Archive

Category Archives for "Networking"

More Videos By Us

During VMworld 2018, the Packet Pushers team girded themselves with an array of video gear. We conducted a live deployment to validate some ideas we had about producing video.  Our starting idea is to  asking a single question “What do customers not know about your company/product/technology?” In the end, we did about 30 videos of […]

The post More Videos By Us appeared first on EtherealMind.

DOH!

The level of interest in the general topic of routing security seems to come in waves in our community. At times it seems like the interest from network operators, researchers, security folk and vendors climbs to an intense level, while at other times the topic appears to be moribund. If the attention on this topic at NANOG 74 is anything to go by we seem to be experiencing a local peak.

Senegal First African Country to Implement Recommendations of ‘Personal Data Protection Guidelines for Africa’

Last week, we have had a busy two days (11-12 October 2018) in Dakar participating in a mutlistakeholder workshop on Privacy and Personal Data Protection in Senegal co-organized by the Personal Data Protection Commission (CDP), the Ministry in charge of Digital Economy (MCTPEN), the Internet Society Senegal Chapter, and supported by the African Regional Bureau of the Internet Society. This workshop was recommended in the Personal Data Protection Guidelines for Africa launched in May 2018 during #AISDakar by the African Union and the Internet Society.

Senegal stands out as the first African Union member to act on that recommendation and run such a workshop, bringing together policy makers, law enforcement, data protection authorities, lawyers, academics, entrepreneurs, and actors of the private sector, civil society, and technologists to debate the issues and build a shared vocabulary and shared understanding.

The discussion was wide-ranging, informed, and mature

Wide-ranging, because the organizers did a great job of attracting a diverse and engaged set of stakeholders and giving them the time and space to contribute.

Informed, because the participants were asking all the right questions (about privacy, innovation, cybercrime, threats to information, reputation and Continue reading

Making better use of your Linux logs

Linux systems maintain quite a collection of log files, many of which you are probably rarely tempted to view. Some of these log files are quite valuable though and options for exploring them might be more interesting and varied than you imagine. Let's look at some system logs and get a handle on some of the ways in which log data might be easier to probe.Log file rotation First, there's the issue of log rotation. Some Linux log files are “rotated”. In other words, the system stores more than one "generation" of these files, mostly to keep them from using too much disk space. The older logs are then compressed, but left available for a while. Eventually, the oldest in a series of rotated log files will be automatically deleted in the log rotation process, but you’ll still have access to a number of the older logs so that you can examine log entries that were added in the last few days or weeks when and if you need to look a little further back into some issue you're tracking.To read this article in full, please click here

BrandPost: When Will We Be Able to Purchase 802.11ax Access Points and Client Devices?

Today we focus on when new 802.11ax access points and client devices will become available. The Wi-Fi industry has made these questions uniquely difficult to answer, but this blog explains what we expect to happen. If you have the patience, save these predictions for rereading toward the end of 2019!The three important milestones along the path to commercial equipment are the IEEE 802.11ax standard, the Wi-Fi Alliance 11ax certification, and integrated circuit chips. These are a sequence in time, but with a lot of overlap.The First Milestone: IEEEThe IEEE writes standards: very detailed definitions of the packet formats, fields, and functions that make the protocols work. IEEE 802.11ax is written as an amendment to the current 802.11 standards and eventually will be folded into the mainstream 802.11 document. Even as an amendment, however, it is 600 pages long. Getting every detail of such a standard correct requires scrutiny from many experts, and the IEEE process involves reviewing drafts and submitting comments and corrections, which then update new drafts, and are reviewed again.To read this article in full, please click here

G20 Women’s Summit: Digital Inclusion for Women

What if future generations in 2030 learned about gender inequality in their history class and not in their lived realities? What can rural women achieve when included in digital society? What can we do now to ensure a future without a gender digital gap?

Many women and girls are being left behind in digital development. Women are 12% less likely to use the Internet globally than men, while in low and middle-income countries, the gap between women’s use and that of men is 26%. This is not only a question of connectivity, but about using the Internet in a meaningful way.

These were some of the critical issues the W20 Summit tackled in Buenos Aires last week.

W20 Argentina, a step forward in the right direction

Women20 (W20) is one of the key G20 engagement groups which supports the promotion of gender inclusive economic growth.

Its recent summit was an opportunity for leaders to make progress on several fronts ranging from digital inclusion to labor inclusion, financial inclusion, and rural development.

In the final Comuniqué, 146 delegates from all sectors of the economy committed to “[Improving] access, affordability, safety, and security of digital services, broadband, and connectivity plans, and the Continue reading