William Gibson is working at the height of his abilities in The Peripheral. Characters move back and forth between near present-day and an unusual post-apocalyptic future, and the book blends high-tech, visionary showpieces with themes of class, opportunity, and economic injustice.
The post Book Review: ‘The Peripheral’ By William Gibson appeared first on Packet Pushers.
Five characteristics for good project governance.
Hey, it's HighScalability time:
Republished from Corero DDoS Blog
It’s well known in the industry that DDoS attacks are becoming more frequent and increasingly debilitating, turning DDoS mitigation into a mission critical initiative. From the largest of carriers to small and mid-level enterprises, more and more Internet connected businesses are becoming a target of DDoS attacks. What was once a problem that only a select few dealt with is now becoming a regularly occurring burden faced by network operators.
In my daily engagements with various customers of all shapes and sizes, it’s truly interesting to see how the approach to DDoS mitigation is changing. Much of this is the result of DDoS mitigation services shifting from a “nice to have” technology to a “must-have”, essential in order to maintain business continuity and availability.
When I built DDoS mitigation and detection services for Verizon back in 2004, the intent was to offer value-add revenue producing services to offer subscribers, in an effort to build out our security offerings. For many years, this concept was one that pretty much every provider I worked with was looking into; build a service with the intent of generating new revenue opportunity from customers when traditional avenues such as Continue reading
Talari CTO and co-founder John Dickey joins Ethan Banks and Greg Ferro, along with four IT leaders from various organizations, in a sponsored podcast about real-world SD-WAN deployments and use cases.
The post Show 261: Lessons Learned From SD-WAN Deployments (Sponsored) appeared first on Packet Pushers.
Earlier this week, an article in New York Times captured the world’s imagination with the prospect of secret Russian submarines possessing the ability to sabotage undersea communication cables (with perhaps Marko Ramius at the helm, pictured above). While it is a bit of a Hollywood scenario, it is still an interesting one to consider, although, as we’ll see, perhaps an unrealistic one, despite the temptation to exaggerate the risk.
Submarine cable cuts occur with regularity and the cable repair industry has considerable experience dealing with these incidents. However, the vast majority of these failures are the result of accidents occurring in relatively shallow water, and not due to a deliberate actor intending to maximize downtime. There is enormous capacity and resiliency among the cables crossing the Atlantic (the subject of the New York Times article), so to even make a dent, a saboteur would need to take out numerous cables in short order.
A mass telecom sabotage event involving the severing of many submarine cables (perhaps at multiple hard-to-reach deep-water locations to complicate repairs) would be profoundly disruptive to international communications — Internet or otherwise. For countries like the U.S. with extensive local hosting, the impact Continue reading
Sertillanges, The Intellectual Life
The post QOTW: The Occupation of the Wise appeared first on 'net work.
After passing the CCIE Lab Exam in Routing & Switching v5 on August 27th 2015 my CCIE Plaque has finally arrived. After all the late nights and weekends of studying and the cost of the training, bootcamps, travel and the lab exam fee, what do you get for passing? Well apart from your digits which […]
The post CCIE Plaque has finally arrived! appeared first on Roger Perkin - Networking Articles.
We’re back again with a quick update to Galaxy. In the last release we did some cool things to make searching roles much easier. This release is a mini release focused on fixing a few bugs and adding minor enhancements we couldn’t squeeze into the last cycle.
Galaxy issues are tracked publicly at https://github.com/ansible/galaxy-issues. Here are the issues addressed in release 1.1.1:
#88 Role Data Should Show Last Modified Instead of Created Date
#86 `ansible-galaxy -r roles.txt` - Incorrect Example
#84 README.md Fails to Render When it Contains a Variable String Like
#82 "Sign in" Option Should Appear on Home Page Header
#81 Better Filter for RHEL/Centos -> EL in Platform Search
#53 Adding a Role Called "Ansible" Results in Un-named Role
#14 Add Galaxy support for Debian Jessie
#9 Periods in Role Names Cause Installs to Fail
As part of fixing issue #81, Better Filter for RHEL/Centos -> EL in Platform Search, we changed the way the new role filtering works. A lot of times you know what you’re looking for, and don’t want to wait for autocomplete suggestions. For example, you might be looking for a Platform value of ‘centos’. Typing Continue reading
Content providers were using centralized traffic flow optimization together with MPLS TE for at least 15 years (some of them immediately after Cisco launched the early MPLS-TE implementation in their 12.0(5)T release), but it was always hard to push the results into the network devices.
PCEP and BGP-LS all changed that – they give you a standard mechanism to extract network topology and install end-to-end paths across the network, as Julian Lucek of Juniper Networks explained in Episode 43 of Software Gone Wild.
Read more ...Bright days ahead, CEO Ed Meyercord says.