The Full Stack Journey explores how the cloud drives IT pros to cultivate both developer and infrastructure skills, and provides an introduction to Microsoft's Azure platform.
The post Full Stack Journey 019: Getting Inside Microsoft Azure appeared first on Packet Pushers.
We are proud to announce that Chapterthon 2017 on Digital Schools was recognized today as the winner of a 2018 World Summit on the Information Society (WSIS) Prize under the category “International and Regional Cooperation,” awarded by the International Telecommunication Union (ITU).
For the Internet Society, this award is a strong affirmation of the valuable work that our Chapters are doing on the ground to empowering their communities through the Internet and, as so, advancing sustainable development.
Chapterthon is a global Chapters marathon, where our chapters work hard with their communities to develop a project within a timeline and budget for achieving a common goal. In 2017, the topic was Digital Schools and 30 Chapters from all 6 regions carried out specific projects to improving education by using the Internet.
Great ideas were taken into action and each project contributes to making a difference not only in their communities but also beyond them. Connecting schools to the Internet through community networks, teaching coding to girls, training teachers and parents, raising awareness about the safe use of the Internet and developing an online platform for a school were not isolated actions but part of global efforts towards improving people’s lives. Together Continue reading
I asked David Gee to review my streaming telemetry blog posts to make sure I didn’t make too many blunders, and he sent me a nice summary of his view on the topic in return.
The only thing I could do after reading it was to ask him for permission to do a copy-paste. Here it is:
Read more ...In 2017, the Internet Society unveiled the 2017 Global Internet Report: Paths to Our Digital Future. The interactive report identifies the drivers affecting tomorrow’s Internet and their impact on Media & Society, Digital Divides, and Personal Rights & Freedoms. Last month we interviewed Nicholas Thompson, Editor in Chief of Wired, to hear his perspective on the forces shaping the Internet’s future.
Prior to joining Wired, Thompson was a journalist at The New Yorker, where he was also the editor of newyorker.com. Thompson has written about politics and technology for numerous publications, and has spent time reporting from West Africa on the role technology plays there. He is also the author of The Hawk and the Dove: Paul Nitze, George Kennan, and the History of the Cold War.
The Internet Society: You recently published (and co-wrote) a long feature on Facebook’s difficulties over the past two years, focusing to a large extent on its role in distributing news and misinformation (or fake news) alike. As policy leaders shape future norms in this field, do you think platforms face stricter regulatory measures? How?
Nicholas Thompson: Platforms need to do better. They need to play a better role in Continue reading
Enterprises jeopardize their automation efforts if they don't invest in developing their network and security teams' cloud skills.
Enterprises jeopardize their automation efforts if they don't invest in developing their network and security teams' cloud skills.
This week is IETF 101 in London, and we’re bringing you daily blog posts highlighting the topics of interest to us in the ISOC Internet Technology Team. There’s plenty of variety on Wednesday, following the themes of Trust and Identity, IPv6 and the Internet-of-Things.
TLS has its second session of the week starting at 09.30 GMT/UTC, and will be focused on the big development of the TLS 1.3 specification being approved by the IESG. Some further work is required, but there are a number of TLS 1.3 related drafts up for discussion.
These include Datagram Transport Layer Security, DTLS Connection Identifer, Exported authenticators in TLS, DANE Record and DNSSEC Authentication Chain Extension for TLS, TLS Certificate compression, SNI Encryption in Tunnelling via TLS, and Semi-static DH Key Establishment in TLS 1.3.
NOTE: If you are unable to attend IETF 101 in person, there are multiple ways to participate remotely.
Running in parallel is LPWAN which is working on enabling IPv6 connectivity with very low wireless transmission rates between battery-powered devices spread across multiple kilometres. There’s a draft providing an overview of the set of LPWAN technologies under consideration by the IETF Continue reading
Our newest data centers in Durban (South Africa) and Port Louis (Mauritius) expand the Cloudflare network to 137 cities globally. We are delighted to reach this special milestone, and even more excited to help improve the performance and security of over 7 million Internet properties (and growing!) across 69 countries.
Just in March, so far, we've launched new data centers across Beirut, Phnom Penh, Kathmandu, Istanbul, Reykjavík, Riyadh, Macau, Baghdad, Houston, Indianapolis, Montgomery, Pittsburgh, Sacramento, Mexico City and Tel Aviv!
Just three years (and about 100 cities ago!), we launched our very first Africa deployment in Johannesburg (South Africa). It was an exciting day for members of our team to facilitate an especially substantial latency improvement for our customers.
Since then, we’ve turned up additional deployments in Cairo (Egypt), Cape Town (South Africa), Djibouti (Djibouti), Luanda (Angola), and Mombasa (Kenya).
Durban is our third deployment in South Africa, where mobile adoption continues to drive traffic growth amongst 20 million Internet users. Other countries with three (or more) Cloudflare data centers are Australia, Canada, China, Germany and United States (with two European states joining this list very Continue reading
Oracle will announce more autonomous cloud services over the next few months, said CTO Larry Ellison. These will include autonomous “analytics, mobility, application development, and integration services.”
Enterprise IT needs visibility into the network and security status of their workloads, whether hosted on premises, or within AWS. While many AWS workloads are sandboxes for application development teams (DevOps), it is important to analyze these workloads. Increasingly, public cloud workloads are also fulfilling mission-critical production needs for many organizations. Enterprise IT must be ready to determine the best location, security posture, and bandwidth allocation when deploying workloads. Having traffic pattern details as well as security analysis and recommendations readily available, helps organizations make the ideal hosting decisions to meet their business needs.
vRealize Network Insight (vRNI) Supports Amazon Web Services (AWS) Public Cloud. The vRNI traffic monitoring features provide visibility into native AWS constructs such as Virtual Private Clouds, VMs, Security Groups, firewall rules, and tags. vRNI also analyzes AWS traffic flows to provide security and micro-segmentation views of cloud workloads. This means you’ll be able to plan micro-segmentation and understand traffic patterns using data collected from your AWS instances.
Let’s review a simple Amazon Web Services (AWS) VPC setup to articulate the value vRealize Network Insight can offer from a Day 1 Day 2 perspective.
The trial mainly focused on management of streaming video content, which could account for up to 80 percent of Verizon's network traffic.
Facebook’s FBOSS and Google’s Stratum use Open Network Linux hardware. ONL is a Linux distribution for bare metal switches and it is one of OCP’s several open hardware projects.
Eighty-four percent of software buyers include security requirements in new vendor contracts.
Currently, there is no open source blockchain benchmarking tool.
Side channel attacks are not something most network engineers are familiar with; I provided a brief introduction to the concept over at The Network Collective in this Short Take. If you aren’t familiar with the concept, it might be worth watching that video (a little over 4 minutes) before reading this post.
Side channel attacks are more common, and more dangerous, than many engineers understand. In this post, I’ll take a look at a 2017 research paper that builds and exploits a side channel attack against several smart home devices to see how such a side channel attack plays out. They begin their test with a series of devices, including a children’s sleep monitor, a pair of security cameras, a pair of smart power plugs, and a voice based home assistant.
The attack itself takes place in two steps. The first is to correlate individual traffic flows with a particular device (where a traffic flow is a 5 tuple. The researchers did this in three different ways. First, they observed the MAC address of each device talking on the network, comparing the first three octets of this address to a list of known manufacturers. Most home device manufacturers use a Continue reading
The focus is to reduce fronthaul and backhaul cots by using Ethernet-based networking and virtual networking in the fronthaul, the BBUs, and the remote radio heads.