The post Worth Reading: The Traffic Shaping Loophole appeared first on rule 11 reader.
The post Worth Reading: Ethernet Getting back on Moore’s Law appeared first on rule 11 reader.
The post Worth Reading: Secure the Grid appeared first on rule 11 reader.
The post Worth Reading: AI Forgeries are in the Future appeared first on rule 11 reader.
The post Worth Reading: The Internet and Trust appeared first on rule 11 reader.
I have used the example of increasing paths to the point where the control plane converges more slowly, impacting convergence, hence increasing the Mean Time to Repair, to show that too much redundancy can actually reduce overall network availability. Many engineers I’ve talked to balk at this idea, because it seems hard to believe that adding another link could, in fact, impact routing protocol convergence in such a way. I ran across a paper a while back that provides a different kind of example about the trade-off around redundancy in a network, but I never got around to actually reading the entire paper and trying to figure out how it fits in.
In Gray Failure: The Achilles’ Heel of Cloud-Scale Systems, the authors argue that one of the main problems with building a cloud system is with grey failures—when a router fails only some of the time, or drops (or delays) only some small percentage of the traffic. The example given is—
The post Worth Reading: The Value of DRM Locks appeared first on rule 11 reader.
The post Worth Reading: New German law encourages censorship appeared first on rule 11 reader.
The post Worth Reading: Journey into the hybrid cloud appeared first on rule 11 reader.
The post On the ‘web: Is it really simpler? appeared first on rule 11 reader.
The post Worth Reading: Take a pause on ransomware appeared first on rule 11 reader.
Before we get to the question of encryption and key length, I would like to point out two things. An IoT device is nothing more than an embedded system with a TCP/IP stack. It is not a magical object that is somehow protected from attackers because of how cool, interesting, or colorful it is. Second, and I can’t believe I have to point this out to people who would read or write to KV, but the Internet has a lot of stuff on it, and it’s getting bigger every day. Once upon a time, there were fewer than 100 nodes on the Internet, and that time is long past. KV has three Internet-enabled devices within arm’s reach, and, if you think a billion users of the Internet aren’t scary, try multiplying that by 10 once every fridge, microwave, and hotel alarm clock can spew packets into the ether(net). Let’s get this straight: if you attach something to a network—any network—it had better be secured as well as possible, because I am quite tired of being awakened by the sound of the gnashing of teeth caused by each and every new network security breach. The Internet reaches everywhere, and if even Continue reading
The post Worth Reading: Moving Computing to the Edge (Again) appeared first on rule 11 reader.