When deploying IPv6, one of the fundamental questions the network engineer needs to ask is: DHCPv6, or SLAAC? As the argument between these two has reached almost political dimensions, perhaps a quick look at the positive and negative attributes of each solution are. Originally, the idea was that IPv6 addresses would be created using stateless configuration (SLAAC). The network parts of the address would be obtained by listening for a Router Advertisement (RA), and the host part would be built using a local (presumably unique) physical (MAC) address. In this way, a host can be connected to the network, and come up and run, without any manual configuration. Of course, there is still the problem of DNS—how should a host discover which server it should contact to resolve domain names? To resolve this part, the DHCPv6 protocol would be used. So in IPv6 configuration, as initially conceived, the information obtained from RA would be combined with DNS information from DHCPv6 to fully configure an IPv6 host when it is attached to the network.
There are several problems with this scheme, as you might expect. The most obvious is that most network operators do not want to deploy two protocols to Continue reading
The GNU Public License version 2 (GPLv2) is arguably the most important open-source license for one reason: It’s the license Linux uses. On November 27, three Linux-using technology powers, Facebook, Google, and IBM, and the major Linux distributor Red Hat announced they would extend additional rights to help companies who’ve made GPLv2 open-source license compliance errors and mistakes. —Steven J. Vaughan-Nichols @ ZDNetThe GNU Public License version 2 (GPLv2) is arguably the most important open-source license for one reason: It’s the license Linux uses. On November 27, three Linux-using technology powers, Facebook, Google, and IBM, and the major Linux distributor Red Hat announced they would extend additional rights to help companies who’ve made GPLv2 open-source license compliance errors and mistakes. —Steven J. Vaughan-Nichols @ ZDNet
On Tuesday the 5th, I’m participating in a webcast discussion about the future of networking over at Brighttalk. The details and registration linked below. I’ll be in a hotel room; I’m hoping the audio and lighting will work out correctly.
Re-Engineering Enterprise IT: A Blueprint for the Modern Infrastructure
There’s an “automation meteor” headed right at us, according to financial adviser and Reformed Broker blogger Josh Brown, who used this troubling “chart o’ the day” from Wharton to show just “how quickly things have changed” over the past decade. And how they’re going to keep on changing. —Shawn Langlois @ MarketWatchThere’s an “automation meteor” headed right at us, according to financial adviser and Reformed Broker blogger Josh Brown, who used this troubling “chart o’ the day” from Wharton to show just “how quickly things have changed” over the past decade. And how they’re going to keep on changing. —Shawn Langlois @ MarketWatch
Many historians believe that one of the main reasons why the U.S. won the Cold War was its decisive lead over the Soviet Union in computer and telecommunications technology, which, by the 1980s, made it virtually impossible for the Soviets to compete, either economically or militarily. Continue reading
This Network Collective show was recorded live at the SDxE conference in Austin, Texas. Pete Lumbis, Jeff Tantsura, and I talk about disaggregation with Eyvonne and Jordan.
In a joint project, IBM Security along with Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) today launched a free service designed to give consumers and businesses added online privacy and security protection. The new DNS service is called Quad9 in reference to the IP address 9.9.9.9 offered for the service. The group says the service is aimed at protecting users from accessing malicious websites known to steal personal information, infect users with ransomware and malware, or conduct fraudulent activity. —CircleIDIn a joint project, IBM Security along with Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) today launched a free service designed to give consumers and businesses added online privacy and security protection. The new DNS service is called Quad9 in reference to the IP address 9.9.9.9 offered for the service. The group says the service is aimed at protecting users from accessing malicious websites known to steal personal information, infect users with ransomware and malware, or conduct fraudulent activity. —CircleID
Another execellent recording by the folks at the Network Collective. Roland Dobbins on the history of Distributed Denial of Service attacks!
There is a lot of talk about the “end of ‘net neutrality” because of the recent announcements made by the United State Federal Communications Commission (FCC). With so much out there, it is often important to sit down and read a few pieces together to gain a better sense of different sides of the issue, rather than reading one or two articles and considering yourself “well informed.” This post provides a starting point for those interested in pursuing the issue a little more deeply.
The latest episodes in this unfortunate techno-religious proclivity are now emerging. One involves an especially egregious hyperbolic excess of the Internet Wars known as Net Neutrality. The winning internet protocol religious faction, having infused the Washington political system with their Templar Knights in 2009, baked their commandments into the embarrassing December 2010 Report & Order of the FCC as “preserving the free and open internet.” “Today the Commission takes an important step to preserve the Internet as an open platform for innovation, investment, job creation, economic growth, competition, and free expression.” Nevermind that they never actually defined “the Internet.” They simply believed that whatever it was, the FCC as a federal government Continue reading