The Internet Is Knowledge and Knowledge Is Power

Adisa Bolutife is a 22-year-old open access advocate based in Lagos, Nigeria. A graduate of the University of Lagos with a degree in and electronics engineering, he is passionate about issues related to access, technology, inclusion, and Internet Governance. In 2016, Bolutife founded Open Switch Africa, where he leads a group of students, researchers, and academics to advocate for open access in research, education, and data in Nigeria. He is also a co-founder and director of Digital Grassroots, a global initiative that works to improve digital literacy in local communities. He is an Internet Society 2017 Youth@IGF fellow and an alumnus of the UNESCO Youth Leadership Workshop on Global Citizenship Education, Mozilla Open Leaders, and OpenCon 2017.

Like many people around the world, the Internet has contributed largely to the person I am today – building my knowledge base through access to a wealth of information. Without the Internet, a lot of things would not be as easy as they are right now.

As a recent graduate, I can relate to the fact that the Internet has been extremely helpful in aiding and improving student learning and research, as I can cite academic resources online and watch Continue reading

Coding for Others

Writing code with the mindset that others are going to view and contribute, even for personal projects, improves the overall project and provides benefits to yourself.

Edge computing best practices

Data processing, analytics, and storage increasingly are taking place at the network edge, close to where users and devices need access to the information. Not surprisingly, edge computing is becoming a key component of IT strategy at a growing number of organizations.A recent report from Grand View Research predicted the global edge computing market will reach $3.24 billion by 2025, expanding at a “phenomenal” compound annual growth rate (CAGR) of 41% during the forecast period.One of the biggest contributors to the rise of edge computing is the ongoing growth of the Internet of Things (IoT). The vast amounts of data created by IoT devices might cause delays and latency, Grand View says, and edge computing solutions can help enhance the data processing power, which further aids in avoiding delays. Data processing takes place closest to the source of the data, which makes it more feasible for business users to gain real-time insights from the IoT data devices are gathering.To read this article in full, please click here

Edge computing best practices

Data processing, analytics, and storage increasingly are taking place at the network edge, close to where users and devices need access to the information. Not surprisingly, edge computing is becoming a key component of IT strategy at a growing number of organizations.A recent report from Grand View Research predicted the global edge computing market will reach $3.24 billion by 2025, expanding at a “phenomenal” compound annual growth rate (CAGR) of 41% during the forecast period.One of the biggest contributors to the rise of edge computing is the ongoing growth of the Internet of Things (IoT). The vast amounts of data created by IoT devices might cause delays and latency, Grand View says, and edge computing solutions can help enhance the data processing power, which further aids in avoiding delays. Data processing takes place closest to the source of the data, which makes it more feasible for business users to gain real-time insights from the IoT data devices are gathering.To read this article in full, please click here

Server sales projected to slow, while memory prices drop

The global server market grew about 5 percent in 2018, but it will slow in the first half of 2019, according to market researcher TrendForce. However, the company also projects a buyer’s market for DRAM, as a glut of memory hits and memory manufacturers slow down production.Enterprise servers continue to account for the majority of the global shipments, but the percentage of servers used for internet data centers, such as hyperscale data centers from Amazon and Facebook, grew to nearly 35 percent of total sales. [ Read also: How to plan a software-defined data-center network ] While total server sales were up 5 percent, with Q2 of 2018 being especially strong with more than 10 percent quarter-over-quarter growth in global server shipments, the shipment growth is expected to slow down to 2 percent in the first half of the year.To read this article in full, please click here

Server sales projected to slow, while memory prices drop

The global server market grew about 5 percent in 2018, but it will slow in the first half of 2019, according to market researcher TrendForce. However, the company also projects a buyer’s market for DRAM, as a glut of memory hits and memory manufacturers slow down production.Enterprise servers continue to account for the majority of the global shipments, but the percentage of servers used for internet data centers, such as hyperscale data centers from Amazon and Facebook, grew to nearly 35 percent of total sales. [ Read also: How to plan a software-defined data-center network ] While total server sales were up 5 percent, with Q2 of 2018 being especially strong with more than 10 percent quarter-over-quarter growth in global server shipments, the shipment growth is expected to slow down to 2 percent in the first half of the year.To read this article in full, please click here

Future Thinking: Chris Yiu

In 2017, the Internet Society unveiled the 2017 Global Internet Report: Paths to Our Digital Future. The interactive report identifies the drivers affecting tomorrow’s Internet and their impact on Media & Society, Digital Divides, and Personal Rights & Freedoms. While preparing to launch the 2019 Global Internet Report, we interviewed Chris Yiu to hear his perspective on the forces shaping the Internet’s future.

Chris is a senior policy fellow for technology in the Renewing the Centre team at the Tony Blair Institute for Global Change. His work focuses on how new technologies can be used to enhance the functioning of liberal democracy, and on policy solutions to the new economic challenges of automation and the digital economy. Chris was previously a general manager at Uber and has held senior roles in a number of public, private, and third-sector organizations. He recently authored the report, “A New Deal for Big Tech: Next-Generation Regulation Fit for the Internet Age (Tony Blair Institute for Global Change, 2018).

The Internet Society: In your report you write that this “new deal for big tech” is urgent for protecting democratic values globally. Why?

Chris Yiu: Political leaders face an external environment characterised by disruption Continue reading

Research: Legal Barriers to RPKI Deployment

Much like most other problems in technology, securing the reachability (routing) information in the internet core as much or more of a people problem than it is a technology problem. While BGP security can never be perfect (in an imperfect world, the quest for perfection is often the cause of a good solution’s failure), there are several solutions which could be used to provide the information network operators need to determine if they can trust a particular piece of routing information or not. For instance, graph overlays for path validation, or the RPKI system for origin validation. Solving the technical problem, however, only carries us a small way towards “solving the problem.”

One of the many ramifications of deploying a new system—one we do not often think about from a purely technology perspective—is the legal ramifications. Assume, for a moment, that some authority were to publicly validate that some address, such as 2001:db8:3e8:1210::/64, belongs to a particular entity, say bigbank, and that the AS number of this same entity is 65000. On receiving an update from a BGP peer, if you note the route to x:1210::/64 ends in AS 65000, you might think you are safe in using this Continue reading

Episode 42 – SD-WAN Beyond The Hype

There’s no doubt that Software-Defined Wide Area Networking is one of the most hyped technologies we’ve seen recent history. From cost savings to unprecedented simplicity, no claim seemed to be off limits when it came to controller driven networks. Now that’s it’s 2019 and some of the dust is settling we wanted to have a chat with a couple of engineers who have been in the thick of it and know what it’s really like to design, implement, and operate Software-Defined WANs.


 

We would like to thank VIAVI Solutions for sponsoring this episode of Network Collective. VIAVI Solutions is an application and network management industry leader focusing on end-user experience by providing products that optimize performance and speed problem resolution. Helping to ensure delivery of critical applications for businesses worldwide, Viavi offers an integrated line of precision-engineered software and hardware systems for effective network monitoring and analysis. Learn more at www.viavisolutions.com/networkcollective.


We would also like to think PathSolutions for sponsoring this episode of Network Collective. PathSolutions TotalView is designed to automatically dig deep into network devices to learn what they know about your network’s performance. This means your network is no longer full of mysteries because you know everything your network knows. Try TotalView on your Continue reading

Orange Matter: Where is Your Configuration Source of Truth?

Orange Matter Logo

I’ve been blogging for Solarwinds recently, posting on Orange Matter, with a cross-post to the Thwack Geek Speak forum. The post linked here looks at where we define our source of truth for device configurations; is it the device itself? Should it be? This is a key question when looking at automation, and one we should all be asking ourselves.

This post appeared on Orange Matter as “Where Is Your Config Source of Truth?“, but I’m also linking to the version posted on Thwack, mainly because that format allowed me to use more images and be slightly more irreverent, which is perhaps a bit more in character.

Where Is Your Config Source of Truth?

I’d love it if you were to take a moment to visit and read, and maybe even comment!

If you liked this post, please do click through to the source at Orange Matter: Where is Your Configuration Source of Truth? and give me a share/like. Thank you!

What Makes IoT A Security Risk?

IoT security is a pretty hot topic in today’s world. That’s because the increasing number of smart devices is causing issues with security professionals everywhere. Consumer IoT devices are expected to top 20 billion by 2020. And each of these smart devices represents an attack surface. Or does it?

Hello, Dave

Adding intelligence to a device increases the number of ways that it can compromised. Take a simple thermostat, for example. The most basic themostat is about as dumb as you can get. It uses the expansion properties of metal to trigger switches inside of the housing. You set a dial or a switch and it takes care of the rest. Once you start adding things like programmability or cloud connection, you increase the number of ways that you can access the device. Maybe it’s a webpage or an app. Maybe you can access it via wireless or Bluetooth. No matter how you do it, it’s more available than the simple version of the thermostat.

What about industrial IoT devices? The same rule applies. In this case, we’re often adding remote access to Supervisory Control And Data Acquistion (SCADA) systems. There’s a big market from enterprise IT providers to create Continue reading

What’s New in Ansible Tower 3.4

 

Red Hat Ansible Tower 3-4

We hope that 2019 will be a great year and the Ansible team is here to start it off right. We're happy to announce that Red Hat Ansible Tower 3.4 is now generally available. In this release, there are several enhancements that can help improve automation practices. Engineering has been working hard to enhance Red Hat Ansible Tower. We're most excited about workflows enhancements, job slices, and some other nifty features. Let’s dive a little deeper into what we’re excited about in this release.


Workflow Enhancements

The enhancements to workflows in Red Hat Ansible Tower 3.4 are a combination of internal and customer requested features. This is designed to bring needed hybrid cloud management capabilities to engineers and administrators around the globe.

Workflow Convergence

Workflow convergence enables a convergence step that tracks the completion of multiple workflow jobs before continuing. For example, when deploying application updates there might be a need to wait until a group of nodes drains from a load balancer pool before having a service stopped on any node in the group. This helps enable a more complete dependency chain for jobs inside workflows.

Ansiblt-Tower-Covergence-Workflows

Nested Workflows

Workflows have been able to have job templates Continue reading