Blogs

Last modified: January 30, 2014
  • TechWomen Mentor – The Power of Mentoring – Looking Forward

    I was so honored to participate in the TechWomen mentoring program in the summer of 2011. Meeting and working with my mentee, Sanae Baatti from Morocco, was a life changing experience. I wrote some about the TechWomen experience last summer. I was deeply honored as well, to travel to Morocco last fall with a state department sponsored TechWomen mentor and

    Read more
    0
  • BIND 9.9.0b2 — a feature update

    Today, ISC is publishing a new beta release of BIND 9.9.0.  As several new features have been added since the feature preview I posted on the occasion of the first alpha release, it would seem to be a good time for an update. Inline signing The new ‘inline-signing’ option, in combination with the ‘auto-dnssec’ option that was introduced in BIND 9.7,

    Read more
    0
  • Routing configuration over DHCPv6

    Currently the DHCPv6 protocol does not allow the provisioning of any routing-related information to hosts. A new proposal is addressing this shortcoming. The draft draft-ietf-mif-dhcpv6-route-option defines a mechanism for delivering routing information over the DHCPv6 protocol. This article explains core concepts and explains how to use the ISC DHCP software to deliver such information. A bit of history When the IPv6

    Read more
    0
  • TechWoman in Marrakesh-an October ’11 update

    As I wrote in June (link to my last techwomen blog), I’ve been deeply honored this year to participate in the inaugural round of the TechWomen initiative, a program of the US State Department, as a technical mentor. This program brings technical women from the Middle East and North Africa to Silicon Valley for technical mentorships and also has brought

    Read more
    0
  • Other Uses for Secure DNS

    Reprinted from ;login: The USENIX Magazine, vol. 36, no. 5 (Berkeley, CA: USENIX Associa- tion, 2011), pp. 13–16. Since the mid-1990s I’ve been a member of a distributed multi-generational team working to secure the Domain Name System. Many ideas and people have come and gone in the decade and a half since this work began, and the current work in

    Read more
    0