Going Virtual with Community Networks Voices in the Asia-Pacific: CNX APAC 2020

Each community network deployment has its own characteristics – ranging from the physical terrain to environmental conditions to local and cultural contexts. Having been involved in some 150 deployments, I can safely say no two are the same.

We helped establish CNX APAC in 2017 as a means to better understand the role, relevance, and evolution of community networks (CNs). It was designed to explore the different characteristics that make up CNs, their local context, the challenges they face, and the opportunities they create. It’s an event in the spirit of community, where community network practitioners come to exchange knowledge, share ideas, inspire others, and be inspired themselves.

For the past three years, we have typically held these as physical events located around some of our community networks deployments in the region. This allowed participants to get hands on with a working CN. The events were multi-dimensional in nature with a conference and knowledge-sharing session, coupled with training and technology demonstrations.

“To make community networks sustainable in the long run, the first thing is, the community has to own it, and the community needs to own it.”
— Mahabir Pun, Nepal

The impact of the global pandemic meant that Continue reading

Year in Review: The Most Viewed Docker Blog Posts of 2020 Part 1

2020 was some type of year…as we wrap up a year that undoubtedly will never be forgotten, we rounded up the most viewed Docker blog posts. The following posts are some of what you, the Docker community, found to be most interesting and useful. Which was your favorite?

10) Announcing the Compose Specification

Starting the list with a *bang* is a post highlighting that we created a new open community to develop the Compose Specification. This new community is run with open governance and with input from all interested parties, allowing us together to create a new standard for defining multi-container apps that can be run from the desktop to the cloud. 

9) Advanced Dockerfiles: Faster Builds and Smaller Images Using BuildKit and Multistage Builds 

This post showed some more advanced patterns that go beyond copying files between a build and a runtime stage, allowing one to get the most out of the multistage build feature. Who doesn’t want more efficient multistage Dockerfiles? 

8) Containerized Python Development – Part 2

The second in a series, this post discussed how to set up and wire other components to a containerized Python service. It showed a good way to Continue reading

Holiday Season Update from Lisbon

Holiday Season Update from Lisbon
Holiday Season Update from Lisbon

It's the end of the year, so we thought it would be a great time to give you an update on how we're doing and what we're planning for 2021. If you're reading this, you know we like to share everything we do at Cloudflare, including how the organization is evolving.

In July, John Graham-Cumming wrote a blog post entitled Cloudflare's first year in Lisbon. and showed how we went from an announcement, just a few months before, to an entirely bootstrapped and fully functional office. At the time, despite a ramping pandemic, the team was already hard at work doing a fantastic job scaling up and solidifying our presence here.

A few weeks later, in August, I proudly joined the team.

The first weeks

Cloudflare is, by any standard, a big company. There's a lot you need to learn, many people you need to get to know first, and a lot of setup steps you need to get through before you're in a position to do actual real productive work.

Joining the company during COVID was challenging. I felt just as excited as I was scared. We were (and still are) fully working from home, I didn't have a Continue reading

Merry Christmas and Happy New Year 2021

Dear friend,

This year was unbelievable. But despite all the horrible things related to COVID19 and lockdown, you and we are still alive. Moreover, the networking and automation industry is growing. It means, we are together on the right side, but we need continuously sharp existing and develop new skills.

We sincerely thank you for your interest in our projects, blogs and trainings. For your questions, comments and suggestions. It means for us a lot.

We wish you Merry Christmas and Happy New Year! Stay healthy and safe during the holiday times and the whole new year.

All the best,
Team Karneliuk.com

We’re Done for This Year

As always, it’s time to shut down our virtual office and disappear until early January… unless of course you have an urgent support problem. Any paperwork ideas your purchasing department might have will have to wait until 2021.

I hope you’ll be able to disconnect from the crazy pace of networking world, forget all the unicorns and rainbows (and broccoli forest of despair), and focus on your loved ones – they need you more than the dusty router sitting in a remote office. We would also like to wish you all the best in 2021!

We’re Done for This Year

As always, it’s time to shut down our virtual office and disappear until early January… unless of course you have an urgent support problem. Any paperwork ideas your purchasing department might have will have to wait until 2021.

I hope you’ll be able to disconnect from the crazy pace of networking world, forget all the unicorns and rainbows (and broccoli forest of despair), and focus on your loved ones – they need you more than the dusty router sitting in a remote office. We would also like to wish you all the best in 2021!

JNCIE-DC lab in EVE-NG

As explained in my previous post on my home servers, I have a bare metal system deployed with EVE-NG Pro installed. As I’m (slowly) preparing for the JNCIE-DC certification I wanted to share the topology that I’m using. As the hardware required to study for the JNCIE-DC is quite significant, it makes a lot of […]

The post JNCIE-DC lab in EVE-NG first appeared on Rick Mur.

The Read Aloud Cloud: An Interview With Forrest Brazeal On His New Book

 

It's Christmas time and you've been wracking your brain trying to find the perfect gift that will teach your loved ones about the cloud in a simple and entertaining way. What to do?

Fortunately for you, Santa has a new elf this year—Forrest Brazeal—who is part AWS Serverless Hero, part skilled cartoonist, and part cloud guru.

Yes, it's a cartoon book about the cloud! 

 

No, I didn't think it could be done either, but Forrest pulled it off with a twinkle in his eyes and little round belly that shook when he laughed, like a bowl full of jelly.

One of the many five-star reviews:

The Read Aloud Cloud is a delightful book. It's 165 pages of hand-drawn cartoons, entertaining verse, and hard-won wisdom.

It truly is a load of fun to flip through. I read it to my kids (8 & 6), and they love it. I'll share it with my parents so they can finally understand what I do. I learned a ton about the history of computing and of course all the ways that we as humans stumble through making our computers do what we want.

Continue reading

Chapter Members Pool Ideas to Inspire New Use Case on Content Filtering

Earlier this year, chapter members from around the world were asked to assist a government minister with an important project. The minister had been tasked with giving an emergency briefing on content filtering and needed the chapter members to help assess an important question. Would the critical properties of the Internet Way of Networking – the foundation that makes the Internet work for everyone – be impacted by the minister’s new policy on content filtering?

While some of the Chapter members held experience in Internet policy, others were relative novices. But as they explored the multiple dimensions and implications of different filtering and blocking techniques, they had a new, powerful tool in their arsenal: the Internet Impact Assessment Toolkit.

The government minister was fictitious, part of a mock scenario created by the Internet Society in collaboration with chapter members participating in chapter workshops. It was a powerful demonstration of how the Internet Impact Assessment Toolkit can evaluate the real-world impact of proposed Internet policy.

During the Latin American Chapter Workshop, about 140 people joined the session dedicated to the discussion of content filtering. Once the mock case was presented, participants were invited to explore the various angles of different filtering and Continue reading

Compiling Qt with Docker multi-stage and multi-platform

This is a guest post from Viktor Petersson, CEO of Screenly.io. Screenly is the most popular digital signage product for the Raspberry Pi. Find Viktor on Twitter @vpetersson.

For those not familiar with Qt, it is a cross-platform development framework that is used in a wide range of products, including cars (Tesla), digital signs (Screenly), and airplanes (Lufthansa). Needless to say, Qt is very powerful. One thing you cannot say about the Qt framework, however, is that it is easy to compile — at least for embedded devices. The countless blog posts, forum threads, and Stack Overflow posts on the topic reveal that compiling Qt is a common headache.

As long-term Qt users, we have had our fair share of battles with it at Screenly. We migrated to Qt for our commercial digital signage software a number of years ago, and since then, we have been very happy with both its performance and flexibility. Recently, we decided to migrate our open source digital signage software (Screenly OSE) to Qt as well. Since these projects share no code base, this was a greenfield opportunity that allowed us to start afresh and explore Continue reading

SolarWinds roundup: Fixes, new bad actors, and what the company knew

The SolarWinds Orion security breach is unfolding at a rapid pace, and the number of vendors and victims continues to grow. Each day brings new revelations as to its reach and depth. Of particular concern are the rate of infection and impact on government systems.In case you missed it, a backdoor was found in the SolarWinds Orion IT monitoring and management software. A dynamic link library called SolarWinds.Orion.Core.BusinessLayer.dll, a SolarWinds digitally-signed component of the Orion software framework, was found to contain a backdoor that communicates via HTTP to third-party servers.[Get regularly scheduled insights by signing up for Network World newsletters.] After an initial dormant period of up to two weeks, the Trojan retrieves and executes commands, called jobs, that include the ability to transfer files, execute files, profile the system, reboot, and disable system services. In short, a total takeover of the machine.To read this article in full, please click here

SolarWinds roundup: Fixes, new bad actors, and what the company knew

The SolarWinds Orion security breach is unfolding at a rapid pace, and the number of vendors and victims continues to grow. Each day brings new revelations as to its reach and depth. Of particular concern are the rate of infection and impact on government systems.In case you missed it, a backdoor was found in the SolarWinds Orion IT monitoring and management software. A dynamic link library called SolarWinds.Orion.Core.BusinessLayer.dll, a SolarWinds digitally-signed component of the Orion software framework, was found to contain a backdoor that communicates via HTTP to third-party servers.[Get regularly scheduled insights by signing up for Network World newsletters.] After an initial dormant period of up to two weeks, the Trojan retrieves and executes commands, called jobs, that include the ability to transfer files, execute files, profile the system, reboot, and disable system services. In short, a total takeover of the machine.To read this article in full, please click here

SolarWinds roundup: Fixes, new bad actors, and the company knew

The SolarWinds Orion security breach is unfolding at a rapid pace and the number of vendors and victims continues to grow. Each day brings new revelations as to its reach and depth. Of particular concern is the rate of infection and impact on government systems.In case you missed it, a backdoor was found in the SolarWinds Orion IT monitoring and management software. A dynamic link library called SolarWinds.Orion.Core.BusinessLayer.dll, a SolarWinds digitally-signed component of the Orion software framework was found to contain a backdoor that communicates via HTTP to third-party servers.[Get regularly scheduled insights by signing up for Network World newsletters.] After an initial dormant period of up to two weeks, the Trojan retrieves and executes commands, called jobs, that include the ability to transfer files, execute files, profile the system, reboot, and disable system services. In short, a total takeover of the machine.To read this article in full, please click here

Integrating Cloudflare Gateway and Access

Integrating Cloudflare Gateway and Access

We’re excited to announce that you can now set up your Access policies to require that all user traffic to your application is filtered by Cloudflare Gateway. This ensures that all of the traffic to your self-hosted and SaaS applications is secured and centrally logged. You can also use this integration to build rules that determine which users can connect to certain parts of your SaaS applications, even if the application does not support those rules on its own.

Stop threats from returning to your applications and data

We built Cloudflare Access as an internal project to replace our own VPN. Unlike a traditional private network, Access follows a Zero Trust model. Cloudflare’s edge checks every request to protected resources for identity and other signals like device posture (i.e., information about a user’s machine, like Operating system version, if antivirus is running, etc.).

By deploying Cloudflare Access, our security and IT teams could build granular rules for each application and log every request and event. Cloudflare’s network accelerated how users connected. We launched Access as a product for our customers in 2018 to share those improvements with teams of any size.

Integrating Cloudflare Gateway and Access

Over the last two years, we Continue reading

SASE check list: 7 key evaluation criteria

The marriage of networking and security into the secure-access service edge stands to improve application performance, reduce infrastructure complexity, and protect sensitive data, and as such SASE is an attractive architecture for enterprises large and small.Due to the newness of SASE offerings, though, providers are still building and refining the features of their services, so available offerings are complex, often incomplete and require integration with customer organizations’ existing network and security architectures.To read this article in full, please click here