Privacy and networking: Part 4 — Logging
Guest Post: What are the the privacy considerations for logged data?
Guest Post: What are the the privacy considerations for logged data?
Guest Post: Does an IP address need to be treated like other Personally Identifiable Information?
Guest Post: How does privacy impact network design and operations?
Guest Post: Privacy isn’t just for infosec, risk management, or compliance, it’s a human right.
Guest Post: Examining the reasons and techniques used when an operator does not want traffic via a specific AS.
Guest Post: Examine the various techniques used to control traffic entry points.
Guest Post: How to select which neighboring AS to send traffic through.
Guest Post: What if IPv6 isn’t big enough?
Guest Post: When dealing with BGP issues, the source is often several steps removed from the result of the problem, making it difficult to resolve.
Guest Post: When it comes to network design, if you haven’t found the trade-offs, you haven’t looked hard enough.