We’re super stoked about bringing you Workers.dev, and we’re even more stoked at every opportunity we have to dogfood Workers. Using what we create keeps us tuned in to the developer experience, which takes a good deal of guesswork out of drawing our roadmaps.
Our goal with Workers.dev is to provide a way to deploy JavaScript code to our network of 165 data centers without requiring developers to register a domain with Cloudflare first. While we gear up for general availability, we wanted to provide users an opportunity to reserve their favorite subdomain in a fair and consistent way, so we built a system to allow visitors to reserve a subdomain where their Workers will live once Workers.dev is released. This is the story of how we wrote the system backing that submission process.
Of course, we always want to use the best tool for the job, so designing the Workers that would back Workers.dev started with an inventory of constraints and user experience expectations:
Schrödinger’s cat or stone soup, pick your favorite ONAP analogy.
Looking at the marketing landscape for IT, you could be forgiven for thinking that the current strategy was to dynamite a word factory and use the resulting debris as marketing content. DevSecOps. NetDevOps. Ops, ops, spam, eggs, spam, and DevSpamOps.
The naming trend lends itself easily to parody, but it began as shorthand for an attempt to solve real IT problems. And its iterations have more in common than a resemblance to alphabet salad. What lies beneath the buzzwords? And do you need to care?
Countless companies have jumped on the NetDevOps bandwagon, all with their own way of doing things; and most are utterly incompatible with everyone else. Some may have already abandoned the NetDevOps craze, believing it to be nothing but marketing hype wrapped around a YAML parser and some scripts. Others might have found a system that works for them and swear by it, using nothing else for provisioning.
Regardless of views, a system that allows for rapid provisioning and re-provisioning of applications, containers, virtual machines, and network infrastructure is paramount.
The modern era of namesmashing started with DevOps. This made a sort of sense because, before this, IT had Continue reading

Writing isn’t always the easiest thing in the world to do. Coming up with topics is hard, but so too is making those topics into a blog post. I find myself getting briefings on a variety of subjects all the time, especially when it comes to networking. But translating those briefings into blog posts isn’t always straight forward. When I find myself stuck and ready to throw in the towel I find it easy to think about things backwards.
When people plan blog posts, they often think about things in a top-down manner. They come up with a catchy title, then an amusing anecdote to open the post. Then they hit the main idea, find a couple of supporting arguments, and then finally they write a conclusion that ties it all together. Sound like a winning formula?
Except when it isn’t. How about when the title doesn’t reflect the content of the post? Or the anecdote or lead in doesn’t quite fit with the overall tone? How about when the blog starts meandering away from the main idea halfway through with a totally separate argument? Or when the conclusion is actually the place where the Continue reading
The electrical contractor and technology integrator deployed a Silver Peak-based managed SD-WAN...
Remember the previous blog post in this sequence in which I explained the need for single source-of-truth used in your network automation solution? No? Please read it first ;)
Ready for the next step? Assuming your sole source-of-truth is the actual device configuration, is there a magic mechanism we can use to transform it into something we could use in network automation?
TL&DR: No.
Read more ...
In this podcast, you will hear O2/ Telefonica, Cardinality and Dell EMC as they jointly showcase...
The storage vendor isn’t aware of any customer attacks resulting from the vulnerability and said...
The new project, DataProjects.org, will offer coursework for improving data literacy and has a...
The 5G race heats up in Ireland as all three operators plan to launch services in 2019. Huawei...
Hewlett Packard Enterprise is one of the new investors, having initially signed up for the Portworx...
Last year, at the Internet Society Asia-Pacific and Middle-East Chapters Meeting, I was introduced to the series of easily-digestible and thought-provoking issue papers published by the Internet Society. Particularly, the one on digital accessibility had me shaking in disbelief. It stated that one in six people in the Asia-Pacific region lives with disability – that is a total of about 650 million people.

The Internet Society Pakistan Islamabad Chapter had always been active in promoting digital accessibility, but I realized that we need to do more, especially at the transnational level. Thus, the idea of organizing a regional forum on digital accessibility was born, and with support from the Internet Society Asia-Pacific Bureau, it became a reality.
The Regional Forum on Digital Accessibility was successfully held on 7 February in Islamabad. It brought together 120 participants, including Internet Society Chapter leaders from Afghanistan and Nepal, fellows from Sri Lanka, and speakers from India.
A major achievement emerging from the forum was the vow from Pakistan’s high-level government officials to include representation of persons with disabilities in the recently-established Prime Minister’s Task Force on Information Technology (IT) and Telecom that is developing a roadmap for Pakistan’s digital transformation. There was Continue reading