QUIC is a middle-aged protocol at this point—it’s several years old, and widely deployed although TCP still dominates the transport layer of the Internet. In this episode of the Hedge, Jana Iyengar joins Alvaro Retana and Russ White to discuss the motivation for developing QUIC, and its ongoing development and deployment.
A young person scrolls through Instagram to see the latest updates on their favorite profiles. To many around the world this doesn’t seem strange, but for a hamlet outside of a small village in Indonesia’s rural southwest, it’s revolutionary. And it’s in part thanks to the work of an Internet entrepreneur named Gustaff Harriman Iskandar. […]
The post The Common Room: How an Artist Is Connecting Rural Indonesia One Village at a Time appeared first on Internet Society.
Today on Day Two Cloud we get into a whole lot of things. For example, what is IT's value in the age of cloud? How can IT figure out what's actually providing value to the business vs. undifferentiated heavy lifting? How companies built on open-source software make their money? Our guest is Stu Miniman, Director of Market Insights at Red Hat.
The post Day Two Cloud 095: Grappling With The Open Source Business Model appeared first on Packet Pushers.
TL&DR: If you want to test BGP, OSPF, IS-IS, or SR-MPLS in a virtual lab, you might build the lab faster with netsim-tools release 0.6.
In the netsim-tools release 0.6 I focused on adding routing protocol functionality:
You’ll also get:
The concept of VRFs is likely one that you’re familiar with. They are the de facto standard when we talk about isolating layer 3 networks. As we’ve talked about previously, they are used extensively in applications such as MPLS VPNs and really provide the foundation for layer 3 network isolation. They do this by allowing the creation of multiple routing tables. Any layer 3 construct can then be mapped into the VRF. For instance, I could assign an IP address to an interface and then map that interface into the VRF. Likewise, I could configure a static route and specify that the route is part of a given VRF. Going one step further I could establish a BGP session off of one of the VRF interfaces and receive remote BGP routes into the VRF. VRFs are to layer 3 like VLANs are to layer 2.
So while we’ve talked about how they are typically used and implemented on networking hardware like routers and switches – we haven’t talked about how they’re implemented in Linux. Actually – they’re fairly new to the Linux space. The functionality was actually written by Cumulus Networks and then contributed to the Linux kernel (kudos Continue reading
On today's Heavy Networking, sponsored by Palo Alto Networks, we examine what SASE means to you as a network engineer, its effects on how applications are protected and how you provide access to end users, and useful things to think about regarding how SASE services are provisioned and operated while you evaluate whether SASE is right for your org.
The post Heavy Networking 575: Designing Better Networking And Security With SASE (Sponsored) appeared first on Packet Pushers.
We are excited to be a sponsor of this year’s virtual KubeCon + CloudNativeCon Europe conference, taking place May 4–7, 2021 online. We hope you’ll join us by visiting our virtual booth, where a team of Tigera experts will be standing by to speak with you.
Our team will be conducting live demos, Ask the Architect sessions, 1:1 chats, and more during our booth hours.
We will have eight 30-minute interactive sessions focused on addressing questions about Kubernetes security and observability. Stop by our booth to check out the times for these sessions.
Attendees can view each booth representative’s profile and initiate a private or group text chat, or request a video call.
Our booth will have a built-in public chat window where booth representatives and attendees can post and reply to messages. Announcements about upcoming activities will be posted in this chat by Tigera representatives.
We have 5 pairs of Apple AirPods to give away! The first 100 visitors to our booth will automatically be entered to win. Attendees Continue reading
A few weeks ago I received a Raspberry Pi 400 as a gift. I didn’t have time to do anything beyond plug it in and verify that it works. It’s great that the Pi 400 comes with everything you need except for a screen: there’s the computer itself, mouse, HDMI cable and power adapter.
The Pi 400 has been sitting gathering dust when Cloudflare launched Auditable Terminal giving me the perfect excuse to get out the Pi 400 and hook it up.
Auditable Terminal gives you a fully featured SSH client in your browser. You authenticate using Cloudflare Access and can log into a computer from anywhere just using the browser and get a terminal. And using Cloudflare Tunnel you can securely connect a computer to Cloudflare without punching holes in a firewall. And you end up with a consistent terminal experience across devices: 256 colours, Unicode support and the same fonts everywhere.
This is ideal for my use case: set up the Pi 400 on my home network, use Cloudflare Tunnel to connect it to the Cloudflare network, use Auditable Terminal to connect to the Pi 400 via Cloudflare and the tunnel using nothing more than a browser.
Here’s Continue reading
A little over a year into the COVID-19 pandemic, our reliance on private, safe, and secure communication has become more critical than ever. So it’s no surprise that organizations across all sectors are increasingly adopting encryption. It’s our strongest digital security tool online, keeping the information we share in daily activities like online banking, working […]
The post A Digital Dystopia: How Calls for Backdoors to Encryption Would Ruin the Internet for Everyone appeared first on Internet Society.