Two weeks ago, a small delegation from the Internet Society was in Delhi for a series of meetings. (See yesterday’s post about GCCS and GFCE.) In this post, I’ll pick up with the Global Commission on the Stability of Cyberspace (GCSC).
The international community has been trying to develop cybernorms for international behaviour for over a decade. This has been happening through UN processes, through the GCCS, through international law discourse, and other fora. And, some progress has been made. For instance, the Tallin manuals provide some insights on how international law applies to cyber war and cyber operations, while the UN GGE, among others, recognized the applicability of international law on the digital space and has provided some protection to cybersecurity incident response teams (CIRTs) and critical infrastructure.
However, these processes are slow, and certainly not without roadblocks. The 5th UN Group of Governmental Experts on Information Security (GGE), for example, failed to reach consensus on whether certain aspects of international law, in particular the right to self-defence, apply to cyberspace as well as issues related to attribution. During a panel at GCCS, five participants in the 5th UN GGE shared their perspectives. To me Continue reading
A while ago I created an Ansible playbook that creates network diagrams from LLDP information. Ben Roberts, a student in my Building Network Automation Solutions online course used those ideas to create an awesome solution: he’s graphing multicast trees.
Here’s how he described his solution:
Read more ...Many of the best things that have happened in my life weren’t planned. Becoming a “Solutions Architect” is one of those things. I didn’t plan it. I’ve been in CPOC (Customer Proof of Concept) for almost 17 years now.
Why? Cause truthfully, having fun and enjoying my job is exceedingly important to me. And I’ve never seen a job (in Cisco or outside) that would be more of an absolute perfect fit for me and what I consider “fun”.
But like I said…. Many of the best things that have happened in my life weren’t planned.
For those of you who know how very much I totally love CPOC… you might be wondering “Fish, what happened that made you decide to look for another job?”. Uh… nothing. Like I said… it wasn’t planned. In fact, i didn’t even interview or apply for the job.
The new job is actually
Teehee… well the team literally just came Continue reading
Many of the best things that have happened in my life weren’t planned. Becoming a “Solutions Architect” is one of those things. I didn’t plan it. I’ve been in CPOC (Customer Proof of Concept) for almost 17 years now.
Why? Cause truthfully, having fun and enjoying my job is exceedingly important to me. And I’ve never seen a job (in Cisco or outside) that would be more of an absolute perfect fit for me and what I consider “fun”.
But like I said…. Many of the best things that have happened in my life weren’t planned.
For those of you who know how very much I totally love CPOC… you might be wondering “Fish, what happened that made you decide to look for another job?”. Uh… nothing. Like I said… it wasn’t planned. In fact, i didn’t even interview or apply for the job.
The new job is actually
Teehee… well the team literally just came Continue reading
Those looking to upgrade might want to check the fine print.
The updates include technology acquired from security startup Cyphort.
Detractors earlier called OpenContrail ‘faux-pen source.’
Lanner’s unique position with SD-WAN services sealed the partnership.
Juniper also announced Contrail as a platform for enterprise multi-cloud management.
As applications and data continue to be distributed more broadly from the data center to the edge, customers are increasingly relying on software-defined wide-area networks (SD-WANs) versus traditional networking for flexible, secure connectivity. It’s for this reason that I am pleased to share that we officially closed our acquisition of VeloCloud Networks today, bringing their industry-leading, cloud-delivered SD-WAN solution to our growing software-based networking portfolio. The acquisition of VeloCloud significantly advances our strategy of enabling customers to run, manage, connect and secure any application on any cloud to any device.
VMware NSX was a game changer in the industry, and it has become the industry-leading implementation of network virtualization. Customers choose NSX because it delivers network and security services closest to the application. By adding VeloCloud’s SD-WAN solutions to our portfolio, we are extending our value in the enterprise and increasing our relevance with service providers by offering end-to-end automation, application continuity and security from data center to cloud edge. VeloCloud will bring the same properties to the wide-area network with an SD-WAN solution that provides full visibility, metrics, control and automation of all endpoints, resulting in better performance and availability for enterprise and cloud applications.
If you are a Continue reading
I’ve been doing some work automating A10 Networks load balancers recently, and while testing I discovered a bug which broke my scripts. As hard as I try to code my scripts to cope with both success and failure, I realized that the one thing I can’t do much with is a failure of a key protocol.
So what matters when I’m automating device configurations? Three things come to mind immediately:
I need reliable network connectivity, or my automation requests will constantly be timing out or failing. While a script should be able to cope with an occasional network failure, unreliable networks are not fun to work with.
Pick a format (XML, JSON) and use it consistently. I’m happy so long as I can send a request and read a response in a given format. If I send a request using JSON, send a response using JSON. Funnily enough I was troubleshooting WordPress xmlrpc recently and noticed that when there was an error, the XML command being issued received a 404 error followed by, well, you’d hope an XML error response, right? No, because it was an HTTP 404 error, the site Continue reading
If we want organizations like Equifax to be good data stewards, we, the users and consumers, must mobilize.
In October, the Internet Society explored why the dominant approach to data handling, based around the concepts of risk and compliance, does not work. To recap: “…data handlers try to adhere to regulatory requirements and minimize the risk to themselves – not necessarily to the individuals whose data they handle. For some data handlers, the risk that poor security creates may not extend to them.”
Euphemistically put, Equifax has not been an example of forthcomingness, transparency, and accountability. Users can change this paradigm. Users can shift the cost of a data breach onto the data handler by holding the accountable for their action or lack of action.
The key is to organize. For example, Consumer Reports is organizing a campaign calling on Equifax to take the next steps to address the fallout from the data breach. Their first step was to deliver a petition signed by over 180,000 individuals to Equifax’s headquarters.
The Internet Society just pledged $10k to this cause, to help Consumer Reports make sure Equifax does everything in its power to make things right for consumers in Continue reading
Let’s be honest. There are many enterprise data centers (and data center admins) who aren’t crazy about Linux. But most of that opposition comes from simply not understanding the benefits of Linux and not experiencing Linux hands-on. Fortunately, we’ve got a comprehensive guide to everything Linux that you can use to get familiar with the basics. Once you start testing out Linux for yourself and getting comfortable with it, I think you’ll find that Linux is the best operating system available today.
So what are the benefits, in general, of using Linux? Some of these benefits include:
Carrier is using ONAP to automate its data center tenant network provisioning.
Megaport claims to have the world’s first SDN-based elastic interconnection platform.
The recent KubeCon event and upcoming holidays influenced release timing.
It deployed Silver Peak’s SD-WAN.