Club Events δημόσια
[search 0]
Περισσότερα
Download the App!
show episodes
 
Loading …
show series
 
Jeden Tag hinterlassen wir unbewusst Unmengen an Datenspuren. Diese Daten werden laufend durch unterschiedliche Parteien gesammelt, ausgewertet und analysiert. Dies häufig, ohne unser Wissen. Von vielen solcher Auswertungen profitieren wir direkt oder indirekt. Zugleich schlummert in solchen Datenpraktiken aber auch das Potenzial, Menschen oder Ges…
  continue reading
 
Thank you for joining us for DENOG16, join us for a quick review and some announcements before heading home!Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/P8QBJW/Από τον Tim Kleefass, Moritz Frenzel, Patrick Bussmann
  continue reading
 
Thank you for joining us for DENOG16, join us for a quick review and some announcements before heading home!Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/P8QBJW/Από τον Tim Kleefass, Moritz Frenzel, Patrick Bussmann
  continue reading
 
Thank you for joining us for DENOG16, join us for a quick review and some announcements before heading home!Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/P8QBJW/Από τον Tim Kleefass, Moritz Frenzel, Patrick Bussmann
  continue reading
 
This talk will give an overview of DTs DNS platform and the challenges arising from carrier scale DNS deployments. It will cover the architecture and new requirements as well as scalability and the implementation status and impact of encrypted DNS (e.g., DoH/DoT and DNS discovery). The presentation will also address shortcomings of the new discover…
  continue reading
 
This talk will give an overview of DTs DNS platform and the challenges arising from carrier scale DNS deployments. It will cover the architecture and new requirements as well as scalability and the implementation status and impact of encrypted DNS (e.g., DoH/DoT and DNS discovery). The presentation will also address shortcomings of the new discover…
  continue reading
 
This talk will give an overview of DTs DNS platform and the challenges arising from carrier scale DNS deployments. It will cover the architecture and new requirements as well as scalability and the implementation status and impact of encrypted DNS (e.g., DoH/DoT and DNS discovery). The presentation will also address shortcomings of the new discover…
  continue reading
 
News from IXPs in GermanyAs introduced 2021 we collect some parameters from all IXPs, which are active in Germany. This talk aggregates the Updates for all the IXPs in a common format and will be presented in a neutral way.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y9RMD…
  continue reading
 
News from IXPs in GermanyAs introduced 2021 we collect some parameters from all IXPs, which are active in Germany. This talk aggregates the Updates for all the IXPs in a common format and will be presented in a neutral way.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y9RMD…
  continue reading
 
News from IXPs in GermanyAs introduced 2021 we collect some parameters from all IXPs, which are active in Germany. This talk aggregates the Updates for all the IXPs in a common format and will be presented in a neutral way.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y9RMD…
  continue reading
 
In this talk, we explore the changes needed to convert a set of fully open source amd64 based VPP routers running in AS8298 to be able to use exactly one IPv4 and IPv6 address in an OSPFv3 and iBGP configuration. The use of /30 or /31 IPv4 transit networks between routers is a thing of the past, paving the way to conserve IPv4 addresses!The talk di…
  continue reading
 
In this talk, we explore the changes needed to convert a set of fully open source amd64 based VPP routers running in AS8298 to be able to use exactly one IPv4 and IPv6 address in an OSPFv3 and iBGP configuration. The use of /30 or /31 IPv4 transit networks between routers is a thing of the past, paving the way to conserve IPv4 addresses!The talk di…
  continue reading
 
In this talk, we explore the changes needed to convert a set of fully open source amd64 based VPP routers running in AS8298 to be able to use exactly one IPv4 and IPv6 address in an OSPFv3 and iBGP configuration. The use of /30 or /31 IPv4 transit networks between routers is a thing of the past, paving the way to conserve IPv4 addresses!The talk di…
  continue reading
 
Metro networks are arguably one of the more challenging areas in carrier network engineering: Feature creep, space constraints, harsh physical environments and the requirement to deliver all services everywhere, for cheap.At Wobcom AS9136 we _just_ wanted to modernize the transport network. Two years later we ended up redesigning just about everyth…
  continue reading
 
Metro networks are arguably one of the more challenging areas in carrier network engineering: Feature creep, space constraints, harsh physical environments and the requirement to deliver all services everywhere, for cheap.At Wobcom AS9136 we _just_ wanted to modernize the transport network. Two years later we ended up redesigning just about everyth…
  continue reading
 
Metro networks are arguably one of the more challenging areas in carrier network engineering: Feature creep, space constraints, harsh physical environments and the requirement to deliver all services everywhere, for cheap.At Wobcom AS9136 we _just_ wanted to modernize the transport network. Two years later we ended up redesigning just about everyth…
  continue reading
 
We had to move a couple of hundred machines from a big Layer 2 broadcast domain into a fully routed network. We also increased the bandwidth available for each server by mounting a new NIC into each server, To avoid synchronisation with service owners, we did not renumber hosts. In addition, there is connectivity to the large Layer 2 domain that is…
  continue reading
 
We had to move a couple of hundred machines from a big Layer 2 broadcast domain into a fully routed network. We also increased the bandwidth available for each server by mounting a new NIC into each server, To avoid synchronisation with service owners, we did not renumber hosts. In addition, there is connectivity to the large Layer 2 domain that is…
  continue reading
 
We had to move a couple of hundred machines from a big Layer 2 broadcast domain into a fully routed network. We also increased the bandwidth available for each server by mounting a new NIC into each server, To avoid synchronisation with service owners, we did not renumber hosts. In addition, there is connectivity to the large Layer 2 domain that is…
  continue reading
 
The Domain Name System (DNS) is a critical component of the Internet infrastructure, responsible for translating human-readable domain names into machine-readable IP addresses. However, theincreasing centralization of DNS traffic through large content-delivery hyper-giants (such as Google), coupled with the fact that the majority of DNS communicati…
  continue reading
 
The Domain Name System (DNS) is a critical component of the Internet infrastructure, responsible for translating human-readable domain names into machine-readable IP addresses. However, theincreasing centralization of DNS traffic through large content-delivery hyper-giants (such as Google), coupled with the fact that the majority of DNS communicati…
  continue reading
 
The Domain Name System (DNS) is a critical component of the Internet infrastructure, responsible for translating human-readable domain names into machine-readable IP addresses. However, theincreasing centralization of DNS traffic through large content-delivery hyper-giants (such as Google), coupled with the fact that the majority of DNS communicati…
  continue reading
 
DDoS attacks and attackers are out there today, and likely won't go away anymore. This talk will outline some current available technologies and developments in the area of DDoS countermeasures, which are designed to make DDoS detection faster, provide better information and decision criteria on what is currently going on in a network, and what is …
  continue reading
 
DDoS attacks and attackers are out there today, and likely won't go away anymore. This talk will outline some current available technologies and developments in the area of DDoS countermeasures, which are designed to make DDoS detection faster, provide better information and decision criteria on what is currently going on in a network, and what is …
  continue reading
 
DDoS attacks and attackers are out there today, and likely won't go away anymore. This talk will outline some current available technologies and developments in the area of DDoS countermeasures, which are designed to make DDoS detection faster, provide better information and decision criteria on what is currently going on in a network, and what is …
  continue reading
 
As communication speeds increase, a new problem of communication errors caused by "return loss" has become apparent in optical connector connections.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/LYC7PW/Από τον Takaya Nakagawa
  continue reading
 
As communication speeds increase, a new problem of communication errors caused by "return loss" has become apparent in optical connector connections.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/LYC7PW/Από τον Takaya Nakagawa
  continue reading
 
As communication speeds increase, a new problem of communication errors caused by "return loss" has become apparent in optical connector connections.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/LYC7PW/Από τον Takaya Nakagawa
  continue reading
 
Everything uses IP nowadays but some stuff is special: Telephony. The connection between customers and their provider is well known but the interconnections of providers themselves are something different. This talk covers the German market, other countries work totally different (some examples might be given).Licensed to the public under http://cr…
  continue reading
 
Everything uses IP nowadays but some stuff is special: Telephony. The connection between customers and their provider is well known but the interconnections of providers themselves are something different. This talk covers the German market, other countries work totally different (some examples might be given).Licensed to the public under http://cr…
  continue reading
 
Everything uses IP nowadays but some stuff is special: Telephony. The connection between customers and their provider is well known but the interconnections of providers themselves are something different. This talk covers the German market, other countries work totally different (some examples might be given).Licensed to the public under http://cr…
  continue reading
 
Following up on last year's introductory talk about NIS2 and the cybersecurity regulations, we'll look at the technical and methodological requirements specifically for digital service providers.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y88EBE/…
  continue reading
 
Following up on last year's introductory talk about NIS2 and the cybersecurity regulations, we'll look at the technical and methodological requirements specifically for digital service providers.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y88EBE/…
  continue reading
 
Following up on last year's introductory talk about NIS2 and the cybersecurity regulations, we'll look at the technical and methodological requirements specifically for digital service providers.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y88EBE/…
  continue reading
 
This presentation investigates the proximity to a low Signal-to-Noise Ratio (SNR) threshold that can still maintain a tolerable Bit Error Rate (BER) in 100G / 400G / 800G network links. Additionally, we account for factors such as temperature and cable length to predict the duration for which a reliable network connection can be sustained between t…
  continue reading
 
This presentation investigates the proximity to a low Signal-to-Noise Ratio (SNR) threshold that can still maintain a tolerable Bit Error Rate (BER) in 100G / 400G / 800G network links. Additionally, we account for factors such as temperature and cable length to predict the duration for which a reliable network connection can be sustained between t…
  continue reading
 
This presentation investigates the proximity to a low Signal-to-Noise Ratio (SNR) threshold that can still maintain a tolerable Bit Error Rate (BER) in 100G / 400G / 800G network links. Additionally, we account for factors such as temperature and cable length to predict the duration for which a reliable network connection can be sustained between t…
  continue reading
 
Starting with 1st of January, 2026, operators of public mobile networks in Germany are obliged toemploy certified network products within their networks. The obligation affects all network products,which are newly introduced into public mobile networks and provide functions, for which a securityassessment document has been approved by the BSI. This…
  continue reading
 
Starting with 1st of January, 2026, operators of public mobile networks in Germany are obliged toemploy certified network products within their networks. The obligation affects all network products,which are newly introduced into public mobile networks and provide functions, for which a securityassessment document has been approved by the BSI. This…
  continue reading
 
Starting with 1st of January, 2026, operators of public mobile networks in Germany are obliged toemploy certified network products within their networks. The obligation affects all network products,which are newly introduced into public mobile networks and provide functions, for which a securityassessment document has been approved by the BSI. This…
  continue reading
 
The so-called ‘Glasfaserstreit' (fibre optic dispute), an antitrust case, successfully prevented the intention of the incumbent to monopolise the Swiss fibre optic network. As a result, >2 million households can currently subscribe to a symmetrical 25 Gigabit FTTH connection for ~€70 per month.Licensed to the public under http://creativecommons.org…
  continue reading
 
The so-called ‘Glasfaserstreit' (fibre optic dispute), an antitrust case, successfully prevented the intention of the incumbent to monopolise the Swiss fibre optic network. As a result, >2 million households can currently subscribe to a symmetrical 25 Gigabit FTTH connection for ~€70 per month.Licensed to the public under http://creativecommons.org…
  continue reading
 
The so-called ‘Glasfaserstreit' (fibre optic dispute), an antitrust case, successfully prevented the intention of the incumbent to monopolise the Swiss fibre optic network. As a result, >2 million households can currently subscribe to a symmetrical 25 Gigabit FTTH connection for ~€70 per month.Licensed to the public under http://creativecommons.org…
  continue reading
 
Single peering interfaces can get loaded during peak usage and/or failure scenarios while the network as a whole still has spare capacity. As remedy we can use upstream via our so-called overflow providers. In normal operation mode we will prefer direct peerings and only use overflow providers as fallback.For events like the European Football Champ…
  continue reading
 
Single peering interfaces can get loaded during peak usage and/or failure scenarios while the network as a whole still has spare capacity. As remedy we can use upstream via our so-called overflow providers. In normal operation mode we will prefer direct peerings and only use overflow providers as fallback.For events like the European Football Champ…
  continue reading
 
Single peering interfaces can get loaded during peak usage and/or failure scenarios while the network as a whole still has spare capacity. As remedy we can use upstream via our so-called overflow providers. In normal operation mode we will prefer direct peerings and only use overflow providers as fallback.For events like the European Football Champ…
  continue reading
 
Loading …

Οδηγός γρήγορης αναφοράς