This week is IETF 100 in Singapore, and we’re bringing you daily blog posts highlighting some of the topics that Deploy360 is interested in. After the focus on IPv6 & IoT during the first couple of days, we’re switching tack today with a focus on routing and crypto matters.
We’re having to wait until after lunch, but then there’s a choice of UTA, SIDROPS or ROLL at 13.30 SGT/UTC+8.
UTA will be focusing on resolving the final IESG comments on the use of TLS for email submission and access which outlines current recommendations for using TLS to provide confidentiality of email traffic between a mail user agent and a mail access server. Next up for discussion are the open issues on a draft related to Strict Transport Security (STS) for mail (SMTP) transfer agents and mail user agents, before consideration of a draft on an option to require TLS for SMTP.
NOTE: If you are unable to attend IETF 100 in person, there are multiple ways to participate remotely.
Over in SIDROPS, there will be a review of the status of BGP Origin Validation deployment in RENATA: the Columbia National Research and Education Network. This represents the first wide-scale deployment Continue reading
Stuck on what to get your favorite tech-loving geek? Here are some ideas.
As more people get online everyday, Internet Freedom is facing a global decline for the 7th year in a row.
Today, Freedom House released their 2017 Freedom on the Net report, one of the most comprehensive assessments of countries’ performance regarding online freedoms. The Internet Society is one of the supporters of this report. We think it brings solid and needed evidence-based data in an area that fundamentally impacts user trust.
Looking across 65 countries, the report highlights several worrying trends, including:
Elections prove to be particular tension points for online freedoms (see also Freedom House’s new Internet Freedom Election Monitor). Beyond the reported trend towards more sophisticated government attempts to control online discussions, the other side of the coin is an increase in restrictions to Internet access, whether through shutting down networks entirely, or blocking specific communication platforms and services.
These Internet shutdowns are at the risk of becoming the new normal. In addition to their impact on freedom of expression and peaceful assembly, shutdowns generate severe economic costs, affecting entire economies [1] and Continue reading
Arista’s OpenFlow implementation doesn’t support TLS encryption. Usually that’s not a big deal, as there aren’t that many customers using OpenFlow anyway, and those that do hopefully do it over a well-protected management network.
However, lack of OpenFlow TLS encryption might become an RFP showstopper… not because the customer would really need it but because the customer is in CYA mode (we don’t know what this feature is or why we’d use it, but it might be handy in a decade, so we must have it now) or because someone wants to eliminate certain vendors based on some obscure missing feature.
Read more ...![]() |
| Fig 1.1- Cisco Meraki MR25 Wireless Systems |
The company's first product monitors whatever matters most to an enterprise.
It migrated Contrail Cloud from Ubuntu OpenStack.
Nokia says smartphone infections accounted for 72 percent of all mobile network infections in the first three months of 2017.
Download the Huawei White Paper, In the digital era, communications service providers (CSPs) are undergoing a technological evolution, and network virtualization is playing a key role—in particular, network functions virtualization (NFV). NFV offers reduced time to market, agility, innovation, an open ecosystem to avoid vendor lock-in, and future CAPEX and OPEX reduction. However, operational transformation... Read more →
Thanks to all who joined us for the Comcast Business 2017 SD-WAN and Virtual Edge Report webinar, Developing a Hybrid Plan for SD-WAN, where they discussed how to ease into SD-WAN to test and experience new business capabilities across a distributed enterprise. After the webinar we took questions from the audience. Unfortunately we ran out... Read more →
Learn tips and tricks for building a high-performance WLAN!
I teamed up with the great staff at Ekahau to put together this infographic about how to design and deploy high capacity Wi-Fi. It's the second poster in the series, following the Wi-Fi Design Poster that focused on radio frequency (RF) factors.
The Wi-Fi Capacity Infographic covers:
Download the Wi-Fi Capacity Infographic today!
The companies will collaborate on other areas including data center interconnection in the future.
They will offer similar pay-per-use private clouds based on VMware and Microsoft Azure Stack next year.
Microsoft just published information on their internal tool called “CrystalNet” which Microsoft defines as “a high-fidelity, cloud-scale network emulator in daily use at Microsoft. We built CrystalNet to help our engineers in their quest to improve the overall reliability of our networking infrastructure.” You can read more about their tool in this detailed ACM Paper. But what I want to talk about is how this amazing technology is accessible to you, at any organization, right now, with network verification using Cumulus VX.
What Microsoft has accomplished is truly amazing. They can simulate their network environment and prevent nearly 70% of the network issues they experienced in a two-year period. They have the ability to spin up hundreds of nodes with the exact same configurations and protocols they run in production. Then applying network tests, they verify if proposed changes will have negative impact on applications and services. This work took the team of Microsoft researchers over two years to develop. It’s really quite the feat!
What I find exciting about this is it validates exactly what we at Cumulus have been preaching for the last two years as well. The ability to make a 1:1 mirror of Continue reading