Link Propagation, a Packet Pushers newsletter, is included in your free Ignition membership.
Thanks for engaging with the Packet Pushers this year. We try to make it worth your while, and we’ll carry on in 2019. See you then.
1. It’s The Change Freeze Season – Networking Nerd
Tom Hollingsworth looks at the reasons why enterprise infrastructure goes on lockdown at the end of the year.
One reason? “Even for “modern” OSes with sanity checking, like Junos or IOS-XR, you have no way of knowing if a change you make on one device somewhere in the branch is going to crash OSPF or BGP for the entire organization.”
2. Serverless Latency? – Ongoing
Serverless is the next big thing in public cloud offerings. Tim Bray does a deep dive into compute latency issues that may affect serverless performance when a function launches from a cold start. He also delves into the complexities that mean you can’t just pick a number and say “I need a latency of no more than X.”
3. How Google Tracks Your Personal Information – Medium
Patrick Berlinquette works in digital marketing, so he has a unique perspective on the kinds of data that online companies provide to advertisers. He uses that perspective to list (and it’s a long list) all the information Google collects about you.
He also talks about forthcoming mechanisms to further refine tracking and advertising. He writes “In 2019, we will be coming close to realizing the Holy Grail of search engine marketing: multidevice attribution. When this tech is realized, ads will follow searchers seamlessly—not only across channels (e.g., social, organic, and email) but across devices (e.g., from mobile to tablet to laptop to TV to desktop).
Depending on your brand loyalty, for example, your TV will emit a hyper-frequency during certain commercials. Undetectable by your obsolete human ear, this signal can only be picked up by a nearby cell phone. If a Nike commercial plays on your TV, and then you pick up your phone and Google “Nike shoes,” your conversion path has been linked from TV to phone. Nice.”
4. flAWS 2 – Summit Route
Summit Route, an AWS security consultancy, has released the second version of a free tutorial on AWS security called flAWS 2. You can play as an attacker or defender, or do one role and then the other.
Creator Scott Piper writes “…this game/tutorial teaches you AWS (Amazon Web Services) security concepts. The challenges are focused on AWS specific issues, so no buffer overflows, XSS, etc. You can play by getting hands-on-keyboard or just click through the hints to learn the concepts and go from one level to the next without playing.”
1. Exclusive: China hacked HPE, IBM and then attacked clients – sources – Reuters
Reuters reports that HPE and IBM were targets of Chinese government attackers who infiltrated HPE and IBM systems, and then targeted customers of the two tech companies.
2. Google’s Secret China Project “Effectively Ended” After Internal Confrontation – The Intercept
Ryan Gallagher, writing at The Intercept, has been closely tracking Google’s Project Dragonfly, a censor-friendly search product supposedly being built by Google to give it access to the Chinese search market.
In his latest news piece, he writes about how Google engineers have lost access to a Chinese website, owned by Google, that provides a search function. Engineers had been harvesting the search queries to help them understand what mainland Chinese users were searching for.
However, Google’s internal privacy team had no knowledge this was happening. Gallagher writes “Members of the privacy team confronted the executives responsible for managing Dragonfly. Following a series of discussions, two sources said, Google engineers were told that they were no longer permitted to continue using the 265.com data to help develop Dragonfly, which has since had severe consequences for the project.”
Google hasn’t walked away from developing a search product for China, but engineers will now have a harder time refining queries and results.
3. Alexa user gets access to 1,700 audio files from a stranger – Tech Crunch
Amazon mistakenly sent a German man the Alexa audio files of a different person. The man had requested his own voice history from Alexa under Europe’s GDPR rules, but when Amazon sent the link, he had access to nearly 2,000 audio files of someone else.
According to Tech Crunch, Amazon says human error was to blame. I’m sure that’s very comforting to all of us.
4. Microsoft mulls acquisition of Israeli chipmaker Mellanox – report – Times Of Israel
OK, here’s a story that’s not about hacking or corporate surveillance or creepy privacy snafus. It’s a good-old-fashioned tech acquisition speculation.
Microsoft is considering the purchase of Mellanox, which makes silicon and other equipment for networking and storage. According to the story, “Microsoft is a key client of Mellanox products, and sees an acquisition as a way to strengthen its services in cloud computing as it competes with the likes of Amazon and Google.”
I’m not sure how owning a hardware supplier would give Microsoft an edge over its competitors, but perhaps Microsoft could leverage Mellanox for Azure Stack, its on-prem play for hybrid cloud.
New On Ignition
If you have a paid membership on Ignition, you can download a brand-new whitepaper on Intent-Based Networking.
The whitepaper covers the key technology concepts and business drivers behind Intent-Based Networking (IBN). It includes:
- 19 pages
- Color illustrations
- A technical overview of IBN
- Enterprise business drivers
- Benefits and drawbacks
- 5 key takeaways
Industry Blogs & Vendor Announcements
WebKit – Wikipedia
VMware NSX-V vs NSX-T Comparison – Vembu
T-Mobile Poland claims 5G network launch – Telegeography
Cisco (CSCO) Is in Talks to Buy Luxtera – Bloomberg