Category: worth reading
Worth Reading: Seven Deadly Sins of Predicting the Future of AI
The next time the sales system engineer working for your beloved $vendor drops by with a glitzy unicorn-based slide deck full of AI/ML goodies, read this article to get a slightly better understanding of where we are... from the perspective of someone who has actual experience doing that stuff.
Worth Reading: Apple II Had the Lowest Input Latency Ever
It's amazing how heaping layers of complexity (see also: SDN or intent-based whatever) manages to destroy performance faster than Moore's law delivers it. The computer with lowest keyboard-to-screen latency was (supposedly) Apple II built in 1983, with modern Linux having keyboard-to-screen RTT matching the transatlantic links.
No surprise there: Linux has been getting slower with every kernel release and it takes an enormous effort to fine-tune it (assuming you know what to tune). Keep that in mind the next time someone with a hefty PPT slide deck will tell you to build a "provider cloud" with packet forwarding done on Linux VMs. You can make that work, and smart people made that work, but you might not have the resources to replicate their feat.
Worth Reading: Understanding Scale Computing HC3 Edge Fabric
A long while ago someone told me about a "great" idea of using multi-port server NICs to build ad-hoc (or hypercube or whatever) server-only networks. It's pretty easy to prove that the approach doesn't make sense if you try to build generic any-to-any-connectivity infrastructure... but it makes perfect sense in a small environment.
One can only hope Scale Computing keeps their marketing closer to reality than some major vendors (that I will not name because I'm sick-and-tired of emails from their employees telling me how I'm unjustly picking on the stupidities their marketing is evangelizing) and will not start selling this approach as save-the-world panacea... but we can be pretty sure there will be people out there using it in way-too-large environments, and then blame everything else but their own ignorance or stubbornness when the whole thing explodes into their faces.
Worth Reading: Why Doctors Think They're the Best
Another great article by Scott Alexander, this time explaining the consequences of selection bias. The applicability to network engineering (and continuous use of shaky solutions) is left as an exercise for the reader.
Worth Reading: How to Talk to a C-Level Executive
Ever wondered who manages to produce deja-moo like this one and why they’d do it?
We unveiled a vision to create an intuitive system that anticipates actions, stops security threats in their tracks, and continues to evolve and learn. It will help businesses to unlock new opportunities and solve previously unsolvable challenges in an era of increasing connectivity and distributed technology.
As Erik Dietrich explains in his blog post, it’s usually nothing more than a lame attempt to pretend there are some clothes hanging on the emperor.
Just in case you’re interested: we discussed the state of Intent-Based Majesty’s wardrobe in Network Automation Use Cases webinar.
IP Addresses Considered Harmful
A long while ago, I wrote about the brokenness of socket API and lack of session layer in TCP/IP stack.
It looks like I’m not the only one with heretic opinions; Fred Baker reached similar conclusions in his Happier Eyeballs draft and Brian Carpenter recently published a lengthy article title IP Addresses Considered Harmful which documents (among other things) the history of socket API and the reasons DNS isn’t tightly integrated with it. Both documents are definitely worth reading.
Still Waiting for the Stupid Network
In 1998, the cover story of ACM netWorker magazine discussed the dawn of the stupid network – an architecture with smart edge nodes and simple packet forwarding code. Obviously we learned nothing in all those years – we’re still having the same discussions.
Here are a few juicy quotes from that article (taken completely out of context solely for your enjoyment).
Welcome to ipSpace.net
During the last days there have been rumors of flying pigs and open speculations whether I’d rename my blog to junoshints or junioshints due to my Junos-related posts. When even my wife told me to get my act together, it was time to move ... and you can see the first changes at the top left corner of the screen.
Interesting links (2011-04-17)
Data Center
RFC 6165 documents the layer-2 related IS-IS extensions. No more excuses along the “TRILL standards are not ready” lines. Are you listening, Brocade and HP?
Data Center Feng Shui: Architecting for Predictable Performance. A nice introductory explanation of advantages of hardware-based forwarding.
When is a Fabric not a Fabric? Juniper continues the “who’s the smartest kid on the block” game. I thought we’re all adults; stop the “bright future” promises and get the products out.
Cleaning the Inbox: Generic IT
Last gems found in dusty corners of my cluttered Inbox:
- The Myths of IT – Part 1 and Part 2. A must-read for anyone working in the IT industry.
- Phone - Scott Adams (of the Dilbert fame) ranting about smartphones. Priceless.
- Maybe you only need it because you have it – seen it too many times. Might also apply to long-distance vMotion.
Cleaning the Inbox: Internet-related Links
Every Internet-related post is a great opportunity to increase comment count. I’ll pass this time, here are the articles I found interesting with little or no comments from my side. First the generic Internet:
- IPv6 and Transitional Myths – Great mythbuster by Geoff Huston
- Google IPv6 statistics
And then my favorite controversy:
- Net Neutrality for Dummies
- Network Neutrality: Pretty Much Just Socialism (I’m obviously not the only one claiming that)
- ISP's top data hog gobbles 2.7TB of data in a month – a bit old but still relevant
- Congress Needs to Step In for Net Neutrality...Really? Seriously?
- Mobile Carriers Dream of Charging per Page
Cleaning the Inbox: Data Center, Storage, Virtualization
Links to great data center, storage and virtualization articles found in the depths of my bloated Inbox:
Technology short takes by Scott Lowe. A must-read.
Keys to Virtualization Success – this is how you do it right. Great job, Bob!
Cleaning the Inbox: Networking Links
I published this blog post in December 2010. As I was cleaning it up 10 years later, only three out of original 11 links still worked. Whatever…
Some Internet Architectural Guidelines and Philosophy – a must-read for people inventing crazy schemes like load balancing based on unicast flooding or MAC-over-MAC proprietary network virtualization (you know who you are but I doubt you read RFCs or my blog).
Spoofing Google search history with CSRF – like we didn’t have enough security problems, here’s another one.
So what's the MTU on that? The MTU surprises never stop.