There are no see cows mentioned in the Wikipedia article about Merovech [0].
I have no knowledge about this, but such a juicy databit should just jump at you, if it was true. Instead, a quite mundane etymology around ‘merovech’ is provided.
In 1995, World War III almost broke out after a rocket launch from the exact same location [1]. It was only a coincidence that stopped the Russians from doing retaliatory nuclear rocket launches. So, indeed, launching to the east is not a good idea from this latitude.
Bear? It is more like a stray dog that keeps shitting on your living room carpet. You don’t need to hate the dog, you just keep it on the outside where it can run around and have a great time on it’s own.
Interesting. I came in contact with dynamic programming as a means to implement the Viterbi algorithm in an equalizer. This relates to calculating “cost” of routes through a trellis, where you accumulate partial results corresponding to alternative routes.
Keep in mind ZFS was created at a time when disks were glacial in comparison to CPUs. And, the fastest write is the one you don't perform, so you can afford some CPU time to check for duplicate blocks.
That said, NVMe has changed that balance a lot, and you can afford a lot less before you're bottlenecking the drives.
If the block to be written is already being stored then you will match the hash and the block won't have to be written. This can save a lot of write IO in real world use.
Yes, but doing it intentionally isn't as simple as one might think. First, BGP generally prefers the shortest path and yours is going to be a little long, so unless the best original path is very long you need on some transit provider to use policy-based routing and trust you as transit. Second, if you want the traffic to pass through your hardware you have to have sufficient bandwidth, otherwise you'll just trigger packet loss and disrupt service (fine if disruption is your goal, not so fine if you want the traffic to pass through your hardware). Third, some people use signed routes, which also complicates your job.
> First, BGP generally prefers the shortest path and yours is going to be a little long, so unless the best original path is very long you need on some transit provider to use policy-based routing and trust you as transit.
the article states:
> The leaked route is likely preferable because of a localpref setting which would prefer sending traffic for free through a peer regardless of the AS path length, over paying to send traffic through a transit provider.
Right. That's policy routing. You can talk to an ISP, have a cable installed and a peering session, gain trust, offer cheap or free traffic delivery, and then publish a route via that session. Your trusting peer may/will then send traffic to that route via you.
This happens legitimately, e.g. when an end-user becomes multihomed or starts using anycast, so the trusting peer can't necessarily discover this algorithmically. Route signing helps.