On 22nd September, 22 women will join a growing community of people who believe in a world of equal opportunity for women and girls.
The Equals in Tech Award is an annual event that gives awards to those who are helping girls and women get equal access, skills, and opportunities online and in the tech industry.
It’s our second year at the event and every year the finalists never fall short of inspiration.
This year, 22 finalists were chosen from among 357 nominations from 80 countries. They’re creating AI Accelerators, exploring new ways to train entrepreneurs, and empowering female healthcare professionals. Out of the 22 finalists, 5 winners will be chosen, each representing a specific category.
EQUALS is a global network delivered by a committed partnership of corporate leaders, governments, nonprofit organizations, communities, and individuals around the world working together to bridge the digital gender divide – by bringing women to tech, and tech to women – and in so doing, bettering the lives of millions worldwide. To find out more, visit their website.
If you’re thinking about submitting an entry for next year’s Equals in Tech Award – here’s what you need to know.
Be a part of it! Continue reading
What could go wrong?
Two years ago this week Cloudflare introduced Opportunistic Encryption, a feature that provided additional security and performance benefits to websites that had not yet moved to HTTPS. Indeed, back in the old days some websites only used HTTP --- weird, right? “Opportunistic” here meant that the server advertised support for HTTP/2 via an HTTP Alternative Service header in the hopes that any browser that recognized the protocol could take advantage of those benefits in subsequent requests to that domain.
Around the same time, CEO Matthew Prince wrote about the importance and challenges of privacy on the Internet and tasked us to find a solution that provides convenience, security, and anonymity.
From neutralizing fingerprinting vectors and everyday browser trackers that Privacy Badger feeds on, all the way to mitigating correlation attacks that only big actors are capable of, guaranteeing privacy is a complicated challenge. Fortunately, the Tor Project addresses this extensive adversary model in Tor Browser.
However, the Internet is full of bad actors, and distinguishing Continue reading
Amazon offers a multitude of options in its AWS cloud services lineup, and much has changed since they were first introduced. This overview from AWS Administration - The Definitive Guide explains the most popular core services and what's new in the latest versions.
As anyone starting their journey into AWS quickly discovers, cloud is different (or as I wrote in the description of my AWS workshop you feel like Alice in Wonderland). One of the gotchas: when you link multiple routing domains (Virtual Private Clouds – the other VPC) you have to create static routing table entries on both ends. Even worse, there’s no transit VPC – you have to build a full mesh of relationships.
The correct solution to this challenge is automation:
Read more ...Yesterday marked the first time in recent Internet history that a new submarine cable carried live traffic across the South Atlantic, directly connecting South America to Sub-Saharan Africa. The South Atlantic Cable System (SACS) built by Angola Cables achieved this feat around midday on 18 September 2018.
Our Internet monitoring tools noticed a change in latency between our measurement servers in various Brazilian cities and Luanda, Angola, decreasing from over 300ms to close to 100ms. Below these are measurements to Angolan telecoms TVCABO (AS36907) and Movicel (AS37081) as the SACS cable came online yesterday.
In the past decade there have been multiple submarine cable proposals to full this gap in international connectivity, such as South Atlantic Express (SAEx) and South Atlantic Inter Link (SAIL) cables.
In recent weeks, the SAIL cable, financed and built by China, announced that they had completed construction of their cable and it was the first cable connecting Brazil to Africa (Cameroon). However, since we haven’t seen any changes in international connectivity for Cameroon, we don’t believe this cable is carrying any traffic yet.
In addition to directly connecting Brazil to Portuguese-speaking Angola, the cable offers Continue reading
The chip maker is retooling its server business to focus on edge computing and is pushing hard on new growth areas like IoT and 5G.
Kong CEO and co-founder Augusto Marietti has touted the company’s platform as an “air traffic control to manage, broker, and hold APIs.”
The product uses a Kubernetes orchestration framework. It supports on-premises storage devices and cloud storage from Amazon, Microsoft, Google, Digital Ocean, Wasabi, and Scality’s software-defined storage platform Ring.
Token Ring, in its original form, was clearly a superior technology. For instance, because of the token passing capabilities, it could make use of more than 90% of the available bandwidth. In contrast, Ethernet systems, particularly early Ethernet systems used a true “single wire” broadcast domain. The Fiber Distributed Data Interface (FDDI), is like Token Ring in many ways.
Although Tier 1 operators are leading the way with NFV, the research firm says that it believes smaller operators will begin to see the benefits as well.
SD-WAN 2.0 takes into account the new requirements of IT and new enterprise communication patterns to spread SD-WAN across multiple locations and clouds, says Nuage CEO Sunil Khandekar.
With this release, NSX-T 2.3 continues to enable VMware’s vision of delivering consistent, pervasive connectivity and intrinsic security for applications and data across any environment. These new advancements help customers implement a more secure, end-to-end software-based network architecture – a Virtual Cloud Network – that supports their multi-cloud enterprises and advanced security in new and compelling ways.
NSX-T Data Center 2.3 extends advanced multi-cloud networking and security capabilities to AWS, in addition to Microsoft Azure and on-premises environments, and adds support for bare metal hosts as well.
Here are a few highlighted features among what’s new in this release.
NSX-T Data Center 2.3 introduces support for bare metal hosts, in addition to hypervisor and container environments. This includes Linux-based workloads running on bare-metal servers, as well as containers running on bare-metal servers without a hypervisor. To support this new capability, NSX-T leverages the Open vSwitch, allowing any Linux host to be an NSX-T transport node.
Bare-Metal Server Support
This release introduces support for Bare-Metal native compute workloads running RHEL 7.4, 7.5, CentOS 7.4, and Ubuntu 16.0.4 operating systems that allows users to network Bare-Metal compute Continue reading
On today’s Datanauts podcast, we break down what it takes to build out a private cloud on your premises. Our guest is Rita Younger, National Practice Lead SDDC / SDN and Technical Innovation Group at CDW.
The post Datanauts 147: What’s Your Private Cloud Strategy? appeared first on Packet Pushers.