In recent years, we have become accustomed to—and often accosted by—the phrase software eats the world. It’s become a mantra in the networking world that software defined is the future. full stop This research paper by Microsoft, however, tells a different story. According to Baumann, hardware is the new software. Or, to put it differently, even as software eats the world, hardware is taking over an ever increasing amount of the functionality software is doing. In showing this point, the paper also points out the complexity problems involved in dissolving the thin waist of an architecture.
The specific example used in the paper is the Intel x86 Instruction Set Architecture (ISA). Many years ago, when I was a “youngster” in the information technology field, there were a number of different processor platforms; the processor wars waged in full. There were, primarily, the x86 platform, by Intel, beginning with the 8086, and its subsequent generations, the 8088, 80286, 80386, then the Pentium, etc. On the other side of the world, there were the RISC based processors, the kind stuffed into Apple products, Cisco routers, and Sun Sparc workstations (like the one that I used daily while in Cisco TAC). The argument Continue reading
The post Worth Reading: 5G and Internet Technology appeared first on rule 11 reader.
The post Worth Reading: The next generation of whois appeared first on rule 11 reader.
The post Worth Reading: Why isn’t everyone running DNSSEC? appeared first on rule 11 reader.
The post Worth Reading: Are more specifics harmful? appeared first on rule 11 reader.
It turns out that if you can hijack less than a hundred BGP prefixes (feasible) you can isolate about 50% of the mining power in the network. Once a collection of nodes are partitioned from the network the network becomes more vulnerable to double spending attacks, transaction filtering, and selfish mining attacks. —Morning Paper
The post Worth Reading: Hijacking Bitcoin appeared first on rule 11 reader.
The post Worth Reading: A brittle and fragile future appeared first on rule 11 reader.
The post Worth Reading: Subscription based networking appeared first on rule 11 reader.
The post Worth Reading: Characterizing IPv6 load balancing appeared first on rule 11 reader.
The post Worth Reading: DevOps is not a security panacea appeared first on rule 11 reader.
The post Worth Reading: Behind the 200g hype appeared first on rule 11 reader.
Jason Wells, over on LinkedIn, has an article up about the end of MPLS; to wit—
To being—I actually work with Aryaka on occasion, and within the larger SD-WAN world more often (I am a member of the TAB over at Velocloud, for instance). This is decidedly not a post about the usefulness or future of SD-WAN solutions (though I do have opinions there, as you might have guessed). Rather, what I want to point out is that we, in the networking industry, tend to be rather sloppy about our language in ways that are not helpful.
To understand, it is useful to back up a few years and consider other technologies where our terms have become confused, and how it has impacted our Continue reading
The post Worth Reading: The blue disco ball appeared first on rule 11 reader.
I was recently interviewed for a new network career site—
This looks like a great resource, worth following.
The post On the ‘net: Interview on my network career appeared first on rule 11 reader.
The post Worth Reading: What if we designed differently? appeared first on rule 11 reader.
The post Worth Reading: A different kind of bubble appeared first on rule 11 reader.