
This HBR article from April 2017 highlights a researcher talking about their paper that face-to-face is more effective than email. Well, duh. However, prior to making their requests, we asked participants in each condition to predict how many of the 10 strangers they asked would agree to fill out the survey. Participants in the face-to-face […]
The post Thought: Face-to-face is effective, No One Talks About How much it costs appeared first on EtherealMind.
OSM Release Five adds support for network slicing and employs a microservices architecture to make it a viable choice for 5G use cases.

This month, we’ve asked parents to share their experiences of raising kids in the tech age. Today’s guest author is Sara Given, creator of the viral blog “It’s Like They Know Us,” which skewers the myth of the perfect parent. She’s also the author of Parenting Is Easy: You’re Probably Just Doing It Wrong.
“Mom, what’s your passcode?”
I looked up to find my 5-year-old daughter jabbing her finger at my iPhone screen. She continued, “My school iPad has a passcode. What’s yours? I need to take pictures of the cat.”
This was a tame request compared to her other inquiries, (“Can I have a little brother?”), but it bothered me for two reasons: First, I knew that if I gave her that passcode, she would immediately take 5,000 pictures of the floor. And second, I hadn’t considered that at age 5 she’d already be so immersed in technology. That she’d know the lingo. That she probably already had more Instagram followers than me. #floorpics
While my daughter chattered away about the cartoon-character math app she’d been using in class, I found myself facing a dilemma: I want to limit my child’s exposure to Continue reading
Swedish carrier Telia Company is the latest carrier to announce it has switched on a 5G network, with the help of Ericsson of course.
IPFire is a modular opensource firewall distribution with a primary objective of security. IPFire employs a Stateful Packet Inspection (SPI) firewall, which is built on top of netfilter (the Linux packet filtering framework). The modular designs allows to extend basic functionality by installation of add-ons that can be easily deployed with the IPFire package management system - pakfire. Updates are digitally signed and encrypted.
During the installation of IPFire, the network is configured into different, separate segments (zones). These different segments may be enabled separately, depending on your requirements. Each segment represents a group of computers who share a common security level.
Green represents a "safe" area. This is where all regular clients will reside. It is usually comprised of a wired, local network. Clients on Green can access all other network segments without restriction. Red indicates "danger" or the connection to the Internet. Nothing from Red is permitted to pass through the firewall unless specifically configured by the administrator. Blue represents the "wireless" part of the local network. Since the wireless network has the potential for abuse, it is uniquely identified and specific rules govern clients on it. Clients on this network segment must be explicitly allowed Continue reading
Google's compute infrastructure is straining to keep up with data demands. The company is looking for "novel ways" to do more data processing. That might include cluster computing.
The BGP specification suggests implementations should have three tables: the adj-rib-in, the loc-rib, and the adj-rib-out. The first of these three tables should contain the routes (NLRIs and attributes) transmitted by each of the speaker’s peers. The second table should contain the calculated best paths; these are the routes that will be (or are) installed in the local routing table and used to build a forwarding table. The third table contains the routes which have been sent to each peering speaker. Why three tables? Routing protocols standards are (sometimes—not always) written to provide the maximum clarity to how the protocol works to someone who is writing an implementation. Not every table or process described in the specification is implemented, or implemented the way it is described.
What happens when you implement things in a different way than the specification describes? In the case of BGP and the three RIBs, you can get duplicated BGP updates. What do parrots and BGP have in common describes two situations where the lack of a adj-rib-out can cause duplicate BGP updates to be sent.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post History Of Networking – Bill Yeager – Routing Software appeared first on Network Collective.
Barefoot Networks has announced the newest version of its Tofino programmable ASIC. Tofino 2 offers 12.8Tbps total throughput and promises greater efficiency thanks to its 7nm design.
The post BiB 065: Barefoot Networks Announces A New 12.8Tbps Tofino ASIC appeared first on Packet Pushers.
Digital replicas interact with real systems and mimic changes that occur - as they occur. Digital twin adoption is growing due to the low cost, high storage and compute capacity of IoT and cloud.
In the market overview section of the introductory part of data center fabric architectures webinar I made a recommendation to use larger number of fixed-configuration spine switches instead of two chassis-based spines when building a medium-sized leaf-and-spine fabric, and explained the reasoning behind it (increased availability, reduced impact of spine failure).
One of the attendees wondered about the “right” number of spine switches – does it has to be four, or could you have three or five spines. In his words:
Read more ...
It affects all Kubernetes-based products and services, and it gives hackers full administrative privileges on any compute node being run in a Kubernetes cluster.
In 2019 the company will deploy these routers at several thousand towers to support its mobile 5G network.