SlideShare a Scribd company logo
Rules About Networks
There are  only two network models 
Ma Bell
…  or the Internet
Pros: ,[object Object],[object Object],[object Object],[object Object]
Cons: ,[object Object],[object Object],[object Object],[object Object]
Pros: ,[object Object],[object Object],[object Object]
Cons: ,[object Object],[object Object],[object Object]
No one can afford to become  Ma Bell again.
Not These Guys
Or These Guys
Or These Guys
Or These Guys
So what are the odds you will?
No one can afford to become a network dictator again.
Networking:  Yin and Yang Stuff you control Stuff someone else controls
God, grant me the serenity to accept the network elements I cannot change;  the courage to change the network elements I can;  and the wisdom to know the difference.
Grasshopper: you must learn the paradox of internetworking. Which is…?
Not changing things enables you to change things. Huh?
It’s True! Just Look at the Internet!
TCP/IP Protocol Stack Changes Often Rarely Changes
So what things should I try not to change too much?
Q: What element did both the Internet and Ma Bell control?
Q: What element did both the Internet and Ma Bell control? A: Addressing. Jon Postel, Original  Internet Assigned Numbers Authority (IANA) North American Numbering Plan (NANP)
What Else?
A: Pay Attention to Life Cycles. Computers: 2-3 years
A: Pay Attention to Life Cycles. Operating Systems: 3-5 years
A: Pay Attention to Life Cycles. Network Protocols: 7-10 years
A: Pay Attention to Life Cycles. Data Formats: 10+ years
There is a name for network elements that don’t change quickly:
The Installed Base
Unlike in global warming, however,  this almost never gets smaller.
The only reason God could create the world in six days was because He didn't have to worry about  the installed base .* *  Enzo Torresi, Einar Stefferud, Esther Dyson, or someone else
Unfortunately, often today’s hot new technology …. Becomes that junky old stuff that drags down the whole installed base. 1999 2008
A: Inevitable.
Q: What is the likelihood the stuff you want to control eventually becomes your biggest obstacle?
But what about the things I can’t control?
How do you protect yourself against reckless drivers?
Buckle up. Keep alert. Obey signs. Buy insurance. Have airbags. Have bumpers. Yeah, Buckle up.
Protection, Network-Style ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Can I steer a safe passage through these perils?
Do I look like Albert Freakin’ Einstein?
Stuff is out of control all over my network. …  and I’m OK with that. Find Your Own Networking Bliss

More Related Content

Viewers also liked

Getting people into network marketing
Getting people into network marketingGetting people into network marketing
Getting people into network marketing
YSDO and MAP
 
Success Secret for MLM Business
Success Secret for MLM BusinessSuccess Secret for MLM Business
Success Secret for MLM Business
MLM Training India
 
Basic Statistical Concepts and Methods
Basic Statistical Concepts and MethodsBasic Statistical Concepts and Methods
Basic Statistical Concepts and Methods
Ahmed-Refat Refat
 
Why Network Marketing
Why Network MarketingWhy Network Marketing
Why Network Marketing
Ranvir Singh
 
Multi-Level Marketing Slide
Multi-Level Marketing SlideMulti-Level Marketing Slide
Multi-Level Marketing SlideRaja Wahyu
 
Ppt 7 network marketing
Ppt 7  network marketingPpt 7  network marketing
Ppt 7 network marketing
Наталья Невзорова
 

Viewers also liked (6)

Getting people into network marketing
Getting people into network marketingGetting people into network marketing
Getting people into network marketing
 
Success Secret for MLM Business
Success Secret for MLM BusinessSuccess Secret for MLM Business
Success Secret for MLM Business
 
Basic Statistical Concepts and Methods
Basic Statistical Concepts and MethodsBasic Statistical Concepts and Methods
Basic Statistical Concepts and Methods
 
Why Network Marketing
Why Network MarketingWhy Network Marketing
Why Network Marketing
 
Multi-Level Marketing Slide
Multi-Level Marketing SlideMulti-Level Marketing Slide
Multi-Level Marketing Slide
 
Ppt 7 network marketing
Ppt 7  network marketingPpt 7  network marketing
Ppt 7 network marketing
 

Similar to Rules About Networks

Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
adamdeja
 
A Digital Conversation: The Next Web
A Digital Conversation: The Next Web A Digital Conversation: The Next Web
A Digital Conversation: The Next Web
Reading Room
 
Empowering School Leaders to Manage and Lead I.T.
Empowering School Leaders to Manage and Lead I.T.Empowering School Leaders to Manage and Lead I.T.
Empowering School Leaders to Manage and Lead I.T.
Mark S. Steed
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
Deja vu Security
 
Bob Frankston's presentation at eComm 2008
Bob Frankston's presentation at eComm 2008Bob Frankston's presentation at eComm 2008
Bob Frankston's presentation at eComm 2008eComm2008
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
rogly
 
It Exercises
It ExercisesIt Exercises
It Exercises
guest29c0535
 
Science and Engineering Out of The Box
Science and Engineering Out of The BoxScience and Engineering Out of The Box
Science and Engineering Out of The Box
University of Hertfordshire
 
Exede Internet Welcome Comic Book
Exede Internet Welcome Comic BookExede Internet Welcome Comic Book
Exede Internet Welcome Comic Book
talex101
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
Unit 1 Compare And Contrast Visual And Visual Research Paper Telegraph
Unit 1 Compare And Contrast Visual And Visual Research Paper  TelegraphUnit 1 Compare And Contrast Visual And Visual Research Paper  Telegraph
Unit 1 Compare And Contrast Visual And Visual Research Paper Telegraph
Nora Hernandez
 
Slide commentary
Slide commentarySlide commentary
Slide commentary
Chris Thomson
 
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...eCommConf
 
Networks for An Infinite Service Future
Networks for An Infinite Service FutureNetworks for An Infinite Service Future
Networks for An Infinite Service Future
University of Hertfordshire
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
Stephen Lahanas
 
The IoT For Real
The IoT For Real The IoT For Real
The IoT For Real
University of Hertfordshire
 
AAAI Beth Logan
AAAI  Beth LoganAAAI  Beth Logan
AAAI Beth Logan
bethloganintel
 
Mike_Nelson_Amplify 11
Mike_Nelson_Amplify 11Mike_Nelson_Amplify 11
Mike_Nelson_Amplify 11
AmplifyFest
 
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docxYou decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
jeffevans62972
 
Labs.Redweb - Agency Briefing: The Internet Of Things
Labs.Redweb - Agency Briefing: The Internet Of Things Labs.Redweb - Agency Briefing: The Internet Of Things
Labs.Redweb - Agency Briefing: The Internet Of Things
David Burton
 

Similar to Rules About Networks (20)

Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...Deja vu security   Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
 
A Digital Conversation: The Next Web
A Digital Conversation: The Next Web A Digital Conversation: The Next Web
A Digital Conversation: The Next Web
 
Empowering School Leaders to Manage and Lead I.T.
Empowering School Leaders to Manage and Lead I.T.Empowering School Leaders to Manage and Lead I.T.
Empowering School Leaders to Manage and Lead I.T.
 
Hushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for EchoHushcon 2016 Keynote: Test for Echo
Hushcon 2016 Keynote: Test for Echo
 
Bob Frankston's presentation at eComm 2008
Bob Frankston's presentation at eComm 2008Bob Frankston's presentation at eComm 2008
Bob Frankston's presentation at eComm 2008
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
It Exercises
It ExercisesIt Exercises
It Exercises
 
Science and Engineering Out of The Box
Science and Engineering Out of The BoxScience and Engineering Out of The Box
Science and Engineering Out of The Box
 
Exede Internet Welcome Comic Book
Exede Internet Welcome Comic BookExede Internet Welcome Comic Book
Exede Internet Welcome Comic Book
 
IoT Yet to Come
IoT Yet to ComeIoT Yet to Come
IoT Yet to Come
 
Unit 1 Compare And Contrast Visual And Visual Research Paper Telegraph
Unit 1 Compare And Contrast Visual And Visual Research Paper  TelegraphUnit 1 Compare And Contrast Visual And Visual Research Paper  Telegraph
Unit 1 Compare And Contrast Visual And Visual Research Paper Telegraph
 
Slide commentary
Slide commentarySlide commentary
Slide commentary
 
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
Bob Frankston's Presentation at Emerging Communication Conference & Awards 20...
 
Networks for An Infinite Service Future
Networks for An Infinite Service FutureNetworks for An Infinite Service Future
Networks for An Infinite Service Future
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
The IoT For Real
The IoT For Real The IoT For Real
The IoT For Real
 
AAAI Beth Logan
AAAI  Beth LoganAAAI  Beth Logan
AAAI Beth Logan
 
Mike_Nelson_Amplify 11
Mike_Nelson_Amplify 11Mike_Nelson_Amplify 11
Mike_Nelson_Amplify 11
 
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docxYou decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
You decide-ScenarioScenario SummaryLeonard Cooper Charte.docx
 
Labs.Redweb - Agency Briefing: The Internet Of Things
Labs.Redweb - Agency Briefing: The Internet Of Things Labs.Redweb - Agency Briefing: The Internet Of Things
Labs.Redweb - Agency Briefing: The Internet Of Things
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Rules About Networks