Computer Club publiczne
[search 0]
Więcej
Download the App!
show episodes
 
Artwork

1
Computer Club

Computer Club - Freddy & Smollie

Unsubscribe
Unsubscribe
Co tydzień
 
Welkom in Computer Club, een podcast door Frederik 'Freddy' De Bosschere en Thomas 'Smollie' Smolders! Wekelijks bespreken we de actualiteit op vlak van technologie en gaan we op zoek naar interessante feiten en innovaties. Er zijn ook jingles.
  continue reading
 
Loading …
show series
 
Jeden Tag hinterlassen wir unbewusst Unmengen an Datenspuren. Diese Daten werden laufend durch unterschiedliche Parteien gesammelt, ausgewertet und analysiert. Dies häufig, ohne unser Wissen. Von vielen solcher Auswertungen profitieren wir direkt oder indirekt. Zugleich schlummert in solchen Datenpraktiken aber auch das Potenzial, Menschen oder Ges…
  continue reading
 
Goed begonnen is half gewonnen, en dat geldt ook zo in het leven. Maar wat als je halverwege het leven besluit dat het vervolg niet per se hoeft? Als je gewoon voor eeuwig in die midlifecrisis wil blijven hangen? Je zou een rode sportwagen kunnen kopen waar je nooit mee zal rijden, bijvoorbeeld, of een yacht waar je zelden mee gaat varen. Je hebt h…
  continue reading
 
Jeden Tag hinterlassen wir unbewusst Unmengen an Datenspuren. Diese Daten werden laufend durch unterschiedliche Parteien gesammelt, ausgewertet und analysiert. Dies häufig, ohne unser Wissen. Von vielen solcher Auswertungen profitieren wir direkt oder indirekt. Zugleich schlummert in solchen Datenpraktiken aber auch das Potenzial, Menschen oder Ges…
  continue reading
 
Jeden Tag hinterlassen wir unbewusst Unmengen an Datenspuren. Diese Daten werden laufend durch unterschiedliche Parteien gesammelt, ausgewertet und analysiert. Dies häufig, ohne unser Wissen. Von vielen solcher Auswertungen profitieren wir direkt oder indirekt. Zugleich schlummert in solchen Datenpraktiken aber auch das Potenzial, Menschen oder Ges…
  continue reading
 
Jeden Tag hinterlassen wir unbewusst Unmengen an Datenspuren. Diese Daten werden laufend durch unterschiedliche Parteien gesammelt, ausgewertet und analysiert. Dies häufig, ohne unser Wissen. Von vielen solcher Auswertungen profitieren wir direkt oder indirekt. Zugleich schlummert in solchen Datenpraktiken aber auch das Potenzial, Menschen oder Ges…
  continue reading
 
This talk will give an overview of DTs DNS platform and the challenges arising from carrier scale DNS deployments. It will cover the architecture and new requirements as well as scalability and the implementation status and impact of encrypted DNS (e.g., DoH/DoT and DNS discovery). The presentation will also address shortcomings of the new discover…
  continue reading
 
This talk will give an overview of DTs DNS platform and the challenges arising from carrier scale DNS deployments. It will cover the architecture and new requirements as well as scalability and the implementation status and impact of encrypted DNS (e.g., DoH/DoT and DNS discovery). The presentation will also address shortcomings of the new discover…
  continue reading
 
This talk will give an overview of DTs DNS platform and the challenges arising from carrier scale DNS deployments. It will cover the architecture and new requirements as well as scalability and the implementation status and impact of encrypted DNS (e.g., DoH/DoT and DNS discovery). The presentation will also address shortcomings of the new discover…
  continue reading
 
This talk will give an overview of DTs DNS platform and the challenges arising from carrier scale DNS deployments. It will cover the architecture and new requirements as well as scalability and the implementation status and impact of encrypted DNS (e.g., DoH/DoT and DNS discovery). The presentation will also address shortcomings of the new discover…
  continue reading
 
News from IXPs in GermanyAs introduced 2021 we collect some parameters from all IXPs, which are active in Germany. This talk aggregates the Updates for all the IXPs in a common format and will be presented in a neutral way.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y9RMD…
  continue reading
 
News from IXPs in GermanyAs introduced 2021 we collect some parameters from all IXPs, which are active in Germany. This talk aggregates the Updates for all the IXPs in a common format and will be presented in a neutral way.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y9RMD…
  continue reading
 
News from IXPs in GermanyAs introduced 2021 we collect some parameters from all IXPs, which are active in Germany. This talk aggregates the Updates for all the IXPs in a common format and will be presented in a neutral way.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y9RMD…
  continue reading
 
News from IXPs in GermanyAs introduced 2021 we collect some parameters from all IXPs, which are active in Germany. This talk aggregates the Updates for all the IXPs in a common format and will be presented in a neutral way.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y9RMD…
  continue reading
 
In this talk, we explore the changes needed to convert a set of fully open source amd64 based VPP routers running in AS8298 to be able to use exactly one IPv4 and IPv6 address in an OSPFv3 and iBGP configuration. The use of /30 or /31 IPv4 transit networks between routers is a thing of the past, paving the way to conserve IPv4 addresses!The talk di…
  continue reading
 
In this talk, we explore the changes needed to convert a set of fully open source amd64 based VPP routers running in AS8298 to be able to use exactly one IPv4 and IPv6 address in an OSPFv3 and iBGP configuration. The use of /30 or /31 IPv4 transit networks between routers is a thing of the past, paving the way to conserve IPv4 addresses!The talk di…
  continue reading
 
In this talk, we explore the changes needed to convert a set of fully open source amd64 based VPP routers running in AS8298 to be able to use exactly one IPv4 and IPv6 address in an OSPFv3 and iBGP configuration. The use of /30 or /31 IPv4 transit networks between routers is a thing of the past, paving the way to conserve IPv4 addresses!The talk di…
  continue reading
 
In this talk, we explore the changes needed to convert a set of fully open source amd64 based VPP routers running in AS8298 to be able to use exactly one IPv4 and IPv6 address in an OSPFv3 and iBGP configuration. The use of /30 or /31 IPv4 transit networks between routers is a thing of the past, paving the way to conserve IPv4 addresses!The talk di…
  continue reading
 
Metro networks are arguably one of the more challenging areas in carrier network engineering: Feature creep, space constraints, harsh physical environments and the requirement to deliver all services everywhere, for cheap.At Wobcom AS9136 we _just_ wanted to modernize the transport network. Two years later we ended up redesigning just about everyth…
  continue reading
 
Metro networks are arguably one of the more challenging areas in carrier network engineering: Feature creep, space constraints, harsh physical environments and the requirement to deliver all services everywhere, for cheap.At Wobcom AS9136 we _just_ wanted to modernize the transport network. Two years later we ended up redesigning just about everyth…
  continue reading
 
Metro networks are arguably one of the more challenging areas in carrier network engineering: Feature creep, space constraints, harsh physical environments and the requirement to deliver all services everywhere, for cheap.At Wobcom AS9136 we _just_ wanted to modernize the transport network. Two years later we ended up redesigning just about everyth…
  continue reading
 
Metro networks are arguably one of the more challenging areas in carrier network engineering: Feature creep, space constraints, harsh physical environments and the requirement to deliver all services everywhere, for cheap.At Wobcom AS9136 we _just_ wanted to modernize the transport network. Two years later we ended up redesigning just about everyth…
  continue reading
 
We had to move a couple of hundred machines from a big Layer 2 broadcast domain into a fully routed network. We also increased the bandwidth available for each server by mounting a new NIC into each server, To avoid synchronisation with service owners, we did not renumber hosts. In addition, there is connectivity to the large Layer 2 domain that is…
  continue reading
 
We had to move a couple of hundred machines from a big Layer 2 broadcast domain into a fully routed network. We also increased the bandwidth available for each server by mounting a new NIC into each server, To avoid synchronisation with service owners, we did not renumber hosts. In addition, there is connectivity to the large Layer 2 domain that is…
  continue reading
 
We had to move a couple of hundred machines from a big Layer 2 broadcast domain into a fully routed network. We also increased the bandwidth available for each server by mounting a new NIC into each server, To avoid synchronisation with service owners, we did not renumber hosts. In addition, there is connectivity to the large Layer 2 domain that is…
  continue reading
 
We had to move a couple of hundred machines from a big Layer 2 broadcast domain into a fully routed network. We also increased the bandwidth available for each server by mounting a new NIC into each server, To avoid synchronisation with service owners, we did not renumber hosts. In addition, there is connectivity to the large Layer 2 domain that is…
  continue reading
 
The Domain Name System (DNS) is a critical component of the Internet infrastructure, responsible for translating human-readable domain names into machine-readable IP addresses. However, theincreasing centralization of DNS traffic through large content-delivery hyper-giants (such as Google), coupled with the fact that the majority of DNS communicati…
  continue reading
 
The Domain Name System (DNS) is a critical component of the Internet infrastructure, responsible for translating human-readable domain names into machine-readable IP addresses. However, theincreasing centralization of DNS traffic through large content-delivery hyper-giants (such as Google), coupled with the fact that the majority of DNS communicati…
  continue reading
 
The Domain Name System (DNS) is a critical component of the Internet infrastructure, responsible for translating human-readable domain names into machine-readable IP addresses. However, theincreasing centralization of DNS traffic through large content-delivery hyper-giants (such as Google), coupled with the fact that the majority of DNS communicati…
  continue reading
 
The Domain Name System (DNS) is a critical component of the Internet infrastructure, responsible for translating human-readable domain names into machine-readable IP addresses. However, theincreasing centralization of DNS traffic through large content-delivery hyper-giants (such as Google), coupled with the fact that the majority of DNS communicati…
  continue reading
 
DDoS attacks and attackers are out there today, and likely won't go away anymore. This talk will outline some current available technologies and developments in the area of DDoS countermeasures, which are designed to make DDoS detection faster, provide better information and decision criteria on what is currently going on in a network, and what is …
  continue reading
 
DDoS attacks and attackers are out there today, and likely won't go away anymore. This talk will outline some current available technologies and developments in the area of DDoS countermeasures, which are designed to make DDoS detection faster, provide better information and decision criteria on what is currently going on in a network, and what is …
  continue reading
 
DDoS attacks and attackers are out there today, and likely won't go away anymore. This talk will outline some current available technologies and developments in the area of DDoS countermeasures, which are designed to make DDoS detection faster, provide better information and decision criteria on what is currently going on in a network, and what is …
  continue reading
 
DDoS attacks and attackers are out there today, and likely won't go away anymore. This talk will outline some current available technologies and developments in the area of DDoS countermeasures, which are designed to make DDoS detection faster, provide better information and decision criteria on what is currently going on in a network, and what is …
  continue reading
 
As communication speeds increase, a new problem of communication errors caused by "return loss" has become apparent in optical connector connections.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/LYC7PW/Autor: Takaya Nakagawa
  continue reading
 
As communication speeds increase, a new problem of communication errors caused by "return loss" has become apparent in optical connector connections.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/LYC7PW/Autor: Takaya Nakagawa
  continue reading
 
As communication speeds increase, a new problem of communication errors caused by "return loss" has become apparent in optical connector connections.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/LYC7PW/Autor: Takaya Nakagawa
  continue reading
 
As communication speeds increase, a new problem of communication errors caused by "return loss" has become apparent in optical connector connections.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/LYC7PW/Autor: Takaya Nakagawa
  continue reading
 
Everything uses IP nowadays but some stuff is special: Telephony. The connection between customers and their provider is well known but the interconnections of providers themselves are something different. This talk covers the German market, other countries work totally different (some examples might be given).Licensed to the public under http://cr…
  continue reading
 
Everything uses IP nowadays but some stuff is special: Telephony. The connection between customers and their provider is well known but the interconnections of providers themselves are something different. This talk covers the German market, other countries work totally different (some examples might be given).Licensed to the public under http://cr…
  continue reading
 
Everything uses IP nowadays but some stuff is special: Telephony. The connection between customers and their provider is well known but the interconnections of providers themselves are something different. This talk covers the German market, other countries work totally different (some examples might be given).Licensed to the public under http://cr…
  continue reading
 
Everything uses IP nowadays but some stuff is special: Telephony. The connection between customers and their provider is well known but the interconnections of providers themselves are something different. This talk covers the German market, other countries work totally different (some examples might be given).Licensed to the public under http://cr…
  continue reading
 
Following up on last year's introductory talk about NIS2 and the cybersecurity regulations, we'll look at the technical and methodological requirements specifically for digital service providers.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y88EBE/…
  continue reading
 
Following up on last year's introductory talk about NIS2 and the cybersecurity regulations, we'll look at the technical and methodological requirements specifically for digital service providers.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y88EBE/…
  continue reading
 
Following up on last year's introductory talk about NIS2 and the cybersecurity regulations, we'll look at the technical and methodological requirements specifically for digital service providers.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y88EBE/…
  continue reading
 
Following up on last year's introductory talk about NIS2 and the cybersecurity regulations, we'll look at the technical and methodological requirements specifically for digital service providers.Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://pretalx.com/denog16/talk/Y88EBE/…
  continue reading
 
Loading …

Skrócona instrukcja obsługi