What’s the deal with SONiC? Is it easy to build and use, or hard? Is it something you should be looking at? Jeff Doyle joins Russ and Tom to look at the SONiC operating system, ecosystem, and deployment.
download
Welcome to Technology Short Take #193! I know it has only been a couple weeks since the last Tech Short Take, but I am guessing that readers won’t really mind another one. Here is my latest collection of articles and posts about data center-related technologies. Enjoy!
Daftar Pustaka
Monumen Operasi Lintas Laut Jawa-Bali dibangun untuk mengabadikan perjuangan TNI dalam memindahkan pasukan melalui laut pada masa awal kemerdekaan. Operasi ini memiliki peran strategis dalam memperkuat pertahanan Indonesia dan mempertahankan kedaulatan wilayah. Selain itu, monumen ini menjadi simbol keteguhan, keberanian, dan inovasi militer.
Selain itu, monumen ini juga mengajarkan generasi muda tentang pentingnya strategi, kerja sama, dan keberanian dalam menghadapi tantangan. Dengan begitu, monumen tidak hanya sebagai benda sejarah, tetapi juga sebagai media edukasi.
Monumen ini terletak di surabaya, Jawa Timur, dekat pelabuhan strategis yang menjadi titik awal operasi. Lokasi ini dipilih karena memiliki nilai historis tinggi dan mudah diakses publik.
Monumen ini dirancang dengan arsitektur yang unik, memadukan unsur modern dan tradisional. Struktur utamanya terdiri dari patung perwira TNI, kapal laut, dan relief sejarah operasi. Setiap elemen memiliki makna simbolis, yang menggambarkan kepahlawanan, strategi, dan pengorbanan prajurit.
Selain itu, monumen memiliki taman dan area edukasi yang memungkinkan pengunjung belajar sejarah sambil menikmati suasana. Taman ini Continue reading
Daftar Pustaka
Gorky Central Park of Culture and Leisure, yang dikenal luas sebagai Taman Gorky, merupakan salah satu destinasi utama bagi warga Moskow maupun wisatawan internasional. Taman ini tidak hanya menawarkan hiburan dan rekreasi, tetapi juga menjadi simbol kebudayaan modern Rusia. Setiap tahun, ribuan pengunjung datang untuk menikmati alam, olahraga, dan acara seni yang diselenggarakan di taman yang luas ini.
Taman ini didirikan pada tahun 1928, sebagai bagian dari upaya pemerintah Soviet untuk menyediakan ruang publik yang nyaman bagi rakyat. Awalnya, taman ini lebih sederhana, dengan jalur pejalan kaki dan area hijau. Namun, seiring waktu, Taman Gorky berkembang pesat menjadi ikon modernitas.
Pada tahun 2011, taman ini mengalami renovasi besar-besaran, yang mencakup penataan ulang jalan setapak, area olahraga, dan fasilitas anak-anak. Transformasi ini menjadikannya taman kota paling modern di Moskow, yang memadukan tradisi dan inovasi. Selain itu, taman ini juga memfasilitasi festival musik, pameran seni, dan acara komunitas yang rutin diadakan setiap musim.
Taman Gorky menawarkan berbagai fasilitas hiburan dan olahraga Continue reading
IS-IS was designed to carry node addresses (NSAPs) between level-1 routers (called Intermediate Systems) within an area and area prefixes between level-2 routers, resulting in a perfect separation of concerns and forwarding information summarization. When IETF tried to use the same routing protocol for a networking stack with a completely different addressing mentality, something had to give.
Following our MikroTik hAP ax³ initial setup guide, we are now ready to unlock the […]
The post Advanced MikroTik hAP ax³ Configuration first appeared on Brezular's Blog.
Note: The core architecture for this pattern was introduced by Isaac Hawley from Tigera.
If you are building an AI agent that relies on tool calling, complex routing, or the Model Context Protocol (MCP), you’re not just building a chatbot anymore. You are building an autonomous system with access to your internal APIs.
With that power comes a massive security and governance headache, and AI agent security testing is where most teams hit a wall. How do you definitively prove that your agent’s identity and access management (IAM) actually works?
The scale of the problem is hard to overstate. Microsoft’s telemetry shows that 80% of Fortune 500 companies now run active AI agents, yet only 47% have implemented specific AI security controls. Most teams are deploying agents faster than they can test them.
If an agent is hijacked via prompt injection, or simply hallucinates a destructive action, does your governance layer stop it? Testing this usually forces engineers into a frustrating trade-off:
Cloudflare data shows that 32% of traffic across our network originates from automated traffic. This includes search engine crawlers, uptime checkers, ad networks — and more recently, AI assistants looking to the web to add relevant data to their knowledge bases as they generate responses with retrieval-augmented generation (RAG). Unlike typical human behavior, AI agents, crawlers, and scrapers’ automated behavior may appear aggressive to the server responding to the requests.
For instance, AI bots frequently issue high-volume requests, often in parallel. Rather than focusing on popular pages, they may access rarely visited or loosely related content across a site, often in sequential, complete scans of the websites. For example, an AI assistant generating a response may fetch images, documentation, and knowledge articles across dozens of unrelated sources.
Although Cloudflare already makes it easy to control and limit automated access to your content, many sites may want to serve AI traffic. For instance, an application developer may want to guarantee that their developer documentation is up-to-date in foundational AI models, an e-commerce site may want to ensure that product descriptions are part of LLM search results, or publishers may want to get paid for their content through mechanisms such Continue reading
A year ago, I was complaining about SR Linux breaking its configuration data model with a new software release. At that time, I was promised it would only happen once a year, and, like clockwork, that moment arrived with the SR Linux release 26.03.
However, this year Miguel Redondo fixed the netlab SR Linux configuration templates (VRF export policies, LocPref routing policy changes) before I could even start looking at them, and Roman Dodin released a tool that tells you exactly what changed between software releases and how to fix it.
Exactly 8 years ago today, we launched the 1.1.1.1 public DNS resolver, with the intention to build the world’s fastest resolver — and the most private one. We knew that trust is everything for a service that handles the "phonebook of the Internet." That’s why, at launch, we made a unique commitment to publicly confirm that we are doing what we said we would do with personal data. In 2020, we hired an independent firm to check our work, instead of just asking you to take our word for it. We shared our intention to update such examinations in the future. We also called on other providers to do the same, but, as far as we are aware, no other major public resolver has had their DNS privacy practices independently examined.
At the time of the 2020 review, the 1.1.1.1 resolver was less than two years old, and the purpose of the examination was to prove our systems made good on all the commitments we made about how our 1.1.1.1 resolver functioned, even commitments that did not impact personal data or user privacy.
Since then, Cloudflare’s technology Continue reading