The Benin Chapter Wins Chapterthon 2018

The winner of this year’s Chapterthon was announced this Tuesday, 4 December during InterCommunity 2018.

Chapterthon is a global Internet Society (ISOC) Chapters and Special Interest Groups (SIGs) marathon, where all the Internet Society members can participate by developing a project within a timeline and budget to achieve a common goal. The project winner is selected by the community through online vote.

This year our community worked on the Internet of Things (IoT) – The future is ours to shape.

Every year, the Chapterthon brings enthusiasm and excitement amongst our community. During two and half months, 43 Chapters and Special Interest Groups (SIGs) from across the globe worked alongside to bring awareness on the Internet of Things (IoT) to their communities. They ran over 200 training sessions and workshops, engaging students, entrepreneurs, and local governments. They organized national campaigns, their projects were mentioned in local newspapers, and their message was brought to the most remote places. The Chapters also developed IoT applications that may in the future improve the lives of people in their communities, and amongst some of the projects are improved transport systems, agriculture, energy management, home protection, and healthcare.

The projects that received the highest number Continue reading

Sponsored Post: InMemory.Net, Triplebyte, Etleap, Stream, Scalyr

Who's Hiring? 


  • Triplebyte lets exceptional software engineers skip screening steps at hundreds of top tech companies like Apple, Dropbox, Mixpanel, and Instacart. Make your job search O(1), not O(n). Apply here.

  • Need excellent people? Advertise your job here! 

Fun and Informative Events

  • Advertise your event here!

Cool Products and Services


  • InMemory.Net provides a Dot Net native in memory database for analysing large amounts of data. It runs natively on .Net, and provides a native .Net, COM & ODBC apis for integration. It also has an easy to use language for importing data, and supports standard SQL for querying data. http://InMemory.Net

EU Terrorist Content Online proposal – political haste and unintended consequences

EU Terrorist Content Online proposal – political haste and unintended consequences
Photo by Sara Kurfeß / Unsplash
EU Terrorist Content Online proposal – political haste and unintended consequences

In September, the European Commission presented a legislative proposal to address the removal of terrorist content online. There has been significant political pressure, particularly as the EU elections of 2019 approach, towards internet companies taking on increased responsibility in the area of terrorist propaganda online. This proposal would be a marked move from various voluntary initiatives taken up by some social media companies in recent times towards a legal responsibility framework for many.  

While appreciating the concerns around terrorism, Cloudflare is not only troubled by the late presentation of this proposal – which leaves inadequate time for a thorough review before this EU legislative term expires – but also much of the substance. Along with others such as CDT, GSMA/ETNO and Mozilla, we have significant concerns around the legal implications, practical application and possible unintended consequences of the proposal, some of which we outline below. Furthermore, we believe that little evidence has been presented as to the necessity of the proposed measures.

Concerns and shortcomings

The Commission’s proposal does not account for the complexity and range of information society services having a storage component - not all services have the same Continue reading

BrandPost: Opportunistic Wireless Encryption…Um, What’s That Again?

By now you’ve heard countless stories for how insecure public Wi-Fi networks in coffee shops, bars, and large venues can be too dangerous for users – malware can infect personal devices, hackers can acquire usernames and passwords, and ransomware can hold private data hostage.In places like airports, potentially millions of travelers are at risk to these types of cyberattacks because of open networks. According to an assessment by Coronet in a CNBC article, you can put a stop to these problems by not joining an open, public Wi-Fi network at all – or if you do, update your device software and use different passwords for different accounts in the event you do get hacked.To read this article in full, please click here

10 predictions for the data center and the cloud in 2019

IDG It’s that time of year again, where vacations are planned, going to the mall looks like something out of “Braveheart,” package theft from doorsteps is rampant, and people try their best not to offend. In other words, it’s Christmastime.This leads to an inevitable tradition of looking back at the year and at what will come. For some time, I’ve done general looks back, but this year we are narrowing the focus to the data center and cloud, since the real battle these days is to find a balance between the cloud and on-premises implementations.To read this article in full, please click here

10 predictions for the data center and the cloud in 2019

It’s that time of year again, where vacations are planned, going to the mall looks like something out of “Braveheart,” package theft from doorsteps is rampant, and people try their best not to offend. In other words, it’s Christmastime.This leads to an inevitable tradition of looking back at the year and at what will come. For some time, I’ve done general looks back, but this year we are narrowing the focus to the data center and cloud, since the real battle these days is to find a balance between the cloud and on-premises implementations.[ Read also: What will be hot for Cisco in 2019? ] Much of what I am predicting has been hinted at in research or emerging trends, so I’m not sticking my neck too far out. I’m just making logical assumptions and conclusions based on past evidence. Hopefully that will improve my accuracy rate. And now …To read this article in full, please click here

Join Us to Discuss Attack Response at Internet Scale

How do we coordinate responses to attacks against Internet infrastructure and users? Internet technology has to scale or it won’t survive for long as the network of networks grows ever larger. But it’s not just the technology, it’s also the people, processes and organisations involved in developing, operating and evolving the Internet that need ways to scale up to the challenges that a growing global network can create.

One such challenge is unwanted traffic, ranging from spam and other forms of messaging-related abuse to multi-gigabit distributed denial of service attacks. Numerous incident response efforts exist to mitigate the effects of these attacks. Some are focused on specific attack types, while others are closed analysis and sharing groups spanning many attack types.

We are helping to bring together operators, researchers, CSIRT team members, service providers, vendors, information sharing and analysis centre members to discuss approaches to coordinating attack response at Internet scale. The Internet Society is sponsoring a two-day “Coordinating Attack Response at Internet Scale (CARIS) Workshop” intended to help build bridges between the many communities working on attack response on the Internet and to foster dialogue about how we can better collaborate.

The workshop will take place on February 28 Continue reading

Virtual Design Clinic 3 at Packet Pushers

Attending conferences has always been expensive, time consuming and tiring. Most people don’t talk about this but prefer to highlight the positives of meeting people, sitting in high quality sessions and enjoy some time off from the repetitive activities of the $dayjob. If you have questions that you want answered but can’t attend, head over […]

The post Virtual Design Clinic 3 at Packet Pushers appeared first on EtherealMind.

Bilim Bulagy: A Spring of Knowledge in Kyrgyzstan

Kyrgyzstan’s transition to post-Soviet renovation toward a free market economy has had severe effects on the nation’s educational system. Having limited resources, schools in Kyrgyzstan desperately need more teachers. Currently, there are over 2500 teaching positions not being covered, most of them in the fields of natural science and mathematics.

Aiming to cover the need of affordable education, the Internet Society Kyrgyzstan Chapter developed Spring of Knowledge, a project supported by the Internet Society Beyond the Net Funding Programme, to provide new learning opportunities via digital self-study materials, such as offline access to Wikipedia, the Khan Academy online courses, as well as eBooks and video lessons in local languages.

Isabek_Asanbaev
Isabek Asanbaev,
Project Manager

“The provision of textbooks in schools during the 2013-2014 academic year was only 73%.” explains the project manager Isabek Asanbaev. “The Kyrgyz Republic was ranked last in mathematics, science and reading among nations that participated in the 2006 and 2009 rounds of the Program for International Student Assessment (PISA). The National Sample-Based Achievement Test (NSBA) showed the same trend of underachievement. Our project aims to provide an opportunity for children to continue learning through self study in schools that don’t have enough teachers and Continue reading

Announcing Cloud Native Application Bundle (CNAB)

As more organizations pursue cloud-native applications and infrastructures for creating modern software environments, it has become clear that there is no single solution in the market for defining and packaging these multi-service, multi-format distributed applications. Real-world applications can now span on-premises infrastructure and cloud-based services, requiring multiple tools like Terraform for the infrastructure, Helm charts and Docker Compose files for the applications, and CloudFormation or ARM templates for the cloud-services. Each of these need to be managed separately.

 

 

To address this problem, Microsoft in collaboration with Docker are announcing Cloud Native Application Bundle (CNAB) – an open source, cloud-agnostic specification for packaging and running distributed applications. CNAB unifies the management of multi-service, distributed applications across different toolchains into a single all-in-one packaging format.The CNAB specification lets you define resources that can be deployed to any combination of runtime environments and tooling including Docker Engine, Kubernetes, Helm, automation tools and cloud services.

Docker is the first to implement CNAB for containerized applications and will be expanding it across the Docker platform to support new application development, deployment and lifecycle management. Initially CNAB support will be released as part of our docker-app experimental tool for building, packaging and managing Continue reading

How well do you know website performance?

How well do you know website performance?
How well do you know website performance?

How quickly did this blog post load? Did you happen to notice?

Most website visitors do notice that sort of thing, even if they don't realize it consciously. In fact, virtually all visitors have strong opinions about how quickly a website should load, how responsive it should be, and how often it should go down (preferably, never). Most users strongly prefer webpages that take under 5 seconds to load, and they're much more likely to leave without buying products or reading content if a page takes too long to render.

Everyone should understand how to keep websites fast

Part of the Cloudflare mission is to make the Internet better by helping it perform better. One way we are delivering on our mission is by sharing easy-to-read educational content to assist anyone with a web property.

We recently launched a performance-themed Learning Center: a series of educational articles on why performance matters, the factors affecting performance, and some of the best practices for making websites faster. Check out the Performance Learning Center!

This Learning Center is for anyone who wants to really do a deep dive into the complex topic of website performance, no matter what their technical background Continue reading