Think about the audience and not yourself
Huawei is not insecure and nothing has yet been found
Still 600K to go. Get in there and waste them today!!
Your IT Infrastructure is at risk is when the U.S. government places sanctions on foreign countries.
Geoff Huston, APNIC’s Chief Scientist, breaks down how TCP and BBR work
Don’t underestimate engineers. They are smarter than you know.
Next time someone in your company asks you if WiFi or electricty is bad for their health, send them this video. Its a balanced summary of the issue with a lot of detailed research. The list of research sources is comprehensive,.
The gray market for IT gear is driven by high vendor prices for new products and by unscrupulous people looking to make a quick buck. Here are four aspects of the gray market that I’ve observed.
Huawei is likely a serious risk but not for the reasons that you think.
Fresh from a conference of MPLS providers telling people that only MPLS or Direct Internet Access (over MPLS) is the only possible solution. Its not, SDWAN over 4G works and often is cost effective too. MPLS is expensive and often more expensive than 3G/4G. An SDWAN solution makes a good network out of any bandwidth….
It’s no secret that relations between Amazon and Oracle are very sour. Oracle has made very public claims that critical Amazon run on their databases. This was done without permission (a legal requirement to use another brand as an endorsement) and against Amazon’s no brand sharing policy. James Hamilton writes on his personal blog: However,…
Enterprise IT used to be dominated by one supplier in each market (think Cisco in switching, Microsoft in desktops, etc.). Will the same pattern repeat in a “software-defined” world, or will diversity reign?
I’ve been using ‘Reader Mode’ on MacOS Safari browser for quite some time. With the new dark mode feature, it a much better way to get information into my weary brain. Maybe it can work for you too.
IT Security costs too much, paying fines is much cheaper
Don’t let vendors sell you FUD and waste your money. Consider your risk and mitigations.
Introduction to DNS over HTTPS (DOH)
Supply chain safety is more than just implants
Unsurprisingly, Enterprise IT is preventing good encryption because their security devices suck
Deep dive into compromising firmware on Supermicro BMC
One element of the US Govt is supporting vendors in denying the Bloomberg article
A big article from Bloomberg claiming that certain custom manufactured models of Super Micro servers shipped with hardware implants of a company (Elemental) that was offering services to US Security agencies. This company was later sold to Amazon and sold services to a company later acquired by Apple for the Siri voice product. Bloomberg published a…
After panel session about the value of security, Simon said that we need more operations and better people operating the security that we already have. Thats one of Greg’s hot button issues so he got him in front of the camera to get a bit deeper on how Secrutiny does this and the sort results…
The problems begin when people don’t have imposter syndrome.
Geoff Huston asks the questions that other people don’t
Helpful post on difference between general compute and AI processing