Making Education Accessible for All: Vashkar Bhattacharjee’s Story

We recently shared the first part of Vashkar Bhattacharjee’s story. Vashkar is the National Consultant, Accessibility, A2i, Prime Minister’s Office of Bangladesh, and the Program Manager, Young Power in Social Action (YPSA). Here is Part Two.

Setting up an accessible digital talking book system (DAISY) in Bangladesh

After training in Japan, I was armed with knowledge in leadership and technology and wanted to create digital access for people with disabilities in Bangladesh. I wanted to prove that people with disabilities like me can work in our job market, but nobody wanted to believe me. With Young People in Social Action (YPSA), a social development organization in my home district of Chittagong, I worked as a volunteer on creating computerized braille production, which allows for printing to be in done in Braille, thus creating the tools for education for people with visual impairment. Very soon, we obtained funding to establish a digital lab, called ICT and Resource Center on Disability (IRCD), to develop assistive technologies and content for persons with disabilities.

In 2005, I was introduced to the Digital Accessible Information System (DAISY) Consortium, where I received inspiration from international experts to work harder and smarter, and make better use Continue reading

Puerto Rico’s Slow Internet Recovery

On 20 September 2017, Hurricane Maria made landfall in Puerto Rico.  Two and a half months later, the island is still recovering from the resulting devastation.  This extended phase of recovery is reflected in the state of the local internet and reveals how far Puerto Rico still has to go to make itself whole again.

While most of the BGP routes for Puerto Rico have returned, DNS query volumes from the island are still only a fraction of what they were on September 19th  — the day before the storm hit.  DNS activity is a better indicator of actual internet use (or lack thereof) than the simple announcements of BGP routes.

We have been analyzing the impacts of natural disasters such as hurricanes and earthquakes going back to Hurricane Katrina in 2005.  Compared to the earthquake near Japan in 2011, Hurricane Sandy in 2012, or the earthquake in Nepal in 2015, Puerto Rico’s disaster stands alone with respect to its prolonged and widespread impact on internet access.  The following analysis tells that story.

DNS statistics

Queries from Puerto Rico to our Internet Guide recursive DNS service have still not recovered to pre-hurricane levels Continue reading

New global internet reliability concerns emerge

Undersea, internet-carrying cables are not protected well enough and there isn’t an alternative in place should they fail.That's according to a new report from U.K.-based Policy Exchange, which outlines potential catastrophic effects that a simple cut in the hosepipe-sized underwater infrastructure could create.Also on Network World: The hidden cause of slow Internet and how to fix it Tsunamis, a vessel dragging an anchor, or even saw-wielding Russians could bring down the global financial system or cripple a solo nation’s internet access, Policy Exchange says in its new study (pdf).To read this article in full, please click here

New global internet reliability concerns emerge

Undersea, internet-carrying cables are not protected well enough and there isn’t an alternative in place should they fail.That's according to a new report from U.K.-based Policy Exchange, which outlines potential catastrophic effects that a simple cut in the hosepipe-sized underwater infrastructure could create.Also on Network World: The hidden cause of slow Internet and how to fix it Tsunamis, a vessel dragging an anchor, or even saw-wielding Russians could bring down the global financial system or cripple a solo nation’s internet access, Policy Exchange says in its new study (pdf).To read this article in full, please click here

Arista brings the benefits of leaf-spine to routing

About a decade ago almost all data centers were built on a traditional three- (or sometimes more) tier architectures that used the spanning tree protocol (STP). That prevented routing loops but also deactivated all the backup links, which accounted for almost half the ports in large environments. This caused organizations to significantly overspend on their networks.Leaf-spine networks, on the other hand, have only two tiers, are much flatter and use something called ECMP (equal cost multi-pathing). So all routes are active, creating a much more efficient network that more agile and costs less.Also on Network World: 10 Most important open source networking projects The traditional three-tier data center was designed to scale up, which was the key requirement in the client/server era. Leaf-spine is optimized for rapid scale out, which has become critical in data centers today, as more and more traffic is moving in an East-West direction. To read this article in full, please click here

Arista brings the benefits of leaf-spine to routing

About a decade ago almost all data centers were built on a traditional three- (or sometimes more) tier architectures that used the spanning tree protocol (STP). That prevented routing loops but also deactivated all the backup links, which accounted for almost half the ports in large environments. This caused organizations to significantly overspend on their networks.Leaf-spine networks, on the other hand, have only two tiers, are much flatter and use something called ECMP (equal cost multi-pathing). So all routes are active, creating a much more efficient network that more agile and costs less.Also on Network World: 10 Most important open source networking projects The traditional three-tier data center was designed to scale up, which was the key requirement in the client/server era. Leaf-spine is optimized for rapid scale out, which has become critical in data centers today, as more and more traffic is moving in an East-West direction. To read this article in full, please click here

CAA of the Wild: Supporting a New Standard

CAA of the Wild: Supporting a New Standard

One thing we take pride in at Cloudflare is embracing new protocols and standards that help make the Internet faster and safer. Sometimes this means that we’ll launch support for experimental features or standards still under active development, as we did with TLS 1.3. Due to the not-quite-final nature of some of these features, we limit the availability at the onset to only the most ardent users so we can observe how these cutting-edge features behave in the wild. Some of our observations have helped the community propose revisions to the corresponding RFCs.

We began supporting the DNS Certification Authority Authorization (CAA) Resource Record in June behind a beta flag. Our goal in doing so was to see how the presence of these records would affect SSL certificate issuance by publicly-trusted certification authorities. We also wanted to do so in advance of the 8 September 2017 enforcement date for mandatory CAA checking at certificate issuance time, without introducing a new and externally unproven behavior to millions of Cloudflare customers at once. This beta period has provided invaluable insight as to how CAA records have changed and will continue to change the commercial public-key infrastructure (PKI) ecosystem.

As of today, Continue reading

J-AUT Course

Hi ,

I have enrolled for Juniper-JAUT Course and looking forward to it.

Below are the details. Its a 5 Day course and am expecting more out of this course.

https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=5186

My main interest lies in YAML / JSON use cases with Juniper Devices and their interaction. I will let you know how the course goes as the day progresses and over all efficiency of the course.

 

-Rakesh

BrandPost: Where Do you Rank? IDC Lists Top Drivers for SD-WAN Adoption

IDC concluded a worldwide survey in September 2017 to learn and report on the key factors driving SD-WAN deployments for enterprises. I’m pleased to see the alignment in the findings with what I wrote in my previous article, SD-WAN Delivers Real Business Outcomes to Cloud-first Enterprises back in September. The results of the survey identified the following top four drivers for deploying an enterprise SD-WAN solution:To read this article in full, please click here

Libertarians are against net neutrality

This post claims to be by a libertarian in support of net neutrality. As a libertarian, I need to debunk this. "Net neutrality" is a case of one-hand clapping, you rarely hear the competing side, and thus, that side may sound attractive. This post is about the other side, from a libertarian point of view.



That post just repeats the common, and wrong, left-wing talking points. I mean, there might be a libertarian case for some broadband regulation, but this isn't it.

This thing they call "net neutrality" is just left-wing politics masquerading as some sort of principle. It's no different than how people claim to be "pro-choice", yet demand forced vaccinations. Or, it's no different than how people claim to believe in "traditional marriage" even while they are on their third "traditional marriage".

Properly defined, "net neutrality" means no discrimination of network traffic. But nobody wants that. A classic example is how most internet connections have faster download speeds than uploads. This discriminates against upload traffic, harming innovation in upload-centric applications like DropBox's cloud backup or BitTorrent's peer-to-peer file transfer. Yet activists never mention this, or other types of network traffic discrimination, because they no more care about "net Continue reading

Getting Started: Setting Up A Job Template

Getting-Started-Job-Template.png

Welcome to another post in our Getting Started series. In our previous post, we discussed the basic structure of how you can write your first playbook.

In this post, we will discuss how to set up job templates and run them against your inventory. We will also discuss job output and how you can view previous job runs to compare and contrast successful/failed runs.

Before we get started, a gentle reminder that in order to run job templates successfully in Red Hat® Ansible® Tower, you will need to have an inventory present, an updated project to select a playbook from to run against and up-to-date credentials

Job Templates: What Are They?

Job templates are a definition and set of parameters for running an Ansible Playbook. In Ansible Tower, job templates are a visual realization of the ansible-playbook command and all flags you can utilize when executing from the command line. A job template defines the combination of a playbook from a project, an inventory, a credential and any other Ansible parameters required to run.

When you run playbooks from the command line you use arguments to control and direct it. Whether you're invoking an inventory file Continue reading