This report has been generated at Fri Mar 25 21:44:39 2005 AEST.
The report analyses the BGP Routing Table of an AS4637 (Reach) router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org/as4637 for a current version of this report.
Recent Table
Routers, IP phones, VPN, etc are starting to get reasonable support
for certificates. So network operators may need some PKI as part
of their infrastructure (rather than the traditional application-layer
PKI such as Web/SSL).
But there seems to be only two choices for Public Key Infrastructure.
Advanced IP Pipeline:
Someday, customers of wireless broadband provider
Clearwire Corp. may be able to use Voice over IP
services. But right now, Craig McCaw's newest company
is giving its customers the silent treatment by
apparently blocking outside VoIP providers from
its network.
On Thu, 24 Mar 2005 16:20:15 -0800 (PST), David Barak
[EMAIL PROTECTED] wrote:
Now if we can just get everyone else to play along...
Like for example old cisco router config for dummies type books (or
whatever) that people just look up and copy / paste example configs
from?
On Fri, Mar 25, 2005 at 12:41:37PM +0530, G Pavan Kumar wrote:
Okie, this has gone on long enough.
If you would like some help, please stop, take a deep breath, count to ten
slowly, then ask nicely and some people here might teach you something.
May be you should spend more time on
i suspect that, rather than being a sociologist trying to
catorgize operators on the surliness scale, at which you
seem to have succeeded splendidly, you may be tring to
understand AS relationships. you may find a useful paper
trail that kinda goes from
On Fri, 25 Mar 2005 12:41:37 +0530 (IST), G Pavan Kumar
[EMAIL PROTECTED] wrote:
May be you should spend more time on networking than your partime job of
yoga teaching!
Pavan, what you seem to know of networking is not just outdated, its
plain wrong.
And you've just managed to flame some of
On Fri, 25 Mar 2005 21:15:25 +0530, Suresh Ramasubramanian
[EMAIL PROTECTED] wrote:
And some others who have enable on huge, worldwide networks that you'd
kill to get an interview call from, let alone a you're hired email.
speaking of hiring .. you'd better pray that your brief foray into
On Fri, Mar 25, 2005 at 07:43:22AM -0800, Randy Bush wrote:
i suspect that, rather than being a sociologist trying to
catorgize operators on the surliness scale, at which you
seem to have succeeded splendidly, you may be tring to
understand AS relationships. you may find a useful paper
I've worked with Aaron from BandwidthAdvisor several times over the past
few years. He's a top notch guy, with a great list of providers and
clients. He's simply an independent agent, and gets paid for bringing
business to your door. In my opinion you can't ask for a lot more than
guys out there
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
Daily listings are sent to [EMAIL PROTECTED]
If you have any comments please contact Philip Smith [EMAIL PROTECTED].
Routing Table Report 04:00 +10GMT Sat 26 Mar, 2005
Tim,
I hope you're joking. Extortion means something pretty specific, legally.
There is absolutely no extortion going on here. The appropriate term is
agency. Its a pretty widely used concept in the business world.
In terms of the integrity of Bandwidth Advisors or any other consultant -
its
- Original Message -
From: Tim Pozar [EMAIL PROTECTED]
To: Hannigan, Martin [EMAIL PROTECTED]
Cc: nanog@merit.edu
Sent: Thursday, March 24, 2005 7:29 PM
Subject: Re: Bandwidth Advisors - www.bandwidthadvisors.com
--- snip ---
I know a bunch of consultants out there (me being one,
For those that don't know... I am now the COO of UnitedLayer. It
sounds like, since I am not going to pay the extortion fee to
Bandwidth Advisors, that their consultants won't know about our
pricing and services. Even if I did pay the fee, that means that
their clients can't get the best
Good afternoon,
The NANOG list is not an appropriate place for speculative critiques of the
business models of individual
companies.
Furthermore, this thread has gone completely off topic. Please take it
off-list.
For the nanog list administrators,
Chris Malayter
TDS Telecom - Network
Sean Donelan wrote:
Routers, IP phones, VPN, etc are starting to get reasonable support
for certificates. So network operators may need some PKI as part
of their infrastructure (rather than the traditional application-layer
PKI such as Web/SSL).
But there seems to be only two choices for Public
This is with my deepest regrets that I apologize from the bottom
of my heart to Mr.Gilmore, Mr.Woodcock, Mr.Bush and also the rest
of the honourable members of the list for being ignorant of how
high-profile a list this is. I couldn't be more sorry. Please,
please forgive me.
ps: I sure meant no
--On Saturday, March 26, 2005 11:51 AM +0530 G Pavan Kumar
[EMAIL PROTECTED] wrote:
This is with my deepest regrets that I apologize from the bottom
of my heart to Mr.Gilmore, Mr.Woodcock, Mr.Bush and also the rest
of the honourable members of the list for being ignorant of how
high-profile a
Most people figured out I was not looking for a public CA solution.
There is very little reason why internal certificates need to be
recognized world-wide, or by anything outside of the internal
organization. Also I didn't say it, but I'm not looking to identify
natural people.
Instead of using
19 matches
Mail list logo