The post Worth Reading: The need for loud cyber weapons appeared first on 'net work.
The post Worth Reading: The hidden world of news cameras appeared first on 'net work.
The post Worth Reading: IPv6 and the DNS appeared first on 'net work.
Over at TechBeacon, my friend Chris Romeo has an article up about DevOps and security. It’s interesting to me because this is actually an area I’d never thought about before, even though it makes sense. Given DevOps is essentially writing software to control infrastructure (like routers, compute, and storage), and software needs to be written in a way that is secure, then it should be obvious that DevOps software should be developed with good security principles gleaned from software development as part of the foundation.
And here we face a challenge, as Chris says—
The key point in here is that every organization is doing things their own way. This isn’t wrong, of course, because every organization must have some “snowflakiness” to justify its existence, and that “snowflakiness” is often likely to show up, in a large way, in something like handling resources within Continue reading
The post Worth Reading: Microsoft and FPGAs appeared first on 'net work.
The post Worth Reading: Some notes on today’s DDoS appeared first on 'net work.
In our last post, we looked at how I2RS is useful for managing elephant flows on a data center fabric. In this post, I want to cover a use case for I2RS that is outside the data center, along the network edge—remote triggered black holes (RTBH). Rather than looking directly at the I2RS use case, however, it’s better to begin by looking at the process for creating, and triggering, RTBH using “plain” BGP. Assume we have the small network illustrated below—
In this network, we’d like to be able to trigger B and C to drop traffic sourced from 2001:db8:3e8:101::/64 inbound into our network (the cloudy part). To do this, we need a triggering router—we’ll use A—and some configuration on the two edge routers—B and C. We’ll assume B and C have up and running eBGP sessions to D and E, which are located in another AS. We’ll begin with the edge devices, as the configuration on these devices provides the setup for the trigger. On B and C, we must configure—
The post Worth Reading: Hack Cameras, DVRs, and DDoS appeared first on 'net work.
The post Worth Reading: Facebook’s video views appeared first on 'net work.
The post Worth Reading: The psychology of bad passwords appeared first on 'net work.
The post Worth Reading: Increasing the strength of the root zone appeared first on 'net work.
The post Worth Reading: What the IoT means to you appeared first on 'net work.
The post Worth Reading: The balancing act of freelancing appeared first on 'net work.
Broadcom released some information about the new Tomahawk II chip last week in a press release. For those who follow hardware, there are some interesting points worth considering here.
First, the chip supports 256x25g SERDES. Each pair of 25G SERDES can be combined into a single 50g port, allowing the switch to support 128 50g ports. Sets of four SERDES can be combined into a single 100g port, allowing the switch to support 64 100g ports.
Second, there is some question about the table sizes in this new chip. The press release notes the chip has “Increased On-Chip Forwarding Databases,” but doesn’t give any precise information. Information from vendors who wrap sheet metal around the chipset to build a complete box don’t seem to be too forthcoming in their information about this aspect of the new chip, either. The Tomahawk line has long had issues with its nominal 100,000 forwarding table entry limit, particularly in large scale data center fabrics and applications such as IX fabrics. We’ll simply have to wait to find out more about this aspect of the new chip, it seems.
Third, there is some question about the forwarding buffers available on the chip. Again, the Tomahawk Continue reading
The post Worth Reading: The EU is pushing new IoT security rules appeared first on 'net work.
The post Worth Reading: Flowspec is a step forward appeared first on 'net work.
The post Worth Reading: The Overlapping Birthday Problem appeared first on 'net work.