Indigenous communities across North America are working to bridge the digital divide.
Each year the Indigenous Connectivity Summit (ICS) brings together community leaders, network operators, policymakers, and others to talk about new and emerging networks and the policies that impact them. During the two-day Summit, people from across the United States, Canada, and the rest of the world share best practices, challenges, and success stories – and learn how they can work together when they return home to solve connectivity challenges in Indigenous communities.
This year, we’ll be in Hilo, Hawaii from November 12-15.
But that’s not nearly enough time to cover everything, especially with close to 1,000 amazing participants (200 in-person and 700 online) ready to share their stories and create new connections.
So we’re trying something new. As we’ve done before, the ICS will still be split into two parts: a two-day training and a two-day event. But this year, participants can also attend a series of two distinct virtual training sessions before the event in Hawaii: Community Networks and Policy and Advocacy.
These sessions will allow participants to spend time over the course of several weeks getting in-depth information about two of the topics we spend Continue reading
This week's Network Break examines Cloudflare's decision to drop 8Chan, analyzes Cisco's settlement of a security-related whistleblower suit the company fought for eight years, discusses a new VMware/Google cloud partnership, reviews the latest financial news from tech vendors, and more.
The post Network Break 246: Cloudflare Dumps 8chan; Cisco Settles Whistleblower Suit appeared first on Packet Pushers.
The Packet Pushers audience survey is a necessary, pithy (and privacy protected!) survey to help us get things right.
The post Packet Pushers 2019 Audience Survey appeared first on EtherealMind.
Millions and millions served: More than 100 million people were affected by a massive data breach at banking and credit card company Capital One, Krebs on Security says. The stolen data included about 140,000 U.S. Social Security numbers and approximately 80,000 bank account numbers, and about 1 million Social Insurance Numbers for Canadian credit card customers. A former software engineer has been arrested and accused of stealing the data. The breach is one of the 10 largest ever, USA Today says.
Here we go again: The so-called Five Eyes spy agencies are again calling on tech vendors to allow law enforcement agencies access to encrypted material, Reuters reports. Encryption should not come at the expense of the public’s safety, the five countries argued, even though many security experts say encryption backdoors will hurt public safety. Meanwhile, the U.S and U.K. are specifically targeting encryption in WhatsApp, Forbes says.
Expanded access: Cuba has brought Internet access to private homes and businesses, the New York Times reports. The Cuban government has put into effect a new set of regulations that seek to expand Internet access across the country. The regulations permit the creation of private wired and WiFi internet Continue reading
The mass shootings in El Paso, Texas and Dayton, Ohio are horrific tragedies. In the case of the El Paso shooting, the suspected terrorist gunman appears to have been inspired by the forum website known as 8chan. Based on evidence we've seen, it appears that he posted a screed to the site immediately before beginning his terrifying attack on the El Paso Walmart killing 20 people.
Unfortunately, this is not an isolated incident. Nearly the same thing happened on 8chan before the terror attack in Christchurch, New Zealand. The El Paso shooter specifically referenced the Christchurch incident and appears to have been inspired by the largely unmoderated discussions on 8chan which glorified the previous massacre. In a separate tragedy, the suspected killer in the Poway, California synagogue shooting also posted a hate-filled “open letter” on 8chan. 8chan has repeatedly proven itself to be a cesspool of hate.
8chan is among the more than 19 million Internet properties that use Cloudflare's service. We just sent notice that we are terminating 8chan as a customer effective at midnight tonight Pacific Time. The rationale is simple: they have proven themselves to be lawless and that lawlessness has caused multiple tragic deaths. Even if Continue reading
Hi All,
Pomodoro technique is really effective, more than the technique it’s more or less like a good stress buster to me.
https://en.wikipedia.org/wiki/Pomodoro_Technique
There are few problems with the timer management
1. It’s impractical for me to manually add 25-minute timer every time
2. I can do a small script but again my computer should always be on
3. Use some app or use a timer with sound (both of them are really disturbing for myself and also colleagues around me)
What did I use
Components Used :
Challenges :
400G Ethernet switches will ship by the end of 2019. We get under the hood of the fastest-ever version of Ethernet to find out how it works, the challenges of building the gear, differences between QSFP-DD and OSFP optics, and more. Our guests are Ray Nering and Lane Wigley of Cisco, the sponsor for today's podcast.
The post Heavy Networking 463: Under The Hood Of 400G Ethernet With Cisco (Sponsored) appeared first on Packet Pushers.
It seems like conference season never really ends. Between RSA, Cisco Live, Black Hat, and VMworld, I’m always running around to something. I enjoy being able to meet new people and talk to companies at these events but I also find that a little bit of planning ahead helps immensely.
There’s always a lot of discussion from people about what to pack for a conference. There have been some great posts written about it, like this one from Bob McCouch in 2014. He definitely covers all the important stuff that people would want to know, such as comfortable shoes and a bag big enough to carry extra things just in case you come back with enough fidget spinners to sink an aircraft carrier.
However, I’ve found in recent years that the difference between just surviving a conference and really being prepared involves a few extra items I never thought I’d need to bring back when I first started doing this in 2006. Maybe it’s the Scoutmaster in me, but being prepared has gone from being a suggestion to a necessity. And here are a few of those little necessities that I have found I can’t live without.
I’ve Continue reading
I was embarrassed to realize recently that it’s been well over two years since my last blog post. Life has a way of getting away from you, I suppose. But I’ve decided to try and reboot the blog, and hopefully get back to writing regularly. Let me kick things off my sharing what I’ve been up to recently.
After nearly five years working at DigitalOcean, I made the difficult decision to part ways with the company. In my time there, I was fortunate to work with an amazing team, and witness the truly amazing evolution of a startup company from niche player to major cloud provider. Most of all, I’m thankful to DigitalOcean for the opportunity my role provided in extending from traditional network engineering into development and automation. I’ll miss working with my DO team, but I’m excited to see where the future will take them.
An increasingly popular design for a data-center network is BGP on the host: each host ships with a BGP daemon to advertise the IPs it handles and receives the routes to its fellow servers. Compared to a L2-based design, it is very scalable, resilient, cross-vendor and safe to operate.1 Take a look at “L3 routing to the hypervisor with BGP” for a usage example.
While routing on the host eliminates the security problems related to
Ethernet networks, a server may announce any IP prefix. In the above
picture, two of them are announcing 2001:db8:cc::/64
. This could be
a legit use of anycast or a prefix hijack. BGP offers several
solutions to improve this aspect and one of them is to leverage the
features around the RPKI infrastructure.
On the Internet, BGP is mostly relying on trust. This contributes to various incidents due to operator errors, like the one that affected Cloudflare a few months ago, or to malicious attackers, like the hijack of Amazon Continue reading