1 / 9

Sponsors - Thank You!

Explore key statistics from NANOG's latest conference with over 500 attendees from diverse industries and regions. Learn about sponsors, top organizations, and cybersecurity best practices discussed during the event.

len
Download Presentation

Sponsors - Thank You!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Sponsors - Thank You! • University of Oregon • Sprint • Cisco • IETF Secretariat • The Measurement Factory • Foundry • Beer ‘n Gear: Adlex Arbor Cisco Force10 Juniper Packet Design Redback Seranoa

  2. Eugene attendance ++ • Total attendance 520 Toronto 509 Miami 425 • NAPs represented 8 • Univ/college/schools 16 • Asia/Pacific/Africa 36 • Europe 17 • Carribbean 1

  3. Commercial vs. non-profit attendees

  4. Vendors vs. ISPs vs. others

  5. Organizations with largest attendance • UO 40 • Cisco 31 • AT&T 16 • Sprint 16 • Juniper 12 • Merit 12 • ARIN 8 • NTT 8

  6. NANOG list • Direct NANOG subscribers 5927 • nanog-announce 533 • nanog-post 4635 • nanog-digest 809

  7. Presentations are on the web • Linked off the agenda page: http://www.nanog.org/mtg-0210/agenda.html

  8. Intrusion detection system • Info about Bro: http://www.icir.org/vern/bro-info.html • No personally identifiable information, including IP addresses, domain names, or other identifiers gathered in the course of operating the NANOG/ARIN meetings network will be shared with third parties unless such disclosure is required by law. • All copies of personally identifiable information gathered will be destroyed no later than five days after the end of the meetings.

  9. Wireless (in)security • Don’t use cleartext passwords • End-to-end authentication needed (e.g., ssh)

More Related