In this community roundtable over at the Network Collective, Jordan, Eyvonne, Nick, and I discuss some interesting use cases for MPLS. This is part of our ongoing series about protocols.
One of my articles was published in the most recent Internet Protocol Journal:
If you don’t subscribe to or read IPJ, you should—it’s a great source of information written by industry leaders and thinkers.
This is the second part of our chat with Dave Crocker about the fascinating history of email.
Remember to come by the Network Collective home page to find all the great video content we have been working on, and check out our membership options for even more content and to become a part of our awesome community of network engineers.
Dubbed Lazy FP State Restore, the vulnerability (CVE-2018-3665) within Intel Core and Xeon processors has just been confirmed by Intel, and vendors are now rushing to roll out security updates in order to fix the flaw and keep their customers protected. The company has not yet released technical details about the vulnerability, but since the vulnerability resides in the CPU, the flaw affects all devices running Intel Core-based microprocessors regardless of the installed operating systems, except some modern versions of Continue reading