Nominations Now Open for 2019 Internet Society Board of Trustees Election

The Internet Society Nominations Committee is now inviting nominations for candidates to serve on the Internet Society Board of Trustees.

In 2019, Internet Society Chapters and the IETF will each select one Trustee, and our Organization Members will select two Trustees. Following an orientation program, all new Trustees will begin 3-year terms commencing with the Internet Society Annual General Meeting in July.

The Board of Trustees provides strategic direction, inspiration, and oversight to advance the Internet Society’s mission of preserving the open, globally-connected, trustworthy and secure Internet for everyone.

If you or someone you know is interested in serving on the Board, please see the official Call for Nominations, additional information, and links to online nomination forms at:
http://www.internetsociety.org/trustees

The nominations period closes at 15:00 UTC on Friday, 14 December 2018.

The post Nominations Now Open for 2019 Internet Society Board of Trustees Election appeared first on Internet Society.

Plenipot 2018 – What’s Up for the Internet?

Two weeks ago, the Editorial Board of the New York Times published a piece predicting that the Internet is heading for a breakup.

Based on the comments made by Alphabet Chairman Eric Schmidt during a private event the Times set out to paint a picture of a world with three Internets.

The timing is understandable. We’re in a world where things like the European Union’s General Data Protection Regulation is met with an equal measure of acceptance, annoyance, and confusion around the world.

And, just last week, my colleague Konstantinos Komaitis warned about what could happen as decision-makers are imposing rules that spill over onto the Internet, hamper innovation, deter investment in their own countries, and risk creating new digital divides.

These events set the stage for the Plenipotentiary meeting of the International Telecommunications Union (ITU).

And, in today’s climate, there are many who believe the Internet could be failing us.

So, we need to speak loudly about the fact that the Internet is not failing.

So far, I think the Internet has been a force for good.

The Internet allows us to do things like expand our access to education, build businesses, and grow our economy.

The Internet Continue reading

VMworld 2018 Europe Sessions on NSX Networking and Security in VMware Cloud on AWS

VMworld 2018 Europe in Barcelona is a week away. Want to learn more about NSX Networking and Security in VMware Cloud on AWS, how you can easily deploy and secure workloads in the cloud, or how to build hybrid cloud solutions with the familiarity and capabilities of vSphere? Make sure to attend the below sessions at VMworld 2018 Europe next week. We will go into a deep dive of all the functionality and show how VMware Cloud on AWS is being used by customers. Continue reading

The Week in Internet News: Rural Maine Looks to Community Broadband

Broadband for themselves: Rural Maine residents are looking into ways to create their own community broadband networks because of a lack of service in some areas, the Press Herald reports. About 15 percent of the state’s residents don’t have access to 25 Mbps broadband service. A project in the St. Croix Valley would create Maine’s first publicly-owned broadband network.

Home patches: Amazon has issued 13 security patches, with some addressing vulnerabilities in its Internet of Things home devices, Engadget reports. If left unpatched, the security holes would let intruders crash devices and remotely run code, giving them full control.

Confusion and delay: Meanwhile, a lot of companies that are potential IoT users are delaying their deployments because of security concerns, reports Betanews. About half of companies labeled as early adopters have delayed an IoT purchase because of security issues, according to a survey from F-Secure.

The cost of a breach: Yahoo has agreed to pay a $50 million settlement to the 200 million people affected the company’s huge 2013 data breach, Fortune says. The company will also pay a tidy $35 million in lawyers’ fees. The settlement applies only to a fraction of the people affected by the email breach.

Continue reading

IBM says buying Red Hat makes it the biggest in hybrid cloud

In a move that IBM says will make it the world’s leader in hybrid cloud, the company says it’s going to buy open-source giant Red Hat for $34 billion, banking on what it sees as Red Hat’s potential to become the operating system of choice for cloud providers.IBM says it expects growth in the use of cloud services to blossom in the coming years, with enterprises poised to expand from using cloud for inexpensive compute power to placing more applications in the cloud.[ Now see After virtualization and cloud, what's left on premises?] “To accomplish this, businesses need an open, hybrid cloud approach to developing, running and deploying applications in a multi-cloud environment,” IBM says in a written statement.To read this article in full, please click here

IBM says buying Red Hat makes it the biggest in hybrid cloud

In a move that IBM says will make it the world’s leader in hybrid cloud, the company says it’s going to buy open-source giant Red Hat for $34 billion, banking on what it sees as Red Hat’s potential to become the operating system of choice for cloud providers.IBM says it expects growth in the use of cloud services to blossom in the coming years, with enterprises poised to expand from using cloud for inexpensive compute power to placing more applications in the cloud.[ Now see After virtualization and cloud, what's left on premises?] “To accomplish this, businesses need an open, hybrid cloud approach to developing, running and deploying applications in a multi-cloud environment,” IBM says in a written statement.To read this article in full, please click here

Rough Guide to IETF 103

Starting next weekend, the Internet Engineering Task Force will be in Bangkok for IETF 103, where around 1,000 engineers will discuss open Internet standards and protocols. The week begins on Saturday, 3 November, with a Hackathon and Code Sprint. The IETF meeting itself begins on Sunday and goes through Friday. We’ll be providing our rough guides on topics of mutual interest to both the IETF and the Internet Society as follows:

  • Overview of ISOC @ IETF (this post)
  • Internet Infrastructure Resilience
  • Internet of Things
  • IPv6
  • DNSSEC, DNS Security and Privacy
  • Identity, Privacy, and Encryption

For more general information about IETF 103 see:

Here are some of the activities that the Internet Society is involved in during the week.

Applied Networking Research Prize (ANRP)

Through the Applied Networking Research Prize (ANRP), supported by the Internet Society, the Internet Research Task Force (IRTF) recognizes the best new ideas in networking and brings them to the IETF, especially in cases where the ideas are relevant for transitioning into shipping Internet products and related standardization efforts. Out of 55 submissions in 2018, six submissions will be awarded prizes. Two winners will present their Continue reading

More on Setting up etcd with Kubeadm

A while ago I wrote about using kubeadm to bootstrap an etcd cluster with TLS. In that post, I talked about one way to establish a secure etcd cluster using kubeadm and running etcd as systemd units. In this post, I want to focus on a slightly different approach: running etcd as static pods. The information on this post is intended to build upon the information already available in the Kubernetes official documentation, not serve as a replacement.

For reference, the Kubernetes official documentation has a write-up on using kubeadm to establish an etcd cluster with etcd running as static pods. For Kubernetes 1.12.x (the current version as of this writing), that information is here; for Kubernetes 1.11.x, that same information is here.

When using these instructions for use with Kubernetes 1.11.x, the official guide leaves something out that is very important: reconfiguring the kubelet to operate in a standalone fashion (without the Kubernetes control plane). This information is present in the 1.12.x documentation, but it applies to both versions.

Now, lest you think you can just follow the 1.12.x documentation for a 1.11.x cluster, you need Continue reading

Network documentation 101 ! How? When? Why?

Documentation is an extremely important rule when building a network. You will know what has been done in your network. With a good network documentation, the network support and maintenance procedures could handle the incidents in a more professional and organized way.     Without a good network documentation, there is no map, topology or …

The post Network documentation 101 ! How? When? Why? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Network documentation 101 ! How? When? Why?

Documentation is an extremely important rule when building a network. You will know what has been done in your network. With a good network documentation, the network support and maintenance procedures could handle the incidents in a more professional and organized way.     Without a good network documentation, there is no map, topology or …

The post Network documentation 101 ! How? When? Why? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.