

Cloudflare first started talking about DNSSEC in 2014 and at the time, Nick Sullivan wrote: “DNSSEC is a valuable tool for improving the trust and integrity of DNS, the backbone of the modern Internet.”
Over the past four years, it has become an even more critical part of securing the internet. While HTTPS has gone a long way in preventing user sessions from being hijacked and maliciously (or innocuously) redirected, not all internet traffic is HTTPS. A safer Internet should secure every possible layer between a user and the origin they are intending to visit.
As a quick refresher, DNSSEC allows a user, application, or recursive resolver to trust that the answer to their DNS query is what the domain owner intends it to be. Put another way: DNSSEC proves authenticity and integrity (though not confidentiality) of a response from the authoritative nameserver. Doing so makes it much harder for a bad actor to inject malicious DNS records into the resolution path through BGP Leaks and cache poisoning. Trust in DNS matters even more when a domain is publishing record types that are used to declare trust for other systems. As a specific example, DNSSEC is helpful for preventing Continue reading
AI use by telcos and providers potentially can improve customer service, speed onboarding, and reduce outages by pro-actively identifying problems. Is this hype or can AI deliver benefits to the enterprise?
Here’s a bit of good news for those of you scared of network automation replacing your jobs: even Elon Musk didn’t manage to pull it off, so I don’t think a networking vendor dabbling in intent will manage to do it (particularly considering the track record of networking vendors’ network management and orchestration systems).
Read more ...Continuing on with the theme of previous cheat sheet articles, this article will help decode the format for Amazon Web Services’ Elastic Compute Cloud (EC2) instance types.
When asked about Kurian, who heads the company’s cloud business, Co-CEO Mark Hurd said “we expect him back.” But Hurd refused to say when that will happen.
Startups share their path to market with their global telecommunications providers at TC3 Summit 2018.
When I joined Arista ten years ago, we were in the midst of developing a novel purpose-built software architecture from a clean sheet of paper for networking. The financial services industry was in crisis, with the collapse of major banks like Lehman Brothers. In parallel, emerging slowly but surely, was a new breed of hyper-scale cloud operators. Amazon AWS, Microsoft Azure and Google GCP were in the early stages of shaping what was to become the public cloud. The requirements of these new titans provided a source of inspiration for the Arista founders and me. We couldn’t have predicted the pace nor the impact of this cloud fury; it came strongly and rapidly. As I reminisce over the past decade, it is clear that the cloud inflection has forever changed the face of enterprise IT for the better. Yet it is just the beginning, and there is much ahead.
Distributed computing with Red Hat OpenStack Platform allows the Contrail Edge Cloud to remotely manage the lifecycle of compute nodes and virtual machines (VMs) from a centralized data center without requiring co-located OpenStack control plane functions in each of these remote edge sites.
I lived through the 3G and 4G hype but I don’t remember the breadth of hype being quite as insane as it is for 5G.
Carpenters always remember one simple piece of advice when they are working on a job: Measure twice, cut once. It’s a little different in networking, though. In our industry, my advice is the following: Measure many times, but never cut. @Search Networking
Both vendors have scored significant 5G deals with all of the major U.S. operators but are not afraid to throw shade at each other.
South Korean operator SK Telecom picked these three equipment vendors for its 5G deployment. The company plans to launch 5G in the first half of 2019.
The hyperconverged infrastructure system is designed for edge deployments. It includes automated virtualization, compute, storage, and power management resources, along with built-in redundancy.