The post BGP security: an overview of the RPKI framework appeared first on Noction.
This is an urgent call for expert help to quickly test a possible method to sterilize used N95 masks.
In many places, hospital staff, first responders and others are at grave risk due to inadequate supplies of N95 masks. Already, some hospitals even in the U.S. report running out of N95 masks and face reusing possibly contaminated masks. My local fire department has about 20 N95 masks total available, as they face transporting patients to the hospital. People are faced with reusing masks without sterilization. I offer an idea that might alleviate the critical shortage. I have run this idea past my pulmonary care doctor of many years who believes that the idea may be viable, but everyone on the front lines of the epidemic are already working flat out.
I sent the letter below to Dr. Anthony Fauci that sets the context.
People with the right expertise are needed to vet the idea and ensure that it is safe and effective as quickly as possible.
Dear Dr. Fauci,
N95 masks are in critically short supply. Sterilization of disposable masks N95 could be a Continue reading
Subscribe to Kernel of Truth on iTunes, Google Play, Spotify, Cast Box and Sticher!
Click here for our previous episode.
This podcast is all about Linux and to talk about it, we have two of the top Linux kernel experts. Kernel of Truth host Roopa Prabhu is one and chats with our special guest David Ahern about eBPF. If you haven’t heard of eBPF, it’s the hottest Linux kernel technology bringing programmability and acceleration to many Linux subsystems. In this podcast we focus on eBPF’s impact on networking and the million possibilities it brings to the table.
Guest Bios
Roopa Prabhu: Roopa Prabhu is Chief Linux Architect at Cumulus Networks. At Cumulus she and her team work on all things kernel networking and Linux system infrastructure areas. Her primary focus areas in the Linux kernel are Linux bridge, Netlink, VxLAN, Lightweight tunnels. She is currently focused on building Linux kernel dataplane for E-VPN. She loves working at Cumulus and with the Linux kernel networking and debian communities. Her past experience includes Linux clusters, ethernet drivers and Linux KVM virtualization platforms. She has a BS and MS in Computer Science. You can find her on Twitter at @__roopa.
The company has posted a 100% year-over-year increase in revenue during the past four years, and...
COVID-19 postponed Google Cloud Next; SoftIron placed its bets on SONiC; and Telefónica tapped...
The carrier's network will have 500 base stations covering around 150 “locations” around the...
Open RAN is gaining momentum around the world and it’s being driven further by recently increased...
Nutanix updated its object storage platform to bring “simplicity” and “performance” to big...
In addition to leading the Series B, Juniper and Cox are also StackPath customers although they use...
"Networking is the most neglected integrated thing that exists in IT right now," says SoftIron CEO...
Today's Day Two Cloud delves into how and why to build a private cloud that functions as well as a public cloud. We examine the design and operational challenges of assembling and running cloud infrastructure on premises. Our guest is Bryan Sullins, Senior Systems Engineer for a large retailer.
The post Day Two Cloud 040: Building And Operating A Private Cloud appeared first on Packet Pushers.
Cisco leads the industry when it comes to respected and valued IT infrastructure certification paths and last month Cisco made some significant changes to the way they do certifications. In today’s episode we discuss some of these changes and what the implications are for those of us pursuing new Cisco certifications or maintaining the certifications we already hold.
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/
The post A New Path For Certifications appeared first on Network Collective.

Back when Cloudflare was created, over 10 years ago now, the dominant HTTP server used to power websites was Apache httpd. However, we decided to build our infrastructure using the then relatively new NGINX server.
There are many differences between the two, but crucially for us, the event loop architecture of NGINX was the key differentiator. In a nutshell, event loops work around the need to have one thread or process per connection by coalescing many of them in a single process, this reduces the need for expensive context switching from the operating system and also keeps the memory usage predictable. This is done by processing each connection until it wants to do some I/O, at that point, the said connection is queued until the I/O task is complete. During that time the event loop is available to process other in-flight connections, accept new clients, and the like. The loop uses a multiplexing system call like epoll (or kqueue) to be notified whenever an I/O task is complete among all the running connections.
In this article we will see that despite its advantages, event loop models also have their limits and falling back to good old threaded architecture is sometimes Continue reading
The company's headquarters in Mountain View, California, are under a "shelter in place" ordinance...
2020 is predicted to be an exciting year with more organizations adopting Kubernetes than ever before. As critical workloads with sensitive data migrate to the cloud, we can expect to encounter various Advanced Persistent Threats (APT) targeting that environment.
DGA is a technique that fuels malware attacks. DGA by itself can’t harm you. But it’s a proven technique that enables modern malware to evade security products and counter-measures. Attackers use DGA so they can quickly switch the command-and-control (also called C2 or C&C) servers that they’re using for malware attacks. Security software vendors act quickly to block and take down malicious domains hard-coded in malware. So, attackers used DGA specifically to counter these actions. Now DGA has become one of the top phone-home mechanisms for malware authors to reach C2 servers. This poses a significant threat to cloud security.
Mitre defines DGA as “The use of algorithms in malware to periodically generate a large number of domain names which function as rendezvous points for malware command and control servers”. Let’s examine this definition more closely. DGA at its core generates domains by concatenating pseudo-random strings and a TLD (e.g. .com, . Continue reading
Remote worker influx stifled services; Cisco, Hitachi sliced jobs; and Red Hat, Intel bridged the...