When someone tells me they have bought smart light bulbs, an Internet-connected pet cam, or any other Internet of Things (IoT) device, I always get an unsettled feeling in the pit of my stomach. They’re so excited about the affordances or their new IoT devices and apps, but I am skeptical about the privacy and security vulnerabilities. How do I have a conversation about these concerns without coming across as hyper paranoid? Perhaps the answer is that we aren’t quite ready to discuss these issues on a societal level.
Privacy and security advocates all over the world have been talking about the threats that IoT may pose to society – unless standards and regulations are put in place to help mitigate some of these risks. They champion that privacy and security should be built into design and should not come as an afterthought.
While I praise the work that advocates are doing, IoT devices are on the shelves right now and we need to be able to have conversations with everyday folk about what privacy and security risks look like in the digital economy. However, how can we have these conversations when we haven’t yet established understandable and common terms Continue reading
About six months ago, I got fed up with my Meraki MR34 APs. They ran just fine, but they needed attention. They needed licenses. They needed me to pay for a dashboard I used rarely but yet had to keep up yearly. And that dashboard had most of the “advanced” features hidden away under lock and key. I was beyond frustrated. I happen to be at the Wireless LAN Professionals Conference (WLPC) and ran into Darrell DeRosia (@Darrell_DeRosia) about my plight. His response was pretty simple:
“Dude, you should check out Ubiquiti.”
Now, my understanding of Ubiquiti up to that point was practically nothing. I knew they sold into the SMB side of the market. They weren’t “enterprise grade” like Cisco or Aruba or even Meraki. I didn’t even know the specs on their APs. After a conversation with Darrell and some of the fine folks at Ubiquiti, I replaced my MR34s with a UniFI AP-AC-HD and an AP-AC-InWall-Pro. I also installed one of their UniFi Security Gateways to upgrade my existing Linksys connection device.
You may recall my issue with redundancy and my cable modem battery when I tried to install the UniFi Security Gateway for Continue reading
When troubleshooting application performance issues, ping alone may not detect the problem. That’s where active testing can help.
Johannes Weber was forced to stress-test the IPv6 networks are easy to renumber nonsense and documented his test results – a must-read for everyone deploying IPv6.
He found out that renumbering IPv6 in his lab required almost four times as many changes as renumbering (outside) IPv4 in the same lab.
My cynical take on that experience: “Now that you’ve documented everything that needs to be changed, make sure it’s automated the next time ;)”
Subscribe to Kernel of Truth on iTunes, Google Play, Spotify, Castbox and Stitcher!
Click here for our previous episode.
Let’s talk about lasers! In this episode of Kernel of Truth, I asked Product Manager Brian O’Sullivan (who you’ll remember from our episode about automation) and Principal Engineer Scott Emery to join me in the recording booth and chat about optical networking. We’ll get into topics like forward error correction, the divide between data center networking engineers and optical networking engineers, Voyager and Pink Floyd. Who knew that progressive rock had anything to do with optical networking?? (It doesn’t, really, but we somehow worked it in.)
So tune in and learn why an open packet optical platform is so innovative for optical networking and telco! And make sure to subscribe to the Kernel of Truth podcast so you stay up to date on the open networking revolution — get with the future of networking so you’re not just “Another Brick in the Wall!”
Tweet any questions, feedback or topics you want us to discuss at @cumulusnetworks and use the hashtag #KernelOfTruth — let us know if you like what you’re hearing!
Guest bios
Brian O’Sullivan: Brian Continue reading
The specifications are for attribute-based encryption that describes how to secure personal data, combining access control with data encryption.
Juniper will integrate the Mist Learning WLAN with Juniper’s Contrail SD-WAN technology.
The serverless security library targets the runtime environment but is not a replacement for an enterprise-grade platform deployment.
Aryaka names new CEO (again); Former AlienVault CEO will now head AT&T cybersecurity; and Kontron absorbs Inocybe leadership in acquisition.
In this episode of IPv6 Buzz, we examine how and why to make the transition from a dual-stack to an all-v6 world. Our guest is Veronika McKillop, network architect at Microsoft and president/chair of the UK IPv6 Council.
The post IPv6 Buzz 008: Our IPv6-Only Future appeared first on Packet Pushers.
LTE growth coupled with the early stages of 5G deployments fueled the evolved packet core market in the second quarter of the year.
As you go through digital transformation, there are a few things to keep in mind. Here are some steps to consider for digital transformation that allows flexibility for future growth.