Our good friend mr. Anonymous has too many buzzwords and opinions in his repertoire, at least based on this comment he left on my Using 4-byte AS Numbers with EVPN blog post:
But IGPs don't scale well (as you might have heard) except for RIFT and Openfabric. The others are trying to do ECMP based on BGP.
Should you be worried about OSPF or IS-IS scalability when building your data center fabric? Short answer: most probably not. Before diving into a lengthy explanation let's give our dear friend some homework.
Read more ...I recently came across a simple idea that is having a positive impact on productivity. That idea is to not reply to everything. While this can be applied to social media broadly, I’m focused on email management here.
For me, not replying is more difficult than it sounds. I am a personality type that doesn’t like loose ends. I like to meet other’s expectations, and have them think cuddly, happy thoughts about what a swell person I am. I know that when I send an email, I hope to get a response. Therefore, when I receive an e-mail, my natural inclination is to respond.
Now, I don’t feel I overly waste time on replying to email. I’ve improved my response technique over the years. I bring an e-mail thread to a conclusion as rapidly as possible by anticipating and proactively answering questions. That’s more time-consuming than a quick, lazy “back to you” response, but saves time in the long run.
However, an advance on the proactive reply is never replying at all. Not responding is the ultimate way to bring an email thread to a conclusion.
On the surface, ignoring inbox messages seems rude. However, Continue reading
I recently came across a simple idea that is having a positive impact on productivity. That idea is to not reply to everything. While this can be applied to social media broadly, I’m focused on email management here.
For me, not replying is more difficult than it sounds. I am a personality type that doesn’t like loose ends. I like to meet other’s expectations, and have them think cuddly, happy thoughts about what a swell person I am. I know that when I send an email, I hope to get a response. Therefore, when I receive an e-mail, my natural inclination is to respond.
Now, I don’t feel I overly waste time on replying to email. I’ve improved my response technique over the years. I bring an e-mail thread to a conclusion as rapidly as possible by anticipating and proactively answering questions. That’s more time-consuming than a quick, lazy “back to you” response, but saves time in the long run.
However, an advance on the proactive reply is never replying at all. Not responding is the ultimate way to bring an email thread to a conclusion.
On the surface, ignoring inbox messages seems rude. However, Continue reading
The carrier sees an addressable market of some 30 million homes for its fixed 5G service plans, but it will also support slices for mobile and enterprise services.
In the Republic of Georgia, high in the mountains of the Tusheti region, a community network has been built to bring faster Internet connectivity to those that did not have it. The story is compelling, not only for the determination of people to make sure that the Internet is available in one of the remotest places in the world, but also for their strong belief of what connecting to the Internet could bring to the people of Tusheti. “Tourism is a beacon of hope for us,” said Ia Buchaidze, who owns a local bakery, “and the Internet is very important for that.”
The project was a true collaborative partnership involving many parties: the Georgian Government, the Internet Society and its Georgia Chapter, the Small and Medium Telecom Operators Association of Georgia, LTD Freenet, and the Tusheti Development Fund (TDF). This network did not need a license, but it did need an authorization from the Georgian Government for it to be built and for the spectrum to be used. The objective was to provide access to a remote region through a locally-built and developed community network.
Similarly, in Mexico, a community network has been built in a remote and Continue reading
The encryption software only runs on Intel hardware now, but the startup isn’t ruling out support for other vendors in the future.
Ankur Singla says that solving business problems has more value than simply selling a technology.
President Donald Trump tweeted Sunday that he and Chinese President Xi were in talks to resolve, or potentially lessen, the ban imposed on the Chinese firm last month.
Way back in the old days, the unit I worked at in the US Air Force had a room with a lot of equipment used for processing classified information. Among this equipment was a Zenith Z-250 with an odd sort of keyboard and a very low resolution screen. A fine metal mesh embedded in a semi-clear substrate was glued to the surface of the monitor. This was our TEMPEST rated computer, on which we could type up classified memos, read classified email, and the like. We normally connected it to the STU-3 through a modem (remember those) to send and receive various kinds of classified information.
Elovici, Mordechai Guri, Yuval. “Bridgeware: The Air-Gap Malware.” Accessed May 13, 2018. https://cacm.acm.org/magazines/2018/4/226377-bridgeware/abstract.
The idea of TEMPEST begins way back in 1985, when a Dutch researcher demonstrated “reading” the screen of a computer using some relatively cheap, and easy to assemble, equipment, from several feet away. The paper I’m looking at today provides a good overview of the many ways which have been discovered since this initial demonstration to transfer data from one computer to another across what should be an “air gap.” For instance, the TEMPEST rated computer described Continue reading
Several organizations are assembling the technologies to enable self-sovereign identity, a way for individuals to control who they are online. Blockchain is one of those essential components.
Take a Network Break! Arista challenges Cisco in the campus with a new a new core switch, Qualcomm is reportedly considering backing away from data center server processors, and a security survey shows woeful patching habits.
Another security survey reveals that three quarters of respondents have been breached at least once in 2017, Apple abandons a planned data center site in Ireland, and ZTE halts major operations because of a US export ban on parts and software from American companies.
Finally, Google acquires cloud onboarding startup VeloStrata, while Google’s Duplex voice assistant raises hackles.
Get links to all these stories after our sponsor messages.
InterOptic offers high-performance, high-quality optics at a fraction of the cost. Find out more at InterOptic.com, and if you re attending Interop 2018 in Vegas, stop by the InterOptic booth to learn how they can help you spec the right optics for your network.
Find out how Cisco and its trusted partners Equilibrium Security and ePlus/IGX can help your organization tackle the General Data Protection Regulation, or GDPR. Tune into Packet Pushers Priority Queue episode 147 to get practical insights on how to get your arms around these wide-ranging rules.
In this interview, Benedict Enweani, director of business development, systems and analytics at EXFO Ontology, discusses challenges in achieving effective and efficient service assurance in modern service provider networks, as well as the benefits of automation.
With Mother’s Day having just passed, some e-commerce sites likely saw an associated boost in traffic. While not as significant as the increased traffic levels seen around Black Friday and Cyber Monday, these additional visitors can potentially impact the site’s performance if it has not planned appropriately. Some sites have extra infrastructure headroom and can absorb increased traffic without issue, but others turn to CDN providers to ensure that their sites remain fast and available, especially during holiday shopping periods.
To that end, I thought that it would be interesting to use historical Internet Intelligence data (going back to 2010) collected from Oracle Dyn’s Internet Guide recursive DNS service, to examine CDN usage. As a sample set, I chose the top 50 “shopping” sites listed on Alexa, and looked at which sites are being delivered through CDNs, which CDN providers are most popular, and whether sites change or add providers over time. Although not all of the listed sites would commonly be considered “shopping” sites, as a free and publicly available list from a well-known source, it was acceptable for the purposes of this post.
The historical research was done on the www hostname of the listed Continue reading