Performant and Resilient Storage: The Open Source & Linux WayOpenNebula Project
OpenNebula users have a range of storage options available to them, including proprietary appliances, proprietary software and Open Source software projects. This session will present a fully Open Source approach, that tightly integrates with Linux, and makes full use of the mature building blocks within the Linux kernel (LVM, Software RAID, DM-crypt, NVMe-oF Target, DRBD, etc...), and delivers one of the highest performance open source storage stacks currently available. The core goal is to expose the improved performance of NVMe storage devices to VMs and containers. The solution covers both local NVMe drives and NVMe-oF. For interacting with NVMe-oF targets it supports the Swordfish-API and LVM & Linux’s software NVMe-oF target. The solution contains a storage addon for OpenNebula.
Getting the Best Out Of WebRTC - Astricon 2014Dan Jenkins
Presentation at Astricon 2014 with Tim Panton about how to get the most of of WebRTC - making sure to deal with video bandwidth, asymetric calls and remembering that things are different to typical VoIP (SIP)
Performant and Resilient Storage: The Open Source & Linux WayOpenNebula Project
OpenNebula users have a range of storage options available to them, including proprietary appliances, proprietary software and Open Source software projects. This session will present a fully Open Source approach, that tightly integrates with Linux, and makes full use of the mature building blocks within the Linux kernel (LVM, Software RAID, DM-crypt, NVMe-oF Target, DRBD, etc...), and delivers one of the highest performance open source storage stacks currently available. The core goal is to expose the improved performance of NVMe storage devices to VMs and containers. The solution covers both local NVMe drives and NVMe-oF. For interacting with NVMe-oF targets it supports the Swordfish-API and LVM & Linux’s software NVMe-oF target. The solution contains a storage addon for OpenNebula.
Getting the Best Out Of WebRTC - Astricon 2014Dan Jenkins
Presentation at Astricon 2014 with Tim Panton about how to get the most of of WebRTC - making sure to deal with video bandwidth, asymetric calls and remembering that things are different to typical VoIP (SIP)
Ceph is an open source distributed storage system designed for scalability and reliability. Ceph's block device, RADOS block device (RBD), is widely used to store virtual machines, and is the most popular block storage used with OpenStack.
In this session, you'll learn how RBD works, including how it:
* Uses RADOS classes to make access easier from user space and within the Linux kernel.
* Implements thin provisioning.
* Builds on RADOS self-managed snapshots for cloning and differential backups.
* Increases performance with caching of various kinds.
* Uses watch/notify RADOS primitives to handle online management operations.
* Integrates with QEMU, libvirt, and OpenStack.
OSMC 2009 | An Introduction to OpenNMS by Tarus BalogNETWAYS
OpenNMS was registered on Sourceforge in March of 2000, two month after NetSaint, which is now Nagios. While both products are about the same age, they took totally different paths.
OpenNMS aimed from the start to be enterprise-grade - to be able to manage hundred of thousands of devices from a single installation. In addition to monitoring, OpenNMS also focuses on provisioning (both automatic and directed), data collection and event management.
This presentation is aimed to introduce people to OpenNMS, and it will cover installation, basic discovery and an overview of features.
LAS16-211: Using LAVA V2 for advanced KVM testingLinaro
LAS16-211: Testing LAVA V2 for advanced KVM testing
Speakers: Riku Voipio
Date: September 27, 2016
★ Session Description ★
The new LAVA dispatcher allows explicit control of starting/controlling guest. Walk through how to use V2 dispatcher for KVM and other VM testing and explore usage of libvirt etc. Share experiences in using V2 dispatcher in general. Plan support for migration and other advanced multinode tests.
★ Resources ★
Etherpad: pad.linaro.org/p/las16-211
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-211/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 SecurityEdgeUno
The IPv6 protocol suite was designed to accommodate the present and future growth of the Internet, by providing a much larger address space than that of its IPv4 counterpart, and is expected to be the successor of the original IPv4 protocol suite. It has already been deployed by most major content providers (including Google and Facebook) and many Internet Service Providers (ISPs). While the ultimate goal of IPv6 is virtually the same as that of IPv4 (moving packets across the Internet), the underlying mechanisms and technical details are significantly different, typically resulting in unexpected security and privacy implications. In this presentation, Fernando will cover the state of the art in everything ranging from IPv6 pentesting, to security controls and operational mitigations for IPv6 attacks, thus providing valuable information to red, blue, and purple teams.
OSDC 2013 | Distributed Storage with GlusterFS by Dr. Udo SeidelNETWAYS
So-called shared file systems are known for a long time for all IT administrators using Linux, Unix and Windows. The network based and also the cluster data systems are almost an old hat. Since a while distributed data systems become popular. The GlusterFS project is not new, but the community didn´t caught notice until the takeover of RedHat. Significant characteristics of this data system are the new approach to meta-data management and the new modular structure.
This presentation gives an insight into the approaches of data systems, and will explain the architecture and describe the first steps to set up a GlusterFS-cluster.
Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120Linaro
"Session ID: BUD17-120
Session Name: Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120
Speaker: Stefan Schmidt
Track: LITE
★ Session Summary ★
Adding support for IEEE 802.15.4 and 6LoWPAN to an embedded Linux system opens up new possibilities to communicate with tiny devices. The mainline kernel
supports the wireless protocols to connect such devices to the internet, acting
as border router for such networks.
This talk will show the current kernel support, how to enable and configure the
subsystems to use it and how to communicate between Linux and IoT operating
systems like RIOT, Contiki or Zephyr.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/bud17/bud17-120/
Presentation: https://www.slideshare.net/linaroorg/linuxwpan-ieee-802154-and-6lowpan-in-the-linux-kernel-bud17120
Video: https://youtu.be/6YNeF2H2i-U
---------------------------------------------------
★ Event Details ★
Linaro Connect Budapest 2017 (BUD17)
6-10 March 2017
Corinthia Hotel, Budapest,
Erzsébet krt. 43-49,
1073 Hungary
---------------------------------------------------
Keyword: linux-wpan, kernel, IEEE, Stefan Schmidt
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961"
Ceph is an open source distributed storage system designed for scalability and reliability. Ceph's block device, RADOS block device (RBD), is widely used to store virtual machines, and is the most popular block storage used with OpenStack.
In this session, you'll learn how RBD works, including how it:
* Uses RADOS classes to make access easier from user space and within the Linux kernel.
* Implements thin provisioning.
* Builds on RADOS self-managed snapshots for cloning and differential backups.
* Increases performance with caching of various kinds.
* Uses watch/notify RADOS primitives to handle online management operations.
* Integrates with QEMU, libvirt, and OpenStack.
OSMC 2009 | An Introduction to OpenNMS by Tarus BalogNETWAYS
OpenNMS was registered on Sourceforge in March of 2000, two month after NetSaint, which is now Nagios. While both products are about the same age, they took totally different paths.
OpenNMS aimed from the start to be enterprise-grade - to be able to manage hundred of thousands of devices from a single installation. In addition to monitoring, OpenNMS also focuses on provisioning (both automatic and directed), data collection and event management.
This presentation is aimed to introduce people to OpenNMS, and it will cover installation, basic discovery and an overview of features.
LAS16-211: Using LAVA V2 for advanced KVM testingLinaro
LAS16-211: Testing LAVA V2 for advanced KVM testing
Speakers: Riku Voipio
Date: September 27, 2016
★ Session Description ★
The new LAVA dispatcher allows explicit control of starting/controlling guest. Walk through how to use V2 dispatcher for KVM and other VM testing and explore usage of libvirt etc. Share experiences in using V2 dispatcher in general. Plan support for migration and other advanced multinode tests.
★ Resources ★
Etherpad: pad.linaro.org/p/las16-211
Presentations & Videos: http://connect.linaro.org/resource/las16/las16-211/
★ Event Details ★
Linaro Connect Las Vegas 2016 – #LAS16
September 26-30, 2016
http://www.linaro.org
http://connect.linaro.org
Fernando Gont - The Hack Summit 2021 - State of the Art in IPv6 SecurityEdgeUno
The IPv6 protocol suite was designed to accommodate the present and future growth of the Internet, by providing a much larger address space than that of its IPv4 counterpart, and is expected to be the successor of the original IPv4 protocol suite. It has already been deployed by most major content providers (including Google and Facebook) and many Internet Service Providers (ISPs). While the ultimate goal of IPv6 is virtually the same as that of IPv4 (moving packets across the Internet), the underlying mechanisms and technical details are significantly different, typically resulting in unexpected security and privacy implications. In this presentation, Fernando will cover the state of the art in everything ranging from IPv6 pentesting, to security controls and operational mitigations for IPv6 attacks, thus providing valuable information to red, blue, and purple teams.
OSDC 2013 | Distributed Storage with GlusterFS by Dr. Udo SeidelNETWAYS
So-called shared file systems are known for a long time for all IT administrators using Linux, Unix and Windows. The network based and also the cluster data systems are almost an old hat. Since a while distributed data systems become popular. The GlusterFS project is not new, but the community didn´t caught notice until the takeover of RedHat. Significant characteristics of this data system are the new approach to meta-data management and the new modular structure.
This presentation gives an insight into the approaches of data systems, and will explain the architecture and describe the first steps to set up a GlusterFS-cluster.
Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120Linaro
"Session ID: BUD17-120
Session Name: Linux-wpan: IEEE 802.15.4 and 6LoWPAN in the Linux Kernel - BUD17-120
Speaker: Stefan Schmidt
Track: LITE
★ Session Summary ★
Adding support for IEEE 802.15.4 and 6LoWPAN to an embedded Linux system opens up new possibilities to communicate with tiny devices. The mainline kernel
supports the wireless protocols to connect such devices to the internet, acting
as border router for such networks.
This talk will show the current kernel support, how to enable and configure the
subsystems to use it and how to communicate between Linux and IoT operating
systems like RIOT, Contiki or Zephyr.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/bud17/bud17-120/
Presentation: https://www.slideshare.net/linaroorg/linuxwpan-ieee-802154-and-6lowpan-in-the-linux-kernel-bud17120
Video: https://youtu.be/6YNeF2H2i-U
---------------------------------------------------
★ Event Details ★
Linaro Connect Budapest 2017 (BUD17)
6-10 March 2017
Corinthia Hotel, Budapest,
Erzsébet krt. 43-49,
1073 Hungary
---------------------------------------------------
Keyword: linux-wpan, kernel, IEEE, Stefan Schmidt
http://www.linaro.org
http://connect.linaro.org
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://twitter.com/linaroorg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961"
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
The Swiss ISP SWITCH has developed a scalable IPFIX exporter built using Snabb.
In 2022 the application gained many new features, and was upstreamed into the
main Snabb repository. We will showcase a production-grade Snabb application,
and discuss implementation challenges and how Snabb helps you deal with them.
(c) FOSDEM 2023
4 & 5 February 2023
https://fosdem.org/2023/schedule/event/network_snabbflow_ipfix/
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabCisco Canada
The Network Service Orchestrator (NSO) is a multi-vendor network orchestrator developed by Tail-f, a recent Cisco acquisition in the area of network management and orchestration. This 4hs session will give an introduction to the NCS system and show hands-on the tool and its different interfaces: network-wide CLI, REST API, etc. Participants will also create one basic network services models using the YANG language.
PLNOG 13: B. van der Sloot, S. Abdel-Hafez: Running a 2 Tbps global IP networ...PROIDEA
Bart van der Sloot joined FiberRing as Managing Director in April 2014, with the objectives to further grow and enhance the footprint, quality and business of FiberRing’s 2 Tbps global IP network, covering over 50 locations on 3 continents. From 1999 to 2013 Bart worked at Global Crossing (acquired by Level 3 in 2011), where he developed staffing, systems and business processes for Global Crossing’s European brand new sales team, built and coached a Wholesale Sales team to sign new telecom customers and grow revenues in various countries across Europe, led Global Crossing’s expansion into Central and Eastern Europe and established Level 3’s position in the Benelux broadcast market.
Samer Abdel-Hafez joined the FiberRing network team in December 2013 as Network Design Engineer. Samer’s responsibilities within the team include planning capacity for the large traffic volume of FiberRing, arranging interconnections in new locations and markets, designing advanced ad-hoc solutions for the FiberRing network and customers and advise the Network support team on day to day issues.
Abstract: FiberRing operates one of the largest content networks in the world, peaking at over 2 Tb/s. In order to facilitate troubleshooting, detect attacks and saving important data as router configurations, we implement a series of tools mostly implemented in house or open source.
The key point of this presentation is to describe how FiberRing is using these tools for:
monitoring: FiberRing makes extensive use of Opsview (Nagios) and NMIS. We utilise Opsview for alerts and reporting and NMIS for detailed traffic analysis.
capacity planning: FiberRing choose PMACCT as netflow collector software and implemented an in house front-end solution that helps us locate strategic peering partners and explore ways to reduce the costs to deliver our content.
DDOS attacks detection: As every large hosting provider, we are regularly target of DDoS attacks. We implement a set of linux boxes running running nfcapd to collect traffic flows with 1 minute/per host granularity. This gives us great flexibility and incredibly valuable data to quick detect attacks and take corrective actions.
routers’ configuration backups: FiberRing is actively involved in the development of Oxidized, an innovative configuration backup tool which poses itself as rancid replacement.
Banog meetup August 30th, network device property as codeDamien Garros
Managing Network Device Properties as Code:
Device configuration templates have simplified a lot of things for the network industry but most people are still managing their device properties (aka variables) manually which is very tedious and error prone. This talk will present a new approach to generate and manage network device properties easily using infrastructure as code principles.
IPv6 configuration at CSCS
● Dual Stack approach
● Static addressing for networking equipment and servers
● Dynamic addressing for PC and guest networks
– Auto configuration with SLAAC
● But we still rely on DHCPv4 to distribute DNS
– Tests ongoing for:
● Distributing DNS via RA (RDNSS, RFC6106)
● DHCPv6
IPv6 deployment
5
● Configure the network part and FW/ACLs
– Test
● Configure IPv6 on the systems
– Test
– At this point the system uses IPv6 and IPv4 for outgoing
connections
● Publish the AAAA resource record into the DNS with short TTL
– If test is succesful: set normal TTL for the RR AAAA
– Now the system is fully IPv6 enabled
IPv6 lessons learned
7
● Some network devices send out RA even if they shouldn't
– Impact: machines get IPv6 global address
● Disable SLAAC autoconfiguration on all the servers
● Rogue RA:
– Impact: default gateway changed! No IPv6 connectivity anymore..
● Filter RA messages at the network level
● IPv6 ACL: be careful not to filter NS/ND messages
– Impact: you may break IPv6 connectivity
● On IPv6 ARP is replaced by ICMPv6 NS and ICMPv6 ND messages
● Firewall IPv6 limitations (CLI config needed, WebGUI not ready)
● Services not listening on IPv6. Remember to configure ssh, httpd, etc to
listen also on IPv6
Similar to PLNOG 4: Paul Vixie - ISC Services at PLIX (20)
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Connector Corner: Automate dynamic content and events by pushing a button
PLNOG 4: Paul Vixie - ISC Services at PLIX
1. ISC Services at PLIX
Paul Vixie, President
Internet Systems Consortium
Warsaw, March 4, 2010
2. About ISC
● Founded in 1993 to maintain BIND (then V4)
● Produced many RFC's to clarify/extend DNS
● Created BIND8 in 1996, BIND9 in 2000
● Operates F-root and a regional network
● Currently:
– 39 employees in six countries
– 45 F-root instances in ~30 countries
– ~6M USD annual budget
3. ISC Services at PLIX
● Since 2009 there has been an ISC SIE relay node
● Since yesterday there has been an F-root node
4. F-Root Introduction
● Service context:
– F is one of 13 servers for the DNS root zone
– Was once NS.ISC.ORG before the A-M renumbering
– Root zone is parent of all TLD's (including .PL)
● Capacity growth:
– Was once a single Intel 486DX2 running BSD/OS
– Then a cluster of DEC Alphas using OSPF ECMP
– Now 45 clusters of Intel EM64T, independent BGP
5. F-Root Anycast
● Threat model:
– DDoS is unpreventable but is manageable
– Risk management means massive overprovisioning
● Delivery model:
– Every F-Root anycast node has a local peering ASN
– Offers IPv4 and IPv6 BGP announcements (AS3557)
● Benefits to PLIX members:
– Shorter round trip times (faster service) every day
– Service continuity during DDoS
– Something to use IPv6 for
6. ISC Security Information Exchange
● Security generally depends on awareness
– Internet is very large/complex
– So, there is no general awareness
● Security vendors operate sensor networks
– Information from these sensors is privately held
● ISC's interests and qualifications
– Nonprofit public benefit corporation (no equity)
– Strong in software, protocols, operations, business
– Several key employees are from PAIX and LINX
7. ISC SIE Technology
● Looks like an IX: private DC for member equipment
– But: equipment is analysis servers, not BGP routers
● We use VLAN tags like television channels
– E.g., “the passive DNS channel”
● Worldwide network of sensors
– Passive DNS, netflow, spam traps, link pairs, +more
● Based on software/protocols developed at ISC
– NCAP was our attempt to replace PCAP (tcpdump)
– Eventually replaced NCAP with NMSG
8. SIE Wins
● HTTP data from CONFICKER appears in realtime
– (other botnets to come as we instrument sinkholes)
● Cross-correlation of passive DNS, spamtraps
– Spam body URL can be reverse-indexed
– So, a domain used in spam can be associated in real
time with all other domains having same A or NS
– Result: near-instantaneous SURBL entries
● SIE makes raw sensor data available to participating
researchers (including academic, L.E., commercial)
– So, new forms of analysis or correlation can be
developed continuously
9. SIE Participation
● Sensor operators:
– You can run our NMSG tools inside your networks
● Passive DNS, netflow, darknet, spamtrap, etc
– Upload that data to the relay server at PLIX
● We will backhaul it to SIE nodes (California, Ottawa)
– Result: more global awareness of Internet events
● Analysis:
– Send us a server, we'll plug you in, you can develop
your own methods of processing this realtime data
– Or use our lookup tools from your own abuse desk
10. Conclusion
● ISC and PLIX both want to do what's best for the
Internet and for the world
● We're working together today on root name service
and Internet security
● Both parties are open to other kinds of cooperation
in the future
● Any questions/discussion?