Enabling the Next Generation of Community Network Builders: A Report on CNXAPAC 2018 and CN Champs

In October 2018, together with our partner Digital Empowerment Foundation (DEF), we organized the 2nd edition of CNXAPAC (Community Network eXchange Asia-Pacific) with a focus on how two sets of community operators – community radio network operators and community (Internet) network operators – could explore synergies in the work they do.

The event was kindly hosted by UNESCO at their Delhi office, and brought together over 50 participants from around the world to exchange knowledge and best practices, and see how the Internet can improve the lives of underserved and unserved communities.

In many parts of the world, community radio stations play an important role in providing information to the public – particularly in rural communities. The community radio community have expertise in setting up radio communications, as well as creating content relevant to their local communities. This presents a wonderful opportunity for this community to add Internet services to their repertoire, and 12 community radio operators from around India were brought to CNXAPAC to learn about Internet community networks, and how these could be deployed in their local communities.

The Internet Society Asia-Pacific Bureau has been working on community networks since 2010 as part of its Wireless for Continue reading

Don’t Sugarcoat the Challenges You Have

Last year I got into somewhat-heated discussion with a few engineers who followed the advice to run IBGP EVPN address family on top of an EBGP underlay.

My main argument was simple: this is not how BGP was designed and how it’s commonly used, and twisting it this way requires schizophrenic BGP routing process which introduces unnecessary complexity (even though it looks simple in Junos configuration) and might confuse people who have to run the network after the brilliant designer is gone.

Read more ...

Establishing software root of trust unconditionally

Establishing software root of trust unconditionally Gligor & Woo, NDSS’19

The authors won a best paper award for this work at NDSS this year. The main result is quite something, but as you might expect the lines of argument are detailed and not always easy to follow (and certainly not critically!) for non-experts like me. I’ll use today’s write-up to convey the big ideas as I understand them. Close reading of the original paper (and it’s accompanying technical report) will be essential if you then want to dig deeper.

The problem: establishing a root of trust

Root of trust (RoT) establishment on an untrusted system ensures that a system state comprises all and only content chosen by the user, and the user’s code begins execution in that state. All implies that no content is missing, and only that no extra content exists. If a system state is initialized to content that satisfies security invariants and RoT establishment succeeds, a user’s code begins execution in a secure initial state.

That is to say, even in the presence of persistent malware e.g. in the firmware of peripheral controllers, network interface cards, disk and USB controllers, and so on, root of Continue reading

Take Your Windows Container Skills to the Next Level at DockerCon

On the heels of the Kubernetes 1.14 release that supports Windows nodes, organizations are going to need to understand how to build, share and run containerized Windows Server applications. Docker and Microsoft have been collaborating since 2014 to bring containers to Windows and have several years of experience helping enterprise organizations bring these applications to production. At this year’s DockerCon, we’re bringing that knowledge to you with a full lineup of Windows Containers sessions designed to take your skill-set to the next level.

Download your Windows Container agenda and register now to learn from industry experts. Content will include modernizing existing applications as well as building the next generation of applications in .NET and .NET Core with the latest Docker Tools.

  • Modernize .NET Apps: Give new life to your existing application portfolio with this hands-on workshop (pre-registration required)
  • Docker for Windows Container Development: Learn how to develop your first .NET/.NET Core application
  • Networking and storage deep dives for Windows architects and sys admins include:
  • See how companies like yours are using Docker Enterprise and Windows Containers for their production services

Intel’s Agilex FPGA family targets data-intensive workloads

After teasing out details about the technology for a year and half under the code name Falcon Mesa, Intel has unveiled the Agilex family of FPGAs, aimed at data-center and network applications that are processing increasing amounts of data for AI, financial, database and IoT workloads.The Agilex family, expected to start appearing in devices in the third quarter, is part of a new wave of more easily programmable FPGAs that is beginning to take an increasingly central place in computing as data centers are called on to handle an explosion of data. Learn about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT FPGAs, or field programmable gate arrays, are built around around a matrix of configurable logic blocks (CLBs) linked via programmable interconnects that can be programmed after manufacturing – and even reprogrammed after being deployed in devices – to run algorithms written for specific workloads. They can thus be more efficient on a performance-per-watt basis than general-purpose CPUs, even while driving higher performance.  To read this article in full, please click here

Intel’s Agilex FPGA family targets data-intensive workloads

After teasing out details about the technology for a year and half under the code name Falcon Mesa, Intel has unveiled the Agilex family of FPGAs, aimed at data-center and network applications that are processing increasing amounts of data for AI, financial, database and IoT workloads.The Agilex family, expected to start appearing in devices in the third quarter, is part of a new wave of more easily programmable FPGAs that is beginning to take an increasingly central place in computing as data centers are called on to handle an explosion of data. Learn about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT FPGAs, or field programmable gate arrays, are built around around a matrix of configurable logic blocks (CLBs) linked via programmable interconnects that can be programmed after manufacturing – and even reprogrammed after being deployed in devices – to run algorithms written for specific workloads. They can thus be more efficient on a performance-per-watt basis than general-purpose CPUs, even while driving higher performance.  To read this article in full, please click here

Cumulus content roundup: March

Did you feel like you missed any of our great blogs or podcasts this month? We had a lot of great ones to choose from in our March content roundup and on top of that, we had a lot of great industry articles and videos we shared that you can easily access below too! Spend a minute or two, or maybe even sixty to digest it all and increase your overall knowledge. Happy trails!

From Cumulus Networks:

Cumulus Networks is excited to announce being the first to power Facebook’s next generation, open modular platform, Minipack: With this news being announced at the recent OCP Summit 2019, we provided this helpful blog with links to everything you need to know about the announcement including data sheets etc.

The multicloud we need, but not the one we deserve: How can you take advantage of multi-cloud deployments without completely ditching Continue reading

BrandPost: 3 Essentials for Achieving Resiliency at the Edge

“The IT industry has done a good job of making robust data centers that are highly manageable, highly secure, with redundant systems,” says Kevin Brown, SVP Innovation and CTO for Schneider Electric’s Secure Power Division. However, he continues, companies then connect these data centers to messy edge closets and server rooms, which over time have become “micro mission-critical data centers” in their own right — making system availability vital. If not designed and managed correctly, the situation can be disastrous if users cannot connect to business-critical applications.  To read this article in full, please click here

CCAOI-ISOC Delhi Webinar on the Draft National e-Commerce Policy

The Indian government’s Department for Promotion of Industry and Internal Trade has released a draft of the National e-Commerce Policy for public comments by 29 March 2019. The CCAOI, with support from the Internet Society India Delhi Chapter, organized a webinar to discuss the draft policy on 18 March. The objective of the discussion was to inform various stakeholders of the provisions of the draft policy and highlight issues of concern. Watch the recording here.

The session was moderated by Subhashish Panigrahi and myself. It was attended by over 45 participants from different stakeholder communities across the country. The speakers that participated in the session were Devika Aggarwal from NASSCOM, Ankit Anand from Reliance Jio, Nikhil Pahwa from MediaNama, Parminder Singh from IT for Change, and Dr. Mahesh Uppal from ComFirst (India) Private Limited.

To kick off the webinar, Smitha Krishna Prasad of the Centre for Communication Governance at the National Law University presented an overview of the draft policy, following which the speakers shared their perspectives on the draft policy. Towards the end of the webinar, speakers answered questions from the participants in a lively and interactive Q&A session.

Some of the key issues discussed were on the Continue reading