Today I’m jumping into water to start writing about some area where I have some half-decent background: the intersection of Open Software/Hardware and Networking.
You see, I’m a software guy. The pragmatical Linux/OpenSource fanboy kind. What that means? I have a formal degree on Computer Science, and wrote Linux drivers and software for embedded systems for 8 years. But I’m also a pragmatical guy: I know how to write kernel drivers, but I use a Mac laptop every day because I like things to work. For the last 4 years I have been learning a big from networking at Hewlett Packard Enterprise, where I have worked on networking (SDN, ASICs), and more recently on the OpenSwitch project.
Continue readingThe post Worth Reading: The FCC’s subtractive privacy rules appeared first on 'net work.
Howdy. In my previous post, I mentioned doing a deep dive of SONiC, the recent software release from Microsoft. So without further delay, Software for Open Networking in the Cloud, or SONiC. What It Ain’t I’m sure y’all might have read this FAQ, but just in case, I’ll hit the main points: SONiC is not […]
The post What People Get Wrong About Microsoft SONiC appeared first on Packet Pushers.
Howdy. In my previous post, I mentioned doing a deep dive of SONiC, the recent software release from Microsoft. So without further delay, Software for Open Networking in the Cloud, or SONiC. What It Ain’t I’m sure y’all might have read this FAQ, but just in case, I’ll hit the main points: SONiC is not […]
The post What People Get Wrong About Microsoft SONiC appeared first on Packet Pushers.
Yvette Kanouff takes the service provider group amid a reportedly huge Cisco reorg.
Interop is one of the few remaining independent tech conferences, which makes it a unique opportunity for IT professionals to get training, education, and insights that aren’t driven by a vendor’s agenda. The conference stretches over five days, you’ll want to plan ahead because there’s so much to choose from, including multi-day workshops, individual sessions, […]
The post How To Get The Most Out Of Interop appeared first on Packet Pushers.
Interop is one of the few remaining independent tech conferences, which makes it a unique opportunity for IT professionals to get training, education, and insights that aren’t driven by a vendor’s agenda. The conference stretches over five days, you’ll want to plan ahead because there’s so much to choose from, including multi-day workshops, individual sessions, […]
The post How To Get The Most Out Of Interop appeared first on Packet Pushers.
Cisco’s newly released HyperFlex extends Cisco’s strategy of software-defined, policy-driven infrastructure to hyperconvergence to overcome the limitations of early hyperconverged infrastructure solutions.
It’s not like they’re asking for a back door for every device.
If the world goes dark through encryption, we’ll be back to the wild west!
After all, if it were your daughter who had been killed in a terrorist attack, you’d want the government to get to that information, too.
While sitting on a panel this last week, I heard all three reactions to the Apple versus FBI case. But none of these reactions ring true to me.
Let’s take the first one: no, they’re not asking for a back door for every device. Under the time tested balance between privacy and government power, the specific point is that people have a reasonable expectation of privacy until they come under suspicion of wrongdoing. However, it’s very difficult to trust that, in the current environment, that such power, once granted, won’t be broadened to every case, all the time. The division between privacy and justice before the law was supposed to be at the point of suspicion. That wall, however, has already been breached, so the argument now moves to “what information should the government be able to trawl through in order to find crimes?” They are asking for Continue reading