Link Propagation, a Packet Pushers newsletter, is included in your free Ignition membership.
It’s Friday. That’s nice.
1. Q: Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible?
This video of a USENIX keynote by James Mickens may be one of the funniest–and illuminating–things I’ve seen. He opens the keynote with a technical overview of machine learning and why computer scientists don’t have a great understanding of how ML produces the results it does, and then explores what that means if you apply ML and AI to things like security.
I think his presentation is best summed up in this quote: “If you know the Internet is a cauldron of evil, and if you know you don’t fully understand how machine learning works, why would you connect the two?”
2. The Cargo Cult of Google Tools – Networking Nerd
Tom Hollingsworth writes “We’ve reached the point in networking and other IT disciplines where we have built cargo cults around Facebook and Google. We practically worship every tool they release into the wild and try to emulate that style in our own networks.”
Is this a good idea? Tom argues that the problems Google and Facebook are solving with their tools aren’t same as your problems, and they definitely aren’t at the same scale. I agree that there’s a cool factor to a tool or approach that comes from a giant tech company full of wizards; if you’re adopting said tool or approach just because of the cool factor, well, there’s a good chance it will blow up in your face.
But if it can solve a problem you have, or might teach you something useful, maybe it’s OK to visit the cult without drinking the Kool-aid.
3. Another Example Of How Important Wire Is To Wireless – WiredNot
Lee Badman tells a real-life tale about why wires still matter in a WLAN world.
4. MikroTik Automated MPLS L3VPN Lab – NeckerCube
Jed Casey shares diagrams and config details on building out a testing lab using MikroTik’s RouterOS.
“This lab demonstrates an automated configuration of a basic MPLS L3VPN service, including four SP core routers, four SP PE routers, and four CE routers representing two different customers.”
5. Liskov Substitution and Modularity in Network Design – Rule11 Reader
Russ White writes “One of the hardest things for designers to wrap their heads around is the concept of unintended consequences. One of the definitional points of complexity in any design is the problem of “push button on right side, weird thing happens over on the left side, and there’s no apparent connection between the two.” This is often just a result of the complexity problem in its base form — the unsolvable triangle (fast/cheap/quality — choose two). The problem is that we often don’t see the third leg of the triangle.”
6. The VMware Compatibility Guide, First Stop for Successful Upgrades – vMiss
Melissa Palmer writes “Ensuring your configuration is supported is the first step for a successful vSphere Upgrade. If you run into issues, you will want to call VMware support, or support of a VMware partner. The first thing they will review with you is all of your hardware and software versions, beyond just VMware vSphere. Guess what? If the combination you are running is not listed on the VMware Compatibility Matrix, you may not be able to receive support. The last thing you want to do is to hear that customer support cannot help you, or that there will be extra costs associated with support.”
1. Getting To The Root Of Security With Trusted Silicon – The Next Platform
“With workloads and data moving from the core datacenter out to the edge or the cloud and back and applications coming in from multiple sources, traditional perimeter defenses by themselves no longer cut it, putting the onus on tech vendors and component makers to find ways to ensure that their products and datacenters are safe.”
2. The Untold Story of NotPetya, the Most Devastating Cyberattack in History – Wired
Wired delves into the NotPetya malware attack that crippled Maersk, the global shipping giant.
3. Verizon throttled fire department’s “unlimited” data during Calif. wildfire – Ars Technica
“Santa Clara Fire paid Verizon for “unlimited” data but suffered from heavy throttling until the department paid Verizon more, according to Bowden’s declaration and emails between the fire department and Verizon that were submitted as evidence.”
4. The four ways that ex-internet idealists explain where it all went wrong – MIT Technology Review
Huh. Maybe this whole “Internet” thing was a bad idea after all…
Vendor & Industry Blogs & Announcements
We are taking new steps against broadening threats to democracy – Microsoft on the Issues
AppViewX 12.4 takes low-code network automation to the next level – Help Net Security
How to rapidly develop apps with microservices – Cloud Native Computing Foundation
Network Break 198: VMware Targets Security; Cisco’s Software Embrace
How VMware Plans to Put the Screws on Cisco – Light Reading
Square can now process chip cards in two seconds – TechCrunch
Cisco Q4 revenue earnings up 6% yoy to $12.8B – Light Reading
Cisco Aims to Keep Revenue Growth Rolling – Wall Street Journal
Cisco Estimates Beatable, But Guidance Likely Messy, Says Analyst – Investor’s Business Daily
Cisco Reports Fourth Quarter and Fiscal Year 2018 Earnings – Cisco Systems