In 2015, I was lucky enough to give an invited keynote at the 20th anniversary of the Ethicomp conference. I found that many of the issues up for discussion were ones in which the Internet Society also has a keen interest: for example — responsible innovation, the ethics of autonomous systems, and what do in the wake of Edward Snowden’s revelations about pervasive state monitoring of the Internet. The conference has now produced a special edition of the Journal of Information, Communication and Ethics in Society (JICES), specifically to report on a global set of surveys on the responses to Snowden. I was invited to write a paper for this special edition, to accompany the more traditional academic analyses of the surveys. My full article, “After Snowden – the evolving landscape of privacy and technology” is now available.
Writing the paper gave me a chance to step back and look at how the privacy advocacy community’s work has changed since Snowden – one of those rare moments in which the frog gets to hop out of the rapidly warming water and contemplate the saucepan. Here are a few of the trends I noted.
First, there has been Continue reading
With P4 developers can program the forwarding plane.
The startup emerged from stealth mode and closed a $9.3 million Series A funding round.
Dell's IoT Division will develop products and incorporate AI and machine learning.
Thanks to all who joined us for the Dell EMC Webinar: SDN: The Foundation for Software-Defined Storage. During the webinar Dell EMC discussed benefits of software defined networking for SDS solutions. After the webinar, we took questions from the audience. Read the full SDN: The Foundation for Software-Defined Storage Q&A below. Does big switch work with... Read more →
The organization's move adds to the growing push for simplifying container deployments.
iTerm2 is a great terminal for MacOS; far better than Apple’s built-in Terminal app, and it’s my #1 recommendation for Mac-based network engineers. One of the many reasons I like it is that it has a feature that solves a really annoying problem.
It’s tedious having to issue a command repeatedly so that you can see when and if the output changes. I’ve had to do this in the past, repeating commands like show ip arp
so that I can spot when an entry times out and when it it refreshes. The repeated sequence of up arrow, Enter, up arrow, Enter, up arrow, Enter
drives me mad.
Some vendors offer assistance; A10 Networks for example has a repeat
command in the CLI specifically to help with show commands:
a10-vMaster[2/2]#repeat 5 show arp Total arp entries: 25 Age time: 300 secs IP Address MAC Address Type Age Interface Vlan --------------------------------------------------------------------------- 10.1.1.65 0000.5e00.01a1 Dynamic 17 Management 1 10.1.1.67 ac4b.c821.57d1 Dynamic 255 Management 1 10.1.1.97 001f.a0f8.d901 Dynamic 22 Management 1 Refreshing command every 5 seconds. (press ^C to quit) Elapsed Time: 00:00:00 Total arp entries: 25 Age time: Continue reading
The post Worth Reading: The Importance of Setting Goals appeared first on rule 11 reader.
Second vendor in this year’s series of data center switching updates: Brocade.
Not much has happened on this front since last year’s update. There was a maintenance release of Brocade NOS, they launched SLX series of switches, but those are so new that the software documentation didn’t have time to make it to the usual place (document library for individual switch models), it's here.
In any case, the updated videos (including edited 2016 content which describes IP Fabric in great details) are online. You can access them if you bought the webinar recording in the past or if you have an active ipSpace.net subscription.
The CNAME resource record was defined in RFC 1035 as “the canonical name for an alias.” It plays the role of a pointer, for example, the CNAME informs the requestor that www.containercult.com is really this other name, instance001.couldbalancer.example.com.
The CNAME record provides a “configure once” point of integration for third party platforms and services. A CNAME is often used as opposed to an A/AAAA record for the same reason developers often use variables in their code as opposed to hard coded values. The CNAME can easily be redefined by the third party or service provider without requiring the end user to make any changes.
A stipulation that prevents use of the CNAME at the apex is that no other records can exist at or alongside a CNAME. This specification is what prevents an end user from being able to place a CNAME at the apex of their zone due to the other records, which must be defined at the apex such as the Start of Authority (SOA).
ALIAS / ANAME – The way of the future
The Oracle ALIAS record allows for CNAME-like functionality at the apex of a zone. The Oracle implementation of the Continue reading
Microwave or Fiber which one is faster ? I will explain the faster connectivity option and some of the use cases for each, deployment considerations a bit in this post. Why latency is important for some special businesses ? Have you heard about HFT (High Frequency Trading) ? If you like the discussion points, after […]
The post Microwave or Fiber which one is faster ? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
It supports AWS, Microsoft Azure, and VMware, with Google Cloud Platform coming in 2018.
In this video, learn the basics about application dependency mapping in order to uncover performance issues.
In this video, learn the basics about application dependency mapping in order to uncover performance issues.
Syslog is a powerful tool for network analysis. Here are some best practices.