Plenipot 2018 – What’s Up for the Internet?

Two weeks ago, the Editorial Board of the New York Times published a piece predicting that the Internet is heading for a breakup.

Based on the comments made by Alphabet Chairman Eric Schmidt during a private event the Times set out to paint a picture of a world with three Internets.

The timing is understandable. We’re in a world where things like the European Union’s General Data Protection Regulation is met with an equal measure of acceptance, annoyance, and confusion around the world.

And, just last week, my colleague Konstantinos Komaitis warned about what could happen as decision-makers are imposing rules that spill over onto the Internet, hamper innovation, deter investment in their own countries, and risk creating new digital divides.

These events set the stage for the Plenipotentiary meeting of the International Telecommunications Union (ITU).

And, in today’s climate, there are many who believe the Internet could be failing us.

So, we need to speak loudly about the fact that the Internet is not failing.

So far, I think the Internet has been a force for good.

The Internet allows us to do things like expand our access to education, build businesses, and grow our economy.

The Internet Continue reading

VMworld 2018 Europe Sessions on NSX Networking and Security in VMware Cloud on AWS

VMworld 2018 Europe in Barcelona is a week away. Want to learn more about NSX Networking and Security in VMware Cloud on AWS, how you can easily deploy and secure workloads in the cloud, or how to build hybrid cloud solutions with the familiarity and capabilities of vSphere? Make sure to attend the below sessions at VMworld 2018 Europe next week. We will go into a deep dive of all the functionality and show how VMware Cloud on AWS is being used by customers. Continue reading

The Week in Internet News: Rural Maine Looks to Community Broadband

Broadband for themselves: Rural Maine residents are looking into ways to create their own community broadband networks because of a lack of service in some areas, the Press Herald reports. About 15 percent of the state’s residents don’t have access to 25 Mbps broadband service. A project in the St. Croix Valley would create Maine’s first publicly-owned broadband network.

Home patches: Amazon has issued 13 security patches, with some addressing vulnerabilities in its Internet of Things home devices, Engadget reports. If left unpatched, the security holes would let intruders crash devices and remotely run code, giving them full control.

Confusion and delay: Meanwhile, a lot of companies that are potential IoT users are delaying their deployments because of security concerns, reports Betanews. About half of companies labeled as early adopters have delayed an IoT purchase because of security issues, according to a survey from F-Secure.

The cost of a breach: Yahoo has agreed to pay a $50 million settlement to the 200 million people affected the company’s huge 2013 data breach, Fortune says. The company will also pay a tidy $35 million in lawyers’ fees. The settlement applies only to a fraction of the people affected by the email breach.

Continue reading

IBM says buying Red Hat makes it the biggest in hybrid cloud

In a move that IBM says will make it the world’s leader in hybrid cloud, the company says it’s going to buy open-source giant Red Hat for $34 billion, banking on what it sees as Red Hat’s potential to become the operating system of choice for cloud providers.IBM says it expects growth in the use of cloud services to blossom in the coming years, with enterprises poised to expand from using cloud for inexpensive compute power to placing more applications in the cloud.[ Now see After virtualization and cloud, what's left on premises?] “To accomplish this, businesses need an open, hybrid cloud approach to developing, running and deploying applications in a multi-cloud environment,” IBM says in a written statement.To read this article in full, please click here

IBM says buying Red Hat makes it the biggest in hybrid cloud

In a move that IBM says will make it the world’s leader in hybrid cloud, the company says it’s going to buy open-source giant Red Hat for $34 billion, banking on what it sees as Red Hat’s potential to become the operating system of choice for cloud providers.IBM says it expects growth in the use of cloud services to blossom in the coming years, with enterprises poised to expand from using cloud for inexpensive compute power to placing more applications in the cloud.[ Now see After virtualization and cloud, what's left on premises?] “To accomplish this, businesses need an open, hybrid cloud approach to developing, running and deploying applications in a multi-cloud environment,” IBM says in a written statement.To read this article in full, please click here

Rough Guide to IETF 103

Starting next weekend, the Internet Engineering Task Force will be in Bangkok for IETF 103, where around 1,000 engineers will discuss open Internet standards and protocols. The week begins on Saturday, 3 November, with a Hackathon and Code Sprint. The IETF meeting itself begins on Sunday and goes through Friday. We’ll be providing our rough guides on topics of mutual interest to both the IETF and the Internet Society as follows:

  • Overview of ISOC @ IETF (this post)
  • Internet Infrastructure Resilience
  • Internet of Things
  • IPv6
  • DNSSEC, DNS Security and Privacy
  • Identity, Privacy, and Encryption

For more general information about IETF 103 see:

Here are some of the activities that the Internet Society is involved in during the week.

Applied Networking Research Prize (ANRP)

Through the Applied Networking Research Prize (ANRP), supported by the Internet Society, the Internet Research Task Force (IRTF) recognizes the best new ideas in networking and brings them to the IETF, especially in cases where the ideas are relevant for transitioning into shipping Internet products and related standardization efforts. Out of 55 submissions in 2018, six submissions will be awarded prizes. Two winners will present their Continue reading

More on Setting up etcd with Kubeadm

A while ago I wrote about using kubeadm to bootstrap an etcd cluster with TLS. In that post, I talked about one way to establish a secure etcd cluster using kubeadm and running etcd as systemd units. In this post, I want to focus on a slightly different approach: running etcd as static pods. The information on this post is intended to build upon the information already available in the Kubernetes official documentation, not serve as a replacement.

For reference, the Kubernetes official documentation has a write-up on using kubeadm to establish an etcd cluster with etcd running as static pods. For Kubernetes 1.12.x (the current version as of this writing), that information is here; for Kubernetes 1.11.x, that same information is here.

When using these instructions for use with Kubernetes 1.11.x, the official guide leaves something out that is very important: reconfiguring the kubelet to operate in a standalone fashion (without the Kubernetes control plane). This information is present in the 1.12.x documentation, but it applies to both versions.

Now, lest you think you can just follow the 1.12.x documentation for a 1.11.x cluster, you need Continue reading

Network documentation 101 ! How? When? Why?

Documentation is an extremely important rule when building a network. You will know what has been done in your network. With a good network documentation, the network support and maintenance procedures could handle the incidents in a more professional and organized way.     Without a good network documentation, there is no map, topology or …

The post Network documentation 101 ! How? When? Why? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Network documentation 101 ! How? When? Why?

Documentation is an extremely important rule when building a network. You will know what has been done in your network. With a good network documentation, the network support and maintenance procedures could handle the incidents in a more professional and organized way.     Without a good network documentation, there is no map, topology or …

The post Network documentation 101 ! How? When? Why? appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Noria: dynamic, partially-stateful data-flow for high-performance web applications

Noria: dynamic, partially-stateful data-flow for high-performance web applications Gjengset, Schwarzkopf et al., OSDI’18

I have way more margin notes for this paper than I typically do, and that’s a reflection of my struggle to figure out what kind of thing we’re dealing with here. Noria doesn’t want to fit neatly into any existing box!

We’ve seen streaming data-flow engines that maintain state and offer SQL interfaces and even transactions (e.g. Apache Flink, and data Artisan’s Streaming Ledger for Flink). The primary model here is data-flow, and SQL is bolted on as an interface to the state. The title of this paper sets me off thinking along those lines, but from the end user perspective, Noria looks and feels more like a database. The SQL interface is primary, not ancillary, and it maintains relational data in base tables (using RocksDB as the storage engine). Noria makes intelligent use of data-flow beneath the SQL interface (i.e., dataflow is not exposed as an end-user programming model) in order to maintain a set of (semi-)materialized views. Noria itself figures out the most efficient data-flows to maintain those views, and how to update the data-flow graphs in the face of Continue reading