning and then SharkFest at the end. I think i hit some “being social” limit and became a hermit for most of July and August. Then 2 weeks of vacation for the first 2 weeks of September. Two full weeks. It was AWESOME! Then Florence came to visit… She hung around for a little while. Like one of those visitors who come stay with you at your house and just won’t leave. Oh.. and then breaking a finger September 15th and struggling to type for the rest of the month.
Hello! I’m BACK!
And I have REALLY missed being here! At the same time… that break was REALLY needed! Awesome summer with the wife and family! Woot woot! Work hard… play hard!
So what am I up to? Stealthwatch Baby! Woot woot! Been with Cisco for 22 years and I have NEVER loved a product and a GUI so Continue reading
Today's Weekly Show delves into DNS performance and endpoint testing with sponsor ThousandEyes. We'll review key findings from a new report on the state of global DNS authored by ThousandEyes, and discuss how to analyze performance and improve troubleshooting with end point testing.
The post Weekly Show 411: Understanding Global DNS Architecture with ThousandEyes (Sponsored) appeared first on Packet Pushers.
I think we’ve reached peak bombshell report discussion at this point. It all started this time around with the big news from Bloomberg that China implanted spy chips into SuperMicro boards in the assembly phase. Then came the denials from Amazon and Apple and event SuperMicro. Then started the armchair quarterbacking from everyone, including TechCrunch. From bad sources to lack of technical details all the way up to the crazy conspiracy theories that someone at Bloomberg was trying to goose their quarterly bonus with a short sale or that the Chinese planted the story to cover up future hacking incidents, I think we’ve covered the entire gamut of everything that the SuperMicro story could and couldn’t be.
So what more could there be to say about this? Well, nothing about SuperMicro specifically. But there’s a lot to say about the fact that we were both oblivious and completely unsurprised about an attack on the supply chain of a manufacturer. While the story moved the stock markets pretty effectively for a few days, none of the security people I’ve talked to were shocked by the idea of someone with the power of a nation state inserting themselves into the supply chain Continue reading
Getting the best end-user performance from HTTP/2 requires good support for resource prioritization. While most web servers support HTTP/2 prioritization, getting it to work well all the way to the browser requires a fair bit of coordination across the networking stack. This article will expose some of the interactions between the web server, Operating System and network and how to tune a server to optimize performance for end users.
On Linux 4.9 kernels and later, enable BBR congestion control and set tcp_notsent_lowat to 16KB for HTTP/2 prioritization to work reliably. This can be done in /etc/sysctl.conf:
net.core.default_qdisc = fq
net.ipv4.tcp_congestion_control = bbr
net.ipv4.tcp_notsent_lowat = 16384
A single web page is made up of dozens to hundreds of separate pieces of content that a web browser pulls together to create and present to the user. The main content (HTML) for the page you are visiting is a list of instructions on how to construct the page and the browser goes through the instructions from beginning to end to figure out everything it needs to load and how to put it all together. Each piece of content requires a Continue reading
Imagine how much the Internet has changed our lives in the last few decades. Today, thanks to the Internet, we can communicate with anyone around the world, instantaneously, reliably and cheaply. This enables us not only to be close to our friends and family that may be far away but also to bridge the knowledge gap that we have with the developed world. It also opens many work opportunities that we wouldn’t even imagine just a few years back and democratize media, allowing anyone to reach instantaneously millions of people at almost no cost, forcing transparency in governance more than ever before.
At national level, our economies are benefiting from the economic opportunities, directly and indirectly related to the Internet. Experts say that this is just the tip of the iceberg and that there are many more opportunities that are yet to be discovered.
However, we cannot deny that the Internet also comes with increasing challenges. Cybercrime is endangering Internet users, organizations and even countries. Our privacies are threatened every day. And more … It is therefore appropriate that governments act to protect its citizens from the negatives impacts of the Internet by enacting laws and regulations. It was therefore Continue reading
Be mindful of these four areas of security when considering an SD-WAN solution. By incorporating security measures like these into an SD-WAN solution, businesses gain assurance that their data, network, IT assets, and customers are protected.
The post Recursive Lookup in BGP appeared first on Noction.
Is GIT any way related to Network Guys ? What is GIT and how a network engineers can benefit from It. Most of the network engineer might have not came across GIT and even not used in their work environment,But as mentioned in earlier posts that inclusion of DevOps in Networking has made network engineer to learn about automation and related technologies.
GIT is a distributed version control software that keeps track of every modification to the code. If any change or mistake is made , we can look back and compare with earlier version of code and find for any mistake.
So how GIT can be useful for Network Engineers ? Network Engineer can use GIT to see the config,how and when it got changed and who made the change ,all the changes in a file can be tracked easily.
Git can be easily installed by following the steps provided in link https://git-scm.com/book/en/v2/Getting-Started-Installing-Git
What is Git Version Control , Lets understand it in more simple way .. As per https://stackoverflow.com/questions/1408450/why-should-i-use-version-control/1408464#1408464
Have you ever:
In mid-September I was invited to present at the vNIC 2018 event in Frankfurt, Germany. Unfortunately I wasn’t able to get there, but Zoom did a great job … and enabled me to record the talk.