Archive

Category Archives for "Networking"

EQUALS in Tech Awards: Nominations Now Open

Are you working to building a better Internet for women? Do you know initiatives that are promoting the development of digital skills for girls? Is your organization contributing to defend the Internet by helping women get equal access to leadership opportunities?

If the answers are yes, we have something for you.

The EQUALS Global Partnership has announced that the nominations for the 2019 EQUALS in Tech Awards are now open.

The Awards recognize groundbreaking initiatives from around the world aimed at bridging the gender digital divide.

The nomination period will run until June 11, 2019. You can nominate your own initiatives or those of others for an award in one of the following categories:

  • Access: Initiatives related to improving women’s and girls’ digital technology access, connectivity, and security
  • Skills: Initiatives that support development of science, technology, engineering, and math (STEM) skills of women and girls
  • Leadership (two subcategories):
    • Initiatives focused on promoting women in decision-making roles within the ICT field
    • Initiatives promoted by tech sector companies to bridge the digital gender divide
  • Research: Initiatives prioritizing research on gender digital divides and producing reliable evidence to tackle diversity issues within STEM and computing fields

The annual EQUALS in Tech Awards are Continue reading

Rapid Development of Serverless Chatbots with Cloudflare Workers and Workers KV

Rapid Development of Serverless Chatbots with Cloudflare Workers and Workers KV

Rapid Development of Serverless Chatbots with Cloudflare Workers and Workers KV

I'm the Product Manager for the Internal Tools team here at Cloudflare. We recently identified a need for a new tool around service ownership. As a fast growing engineering organization, ownership of services changes fairly frequently. Many cycles get burned in chat with questions like "Who owns service x now?

Whilst it's easy to see how a tool like this saves a few seconds per day for the asker and askee, and saves on some mental context switches, the time saved is unlikely to add up to the cost of development and maintenance.

= 5 minutes per day
x 260 work days 
= 1300 mins 
/ 60 mins 
= 20 person hours per year

So a 20 hour investment in that tool would pay itself back in a year valuing everyone's time the same. While we've made great strides in improving the efficiency of building tools at Cloudflare, 20 hours is a stretch for an end-to-end build, deploy and operation of a new tool.

Enter Cloudflare Workers + Workers KV

The more I use Serverless and Workers, the more I'm struck with the benefits of:

1. Reduced operational overhead

When I upload a Worker, it's automatically distributed to 175+ data Continue reading

We want to host your technical meetup at Cloudflare London

We want to host your technical meetup at Cloudflare London

Cloudflare recently moved to County Hall, the building just behind the London Eye. We have a very large event space which we would love to open up to the developer community. If you organize a technical meetup, we'd love to host you. If you attend technical meetups, please share this post with the meetup organizers.

We want to host your technical meetup at Cloudflare London
We're on the upper floor of County Hall

About the space

Our event space is large enough to hold up to 280 attendees, but can also be used for a small group as well. There is a large entry way for people coming into our 6th floor lobby where check-in may be managed. Once inside the event space, you will see a large, open kitchen area which can be used to set up event food and beverages. Beyond that is Cloudflare's all-hands space, which may be used for your events.

We have several gender-neutral toilets for your guests' use as well.

Lobby

You may welcome your guests here. The event space is just to the left of this spot.

We want to host your technical meetup at Cloudflare London

Event space

This space may be used for talks, workshops, or large panels. We can rearrange seating, based on the format of your meetup.

We want to host your technical meetup at Cloudflare London

Food & Continue reading

Automation Solution: Create Switch Stack Reports

Have you ever wondered how many free ports you have on your stackable campus switches? I’m sure there must be a wonderful network management tool that creates that reports with a click of a button… but what if the tool your PHB purchased based on awesome PowerPoint and glitzy demo can’t do that?

Nadeem Lughmani decided to solve this challenge as a hands-on assignment in the Building Network Automation Solutions online course and created an Ansible playbook and a Python plugin that counts the total number of ports and number of free ports for each switch stack specified in the device inventory.

Wonder what else course attendees created in the past? Here’s a small sample.

Coding Packets the Rails Edition

One of my 2019 goals was to migrate codingpackets.com from the python web framework Django to the ruby web framework Rails. Well it's done and this is the story of how and why I did it. Ruby on Rails Rails is a really nice to work with web framework which is "Optimizing for programmer...

BrandPost: Is 802.11ax the End of Dual 5 -GHz Radio APs?

There are a lot of things that remain to be seen about how 802.11ax will affect wireless network design. An interesting side effect of the addition of OFDMA to the standard may be an end to the dual 5 GHz access point (AP). In a typical campus wireless network, we don’t need as many 2.4 GHz radios as 5 GHz radios. Rather, we are more limited in the number we can use because the 2.4 GHz spectrum has fewer channels and a larger coverage area. This issue is even more pronounced in high-density wireless deployments.Rather than just disable the 2.4 GHz radio, some APs allow you to switch the unneeded 2.4 GHz radio to a 5 GHz radio in software. This can be useful because there are a lot more available 5 GHz channels, so rather than having a bunch of APs with only one radio you can add 5 GHz capacity to the network with the same number of APs.To read this article in full, please click here

IoT roundup: VMware, Nokia beef up their IoT

When attempting to understand the world of IoT, it’s easy to get sidetracked by all the fascinating use cases: Automated oil and gas platforms! Connected pet feeders! Internet-enabled toilets! (Is “the Internet of Toilets” a thing yet?) But the most important IoT trend to follow may be the way that major tech vendors are vying to make large portions of the market their own.VMware’s play for a significant chunk of the IoT market is called Pulse IoT Center, and the company released version 2.0 of it this week. It follows the pattern set by other big companies getting into IoT: Leveraging their existing technological strengths and applying them to the messier, more heterodox networking environment that IoT represents.To read this article in full, please click here

Kernel of Truth season 2 episode 6: Infrastructure as code

 

Subscribe to Kernel of Truth on iTunes, Google Play, SpotifyCast Box and Sticher!

Click here for our previous episode.

Our consultants are often the first to hear about trends and issues that customers and the industry as a whole are seeing and dealing with. Recently we’ve found that quite a few were unaware of what “infrastructure as code” is so we thought, let’s demystify it for everyone! Host Brian talks to Nick Mitchell and Eric Pulvino, two of our consultants who have first-hand knowledge about the topic and share not only what it is but what the problems infrastructure as code is solving for and why you should care! As you listen beware, there may be a “dad joke” and an attempt at Buzzword Bingo along the way. Apparently, it can’t be helped when you’re talking about “git.”

Guest Bios

Brian O’Sullivan: Brian currently heads Product Management for Cumulus Linux. For 15 or so years he’s held software Product Management positions at Juniper Networks as well as other smaller companies. Once he saw the change that was happening in the networking space, he decided to join Cumulus Networks to be a part of the Continue reading

Buy More, Save More — This HP Coupon Code Cuts Prices on Business PCs

If you're looking to buy a new business PC, HP is currently offering a "buy more, save more" discount that gets activated at 3 different price points, and using a special code. Configure your new PC to the $599+ price point and apply code BMSM60 to save $60. Or configure to $1,299+ and use code BMSM150 to save $150. Configure to $1,999+ and use code BMSM350 for a whopping $350 off your new PC.  Click the codes just mentioned to learn more, or click right here to review available models, specs, and configurations.To read this article in full, please click here

xdpcap: XDP Packet Capture

xdpcap: XDP Packet Capture

Our servers process a lot of network packets, be it legitimate traffic or large denial of service attacks. To do so efficiently, we’ve embraced eXpress Data Path (XDP), a Linux kernel technology that provides a high performance mechanism for low level packet processing. We’re using it to drop DoS attack packets with L4Drop, and also in our new layer 4 load balancer. But there’s a downside to XDP: because it processes packets before the normal Linux network stack sees them, packets redirected or dropped are invisible to regular debugging tools such as tcpdump.

To address this, we built a tcpdump replacement for XDP, xdpcap. We are open sourcing this tool: the code and documentation are available on GitHub.

xdpcap uses our classic BPF (cBPF) to eBPF or C compiler, cbpfc, which we are also open sourcing: the code and documentation are available on GitHub.

xdpcap: XDP Packet Capture
CC BY 4.0 image by Christoph Müller

Tcpdump provides an easy way to dump specific packets of interest. For example, to capture all IPv4 DNS packets, one could:

$ tcpdump ip and udp port 53

xdpcap reuses the same syntax! xdpcap can write packets to a pcap file:

$ xdpcap /path/to/hook capture.pcap  Continue reading

Cisco: DNSpionage attack adds new tools, morphs tactics

The group behind the Domain Name System attacks known as DNSpionage have upped their dark actions with new tools and malware to focus their attacks and better hide their activities. Cisco Talos security researchers, who discovered DNSpionage in November, this week warned of new exploits and capabilities of the nefarious campaign. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key “The threat actor's ongoing development of DNSpionage malware shows that the attacker continues to find new ways to avoid detection. DNS tunneling is a popular method of exfiltration for some actors and recent examples of DNSpionage show that we must ensure DNS is monitored as closely as an organization's normal proxy or weblogs,” Talos wrote.   “DNS is essentially the phonebook of the internet, and when it is tampered with, it becomes difficult for anyone to discern whether what they are seeing online is legitimate.”To read this article in full, please click here

Cisco: DNSpionage attack adds new tools, morphs tactics

The group behind the Domain Name System attacks known as DNSpionage have upped their dark actions with new tools and malware to focus their attacks and better hide their activities. Cisco Talos security researchers, who discovered DNSpionage in November, this week warned of new exploits and capabilities of the nefarious campaign. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key “The threat actor's ongoing development of DNSpionage malware shows that the attacker continues to find new ways to avoid detection. DNS tunneling is a popular method of exfiltration for some actors and recent examples of DNSpionage show that we must ensure DNS is monitored as closely as an organization's normal proxy or weblogs,” Talos wrote.   “DNS is essentially the phonebook of the internet, and when it is tampered with, it becomes difficult for anyone to discern whether what they are seeing online is legitimate.”To read this article in full, please click here

Mentorship and Early Career Development

In this episode of the Network Collective, John Fraizer, Denise Fishburn, and Trey Aspelund join the NC crew to talk about the importance of mentorship and practical advice on how to mentor and be mentored.

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/