J’ai le plaisir de vous présenter notre nouveau projet MOOC (Massive Open Online Course) de droits numériques (New Digital Rights) qui enseignera aux citoyens leurs droits en matière de données personnelles à travers les frameworks GDPR et MyData. Il est financé par le programme de financement Beyond the Net de l’Internet Society et rendu possible grâce à des bénévoles.
Le projet est un partenariat entre ISOC Finland Chapter et Open Knowledge Finland. D’autres ONG et associations comme Electronic Frontier Finland, Faktabaari et des organisations d’étudiants seront mobilisées.
The post Les débuts des nouveaux droits numériques pour les citoyens finlandais appeared first on Internet Society.
There was an old way of generating Interface IPv6 address using SLAAC process (Stateless autoconfiguration). You simply configured that you want SLAAC autoconfiguration and the interface IPv6 was generated by squeezing “FFFE” in hex (11111111 11111110 bits) between two parts of physical MAC address of that interface. Then, after a while, several comments came to IETF about the use of predictable Interface Identifiers in IPv6 addresses. They were pointing to the ease of correlation of host activities within the same network and across multiple networks. If Interface Identifiers are constant across networks this is negatively affecting the privacy and security of
The post The New Way of Generating IPv6 – SLAAC EUI-64 Address Format appeared first on How Does Internet Work.
Cuando Internet no llega a lugares remotos, un modelo que funciona muy bien es aquel en el que la comunidad construye la red para llegar a Internet (no esperar que un proveedor llegue a su comunidad sino construir la red para llegar hasta el proveedor más cercano). Eso implica varios desafíos y requiere cambios tecnológicos, legislativos, nuevos estándares y comunidades que sean capaces de construir y operar la infraestructura comunitaria.
Las redes comunitarias tienen características únicas que requieren una evolución y mudanzas disruptivas tanto en las tecnologías como en la gestión de los recursos (aprovechamiento de la infraestructura pública, gestión del espectro, recursos de Internet, etc.).
Las experiencias prueban que existen muchos modelos que hacen sustentables y efectivas estas redes comunitarias. Ahora debemos comenzar a formalizar y generalizar esos modelos para conseguir la escala e impacto necesarios. Debemos promover cambios en reglamentos y en tecnologías, en gobiernos y en empresas, en fabricantes de equipos y en software open-source. Será necesario organizar y capacitar a las comunidades, involucrar a las ONG para que tengan la capacidad y recursos para ayudarlas, convencer a las empresas que esto no afecta sus negocios y ser sensibles a las necesidades y diferencias de las Continue reading
The post DDoS Amplification Attacks appeared first on Noction.


If your app loads critical resources over the network, it's relying on your user's mobile network connection to deliver an engaging experience. Network errors occur in 3 to 12% of app sessions depending on infrastructure reliability and user geography.
How much engagement are you losing in your app to network errors? Chances are, you don't know.
We didn't either, until we built a free tool that helps Android and iOS developers visualize and understand their mobile app's network utilization.
Our SDK helps you identify slowdowns caused by balky or too frequent network calls, so you can focus your development effort on optimizing the lowest-hanging fruit.
Modern app developers already heavily instrument their apps to identify UX impacting events: they measure and collect launch time, session length, crash rates, conversion events, and lots more, using a multitude of different metrics packages and services.
Web developers look at similar data. They also pay tons of attention to their resource waterfall, mapping their critical rendering path, and understanding which resource loads are synchronous, which are not, and which block rendering. JavaScript even exposes an API to collect waterfalls in the browser programmatically.
It's time to bring the same visibility Continue reading
How do we connect everyone, everywhere, to the Internet? What role do “community networks” play in helping connect more people? How can we best use wireless spectrum and what are the issues with that? How can satellites fit into the picture? And what is the state of satellite technology? And what about the role of “space lasers”?
All that and more was the subject of yesterday’s featured panel at the Technical Plenary at IETF 101 in London.
Organized by the Internet Architecture Board (IAB) and the Internet Research Task Force (IRTF), the panel was moderated by our Jane Coffin and included these speakers:
You can watch the recording of the session at:
The session began with Leandro Navarro outlining how half the world is still not connected to the Internet and is not Continue reading
Comment connecter tout le monde, partout, à Internet? Quel rôle jouent les «réseaux communautaires» pour aider à connecter plus de gens? Comment pouvons-nous utiliser au mieux le spectre sans fil et quels sont les problèmes avec cela? Comment les satellites peuvent-ils s’intégrer dans l’image? Et quel est l’état de la technologie par satellite? Et qu’en est-il du rôle des “lasers spatiaux”?
The post Comment connecter tout le monde à Internet? Une réunion plénière technique de l’IETF 101 appeared first on Internet Society.
In this chapter excerpt from "Mastering Kubernetes," learn what the container orchestration platform does and its basic architecture.
In this chapter excerpt from "Mastering Kubernetes," learn what the container orchestration platform does and its basic architecture.
Alex was trying to figure out how to use Catalyst 3850 switches and sent me this question:
Is MLAG an alternative to use rather than physically creating a switch stack?
Let’s start with some terminology.
Link Aggregation Group (LAG) is the ability to bond multiple Ethernet links into a single virtual link. LAG (as defined in 802.1ax standard) can be used between a pair of adjacent nodes. While that’s good enough if you need more bandwidth it doesn’t help if you want to increase redundancy of your solution by connecting your edge device to two switches while using all uplinks and avoiding the shortcomings of STP. Sounds a bit like trying to keep the cake while eating it.
Read more ...Dual-active Detection (DAD) is designed to prevent a split-brain scenario where both VSS supervisors become active in the event of a VSL link failure. It uses a separate (from the VSL link) secondary communication link to communicate the devices state.
When the VSL link fails the standby switch becomes active and the current active switch is informed of this over the DAD links and goes into recovery mode to stop a split-brain situation occurring.
Microsoft is working with Intel, Facebook, and Google to implement Project Cerberus security architecture. It plans to contribute the open hardware security specs to OCP.
A recurring topic at the Open Compute Project summit was the increase in east-west traffic within data centers. To cope with this traffic, Facebook innovated a distributed network system called the Fabric Aggregator.