#NetworkDesign

Mohammad HajiaghayiMTHajiaghayi@mathstodon.xyz
2025-02-03

πŸš€ Exciting update! My Network Algorithms and Approximations course continues with Lessons 2, 3 & 4 now available! πŸŽ‰

πŸ“Œ Topics covered:
βœ… Submodular (Set) Cover – Greedy log-approximation & Group Steiner Tree
βœ… Maximum Coverage – 1 - 1/e approx, LP relaxations & budgeted coverage
βœ… Unique Coverage – Log(n)-approximation, NP-hardness & max-cut ties

πŸ”— Watch now:
▢️ Lesson 2: youtu.be/xi6P3bqy61g
▢️ Lesson 3: youtu.be/jC44JdD74Hw
▢️ Lesson 4: youtu.be/ypzFnl0Wfp4

πŸ“… New lectures premiere every Wednesday at 7PM ET!
πŸ“Ί Full playlist: youtube.com/playlist?list=PLx7

πŸ”” Subscribe for more: youtube.com/@hajiaghayi

#Optimization #Algorithms #NetworkDesign #CombinatorialOptimization #MachineLearning #GraphTheory #SetCover #ApproximationAlgorithms

Mohammad HajiaghayiMTHajiaghayi@mathstodon.xyz
2024-12-08

πŸš€ Excited to announce my 5th course, Network Algorithms and Approximations! πŸŽ“ Explore NP-complete problems (Set Cover, Unique Coverage, etc.), approximation techniques, and applications in data science, neural nets, & network optimization.

πŸ“Ί First lecture: youtu.be/Tnm-8xieqB4
πŸŽ₯ Weekly uploads: Wednesdays at 7 PM EDT. Playlist: youtube.com/playlist?list=PLx7

Plus, all 4 previous courses (Game Theory, Algorithms, Lower Bounds, Data Science) are online! 🌐 youtube.com/@hajiaghayi

#NetworkDesign #Optimization #NPComplete #Algorithms #DataScience #NeuralNets

LINUXexpert.orglinuxexpert
2024-07-23

IPsec, or Internet Protocol Security, is a suite of protocols designed to secure internet communication by authenticating and encrypting each IP packet of a communication session. It has long been associated with IPv4, but its relationship with IPv6 often stirs confusion and misinformation.
linuxexpert.org/ipsec-and-ipv6

@lucasmz@hachyderm.io

Einstein^Diogenes@UniverseLinkazuresaipan@defcon.social
2024-04-18

Then again, why use a VPN if you have perfect DNS?
noise.cs.uchicago.edu/
medium.com/noise-lab/oblivious
[A: This thought criminal thinks that the EULAS and companies can't be trusted. So systems that are agnostic about who the sysadmins are as long as they are working like they were designed? Need anonymity for security.
ng27owmagn5amdm7l5s3rsqxwscl5y]

Researchers observe that tor node DNS uses Google resolvers often.
medium.com/noise-lab/noise-lab

Having high quality volunteer nodes is still important. A multi-hop VPN with high quality DNS could rival the security and privacy of tor, but high adoption of tor boosts anonymity.

#ODoH #Apple #VPN #tor #networkdesign #SecurityResearch
#uchicago #cs

2023-12-12

My latest blog revisits Cisco (and others’) segmentation, touching on some requirements debate topics that came up in a set of customer design sessions. #CCIE1773 #BlueAlly #NetCraftsmen #Cisco #NetworkDesign #Security #Segmentation netcraftsmen.com/securing-segm

πŸŒͺ MikeMathia.com πŸ“‘mikemathia@ioc.exchange
2023-11-15
Stephen Brahamwarp@noc.social
2023-11-01

These two #Nokia reports are always important basic reading in the mission-crit #networkdesign game: lightreading.com/broadband/nok

Ryan in Minneapolisryaninmpls
2023-09-14

If you're looking for an engineer with a background in and door , , , and Level 2/Level 3 support look no further than right here.

I am looking immediately for new work. LinkedIn here: linkedin.com/in/d3photographer/

2023-09-08

I put together a few thoughts on
network #WAN design, taking a look at how adding more circuits/devices may help or hinder availability.

josh-v.com/designing-wan-avail

#Networking #NetworkDesign

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst