The Deis platform combines features and technologies from Google, Docker, and CoreOS.
Sunday, June 4, 2017
Welcome to the NANOG 70 Hackathon brought to you by NANOG and hackathon host sponsor
Join us for the NANOG 70 Hackathon -- a one-day event Sunday, June 4, 2017, at the Hyatt Regency Bellevue.
The NANOG 70 Hackathon will bring network operators together in a room to develop new ideas and hacks for automating production internet networks. Tools and software beyond those provided by vendors and existing open-source projects are needed to keep those networks up and running. By gathering together at NANOG 70 to collaboratively hack on code or hardware, develop ideas, and documentation we can open the possibilities of peering automation. And we will have fun while doing it!
Registration for the Hackathon is open on a space-available basis to all interested attendees of NANOG 70. All skill levels are welcome and participants are expected to actively participate in the hacks. Hackathon participants will be automatically added to an email list after registration is complete in order to receive information and updates. At the end of the hack participating teams will be given the opportunity to briefly present their ideas and determine the top 3 teams. Lightning talks may be Continue reading
This is where streaming video will display.
The post Worth Reading: Seven tips to a better profile appeared first on 'net work.
Microsoft is battling AWS' market dominance in the cloud.
Score a point for Arista, but it's still waiting for an ITC ruling in September.
Lenovo hires a former Intel executive; VMware's CTO moves to Asia.
Is it time for the IETF to give up? Over at CircleID, Martin Geddes makes a case that it is, in fact, time for the IETF to “fade out.” The case he lays out is compelling—first, the IETF is not really an engineering organization. There is a lot of running after “success modes,” but very little consideration of failure modes and how they can and should be guarded against. Second, the IETF “the IETF takes on problems for which it lacks an ontological and epistemological framework to resolve.”
In essence, in Martin’s view, the IETF is not about engineering, and hasn’t ever really been.
The first problem is, of course, that Martin is right. The second problem is, though, that while he hints at the larger problem, he incorrectly lays it at the foot of the IETF. The third problem is the solutions Martin proposes will not resolve the problem at hand.
First things first: Martin is right. The IETF is a mess, and is chasing after success, rather than attending to failure. I do not think this is largely a factor of a lack of engineering skill, however—after spending 20 years working in the IETF, there Continue reading
This article is the 4th in Layer 2 security series. We will be discussing a very common layer 2 attack which is MAC flooding and its TMtigation “Port Security MAC limiting” If you didn’t read the previous 3 articles; DHCP snooping, Dynamic ARP Inspection, and IP Source Guard; I recommend that you take a quick […]
The post Mac Flooding Attack , Port Security and Deployment Considerations appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.