Follow-up to fergdawg, the Georgia Tech/Google study made it on
the wires today (including the front section of our local Oregonian,
below is the Times of India version).
Congrats to NANOG and all the presenters for the network center
energy efficiency segment today. I'm not really active on
Don't be so fast to point the finger. Generally speaking, blame
is obvious from the initial news reports but tends to diminish
with retrospective fact-based assessment.
For example: it's obvious that serious net sites need multihoming.
But what if your multihomed bits go through the same pipe
The story is evolving, as you'd expect. An excerpt from the latest
update at the Chron is below. Nothing at this hour has appeared
on 365main.com. But go there and take a look and decide if
*your* colo has better stuff.
http://www.365main.com/365_main_tour_2.html
And now that we know this
If you turn on IPv6 on an XP machine (or have it turned on for you
by a helpful application or MCP-enabled IT staff) be aware
that there can be unexpected consequences.
In my case it was discovering the nooks and crannies of Teredo,
Microsoft's IPv6 tunnelling protocol.
the case. In any
event, after backing it and IPv6 out, all was well.
fh
-
[h how come I didn't parse any operational content in this post...]
Fred Heutte wrote:
[..]
I spent a couple hours in a hotel recently trying to untangle why
using the DSL system I could see the net
There are significant cable landing sites at Pacific City and at
Nedonna Beach near Rockaway, Oregon, not far from here in Portland.
They connect variously to Japan, Hawaii (and Australia), Alaska
and California.
Quite a bit about these cable terminuses can be found at the
Oregon Fishermen's
Leaving lurk.mode for one of my very rare comments here . . .
I do watch quite a bit of the NANOG meetings and find them
quite interesting. However, Tuesday's discussion/debate on
IP6 was really a standout and I commend everyone involved
for putting on your thinking caps and really mixing it
Creating consternation around boundary conditions and then
proposing artificial self-serving compromises is one of the oldest
games there is on mailing lists, going back pretty much to the
invention of Usenet. At the risk of playing a small role in this
instance, as a longtime lurker I simply
More info. This seems pretty reasonable:
http://castlecops.com/a6445-WMF_Exploit_FAQ.html
Steve Gibson is also mirroring Guilfanov's bypass, and says
Microsoft's cryptographically signed but unreleased patch
is floating around the net now:
http://www.grc.com/sn/notes-020.htm
In my reading
I understand the frustration Valdis has with the Microsoft situation.
I've done my share of patching and updating and crawling under
desks and wrestling with Exchange Server and all the rest,
and fortunately (for my sanity) I'm not managing a few dozen
M$ desktops anymore.
My observation had
Martin Hannigan quoth:
Internet security problems at large haven't even reached the break
of dawn yet. Wait until every phone, toaster, baby intensive care
sensor, and car is hooked up.
Indeed, depending on how you look at it, Vint Cerf's formulation,
IP on everything, is either a promise
The cover story of the Economist this week (with a typical dollop
of hype called How the internet killed the phone business) is
about Skype and VOIP as a disruptive technology (in Clayton
Christensen's sense) that is upending the wireline world but is
even more of a threat to the mobile/cellular
In an running on WWL TV right now, Mayor Ray Nagin says that
a planned sandbag drop to stop the levee breach near pump #6
at the 17th St. Canal didn't happen and the pump has failed, so the
probability is that the bowl will now be filled, meaning water will
flood the majority of the city
(1) There will be a market for independent ISPs as long CLECs
continue to let their customers enjoy poor service and unnecessary
restrictions. Bandwidth is a commodity and scales appropriately;
service is service and does not scale without a great deal
of management commitment, resources, money,
NYT:
The crucial element in the password thefts that provided access
at Cisco and elsewhere was the intruder's use of a corrupted
version of a standard software program, SSH. The program is
used in many computer research centers for a variety of tasks,
ranging from administration of
I doubt that the participants in this discussion who are getting
so huffy about the EFF position are ready to tolerate a
situation where unknown third parties can arbitrarily block
any email they send or receive, without informing them,
regardless of content.
Think about how that maps to the
I like T-Mobile here in Portland, Oregon. Got a Sidekick/Hiptop.
It does web, email, phone, notes, AIM (who cares), calendar,
and the new one out later this month will have a built-in camera.
The little keypad is nicer than the Blackberry.
It was an extra $10 for the Terminal app, which runs
Forgive the continuing thread on s**m, but there was a good
article on the front page of the Friday Wall Street Journal's
Marketplace section, The Spam-China Link.
Countries like China, South Korea and Taiwan are becoming
centers of Internet fraud, the way Grand Cayman or the
Bahamas are
This is quite something. From Judge Lamberth's order, additional
insight into the behavior of a contractor we know well:
It is unfortunate, therefore, that Interior proposes that
[e]ach bureau or office for which reconnection is intended
will take steps to verify its representation that
The new issue of Network Magazine has a cover story that may
be worth a look: SSL VPNs: Remote Access for the Masses,
by Andrew Conry-Murray, which makes a pretty convincing
case for the use of SSL VPNs instead of IPSec. A lot of this
is still-emerging stuff and the author, to his credit,
http://calgary.cbc.ca/regional/servlet/View?filename=ca_aircanada20030819
Web Posted Aug 19 2003 01:36 PM MDT
Air Canada hit by computer slowdown Calgary - A pair of computer
viruses is being blamed for major disruptions in airports across
North America Tuesday, including Calgary
It appears that this was the largest power outage on record,
in a variety of respects (geographic reach, number of grid
line-miles, megawatts of capacity, number of affected
customers, etc.).
Despite all the noise already arising about the antiquated
American grid, it's important to recognize
an underlying cause.
As to the root cause of that engineering problem -- the
answer is politics, some of it congressional, and I will say no
more in this forum.
Fred Heutte
Portland, Oregon
energy policy analyst and net geek
I have restrained from saying this so far but... I told you so.
When I attended the Oakland NANOG in October 2001, I had just
returned from Washington DC. The trip originally was for my
brother's wedding but I extended it for some personal lobbying on
the so-called USA PATRIOT bill as it
http://www.cdt.org/publications/pp_8.15.shtml#2
(2) NEW DEPARTMENT LIKELY TO GAIN AUTHORITY OVER CYBER SECURITY AND
INFRASTRUCTURE PROTECTION
Both House and Senate bills would grant the Department of Homeland Security
authority over cyber security and infrastructure protection.
There was a fire Monday afternoon in an old empty warehouse-sized grocery
store on Foxdale Loop right next to the Capitol Expressway.
This is nowhere near the data centers in SJ I know about. Above.net is
downtown on W. San Fernando next to the Fairmont Hotel, for example, and
MAE-West is at
26 matches
Mail list logo