Platform Media öffentlich
[search 0]
Mehr
Download the App!
show episodes
 
Loading …
show series
 
We are building **Das SCHIFF**, a Kubernetes Cluster as a Service platform for Deutsche Telekom. Das SCHIFF is used by internal teams to deploy network functions like 5G core and other applications on bare-metal.Due to the complexity in telecom networks we opted to build a host-centered design with BGP-EVPN to each Kubernetes host.I would like to s…
  continue reading
 
In contrast to the usual dual-stack procedure, IPv6-Mostly can actually save IPv4 addresses. This is achieved by combining a DHCPv4 option (RFC8925) in conjunction with an IPv6 RA extension (RFC8781) and NAT64/DNS64.I will show how to configure the DHCP server as well as the router and, if necessary, how to configure the clients. We also rolled out…
  continue reading
 
This talk focuses on control plane data plane testing aka how long it takes to translate BGP Control Plane events into a new Data plane entry. This is an important metric to look at in the context of your peering edge.Noneabout this event: https://pretalx.com/denog15/talk/SWKMYC/Von Tobias Heister
  continue reading
 
When you want to provide telecommunication services to customers you need to provide a good set of functions/services to them. Most commonly those services are ~~IP-based~~, I mean of cource IP6-based.These functions are commonly provided by vendors which are pre-selected by long negotiations.In these, all requirements are marked as fulfilled at th…
  continue reading
 
Are you managing your network infrastructure using NetBox?Do you need to manually create Letters of Authorization (LOAs)?Not anymore! You can let Bulk Loagen create them automatically from the data in NetBox.Bulk Loagen is a small service running alongside NetBox that generated PDFs on-demand with the technical information fetched from NetBox.Nonea…
  continue reading
 
Reeling under the blows of the Russian assault on Ukraine and the ever-increasing threats to networks and utilities, the European regulatory regime for critical infrastructures is undergoing profound changes. Both cyber and physical security of essential service providers are covered by the recent EU directives NIS 2 and CER, with several additiona…
  continue reading
 
Time is a common good, yet hardly any thought is given to its handling or its synchronisation in particular.Time synchronisation is used in various areas: from own networks to trading transactions in the financial sector. Depending on the type of application, it requires high accuracy.Today's solutions are mostly based on satellites (e.g. GNSS, GPS…
  continue reading
 
The BNG Blaster (https://github.com/rtbrick/bngblaster) is an open-source network tester that has evolved significantly since my last presentation at DENOG13 two years ago. Beyond its initial capabilities with various access protocols, it has been enhanced to support all major routing protocols, including BGP, ISIS, OSPF, and LDP.In this presentati…
  continue reading
 
As vehicles get more and more connected, their networks grow larger and more complex. This talk gives an introduction to automotive networks. It covers bus systems for automotive use cases and shows different network architectures used in road vehicles.Noneabout this event: https://pretalx.com/denog15/talk/QBPHUK/…
  continue reading
 
Internet Governance is a terminology which is often used and referred to, but who are the players? Who is responsible for what and how does this puzzle pieces fit together?This presentation aims to explains some of this questions.Noneabout this event: https://pretalx.com/denog15/talk/FPUHRQ/Von Christian Kaufmann
  continue reading
 
With the speed of 400G coherent technology was introduced to pluggable optical transceivers (OIF 400ZR and OpenZR+). This technology is complex and powerful for your network, it even has influence on your network device operating system. This talk will provide first insight in Nokia's implementation as well as known or potential interoperability is…
  continue reading
 
With the rise and fall of social networks, decentralized networks, and new spin-offs were moved in the focus of the public. One significant benefit of advertising non-commercial social networks is diversity and the ability to self-host. Independence should give federated networks more resiliency against the power of certain actors.This talk will ex…
  continue reading
 
Communication networks are vital for society and network availability is therefore crucial. There is a huge potential in using network telemetry data and machine learning algorithms to proactively detect anomalies and remedy network problems before they affect the customers. In practice, however, there are many steps on the way to get there. In thi…
  continue reading
 
The market has gathered more than a year’s experience with Private Relay, which Apple introduced with iOS15. We want to shed some light on the traffic profile visible from an access-network perspective.So far, the market has not seen a major uptake in Apple Relay services, it is still in the permille range of total traffic. However, operators have …
  continue reading
 
The 2nd Internet Backbone Study examined various areas and effects of ongoing centralization and consolidation on the Internet infrastructure. It comprises:* A catalog of wide-ranging Internet disruptions* Fictitious outage scenarios* Dependencies on international cable connections* Developments and changes in the Internet infrastructure* Social an…
  continue reading
 
Between 2015 and 2021, in Germany, Deutsche Telekom has first enabled Dualstack IPv4 and IPv6 for their mobile subscribers, and then successfully transitioned most of them into an IPv6-only access model.This talk will highlight the rationale, the planning phase, the different testing stages as well as the implementation and the migration of the cus…
  continue reading
 
The field of automotive HMI has evolved into a sophisticated intersection of functionality, compliance, and dynamic visuals. We'll discuss the requirements, the reasons for choosing Godot, and the custom runtime integration with RenderCoreTM. Additionally, we'll delve into the modifications made to the engine and editor to accommodate multiple scri…
  continue reading
 
To create Strange Light, an extended reality documentary that premiered at the 2023 Arts & Ideas Festival in New Haven, CT, USA, creators Kit Hung & JLS Gangwisch developed a workflow to import and animate volumetric video captured with Brekel Point Cloud into their Godot 4.0 project. In this talk, JLS Gangwisch will demonstrate these tools and dis…
  continue reading
 
Building multiplayer games with physics and great graphics is extremely complex. The Mirror simplifies this with out-of-the-box networked Jolt physics, authentication, databases, deployments, analytics, REST APIs, tailored shaders, Godot GLB imports, payment rails, marketplace, revshare, and more. The Mirror draws inspiration from Roblox, Garry's M…
  continue reading
 
I am making a puzzle game with a robot on a wire, and we can bend the wire around walls and corners. It really looks complex, but in this talk I deconstruct it to like 10-ish simple steps.about this event: https://pretalx.c3voc.de/godotcon2023/talk/godotcon20236/Von Ivan Bushmin
  continue reading
 
Realistic flight physics adds fun, but just for some pew pew and whoosh a scientifically accurate library is too much. This talk presents a GDScript flight library, but with just the parts you really need.about this event: https://pretalx.c3voc.de/godotcon2023/talk/godotcon202326/Von Fernando "Vela" Cosentino
  continue reading
 
One of the biggest prejudices amongst the game dev community that has not tried Godot yet is that the engine is “only good for 2D games!”. Every day Godot is improving its capabilities to render 3D environments more and more, and to put these prejudices to the ground, we took three months to try to achieve the best graphical quality we could for ou…
  continue reading
 
Die De-Militarisierung von Cybersicherheit? Perspektiven und Fragen aus der Soziologie und den feministischen science and technology studiesAttacken, Verteidigung, Schwachstellen oder der Faktor Mensch - Cybersicherheit ist durchzogen von militärischen Metaphern. Diese werden in alarmistische und moralisierende Kommunikationsstrategien übersetzt. I…
  continue reading
 
Loading …

Kurzanleitung