At DockerCon Copenhagen we launched the Docker Pals program in order to connect attendees and help them make the most out of their trip to DockerCon. Attending a conference by yourself can be intimidating and we don’t want anyone to feel that way at DockerCon! Pals get matched with a few others who are new (the “Pals”), and someone who knows their way around (the “Guide”) so that you will know someone before you arrive at the conference. So, DockerCon veterans, please consider signing up to be a Guide and help welcome those newer to DockerCon to the amazing Docker community. Participating gives you the opportunity to learn even more, grow an even bigger network, and have even more fun!
“Docker Pals was an excellent opportunity to meet new Docker Captains and Community Leaders who are open to engaging with container enthusiasts of all skill levels, specialities and backgrounds. I would certainly take advantage of the program again, and volunteer to be a Guide next year.” – Jackie Liu
“I was able to learn and understand how Docker is used in real time and in production with my fellow Docker Pal.” – Continue reading
While the Open19 Project started as a way for LinkedIn to optimize its data centers, its founders quickly realized that the platform was well suited for edge deployments.
Paired with the P4 programming language, Barefoot’s Tofino chip gives users the freedom to design what the chip can do.
Module 9 is here! Tune into Josue Vargas’s newest video – Certified Ethical Hacking: Denial of Service to learn about DoS and DDoS attacks and how to prevent them.
DoS and DDoS are disruptive attacks meant to bring a server or network out of operation. You might have seen some of this in the news, especially as related to hacktivism (people who hack for a cause). A DDoS attack can be a big financial hit on an organization. In this module you will learn how this type of attack is accomplished and even how it can be done stealthily. As an ethical hacker you will get the point of view of the attacker, as usual, but you will also learn how to protect your organization from this type of event using the right tools and strategies.
AWS and Google are notably absent from the group, though Microsoft and IBM are on board.
Ericsson and Telstra extended the 3GPP standards-based limit for a long-range narrowband IoT data connections from 40 km to 100 km through software upgrades.
The government agency gave time limits to cities to approve or reject requests from wireless operators to install small cell sites in neighborhoods.
Previously, SteelFusion has been available out-of-box for VMware environments only. But now, Riverbed is providing SteelFusion for native Microsoft Windows Server environments for Hyper-V.
VirusTotal also has new capabilities to help companies’ threat intelligence teams better analyze massive amounts of data.
On today's Priority Queue, wireless engineer Lee Badman shares a real-world detective tale about a troubleshooting problem that took him into dark places involving wires.
The post PQ 156: Wires Matter – A Wireless Engineer’s Detective Story appeared first on Packet Pushers.

As part of our work in the University of Washington’s Information and Communications Technology for Development (ICTD) Lab, we recently spent four weeks in Bokondini, a village in the Papuan Highlands. During our time in Bokondini, we helped some community members extend Internet access throughout the village via a community LTE network, using a technology stack that we call CoLTE (for Community LTE).
The Area and Background
Bokondini is a small village (population ~1,500) in the Baliem Valley, a mountainous region located in the highlands of Indonesian Papua. The Papuan Highlands are a famously rugged, remote, and hard-to-cover area, and many inhabitants of the region live without any form of telecommunications whatsoever. Infrastructure in Bokondini is a remarkably ad-hoc process; for example, electricity comes from a small set of solar panels and a micro hydro generator, and tends to shut off between the hours of 9pm and 6am.
Bokondini’s current relationship to the Internet revolves primarily around the local school. The community pays for a small (1Mbps) satellite Internet connection that terminates at the local elementary school, where it’s used to provide WiFi coverage to teachers on the school campus. Coverage is extended to a few other houses in Continue reading


“I love my domain registrar.” Has anyone ever said this? From before Cloudflare even launched in September 2010, our early beta customers were literally begging us: "Will you please launch a registrar too?!" Today we're doing just that, launching the first registrar we hope you’ll be able to say you love. It's built around three principles: trust, security, and always-fair pricing. And it’s available to all Cloudflare customers.
Cloudflare has actually run a registrar for some time. Like many of our best products, it started by solving an internal issue we had. Cloudflare has several mission-critical domains. If the registration of these domains were ever compromised, it would be, in a word, bad.
For years, we worked with our original domain registrar to ensure these domains were as locked down as possible. Unfortunately, in 2013, a hacker was able to compromise several of the systems of the registrar we used and come perilously close to taking over some of our domains.
That began a process of us looking for a better registrar. Unfortunately, even the registrars that charge hefty premiums and promise to be very secure turn out to have pretty lousy security. Continue reading