The network automation community, for the most part, agrees that to automate the network and higher-level services, we need structured data, ideally stored in a centralized location, often referred to as the Source of Truth (SoT).
We have seen increased advocacy for a better way of governing the data in and their relationships using a design-driven approach. The goal is to move away from...
Team Cymru offers a full suite of free tools and services to the network and netsec communities. I will cover each one at a high level and answer questions regarding each tool.
Piracy Shield from an operator PoV
Trust is essential for successful network automation adoption.
When automation platforms exhibit predictable behaviors and transparent processes, teams can confidently delegate critical network operations. Building trustworthy automation doesn't happen by itself, it needs to be baked into the design of every workflows. This technical session examines core principles that build trust,...
DNS has evolved from its humble beginnings to a complex system. We believe some best practices can make the life of operators easier and the DNS more secure and resilient at the same time.
This presentation outlines the essential pillars for successfully launching and scaling an Internet Service Provider (ISP). We begin by defining the core technical infrastructure—network architecture, routing protocols, bandwidth provisioning, peering arrangements, and redundancy strategies—to ensure high availability and optimal performance. Next, we address security imperatives and...