Have you ever thought about the increasing disorder in your life? Sure, it may seem like things are constantly getting crazier every time you turn around, but did you know that entropy is always increasing in the universe? It’s a Law of Thermodynamics!
The idea that organized systems want to fall into disorder isn’t too strange when you think about it. Maintaining order takes a lot of effort and disorder is pretty easy to accomplish by just giving up. Anyone with a teenager knows that the amount of disorder that can be accomplished in a bedroom is pretty impressive.
One place where we don’t actually see a lot of disorder is in the computing realm. Computers are based on the idea that there is order and rationality in everything that we do. This is so prevalent that finding a way to be random is actually pretty hard. Computer programmers have tried a number of ways to come up with random number generators that take a variety of inputs into the formula and come up with something that looks sufficiently random. For most people just wanting the system to guess a number between 1 and 100 it’s not too bad. But Continue reading
Each day, more and more of us buy products that connect to the Internet, such as personal assistants, fitness monitors, appliances, and home security systems. Odds are you have one, two, or even more. There are more than 23 billion of these Internet of Things (IoT) products installed around the globe – roughly triple the world’s population – and that number is growing.
The Internet of Things offers the promise of convenience, efficiency, and more personalized services. However, many of these products are designed with little consideration for basic security and privacy protections.
The Internet Society and Consumers International formed a working partnership last year to address these challenges and to make sure consumers have access to trusted Internet-connected devices. We are proud to be lead partner at the Consumers International Summit, 30 April – 1 May, focused on putting consumers at the heart of digital innovation.
Consumers care deeply about their privacy, security, and how their personal information is collected and handled. On May 1 at the Summit, our President and CEO Andrew Sullivan will unveil new research from Consumers International and the Internet Society exploring what matters most to consumers when buying connected devices. He will also Continue reading
QOS Networks CEO Frank Cittadino discusses the managed service providers’ road ahead for SD-WAN...
My first Cisco router was a blade for a Cabletron modular hub (anyone remembers what hubs were or a company named Cabletron?). We plugged it in, I read the documentation, figured out I had to type conf t and was faced with a blinking cursor staring back at me from an empty line.
A few years later I was invited to beta test Cisco software release 9.21 (it wasn’t called IOS yet). The best feature it had was the awesome configuration CLI with context-sensitive prompts and on-demand help.
Read more ...Wistar is an open-source network emulator originally developed by Juniper Networks and released under the Apache license. It simplifies the presentation of Juniper products on its graphical user interface by making the multiple VMs that make up each JunOS virtual router appear as one node in the network topology.
Wistar also supports Linux virtual machines and, interestingly, uses cloud-init to configure Linux routers from the Wistar user interface. Wistar also supports generic virtual appliances, in a basic way. In this post, I will install Wistar and use it to work through two examples using open source routers.
The Wistar installation procedure is documented in the Wistar GitHib page. The Wistar user guide is available at the Read the Docs website and some unpublished chapters are available on GitHub. Juniper published a presentation about using Wistar. In addition, there are a few other other blog posts available about using Wistar and comparing Wistar to other network emulators.
Wistar documentation is good enough to get started, but seems to be incomplete.
I installed Wistar on my laptop computer running Ubuntu 18.04 LTS. I modified the Wistar Continue reading
“When it became apparent that we don’t have a clear path to profitability in 5G modems, we...
Verizon named the next 20 cities to receive mobile 5G, but service may not actually be live for up...
The Oracle maneuver echoes a similar push by Amazon to ditch its reliance on Oracle platforms.
The AWS Asia-Pacific (Hong Kong) Region is the cloud giant’s eighth data center region in...
The vendor posts a surprise first-quarter 2019 loss, but CEO Rajeev Suri says a weak Q1 was...
Are you working to building a better Internet for women? Do you know initiatives that are promoting the development of digital skills for girls? Is your organization contributing to defend the Internet by helping women get equal access to leadership opportunities?
If the answers are yes, we have something for you.
The EQUALS Global Partnership has announced that the nominations for the 2019 EQUALS in Tech Awards are now open.
The Awards recognize groundbreaking initiatives from around the world aimed at bridging the gender digital divide.
The nomination period will run until June 11, 2019. You can nominate your own initiatives or those of others for an award in one of the following categories:
The annual EQUALS in Tech Awards are Continue reading
I'm the Product Manager for the Internal Tools team here at Cloudflare. We recently identified a need for a new tool around service ownership. As a fast growing engineering organization, ownership of services changes fairly frequently. Many cycles get burned in chat with questions like "Who owns service x now?
Whilst it's easy to see how a tool like this saves a few seconds per day for the asker and askee, and saves on some mental context switches, the time saved is unlikely to add up to the cost of development and maintenance.
= 5 minutes per day
x 260 work days
= 1300 mins
/ 60 mins
= 20 person hours per year
So a 20 hour investment in that tool would pay itself back in a year valuing everyone's time the same. While we've made great strides in improving the efficiency of building tools at Cloudflare, 20 hours is a stretch for an end-to-end build, deploy and operation of a new tool.
The more I use Serverless and Workers, the more I'm struck with the benefits of:
When I upload a Worker, it's automatically distributed to 175+ data Continue reading
Cloud management company RackWare’s co-founders recommend implementing a comprehensive plan and a...
Cloudflare recently moved to County Hall, the building just behind the London Eye. We have a very large event space which we would love to open up to the developer community. If you organize a technical meetup, we'd love to host you. If you attend technical meetups, please share this post with the meetup organizers.
Our event space is large enough to hold up to 280 attendees, but can also be used for a small group as well. There is a large entry way for people coming into our 6th floor lobby where check-in may be managed. Once inside the event space, you will see a large, open kitchen area which can be used to set up event food and beverages. Beyond that is Cloudflare's all-hands space, which may be used for your events.
We have several gender-neutral toilets for your guests' use as well.
You may welcome your guests here. The event space is just to the left of this spot.
This space may be used for talks, workshops, or large panels. We can rearrange seating, based on the format of your meetup.
Have you ever wondered how many free ports you have on your stackable campus switches? I’m sure there must be a wonderful network management tool that creates that reports with a click of a button… but what if the tool your PHB purchased based on awesome PowerPoint and glitzy demo can’t do that?
Nadeem Lughmani decided to solve this challenge as a hands-on assignment in the Building Network Automation Solutions online course and created an Ansible playbook and a Python plugin that counts the total number of ports and number of free ports for each switch stack specified in the device inventory.
Wonder what else course attendees created in the past? Here’s a small sample.