• Who am I?
  • Creativity
  • IPv6
  • SDN
  • Security

Creative|Technologist

[email protected]
Login

Login
don't panic don't panic don't panic don't panic
  • Who am I?
  • Creativity
  • IPv6
  • SDN
  • Security

Archive


Category Archive for "CircleID"

1The Shadow of the Web

The Shadow of the Web

Dec 28, 2015

I believe in the Internet As an ideal. As a web of human minds. As a wonder of the world, not built through totalitarian control but rather through fierce coopetition. As a technological pillar held up by a newer, better, governance structure. As the facilitator of knowledge sharing and communication on a level so advanced […]

2The IETF’s *Other* Diversity Challenge: An Update

The IETF’s *Other* Diversity Challenge: An Update

Feb 2, 2015

Last June I wrote an article titled “The IETF’s *Other* Diversity Challenge” where I discussed the positive steps the Internet Engineering Task Force (IETF) is taking to increase the diversity of its participants and raised a potentially overlooked demographic: Network Operators. That essay was a problem statement of sorts, and I was long ago taught […]

3The IETF’s *Other* Diversity Challenge

The IETF’s *Other* Diversity Challenge

Jun 16, 2014

The Internet Engineering Task Force (IETF) is the standards body for the Internet. It is the organization that publishes and maintains the standards describing the Internet Protocol (IP – versions 4 and 6), and all directly related and supporting protocols, such as TCP, UDP, DNS (and DNSSEC), BGP, DHCP, NDP, the list goes on, and […]

4Human Network, Human Challenges

Human Network, Human Challenges

May 26, 2014

It has now been about eight months since I joined the Internet Society as the Director of Deployment & Operationalization and I still get asked on a fairly regular basis “what do you do?” Well, with ISOC’s Chief Internet Technology Officer Leslie Daigle’s recent departure, and with my time here having exceeded both my first […]

5

Securing the Core

Feb 3, 2014

The new Deploy360 Securing BGP topic will collect, curate, and create documentation to help network operators deploy the full range of BGP security mechanisms. From adding MD5 to your peering sessions, to proper prefix filtering, and on to RPKI and BGPSEC when the time is right.

6The Future of Home Networking: A Problem Statement

The Future of Home Networking: A Problem Statement

Dec 5, 2012

I’m a network engineer, and like many engineers I often gravitate to the big projects; large networks with problems of scale and complexity in my case. However, I also consider myself a student of Occam’s razor and often quote Antoine de Saint-Exupéry: “perfection is reached not when there is nothing left to add, but when […]

7IPv6 Subnetting – The Paradigm Shift

IPv6 Subnetting – The Paradigm Shift

Jul 25, 2012

Almost every conversation I have with folks just learning about IPv6 goes about the same way; once I’m finally able to convince them that IPv6 is not going away and is needed in their network, the questions start. One of the most practical and essential early questions that needs to be asked (but often isn’t) […]

Chris Grundemann

Recent:

Privileged Account Management with CyberArk

Privileged Account Management with CyberArk

28 January 2019

One of my favorite quotes is from William Gibson: The future...

Security through Virtualization

Security through Virtualization

14 January 2019

We tend to talk a lot about security through obscurity. But...

Making Sense of Cybersecurity

Making Sense of Cybersecurity

7 January 2019

I have spent the past 18-24 months deep inside the rabbit...

My Three Words for 2019

My Three Words for 2019

2 January 2019

New Year’s Resolutions suck. Always have, always will....

2018: My Year in Books

2018: My Year in Books

31 December 2018

Note: Feel free to skip right to the book list below if you...

Tweets!

My Tweets

Reach Out

Hi! I'd love to hear from you. Send me an email and I'll get back to you, asap.

Send Message

Search this site!

Technology Update SDN ISOC CircleID Policy IPv6 Juniper IETF Internet ARIN Networking Creativity Happiness Travel Colorado Miscellaneous Learning IPv6 Security Myths Philosophy Politics Security TechFieldDay Tech Policy

Popular Posts:

  • Introducing IPv6 | Understanding IPv6 Addresses
  • NAT444 (CGN/LSN) and What it Breaks
  • 100.64.0.0/10 - Shared Transition Space
  • Juniper Tips from the JNCIA-Junos Study Guides

Recent Posts:

  • Privileged Account Management with CyberArk
  • Security through Virtualization
  • Making Sense of Cybersecurity
  • My Three Words for 2019

Let’s Connect!

© 2019 · Chris Grundemann.