Fig 1.1- CDP Protocol |
Fig 1.1- PHP in MPLS |
Intel contributed its virtual evolved packet core to ONF.
Getting bored sitting at San Jose airport waiting for Vagrant to update guest additions in my Ubuntu VM (first item on my to-do list: prepare final version of material for next week’s Docker workshop), so here are my very first impressions of Networking Field Day 16 presentations we’ve seen in the last three days.
As always, there were great presentations, good presentations, … and a few that are best forgotten. I won’t mention those.
Read more ...Last week we announced the names of twenty-five individuals who were selected as the awardees of our 25 under 25 program, an initiative which recognizes young people from around the globe who are using the Internet to make a positive difference.
The program forms part of the Internet Society’s 25th Anniversary celebrations this month, including a special recognition ceremony planned in Los Angeles, California on Monday 18 September for the 25 under 25. We invited all twenty-five awardees to Los Angeles to take part and receive their awards in person but we have learnt that unfortunately, not everyone will be able to travel. Three of the awardees have not been granted visas to enter the United States.
On hearing this news one awardee, Mariano Gomez, penned us an open letter. In it, he explains his frustration at a process which required him to travel over several days to a ten minute interview which resulted in rejection. He described with utter clarity the irony of being denied entry due to the very conditions he hopes to address with the innovations he is pursuing on the Internet.
We understand and applaud Mariano’s statement. Not only are we disappointed that he and two Continue reading
“AWS can’t do any of this stuff,” Ellison said.
The post Worth Reading: Work life balance appeared first on rule 11 reader.
Kubernetes needs to maintain focus while expanding its influence.
China Telecom could have chosen Huawei, but didn’t.
ONF consolidates open source communities; More than 21,000 people attended the first Mobile World Congress Americas.
The two companies also collaborate on the Cyber Threat Alliance.
The pace of vendor adoption of software remains an ongoing concern.
Microsoft is using its Coco Framework technology to encrypt data in use for Azure SQL Database.
Billions of Bluetooth-enabled devices may be exposed to a new remote attack called “BlueBorne”, even without user interaction or pairing. Affected systems include Windows, iOS (older than iOS 10), the Linux kernel, and Android. What should you do about it?
Bluetooth is ubiquitous, commonly connecting accessories like headsets and keyboards, but is also used throughout the brave new Internet of Things (IoT) world. An attacker exploiting these BlueBorne vulnerabilities can mount a man-in-the-middle attack, or even take control of a device without the user even noticing it.
The vulnerabilities were discovered by a security company called Armis earlier this year. Researchers reached out to the companies responsible for vulnerable implementations that lead to the coordinated disclosure (and patches) on September 12. (You can read more about our views on responsible disclosure and collaborative security in Olaf Kolkman’s blog post here.)
This case once again highlights how crucial it is that software update mechanisms are available to fix vulnerabilities, update configuration settings, and add new functionality to devices. There are challenges, both technological and economic, in having update capabilities ubiquitously deployed, as discussed in the recently published Report from the Internet of Things Software Update (IoTSU) Workshop 2016.
Vulnerabilities Continue reading
The post Worth Reading: Hunting AdwindRAT appeared first on rule 11 reader.
You might have seen this Register article this week which summarized a Future:Net talk from Peyton Koran. In the article and the talk, Peyton talks about how the network vendor and reseller market has trapped organizations into a needless cycle of bad hardware and buggy software. He suggests that organizations should focus on their new “core competency” of software development and run whitebox or merchant hardware on top of open source networking stacks. He says that developers can use code that has a lot of community contributions and shares useful functionality. It’s a high and mighty goal. However, I think the open source part of the equation is going to cause some issues.
The idea behind open source isn’t that hard to comprehend. Everything available to see and build. Anyone can contribute and give back to the project and make the world a better place. At least, that’s the theory. Reality is sometimes a bit different.
Many times, I’ve had off-the-record conversations with organizations that are consuming open source resources and projects as a starting point for building something that will end up containing many proprietary resources. When I ask them about contributing back to Continue reading
It’s designed to function as the VIM in NFV networks.
We discussed LAG (Link Aggregation Group) and the ECMP (Equal Cost Multipath) on real network deployments with the Service Provider/Telco Engineer engineers on my slack group. I thought it was good discussion so you can see what others are doing and the reasons of their deployments. In this talk, three people involved. Myself […]
The post LAG vs. ECMP discussion on real network deployments appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.