Peter Welcher of NetCraftsmen explains how to make sure you choose the right router or firewall to meet your performance and throughput needs.
Our good friend mr. Anonymous has too many buzzwords and opinions in his repertoire, at least based on this comment he left on my Using 4-byte AS Numbers with EVPN blog post:
But IGPs don't scale well (as you might have heard) except for RIFT and Openfabric. The others are trying to do ECMP based on BGP.
Should you be worried about OSPF or IS-IS scalability when building your data center fabric? Short answer: most probably not. Before diving into a lengthy explanation let's give our dear friend some homework.
Read more ...We’ll be looking at a couple more papers from the re-coding Black Mirror workshop today:
(If you don’t have ACM Digital Library access, all of the papers in this workshop can be accessed either by following the links above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page).
It’s possible to recognise emotions from a variety of signals including facial expressions, gestures and voices, using wearables or remote sensors, and so on.
In the current paper we envision a future in which such technologies perform with high accuracy and are widespread, so that people’s emotions can typically be seen by others.
Clearly, this could potentially reveal information people do not wish to reveal. Emotions can be leaked through facial micro-expressions and body language making concealment very difficult. It could also weaken social skills if it is believed that there is no need to speak or move to convey emotions. “White lies” might become impossible, removing a person’s responsibility to be compassionate. It could also lead to physical harm:
The ability Continue reading
I recently came across a simple idea that is having a positive impact on productivity. That idea is to not reply to everything. While this can be applied to social media broadly, I’m focused on email management here.
For me, not replying is more difficult than it sounds. I am a personality type that doesn’t like loose ends. I like to meet other’s expectations, and have them think cuddly, happy thoughts about what a swell person I am. I know that when I send an email, I hope to get a response. Therefore, when I receive an e-mail, my natural inclination is to respond.
Now, I don’t feel I overly waste time on replying to email. I’ve improved my response technique over the years. I bring an e-mail thread to a conclusion as rapidly as possible by anticipating and proactively answering questions. That’s more time-consuming than a quick, lazy “back to you” response, but saves time in the long run.
However, an advance on the proactive reply is never replying at all. Not responding is the ultimate way to bring an email thread to a conclusion.
On the surface, ignoring inbox messages seems rude. However, Continue reading
I recently came across a simple idea that is having a positive impact on productivity. That idea is to not reply to everything. While this can be applied to social media broadly, I’m focused on email management here.
For me, not replying is more difficult than it sounds. I am a personality type that doesn’t like loose ends. I like to meet other’s expectations, and have them think cuddly, happy thoughts about what a swell person I am. I know that when I send an email, I hope to get a response. Therefore, when I receive an e-mail, my natural inclination is to respond.
Now, I don’t feel I overly waste time on replying to email. I’ve improved my response technique over the years. I bring an e-mail thread to a conclusion as rapidly as possible by anticipating and proactively answering questions. That’s more time-consuming than a quick, lazy “back to you” response, but saves time in the long run.
However, an advance on the proactive reply is never replying at all. Not responding is the ultimate way to bring an email thread to a conclusion.
On the surface, ignoring inbox messages seems rude. However, Continue reading
The carrier sees an addressable market of some 30 million homes for its fixed 5G service plans, but it will also support slices for mobile and enterprise services.
In the Republic of Georgia, high in the mountains of the Tusheti region, a community network has been built to bring faster Internet connectivity to those that did not have it. The story is compelling, not only for the determination of people to make sure that the Internet is available in one of the remotest places in the world, but also for their strong belief of what connecting to the Internet could bring to the people of Tusheti. “Tourism is a beacon of hope for us,” said Ia Buchaidze, who owns a local bakery, “and the Internet is very important for that.”
The project was a true collaborative partnership involving many parties: the Georgian Government, the Internet Society and its Georgia Chapter, the Small and Medium Telecom Operators Association of Georgia, LTD Freenet, and the Tusheti Development Fund (TDF). This network did not need a license, but it did need an authorization from the Georgian Government for it to be built and for the spectrum to be used. The objective was to provide access to a remote region through a locally-built and developed community network.
Similarly, in Mexico, a community network has been built in a remote and Continue reading
The encryption software only runs on Intel hardware now, but the startup isn’t ruling out support for other vendors in the future.
Ankur Singla says that solving business problems has more value than simply selling a technology.
President Donald Trump tweeted Sunday that he and Chinese President Xi were in talks to resolve, or potentially lessen, the ban imposed on the Chinese firm last month.
Way back in the old days, the unit I worked at in the US Air Force had a room with a lot of equipment used for processing classified information. Among this equipment was a Zenith Z-250 with an odd sort of keyboard and a very low resolution screen. A fine metal mesh embedded in a semi-clear substrate was glued to the surface of the monitor. This was our TEMPEST rated computer, on which we could type up classified memos, read classified email, and the like. We normally connected it to the STU-3 through a modem (remember those) to send and receive various kinds of classified information.
Elovici, Mordechai Guri, Yuval. “Bridgeware: The Air-Gap Malware.” Accessed May 13, 2018. https://cacm.acm.org/magazines/2018/4/226377-bridgeware/abstract.
The idea of TEMPEST begins way back in 1985, when a Dutch researcher demonstrated “reading” the screen of a computer using some relatively cheap, and easy to assemble, equipment, from several feet away. The paper I’m looking at today provides a good overview of the many ways which have been discovered since this initial demonstration to transfer data from one computer to another across what should be an “air gap.” For instance, the TEMPEST rated computer described Continue reading
Several organizations are assembling the technologies to enable self-sovereign identity, a way for individuals to control who they are online. Blockchain is one of those essential components.