Are you looking to improve how you hire technical talent? Essilen Research's free video series can help. Fix common issues in screening, interviewing, closing and on-boarding. Learn how world-class tech companies crush the hiring game!
Sisu Data is looking for machine learning engineers who are eager to deliver their features end-to-end, from Jupyter notebook to production, and provide actionable insights to businesses based on their first-party, streaming, and structured relational data. Apply here.
Triplebyte lets exceptional software engineers skip screening steps at hundreds of top tech companies like Apple, Dropbox, Mixpanel, and Instacart. Make your job search O(1), not O(n). Apply here.
Need excellent people? Advertise your job here!
Cool Products and Services
Level up on in-demand technologies and prep for your interviews on Educative.io, featuring popular courses like the bestselling Grokking the System Design Interview. For the first time ever, you can now sign up for a subscription to get unlimited access to every course on the platform at a discounted price through the holiday period only. You'll also get to lock in this price as long as you're a subsciber.
Stateful JavaScript Apps. Effortlessly add state Continue reading
Today’s Internet requires stronger protection within its core routing system and as we have already said: it's high time to stop BGP route leaks and hijacks by deploying operationally-excellent RPKI!
Luckily, over the last year plus a lot of good work has happened in this arena. If you’ve been following the growth of RPKI’s validation data, then you’ll know that more and more networks are signing their routes and creating ROA’s or Route Origin Authorizations. These are cryptographically-signed assertions of the validity of an announced IP block and contribute to the further securing of the global routing table that makes for a safer Internet.
The protocol that we have not written much about is RTR. The Resource Public Key Infrastructure (RPKI) to Router Protocol - or RTR Protocol for short. Today we’re fixing that.
RPKI rewind
We have written a few times about RPKI (here and here). We have written about how Cloudflare both signs its announced routes and filters its routing inbound from other networks (both transits and peers) using RPKI data. We also added our efforts in the open-source software space with the release of the Cloudflare RPKI Toolkit.
Modern web architecture relies heavily on JavaScript and enabling third-party code to make client-side network requests. These innovations are built on client-heavy frameworks such as Angular, Ember, React, and Backbone that leverage the processing power of the browser to enable the execution of code directly on the client interface/web browser. These third-party integrations provide richness (chat tools, images, fonts) or extract analytics (Google Analytics). Today, up to 70% of the code executing and rendering on your customer’s browser comes from these integrations. All of these software integrations provide avenues for potential vulnerabilities.
Unfortunately, these unmanaged, unmonitored integrations operate without security consideration, providing an expansive attack surface that attackers have routinely exploited to compromise websites. Today, only 2% of the Alexa 1000 global websites were found to deploy client-side security measures to protect websites and web applications against attacks such as Magecart, XSS, credit card skimming, session redirects and website defacement.
Improving website security and ensuring performance with Cloudflare Workers
In this post, we focus on how Cloudflare Workers can be used to improve security and ensure the high performance of web applications. Tala has joined Cloudflare’s marketplace to further our common goals of ensuring website security, preserving data privacy and Continue reading
The vMotion is instantaneous and lossless myth has been propagated since the early days of vMotion when sysadmins proudly demonstrated what seemed to be pure magic to amazed audiences… including the now-traditional terminal window running ping and not losing a single packet.
The vMotion is instantaneous and lossless myth has been propagated since the early days of vMotion when sysadmins proudly demonstrated what seemed to be pure magic to amazed audiences… including the now-traditional terminal window running ping and not losing a single packet.
As COVID-19 (Corona) has spread around the world, and while we can argue how serious that is, a lot of tech conferences have been cancelled, and rightfully so. Safety always comes first.
People have suggested that virtual conferences could be a replacement, but as I’ll explain in this blog, they can never really replace a standard conference, rather just be a complement.
First, let me just clear a couple of things:
Safety comes first, if the prize of safety is to cancel a tech conference, that’s a small prize to pay
We should generally try to travel less and replace some of the travel with the use of collaboration apps such as Webex, Zoom etc
There are virtual conferences, such as the PacketPushers VDC, that do work in a virtual format
The first challenge is that we are all in different time zones. When I go to Cisco Live in the US, I adjust to the US time. If I’m staying here in Sweden, I’m not going to stay up late to watch a stream coming from the US.
When you travel to a conference, you are away from work and family, you have dedicated that time to make the Continue reading
When it comes to Ethiopia’s future
online, there are many reasons to feel optimistic.
The country has one of the
fastest-growing economies in the region, is strategically placed, and has a population
of over 105 million, 60% of whom are under the age of 30. All of these are
assets to make it a regional digital giant.
But this won’t happen unless Ethiopia takes some strategic moves. Internet penetration is still very low compared to its peers in Africa. The rural areas are still largely unconnected to the Internet. Only cities enjoy 3G access and 4G is only available in the capital. In spite of successive price cuts by Ethio telecom in the last year, the Internet is not affordable for the majority of Ethiopians.
It’s not that the government has not wanted to connect the rural areas. In fact, the rationale that the Ethiopian government had to keep the monopoly was to use the money generated from cities to invest in the rural areas. However, this strategy has clearly not worked since Ethiopia’s rural areas are not better connected than those in countries that have not had a government monopoly on the sector, such as Kenya.
We are excited about the momentum behind Ethiopia.
It is a rare moment in any country’s history to undergo such a positive transformation. It’s a time of immense optimism and investment potential. It’s not a surprise as the country also has one of the fastest-growing economies in the region, is strategically placed, and has a young population of over 105 million – half of whom are under the age of 18.
While we’ve been active in the Internet world for many years, the time to start a Chapter in Ethiopia is absolutely now. With that, let me share our “why” and introduce ourselves.
We are the Internet Society Ethiopia Chapter.
The idea of starting an Internet Society Chapter came to us during a workshop in the city of Bahir Dar, where we became conscious of the fact that more than 85% of the Ethiopia population is losing countless opportunities every day because they don’t have access to the Internet. We believe the Internet is for everyone and we are here to work with all people – from communities to businesses to governments and ordinary people to connect the unconnected and create a bigger and stronger Internet in Ethiopia. What drives Continue reading
Take a Network Break. This week's IT news analysis covers a new anti-malware appliance from Fortinet, VMware security software for data centers and clouds, Nokia's efforts to buy time as it gets its 5G house in order, and financial results from multiple vendors.
Take a Network Break. This week's IT news analysis covers a new anti-malware appliance from Fortinet, VMware security software for data centers and clouds, Nokia's efforts to buy time as it gets its 5G house in order, and financial results from multiple vendors.
Update March 6, 2020: This post will be obsolete soon by a new version
Forewords
This article explains the similarities between a LISP/VXLAN based Campus Fabric and AWS Virtual Private Cloud (VPC) from the Intra-Subnet Control-Plane and Data-Plane operation perspective. The AWS VPC solution details are not publicly available and the information included in this article is based on the author's own study using publically available AWS VPC documentation. There are two main reasons for writing this document:
First, Cisco SDA is an on-prem LAN model while the AWS VPC is an off-prem DC solution. I wanted to point out that these two solutions, even though used for very different purposes, use the same kind of Control-Plane operation and Data-Plane encapsulation and are managed via QUI. This is kind of my answer to ever going discussion about is there DC-networks, Campus-networks and so on, or is there just networks.
Second, my own curiosity to understand the operation of AWS VPC. I usually start by introducing the example environment and then explaining the configuration, moving to Control-Plane operation and then to Data-Plane operation. However, this time I take a different approach. This article first introduces the example environment but then the Data-Plane operation is discussed before Control-Plane operation. This way it is easier to understand what information is needed and how that information is gathered.