In November 2017, the Internet Society hosted the inaugural Indigenous Connectivity Summit in Santa Fe, New Mexico. The event brought together community network operators, Internet service providers, community members, researchers, policy makers, and Indigenous leadership to work together to bridge the connectivity gap in indigenous communities in North America. One of the participants shared her story.
Christel White, geographic information system (GIS) specialist for the Pueblo of Cochiti, is no stranger to intertribal dynamics. White is an enrolled member of the Onondaga people and grew up on the Seneca Nation reservation in New York State. In her current role, she ponders how the specific culture and needs of the people of Cochiti impacts the role of connectivity. “I want to bring in GIS online, but we don’t want cultural sites out in circulation,” explains White. “Do we want new land on there?”
The lack of Internet speed in tribal offices means White currently works from home, but says that it impacts her ability to interact with the public. If someone comes into the office with a question, White is not always physically there, but she can’t otherwise complete her work without a better connection. “Indigenous communities are often stuck on Continue reading
A twenty-year networking and IT veteran discusses where the industry is headed and offers advice on how to get started in a technology career.
In recent Software Gone Wild episodes we explored emerging routing protocols trying to address the specific needs of highly-meshed data center fabrics – RIFT and OpenFabric. In Episode 92 with Dinesh Dutt we decided to revisit the basics trying to answer a seemingly simple question: do we really need new routing protocols?
Read more ...When Marvell acquired Cavium a couple months ago, it “had to make decisions." Marvell decided to focus all our efforts on its Prestera switching chip line.
Edge devices will create a tsunami of data, and while using databases would seemingly help tame the volumes of data at the edge, databases don’t work at the edge.
It's common for hardware to have bugs. It's up to the kernel to provide mitigation.
OpenStack’s Rocky Release makes it easier to deploy containers on bare metal.
Photo by Markus Spiske / Unsplash
You hear about data breaches almost every day in the news these days. New regulations, such as GDPR, require companies to disclose data breaches within 72 hours of becoming aware. Becoming aware of and identifying data breaches as they happen, however, is not an easy task. It is often challenging for companies to become aware of their own data breaches and losses well-before they get picked up by the media.
One symptom of a data breach is data (such as passwords or PII) that should never leave internal systems making its way through an HTTP response into the public Internet. Since Cloudflare Workers sits between your infrastructure and the public for any endpoints exposed to the Internet, Workers can be used as a way of alerting you of canary data leaving.
In the following example, we will be inspecting the content of each response, checking to see if our canary data has leaked out, and if so, returning a static response and calling the PagerDuty API to notify of a potential breach.
In this example, we’ll be looking for a particular string in the body of the response. This string can Continue reading
The startup uses artificial intelligence and automation to detect and respond to security threats and ensure compliance in cloud environments.