
I’m interested in fonts. The two space remains bunk.

Change the way you think about strategy and why mapping works ?
The Internet Society and the African Union Commission (AUC) today launched the Personal Data Protection Guidelines for Africa (“the Guidelines”) at the Africa Internet Summit in Dakar, Senegal. Grounded on principles of privacy, trust and responsible use, the Guidelines introduced another step in securing the African Internet infrastructure and emphasized the notion that good data protection strengthens trust in online services and contributes to sustainable growth of the digital economy. This timely development follows a recent massive privacy breach at Facebook and the much talked about Cambridge Analytica saga which mishandled the data of millions of Facebook users, including many on the African continent.
Speaking at the launch event, the Director for Africa Regional Bureau, Dawit Bekele, applauded Senegal for becoming the first country in Africa to show leadership and commitment towards building a solid information society. “Africa – indeed like the rest of the world – considers personal data protection as key in securing the Internet infrastructure and Senegal has shown us the way by being the first African country to ratify the Malabo Convention.”
The African digital economy is continuing to grow, with the potential to reach $300 billion or 10% of GDP of the African economy Continue reading
Developing software on Optane hardware reduces transaction costs for latency-sensitive workloads and increases scale per server.
One of my favorite guilty pleasures is the movie "10 Things I Hate About You". If you're not familiar with it, it's a 90's teenybopper flick that's loosely based on Shakespeare's "The Taming of the Shrew". In the movie, our hero Patrick is surreptitiously paid to woo the man-hating Kat so that slimy Joey will be allowed to date her younger sister Bianca. Kat initially can't stand Patrick and his numerous bad habits, but by the end of the story has fallen for him. She reads him a poem that starts off describing ten things she hates about him, but wraps it up declaring her love for him instead.
I love Windows, but I know many Linux admins can't stand it, and avoid working with it at any cost. While working on a talk to espouse the use of Ansible to manage Windows in the same way as Linux, I imagined a Linux admin discovering the power of Ansible's features and common language to see the beauty in an automated Windows setup. It inspired me to write my own version of Kat's poem:
I hate that you're not SSH, and the shell that you call "Power",
I hate Continue reading
The agent AppMon's sensors are pervasively deployed in a host environment to generate precise granular performance measurement, impairment detection, and anomaly detection.
By making switching smarter, operators can lower latency and increase bandwidth.
The latest round of Azure Kubernetes Service updates include the new name and general availability in the coming weeks.
The SD-WAN supply chain becomes critically important, as it includes the planning and management of all application delivery infrastructure involved in sourcing, procurement, deployment, and logistics.
I was recently invited to a webinar for the RIPE NCC about the future of BGP security. The entire series is well worth watching; I was in the final session, which was a panel discussion on where we are now, and where we might go to make BGP security better.
At our recent virtual event, we shared our excitement around Docker Enterprise Edition (EE) 2.0 – the most complete enterprise-ready container platform in the market. We shared how this release enables organizations like Liberty Mutual and Franklin American Mortgage Company, both presenters at DockerCon 2018, to efficiently scale their container environment across many teams while delivering choice and flexibility. We demonstrated some of the new advanced capabilities around access controls with secure application zones and building a consistent software supply chain across regions, and highlighted how easy and interchangeable it is to leverage both Swarm and Kubernetes orchestration in the same environment.
If you missed the live event, don’t worry! You can still catch the recording on-demand here.
We got great questions throughout the event and will address the most common ones in our blog over the next few days.
One of the highlights of this release is the integration of Kubernetes, making Docker EE the only platform that runs both Swarm and Kubernetes simultaneously on the same cluster – so developers do not need to make an orchestration choice. Operations teams have the flexibility to choose orchestrators interchangeably.

Q: Is Continue reading
Chocolate and peanut butter, tea and scones, gin and tonic, they’re all great combinations, and today we now have a new binary mixture — Quantum and AI. Do they actually mix well together? Quadrant, a new spin out from D-Wave Systems, certainly seems to think so.
D-Wave has been in the quantum computing business since 1999, raising in excess of $200 million from Goldman Sachs, Bezos Expeditions and others, they now list folks such as Google, NASA, Los Alamos National Laboratory and Volkswagen as examples of their signature customers. Quadrant is basically the new AI play from the …
Blending An Elixir Of Quantum And AI For Better Healthcare was written by James Cuff at The Next Platform.
Interop ITX speaker Rob Hirschfeld provides a reality check on a hot trend that promises to make data center infrastructure more efficient.
The world of AI software is quickly evolving. New applications are coming on the scene on almost a daily basis, and now is a good time to try to get a handle on what people are really doing with machine learning and other AI techniques and where they might be headed.
In our first two articles trying to assess what is happening out there in the enterprise when it comes to AI – Lagging In AI? Don’t Worry, It’s Still Early and New AI Being Mostly Used To Solve Old Problems – we discussed how real-world users are approaching AI …
AI Frameworks And Hardware: Who Is Using What? was written by Timothy Prickett Morgan at The Next Platform.
Hi All,
I was preparing some content on MPLS for a training session and as a part of it, was going through LDP. The interesting aspect is very obvious
-> LDP is dependent on IGP
-> What ever Draw-backs IGP has will be inherited by LDP
-> LDP has to be enabled on the Interface to exchange Labels, else it wont consider the exit-interface from IGP and hence there will be no LSP’s
So far so good and makes sense as well
I will not be boring with command line outputs in this case
-> I have disabled the interface between R3/R4 so if R3 Has to reach R1, it will use R3-R2-R1 path
All good, Am going to just tweak the metric of the interface on R3 -> R2 before I enable back the R3 – R4
Now let me enabled the interface between R3-R4
-> It has a Better cost
-> It has not been enabled for LDP
If we go back to R3, to examine the result
This is dangerously familiar for me
, There is a LDP neighbor, but No routes are present in Inet.3 (neither for R1 or R2) as Routes Continue reading