Archive

Category Archives for "Networking"

Building Our New Website: POSSE and Sharing on Facebook, Twitter, LinkedIn, Google+ and More

As we built our new website, one of my own guiding principles was “POSSE“, a content publishing model from the “IndieWeb” movement. The idea is:

Publish on your
Own
Site,
Syndicate
Elsewhere

Essentially, make sure you own your own content – and then share it out onto other sites and services. (See the IndieWeb page about POSSE for more discussion.) Make your own website the “hub” for all your content, and then have spokes going out to all the other places where people might discover and learn about your content.

To me, this model is the best way to support the principles of the open Internet, while engaging people in the places where they already are.

Why does this matter?

We aren’t just publishing reports, papers, blog posts and articles for the sake of talking about what we are doing.

We are publishing content to bring about change that ensures the Internet remains open, globally connected, and secure. As we said in our vision statement for the new website:

Our website is a driving force in Continue reading

Policing, Shaping, and Performance

Policing traffic and shaping traffic are two completely different things, but it is hard to know, in the wild, what the impact of one or the other will have on a particular traffic flow, or on the performance of applications in general. While the paper under review here, An Internet-Wide Analysis of Traffic Policing, is largely focused on the global ‘net, specifically from a content provider’s perspective, it contains lessons for just about every network operator who needs to manage Quality of Service (QoS) in a sane and meaningful way.

Flach, Tobias, Pavlos Papageorge, Andreas Terzis, Luis Pedrosa, Yuchung Cheng, Tayeb Karim, Ethan Katz-Bassett, and Ramesh Govindan. 2016. “An Internet-Wide Analysis of Traffic Policing.” In Proceedings of the 2016 ACM SIGCOMM Conference, 468–482. SIGCOMM ’16. New York, NY, USA: ACM. https://doi.org/10.1145/2934872.2934873.

Traffic policing involves setting up a queue with a pool of tokens. For some unit of traffic—assume a packet here—received, a token is consumed. When a packet is transmitted, the token is added back to the pool. If the pool is sized correctly, short bursts in the traffic stream will be allowed through, but if the application attempts to establish a session using more bandwidth Continue reading

Let’s Encrypt Offers Free Multi-Domain HTTPS Certificates

Let’s Encrypt, a nonprofit certificate authority launched in 2016, has delivered on its pledge to offer free certificates that enable secure HTTP connections for complete domains.

The organization’s new wildcard certificate service, allowing website operators to secure all subdomains of a domain with a single certificate, should help the Internet become more secure by enabling wider deployment of HTTPS, Josh Aas, executive director of the Internet Security Research Group, wrote in a blog post. (Full disclosure: the Internet Society is a major sponsor of Let’s Encrypt.)

Last July, Let’s Encrypt had promised that it would offer free wildcard certificates. With the recent release of the ACMEv2 [Automatic Certificate Management Environment] Protocol, the organization delivered on that promise.

“Wildcard certificates can make certificate management easier in some cases, and we want to address those cases in order to help get the Web to 100% HTTPS,” Aas wrote. “We’re excited about the prospect of a 100% HTTPS Web and we’re working hard to get there.”

A wildcard certificate isn’t recommended for all websites, Aas noted. In most cases, other certificates, such as single-domain ones, will be more appropriate.

Although wildcard certificates enable streamlined management of HTTPS, some security Continue reading

We’ve Added a New Google Cloud Platform Course to Our Video Library!

This course introduces AWS professionals to the core capabilities of Google Cloud Platform (GCP) in the four technology pillars: networking, compute, storage, and database. It is designed for AWS Solution Architects and SysOps Administrators familiar with AWS features and setup, who want to gain experience configuring GCP products.

The Google Cloud Platform for AWS Professionals is 6 hours and 9 minutes long and is taught by Joseph Holbrook. If you’re interested in watching, you can view the course using your All Access Pass or buy the course at ine.com.

About the Instructor:

Joe Holbrook has been in the IT field since 1993 when he was exposed to several HPUX systems on board a US Navy flagship. He has migrated from UNIX world to Storage Area Networking (SAN) and then onto Enterprise Virtualization and Cloud Architecture. He worked for numerous companies like HDS, 3PAR Data, Brocade, Dimension Data, EMC, Northrup Grumman, ViON, Ibasis.net, Chematch.com, SAIC and Siemens Nixdorf. Currently he works as a Subject Matter Expert specializing in Cloud/IT Security focused on Data Storage infrastructure services and Data migrations to the Cloud.

He holds Industry leading certifications from Amazon Web Services, Google Cloud Platform, Brocade, Hitachi Data Systems, Continue reading

History Of Networking – Dinesh Dutt – Divergence of Compute and Networking

The operation and management of compute and networking are unique in the the tools and skill-sets required, but do they necessarily need to be? Dinesh Dutt joins Network Collective to talk about the divergence of compute and networking, how it hasn’t always been this way, and why he believes it should return to being a unified effort.


Dinesh Dutt
Guest
Russ White
Host
Jordan Martin
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Dinesh Dutt – Divergence of Compute and Networking appeared first on Network Collective.

Applications Now Open for Hackathon@AIS

The application process for the Hackathon@AIS is now open. The Hackathon@AIS is an event aimed at exposing engineers from the African region to Open Internet Standards development and is co-organized by the Internet Society and AFRINIC. This will be the second event in the series following a successful event held in Nairobi last year during the Africa Internet Summit.

A list of the topics that will be covered this year can be found here.

Network/Systems engineers, software developers, and computer science students are encouraged to apply as engagement in open Internet standards development can help further their careers.

The event will be held on the 9th and 10th of May 2018 in Dakar, Senegal. If you are interested in participating AND can commit to being available over the 2 days, please complete the application form. Space is limited and successful applicants will be notified and then be enrolled in various online training sessions in the build up to the event.

Fellowships will be awarded to strong applicants where possible.

Applications close on the 8th of April 2018.

Apply here!

 

The post Applications Now Open for Hackathon@AIS appeared first on Internet Society.

People are really worried about IoT data privacy and security—and they should be

A new study from the Economist Intelligence Unit (EIU) shows that consumers around the world are deeply worried about in how their personal information is collected and shared by the Internet of Things (IoT). But let’s be honest, the problem isn’t that unsophisticated consumers are panicking for no reason. In fact, consumers are merely picking up on the very real inherent risks and uncertainties surrounding IoT data.Businesses are also worried about IoT security I’ll get into the results and implications of the survey in a moment, but first I want to note that business and professionals are equally concerned. Perhaps that’s why Gartner just predicted that IoT security spending will hit $1.5 billion by the end of the year, up 28 percent from 2017, and more than double to $3.1 billion by 2021.To read this article in full, please click here

People are really worried about IoT data privacy and security—and they should be

A new study from the Economist Intelligence Unit (EIU) shows that consumers around the world are deeply worried about in how their personal information is collected and shared by the Internet of Things (IoT). But let’s be honest, the problem isn’t that unsophisticated consumers are panicking for no reason. In fact, consumers are merely picking up on the very real inherent risks and uncertainties surrounding IoT data.Businesses are also worried about IoT security I’ll get into the results and implications of the survey in a moment, but first I want to note that business and professionals are equally concerned. Perhaps that’s why Gartner just predicted that IoT security spending will hit $1.5 billion by the end of the year, up 28 percent from 2017, and more than double to $3.1 billion by 2021.To read this article in full, please click here

Datanauts 127: Found On The Internet Series 4

Today on the Datanauts we crack open our cabinet of curiosities to explore a variety of subjects, ideas, and blogs gleaned from the Internet.

Topics include Site Reliability Engineering, AWS vs. Amazon for your cloud career, the pros and cons of abstraction, and the ups and downs of industry certifications.

Check out the show links for more details on everything we discuss.

Show Links:

You need SRE skills to thrive in a serverless world Kelsey Hightower – A Cloud Guru

AWS Vs. Azure: Which One s Right for Your Cloud Career? – SimpliLearn

OpenFaaS.com

The CNCF takes steps toward serverless computing – Cloud Native Computing Foundation

Serverless Working Group – GitHub

PowerShell Summit

How Self-Sufficient Do You Want to Be? – IP Space

The Law of Leaky Abstractions – Joel on Software

The Network Collective

Rehashing Certifications – Rule 11 Reader

Computer Networking Problems And Solutions – Rush White and Ethan Banks

Building Next-Generation Data Center – IP Space

RedHat to acquire CoreOS – RedHat

On-call doesn’t have to suck – Medium

Open source project trends for 2018 – GitHub Blog

The State of the Octoverse 2017 – GitHub

The post Datanauts 127: Found On The Internet Series 4 Continue reading

IoT could help at-risk seniors

The internet of things is also, in part, the internet of people, particularly in the plans of an Ontario-based chain of retirement homes and long-term care facilities called Schlegel Villages.The company, which is based in Kitchener, Ontario, designs its facilities to be less institutional-looking and more friendly, preferring to call them “villages.” But it’s got a problem to deal with, as at-risk seniors can sometimes become confused and attempt to leave.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] According to Schlegel’s IT director, Chris Carde, it’s a serious issue.To read this article in full, please click here

IoT could help seniors with dementia

The internet of things is also, in part, the internet of people, particularly in the plans of an Ontario-based chain of retirement homes and long-term care facilities called Schlegel Villages.The company, which is based in Kitchener, Ontario, designs its facilities to be less institutional-looking and more friendly, preferring to call them “villages.” But it’s got a problem to deal with, one all too common to the elderly – dementia.[ For more on IoT see tips for securing IoT on your network, our list of the most powerful internet of things companies and learn about the industrial internet of things. | Get regularly scheduled insights by signing up for Network World newsletters. ] According to Schlegel’s IT director, Chris Carde, it’s a serious issue.To read this article in full, please click here