‘net neturality has been much in the news recently; a while back I did a piece for Tech Target on some of the complexities here, and I ran across three other articles that provide a contrarian view—not what you are likely to hear from the major edge providers. Since I am always trying to understand both sides of an issue, I am always looking for solid, well written views on both sides. It is hard to dig behind the hype in our 140 character world, but it is also important.
Hence this post, with pointers to my older post and three other articles of interest. Warning: some of these are more trenchant and contrarian than others.
The primary foundation of net neutrality explained is this: Providers should not be able to give services they offer any advantage over a competing service running over their network. The perfect example might seem to be voice services. Suppose you purchase access to the internet from a company that not only sells internet access, but also voice services. Now, suppose the provider decides to sell its voice service as superior in quality to any other available voice service — and guarantee its service is Continue reading
Juniper’s cloud vertical grew 32% from the previous year.
AT&T credits SDN and NFV with helping it lower its costs.
The post Worth Reading: The Great Ethereum HAck appeared first on rule 11 reader.
Internet service in and around Mogadishu, Somalia suffered a crippling blow recently as the East African Submarine System (EASSy) cable, which provides service to the area, was cut by the anchor of a passing ship. The government of Somalia estimated that the impact of the submarine cable cut was US$10 million per day and detained the MSC Alice, the cargo vessel that reportedly caused the damage.
The cable was repaired on 17 July. The incident is the latest in a series of recent submarine cable breaks (see Nigeria, Ecuador, Congo-Brazzaville and Vietnam) that remind us how dependent much of the world remains on a limited set of physical connections which maintain connectivity to the global Internet.
Internet in Mogadishu
The story of how high-speed Internet service came to Mogadishu is nothing short of remarkable. It involved Somali telecommunications personnel staring down the threat of a local terrorist group (Al-Shabaab) in order to establish Somalia’s first submarine cable connection. This submarine cable link would be vital if Mogadishu were to have any hope of improving its local economy and ending decades of violence and hunger. However, in January 2014, Al-Shabaab Continue reading
For many the world of wireless networking is a world that is dark and full of terrors, but it doesn’t have to be that way. In this episode of Network Collective, the panel reveals many of the most common wireless networking misconceptions so you too can be a wizard in the black art of RF. I promise, no RF math was used in the filming of this episode.
—–
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 8 – Wireless Misconceptions appeared first on Network Collective.
For many the world of wireless networking is a world that is dark and full of terrors, but it doesn’t have to be that way. In this episode of Network Collective, the panel reveals many of the most common wireless networking misconceptions so you too can be a wizard in the black art of RF. I promise, no RF math was used in the filming of this episode.
—–
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post Episode 8 – Wireless Misconceptions appeared first on Network Collective.
See how to create a sponsored guest wireless network in Cisco Identity Services Engine.
The post Worth Reading: Docker Part 0 appeared first on rule 11 reader.