Archive

Category Archives for "Networking"

Register for AfPIF 2019

Join us in Balaclava, Mauritius for the 10th Africa Peering and Interconnection Forum (AfPIF) from 20-22 August 2019.

AfPIF attracts ISPs, content providers, governments, and IXP’s for three days of learning, sharing, and building business in Africa.

Why should you attend AfPIF-2019? Have a look through the AfPIF 2018 Summary Report, which contains briefs of presentations, emerging discussions, speakers, and sponsors.

Sponsorship opportunities are available to promote your business to these key audiences. Find out more about these opportunities here: https://www.afpif.org/afpif-10/sponsorship-brochure/

Register now to secure your place – and remember to check your visa requirements for travel to Mauritius.

Don’t miss Africa’s premier peering event – celebrating its 10-year anniversary this year!

The post Register for AfPIF 2019 appeared first on Internet Society.

Unit Testing Workers, in Cloudflare Workers

Unit Testing Workers, in Cloudflare Workers
Unit Testing Workers, in Cloudflare Workers

We recently wrote about unit testing Cloudflare Workers within a mock environment using CloudWorker (a Node.js based mock Cloudflare Worker environment created by Dollar Shave Club's engineering team). See Unit Testing Worker Functions.

Even though Cloudflare Workers deploy globally within seconds, software developers often choose to use local mock environments to have the fastest possible feedback loop while developing on their local machines. CloudWorker is perfect for this use case but as it is still a mock environment it does not guarantee an identical runtime or environment with all Cloudflare Worker APIs and features. This gap can make developers uneasy as they do not have 100% certainty that their tests will succeed in the production environment.

In this post, we're going to demonstrate how to generate a Cloudflare Worker compatible test harness which can execute mocha unit tests directly in the production Cloudflare environment.

Directory Setup

Create a new folder for your project, change it to your working directory and run npm init to initialise the package.json file.

Run mkdir -p src && mkdir -p test/lib && mkdir dist to create folders used by the next steps. Your folder should look like this:

.
./dist
./src/worker.js
./test
./test/lib
. Continue reading

Revolutionary data compression technique could slash compute costs

There’s a major problem with today’s money-saving memory compression used for storing more data in less space. The issue is that computers store and run memory in predetermined blocks, yet many modern programs function and play out in variable chunks.The way it’s currently done is actually, highly inefficient. That’s because the compressed programs, which use objects rather than evenly configured slabs of data, don’t match the space used to store and run them, explain scientists working on a revolutionary new compression system called Zippads.The answer, they say—and something that if it works would drastically reduce those inefficiencies, speed things up, and importantly, reduce compute costs—is to compress the varied objects and not the cache lines, as is the case now. Cache lines are fixed-size blocks of memory that are transferred to memory cache.To read this article in full, please click here

Revolutionary data compression technique could slash compute costs

There’s a major problem with today’s money-saving memory compression used for storing more data in less space. The issue is that computers store and run memory in predetermined blocks, yet many modern programs function and play out in variable chunks.The way it’s currently done is actually, highly inefficient. That’s because the compressed programs, which use objects rather than evenly configured slabs of data, don’t match the space used to store and run them, explain scientists working on a revolutionary new compression system called Zippads.The answer, they say—and something that if it works would drastically reduce those inefficiencies, speed things up, and importantly, reduce compute costs—is to compress the varied objects and not the cache lines, as is the case now. Cache lines are fixed-size blocks of memory that are transferred to memory cache.To read this article in full, please click here

BiB 077: Attend Gluware Intent ’19 With The Packet Pushers In NYC On May 14, 2019

Gluware Intent is a live event we're holding in NYC on May 14, 2019. Come hang out with the Packet Pushers, the Gluware team, and customers to learn about practical network automation. Register via https://packetpushers.net/gluware to reserve your seat, hear presentations, and see the Packet Pushers record a Heavy Networking episode live.

The post BiB 077: Attend Gluware Intent ’19 With The Packet Pushers In NYC On May 14, 2019 appeared first on Packet Pushers.

Automation Solution: Find Source of STP Topology Changes

Topology changes are a bane of large STP-based networks, and when they become a serious challenge you could probably use a tool that could track down what’s causing them.

I’m sure there’s a network management tool out there that can do just that (please write a comment if you know one); Eder Gernot decided to write his own while working on a hands-on assignment in the Building Network Automation Solutions online course. Like most course attendees he published the code on GitHub and might appreciate pull requests ;)

Wonder what else course attendees created in the past? Here’s a small sample.

Health care is still stitching together IoT systems

Government regulations, safety and technical integration are all serious issues facing the use of IoT in medicine, but professionals in the field say that medical IoT is movingforward despite the obstacles. A vendor, a doctor, and an IT pro all spoke to Network World about the work involved.To read this article in full, please click here(Insider Story)

Cisco issues critical security warning for Nexus data-center switches

Cisco issued some 40 security advisories today but only one of them was deemed “critical” – a vulnerability in the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode data-center switch that could let an attacker secretly access system resources.The exposure, which was given a Common Vulnerability Scoring System importance of 9.8 out of 10, is described as a problem with secure shell (SSH) key-management for the Cisco Nexus 9000 that lets a remote attacker to connect to the affected system with the privileges of a root user, Cisco said.To read this article in full, please click here

Cisco issues critical security warning for Nexus data-center switches

Cisco issued some 40 security advisories today but only one of them was deemed “critical” – a vulnerability in the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode data-center switch that could let an attacker secretly access system resources.The exposure, which was given a Common Vulnerability Scoring System importance of 9.8 out of 10, is described as a problem with secure shell (SSH) key-management for the Cisco Nexus 9000 that lets a remote attacker to connect to the affected system with the privileges of a root user, Cisco said.To read this article in full, please click here

Cisco issues critical security warning for Nexus data-center switches

Cisco issued some 40 security advisories today but only one of them was deemed “critical” – a vulnerability in the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode data-center switch that could let an attacker secretly access system resources.The exposure, which was given a Common Vulnerability Scoring System importance of 9.8 out of 10, is described as a problem with secure shell (SSH) key-management for the Cisco Nexus 9000 that lets a remote attacker to connect to the affected system with the privileges of a root user, Cisco said.To read this article in full, please click here

BrandPost: Higher Ed IT, Your Digital Transformation Has Arrived

It’s here, and it’s sweeping campuses nationwide: Digital Transformation (Dx) in higher education. While other industries have already made giant leaps in Dx (just look at the retail industry with tech titan Amazon and the transportation industry with innovator Uber), Digital Transformation in higher ed is now starting to take shape.The topic of Dx in higher ed is being addressed at widely attended events like the Educause Annual Conference, where higher education institutions of all sizes come together to discuss the topic of technology. Still in the relatively early stages of Dx, higher ed IT professionals are wondering if their IT departments are set up to support the evolving digital ecosystems at their institutions – and working to ensure that they are.To read this article in full, please click here

BrandPost: What Internal IT Support Can Learn from External Customer Support

Over the last couple of years, there’s been a lot of attention on how customer support is changing and how brands are using customer support as a business differentiator. But where’s all the attention on how businesses are using internal-facing support as a key competitive advantage?(Crickets chirping. Still chirping.)The truth is, customers are a prime focus for businesses but internal employees a distant second, at best. It seems to make sense to prioritize external-facing customer support over internal-facing IT support. But here’s the deal: your employees are consumers, too – they’re out there in the world interacting with A+ service and support teams, and it’s changing their expectations back at the office. They expect internal IT support to deliver the same level of service that they experience as customers.To read this article in full, please click here