The domain name system is vital for operating in a digital economy, but a target for cybercriminals.
You are probably expecting me to write another monthly blog on exciting innovative technology. Today I digress and reflect on recent awards and accolades Arista has received and how we got here. At Arista, we have worked very hard to become a great company. Building a good company takes constant hard work and heavy lifting. Making a great company is an even harder work-in-progress, demanding tenacity, especially in high technology, where disruptions are daunting and challenges are frequent.
You are probably expecting me to write another monthly blog on exciting innovative technology. Today I digress and reflect on recent awards and accolades Arista has received and how we got here. At Arista, we have worked very hard to become a great company. Building a good company takes constant hard work and heavy lifting. Making a great company is an even harder work-in-progress, demanding tenacity, especially in high technology, where disruptions are daunting and challenges are frequent.
As Robin Wilton discussed a few days ago in Roca: Encryption Vulnerability and What to do About It, yet another security vulnerability has been discovered. If you have one of the ISOC-branded Yubikey 4s that we have given out at some conferences, they were affected by the recently disclosed Infineon vulnerability. See these two links for details:
This issue impacts only some limited uses of the keys. For details, see
https://www.yubico.com/keycheck/functionality_assessment.
You can get your ISOC-branded Yubikey 4 replaced at no cost to you by going to this page and following the instructions.
If you have questions or concerns, please contact Steve Olshansky, Internet Technology Program Manager, at <[email protected]>.
The post Some Yubikeys Affected by Infineon Security Weakness appeared first on Internet Society.
President Trump touted the announcement during an Oval Office event.
Virtualization giant extends networking reach beyond the data center with purchase of SD-WAN supplier
New software delivers reductions in VM-to-VM latency.
ONF says 80 percent of the telco spending is at the edge of the network.
Company claims new Threat Management platform can process 5 billion security threats in 10 minutes.
![]() |
| Fig 1.1- Fortigate Next Generation Firewalls |
The argument for end-to-end encryption is apparently heating up with the work moving forward on TLSv1.3 currently in progress in the IETF. The naysayers, however, are also out in force, arguing that end-to-end encryption is a net negative. What is the line of argument? According to a recent article in CircleID, it seems to be something like this:
The idea of end-to-end encryption is recast as a form of extremism, a radical idea that should not be supported by the network engineering community. Is end-to-end encryption really extremist? Is it really a threat to the social order?
Let me begin here: this is not just a technical issue. There are two opposing worldviews in play. Engineers don’t often study worldviews, or philosophy, so these questions tend to get buried in Continue reading
The deal gives VMware more networking clout to better compete with Cisco.
OpenStack Summit Sydney is just around the corner, and Cumulus Networks wouldn’t miss it for the world! We’ll be there at our booth, doing daily contests and raffles, so make sure to stop by. If you’re lucky, you might walk away with a 6 pack of Linux Lager. But of course, you don’t need beer to have fun at OpenStack — there’s so much to keep you busy and fired up! With so many amazing panels and presentations, it’s hard to pick and choose which events to attend. Fortunately, we’ve done the research and picked out the top 3 must-attend activities. If you’re going to be at OpenStack in Sydney next week, make sure to check these out: