#distributed router
Explore tagged Tumblr posts
Text
Service Router vs Distributed Router in NSX-T (aka NSX 4.x)
In VMware NSX-T, both Service Router (SR) and Distributed Router (DR) are integral components of the networking architecture that play distinct roles in providing routing and connectivity within the virtualized network environment. Let’s delve into the differences between these two router types: Service Router (SR): Role: The Service Router is a centralized routing component that provides…
View On WordPress
0 notes
Text
glad to see the pokespe tradition of "incorporate every key item, no matter how obscure, into the main narrative" continues
#pokespe liveblog#one thing about dppt is that they Loved their key item events#also fun fact! i remember being so excited for when they did the oak's letter distribution over wifi#because as a kid our internet was So Super Bad and my ds wouldn't connect so i missed out on the darkrai event#but we got a new router around the time of this distribution and it worked and this was my first legit wifi event. many fond memories#(i later hacked in the member's card with an action replay but oak's letter was legit)
2 notes
·
View notes
Text
BLIIoT specializes in Industrial IoT Gateways, PLC Gateways, 4G Industrial Edge Router, SMS/4G RTU, Ethernet IO Module, Distributed I/O Module, ARM Industrial Computer, X86 Industrial Compter etc. OEM ODM Since 2005.
More than 200 patents, software and certification. BLIIoT Technology Make IIoT More Easier. https://www.bliiot.com/
#bliiot#bliiotsolution#iot#iiot#iot gateway#industrial edge router#io module#distributed io module#Ethernet IO Module#industrial computer#RTU#Alarm controller
0 notes
Text
African poverty is partly a consequence of energy poverty. In every other continent the vast majority of people have access to electricity. In Africa 600m people, 43% of the total, cannot readily light their homes or charge their phones. And those who nominally have grid electricity find it as reliable as a Scottish summer. More than three-quarters of African firms experience outages; two-fifths say electricity is the main constraint on their business.
If other sub-Saharan African countries had enjoyed power as reliable as South Africa’s from 1995 to 2007, then the continent’s rate of real GDP growth per person would have been two percentage points higher, more than doubling the actual rate, according to one academic paper. Since then South Africa has also had erratic electricity. So-called “load-shedding” is probably the main reason why the economy has shrunk in four of the past eight quarters.
Solar power is increasingly seen as the solution. Last year Africa installed a record amount of photovoltaic (PV) capacity (though this still made up just 1% of the total added worldwide), notes the African Solar Industry Association (AFSIA), a trade group. Globally most solar PV is built by utilities, but in Africa 65% of new capacity over the past two years has come from large firms contracting directly with developers. These deals are part of a decentralised revolution that could be of huge benefit to African economies.
Ground zero for the revolution is South Africa. Last year saw a record number of blackouts imposed by Eskom, the state-run utility, whose dysfunctional coal-fired power stations regularly break down or operate at far below capacity. Fortunately, as load-shedding was peaking, the costs of solar systems were plummeting.
Between 2019 and 2023 the cost of panels fell by 15%, having already declined by almost 90% in the 2010s. Meanwhile battery storage systems now cost about half as much as five years ago. Industrial users pay 20-40% less per unit when buying electricity from private project developers than on the cheapest Eskom tariff.
In the past two calendar years the amount of solar capacity in South Africa rose from 2.8GW to 7.8GW, notes AFSIA, excluding that installed on the roofs of suburban homes. All together South Africa’s solar capacity could now be almost a fifth of that of Eskom’s coal-fired power stations (albeit those still have a higher “capacity factor”, or ability to produce electricity around the clock). The growth of solar is a key reason why there has been less load-shedding in 2024...
Over the past decade the number of startups providing “distributed renewable energy” (DRE) has grown at a clip. Industry estimates suggest that more than 400m Africans get electricity from solar home systems and that more than ten times as many “mini-grids”, most of which use solar, were built in 2016-20 than in the preceding five years. In Kenya DRE firms employ more than six times as many people as the largest utility. In Nigeria they have created almost as many jobs as the oil and gas industry.
“The future is an extremely distributed system to an extent that people haven’t fully grasped,” argues Matthew Tilleard of CrossBoundary Group, a firm whose customers range from large businesses to hitherto unconnected consumers. “It’s going to happen here in Africa first and most consequentially.”
Ignite, which operates in nine African countries, has products that include a basic panel that powers three light bulbs and a phone charger, as well as solar-powered irrigation pumps, stoves and internet routers, and industrial systems. Customers use mobile money to “unlock” a pay-as-you-go meter.
Yariv Cohen, Ignite’s CEO, reckons that the typical $3 per month spent by consumers is less than what they previously paid for kerosene and at phone-charging kiosks. He describes how farmers are more productive because they do not have to get home before dark and children are getting better test scores because they study under bulbs. One family in Rwanda used to keep their two cows in their house because they feared rustlers might come in the dark; now the cattle snooze al fresco under an outside lamp and the family gets more sleep.
...That is one eye-catching aspect of Africa’s solar revolution. But most of the continent is undergoing a more subtle—and significant—experiment in decentralised, commercially driven solar power. It is a trend that could both transform African economies and offer lessons to the rest of the world."
-via The Economist, June 18, 2024. Paragraph breaks added.
#one of the biggest stories of this century is going to be the story of the African Renaissance#I promise you#well preferably they'll come up with a non-European term for it lol#but trust me it WILL happen and it will be SO good to see#africa#south africa#nigeria#kenya#solar#solar power#solar panels#solar pv#energy#clean energy#poverty#electrification#distributed energy#electricity#infrastructure#hope#solarpunk#good news#solar age#<- making that a tag now
416 notes
·
View notes
Text
In a world not yet healed but slightly better than ours schools could have entire courses that consisted of like. learning how to repair a computer, both the hardware and software. installing your first linux distribution. how to safely torrent something and share a file. How to crack open a game file and make a slight adjustment for your personal pleasure. How to configure and secure a router. Basic computer literacy stuff that's getting lost in the shuffle of walled garden consumer technology.
#it would if demographics have held consistent since my high school days consist largely of nerd boys and soon to be former nerd boys.#and that's unfortunate because these are the sort of skills that should be pretty universal.#but this is meant to be a very grounded fantasy
19 notes
·
View notes
Text
ok since i've been sharing some piracy stuff i'll talk a bit about how my personal music streaming server is set up. the basic idea is: i either buy my music on bandcamp or download it on soulseek. all of my music is stored on an external hard drive connected to a donated laptop that's next to my house's internet router. this laptop is always on, and runs software that lets me access and stream my any song in my collection to my phone or to other computers. here's the detailed setup:
my home server is an old thinkpad laptop with a broken keyboard that was donated to me by a friend. it runs yunohost, a linux distribution that makes it simpler to reuse old computers as servers in this way: it gives you a nice control panel to install and manage all kinds of apps you might want to run on your home server, + it handles the security part by having a user login page & helping you install an https certificate with letsencrypt.
***
to stream my music collection, i use navidrome. this software is available to install from the yunohost control panel, so it's straightforward to install. what it does is take a folder with all your music and lets you browse and stream it, either via its web interface or through a bunch of apps for android, ios, etc.. it uses the subsonic protocol, so any app that says it works with subsonic should work with navidrome too.
***
to listen to my music on my phone, i use DSub. It's an app that connects to any server that follows the subsonic API, including navidrome. you just have to give it the address of your home server, and your username and password, and it fetches your music and allows you to stream it. as mentionned previously, there's a bunch of alternative apps for android, ios, etc. so go take a look and make your pick. i've personally also used and enjoyed substreamer in the past. here are screenshots of both:
***
to listen to my music on my computer, i use tauon music box. i was a big fan of clementine music player years ago, but it got abandoned, and the replacement (strawberry music player) looks super dated now. tauon is very new to me, so i'm still figuring it out, but it connects to subsonic servers and it looks pretty so it's fitting the bill for me.
***
to download new music onto my server, i use slskd which is a soulseek client made to run on a web server. soulseek is a peer-to-peer software that's found a niche with music lovers, so for anything you'd want to listen there's a good chance that someone on soulseek has the file and will share it with you. the official soulseek client is available from the website, but i'm using a different software that can run on my server and that i can access anywhere via a webpage, slskd. this way, anytime i want to add music to my collection, i can just go to my server's slskd page, download the files, and they directly go into the folder that's served by navidrome.
slskd does not have a yunohost package, so the trick to make it work on the server is to use yunohost's reverse proxy app, and point it to the http port of slskd 127.0.0.1:5030, with the path /slskd and with forced user authentification. then, run slskd on your server with the --url-base slskd, --no-auth (it breaks otherwise, so it's best to just use yunohost's user auth on the reverse proxy) and --no-https (which has no downsides since the https is given by the reverse proxy anyway)
***
to keep my music collection organized, i use beets. this is a command line software that checks that all of the tags on your music are correct and puts the file in the correct folder (e.g. artist/album/01 trackname.mp3). it's a pretty complex program with a ton of features and settings, i like it to make sure i don't have two copies of the same album in different folders, and to automatically download the album art and the lyrics to most tracks, etc. i'm currently re-working my config file for beets, but i'd be happy to share if someone is interested.
that's my little system :) i hope it gives the inspiration to someone to ditch spotify for the new year and start having a personal mp3 collection of their own.
25 notes
·
View notes
Text
the year is 2048. a smiling young farmer in a power wheelchair sells me the biggest bag of muesli I've ever seen out of a market stall built from repurposed drone parts. he sees the toys in my reusable bag and insists on throwing in some homemade cat treats “on the house”. I get an email from the wind farm: they've deposited another $20 in my account for using up excess electricity outside peak hours, so I decide to splurge on some flavoured honey and boba tea. I tell the barista I feel like a billionaire today and she smiles politely and asks me what a “billionaire” is. I run into an old friend handing out free insulin packets and we spend some time catching up. I've got a new gig at the organ printing depot and she's on rotating job assignments with the Workers' Cooperative: this month is insulin distribution, last month was reprogramming robot dogs as automated planters for the pollinator farm, next month she'll be on a work crew converting the old football stadium into a greenhouse. She's been sleeping in the park (by choice, of course, the local housing co-op has tons of suites open) but the climate bureau is cloud seeding this weekend and we're expecting a lot of rain. I invite her to crash at my place. She smiles and says she would like that. Our trolley ride home is briefly halted by an impromptu pride parade and the sun is setting as we pass the ivy-covered sign advertising the golf course that once existed where my neighbourhood now stands. A friendly technician explains she's just finished replacing the faulty router on our block so we can use the public WiFi again. I start a fire in the fireplace and sort through some mail: a postcard from one of my exes in Hawaii installing carbon dioxide scrubbers that double as frog habitats, a flyer for a music recital at the rehab clinic, and a letter from International Blood Services declining my donation because they are fully stocked. I ask my Global Music Archive uplink to select a random decade, country and genre and it starts a playlist while the two of us snuggle together on the couch under a hand-knitted blanket and my cat makes biscuits on top. On TV, a newscaster says global temperatures are at their lowest point in the last 40 years. I flip channels to some standup comedian saying kids these days don't know how to conceal when they're high because there's no cops anymore. We laugh until the rain softly falling on the roof lulls us to sleep.
#microfiction#hope for the future#a post by me™#this deserved its own post i hope it brightens someone's day
49 notes
·
View notes
Text
The Federal Bureau of Investigation (FBI), Cyber National Mission Force (CNMF), and National Security Agency (NSA) assess that People’s Republic of China (PRC)-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home office (SOHO) routers, firewalls, network-attached storage (NAS) and Internet of Things (IoT) devices with the goal of creating a network of compromised nodes (a “botnet”) positioned for malicious activity. The actors may then use the botnet as a proxy to conceal their identities while deploying distributed denial of service (DDoS) attacks or compromising targeted U.S. networks.
Integrity Technology Group, a PRC-based company, has controlled and managed a botnet active since mid- 2021. The botnet has regularly maintained between tens to hundreds of thousands of compromised devices. As of June 2024, the botnet consisted of over 260,000 devices. Victim devices part of the botnet have been observed in North America, South America, Europe, Africa, Southeast Asia and Australia.
While devices aged beyond their end-of-life dates are known to be more vulnerable to intrusion, many of the compromised devices in the Integrity Tech controlled botnet are likely still supported by their respective vendors.
FBI, CNMF, NSA, and allied partners are releasing this Joint Cyber Security Advisory to highlight the threat posed by these actors and their botnet activity and to encourage exposed device vendors, owners, and operators to update and secure their devices from being compromised and joining the botnet. Network defenders are advised to follow the guidance in the mitigations section to protect against the PRC-linked cyber actors’ botnet activity. Cyber security companies can also leverage the information in this advisory to assist with identifying malicious activity and reducing the number of devices present in botnets worldwide.
For additional information, see U.S. Department of Justice (DOJ) press release....
4 notes
·
View notes
Text
You make a thousand copies before breakfast. That doesn't make you part of the entertainment industry.
This is the LAST WEEKEND to back the Kickstarter campaign for the audiobook of my next novel, The Lost Cause. These kickstarters are how I pay my bills, which lets me publish my free essays nearly every day. If you enjoy my work, please consider backing!
Back when every book had a printing press in its history, every record a record-pressing plant, every film a film-lab, “making or handling copies of creative works” was a pretty good test to determine whether someone was part of the entertainment industry. Even if it turned out they weren’t, the kind of person who has a record-pressing plant can afford to consult an expert to make sure they’re on the right side of the law.
But a funny thing happened on the way to the 21st Century. We started using computers for everything. And computers work by making copies.
The mere act of reading this article created dozens — if not hundreds — of copies of it. These copies flashed in and out of existence in network buffers, switches and routers, graphics buffers and RAM, in multiple content distribution network caches and in your browser’s cache.
You make a thousand copies before breakfast. That doesn’t make you part of the entertainment industry.
It’s a near-dead-certainty that much of what you do violates the black letter of copyright law. We could simplify copyright until everyone who uses the internet for anything could easily grasp its contours and stay within them. But any copyright that is made simple enough for kids doing their homework and people using a dating site to follow would be way too crude for me and the various parties in my supply chain to follow.
-The Internet's Original Sin
My next novel is The Lost Cause, a hopeful novel of the climate emergency. Amazon won't sell the audiobook, so I made my own and I'm pre-selling it on Kickstarter!
25 notes
·
View notes
Text
The Darkweb: Exploring the hidden crimes of the Internet
The Dark Web is a complex and often misunderstood segment of the internet, shrouded in secrecy and notorious for its association with illegal activities. This hidden part of the web, accessible only through specialised software like Tor (The Onion Router), allows users to navigate anonymously, which has fostered both legitimate and illicit uses. The Dark Web is a subset of the Deep Web, which itself constitutes about 90% of the internet not indexed by traditional search engines. While most users interact with the Surface Web, the Deep Web includes private databases and secure sites, whereas the Dark Web is specifically designed for anonymity and privacy. The Dark Web emerged from projects aimed at ensuring secure communication, originally developed by the U.S. Department of Defence in the early 2000s. [1] [2]
Hidden Crimes in the Dark Web
The anonymity offered by the dark web has made it a hub for numerous forms of criminal activity. From illegal marketplaces to cybercrime forums, this underworld of the internet is teeming with hidden dangers.
Illicit Markets and Drug Trade
One of the most notorious aspects of the dark web is its marketplace for illegal goods. Websites like the now-defunct Silk Road offered a platform where users could buy and sell illegal drugs, firearms, stolen goods, and counterfeit documents. These black markets are often operated using cryptocurrencies such as Bitcoin to further mask identities and ensure untraceable transactions.According to a 2019 study by the European Monitoring Centre for Drugs and Drug Addiction, the dark web drug trade has grown exponentially, with millions of dollars' worth of drugs being sold monthly across various platforms . [3] [4]
2. Cybercrime and Hacking Services
The dark web also serves as a marketplace for cybercriminals. Hacking tools, ransomware-as-a-service, and stolen data are regularly exchanged in these hidden corners of the internet. Criminals offer services ranging from DDoS attacks to the sale of stolen credit card information and personal identities. Some forums even provide tutorials for novice hackers looking to learn cybercrime techniques. [5]
3. Human Trafficking and Exploitation
While less publicly discussed, the dark web has been linked to disturbing trends in human trafficking and child exploitation. Illegal forums allow criminals to sell services or even traffic victims, relying on the secrecy provided by encryption and anonymity transactions. These criminal activities often occur alongside other heinous content like child abuse imagery, which is tragically prevalent in certain corners of the dark web . [5]
4.Weapons and Assassination-for-Hire
Another dark aspect of the dark web is the sale of illegal firearms, explosives, and even assassination services. Websites provide arms to buyers without the restrictions and regulations of the surface web. Though some claims of hitmen-for-hire on the dark web have been debunked as scams, the sale of illicit firearms remains a significant concern for global law enforcement agencies .
Top 5 Notorious Cases on the Dark Web
(Content Warning: This list includes some horrifying incidents and scary dark web stories. We suggest you skip entries if you’re faint of heart or suffering from any type of anxiety or stress disorder.)
1. Banmeet Singh’s $100M+ dark web drug empire gets brought to light
Starting with a fairly recent case, Banmeet Singh of Haldwani, Northern India was sentenced to eight years in prison in late January 2024 after he was found to have created and led a multi-million dollar drug enterprise.The Indian national also forfeited $150 million in cryptocurrency. This proved to be illegal drug money that was laundered into cryptocurrency. Singh used various dark web marketplaces to create his drug empire. According to the U.S. Department of Justice, Singh shipped drugs from Europe to eight distribution centers in the US. After, these were transported to and sold in all 50 US states and other countries in the Americas. Singh was arrested in London, where he was residing in 2019. In 2023, he was extradited to the US. [7]
2. Operation Dark hunTor results in 150 arrests in nine countries
We’re moving from one multi-million-dollar illegal contraband case to the next. In 2021, Euro pol, Eurojust, and the police forces of nine countries conducted one of the biggest anti-crime operations the dark web has ever seen: Dark hunter. This operation resulted in 150 arrests across Australia, Bulgaria, France, Germany, Italy, the Netherlands, Switzerland, the United Kingdom, and the United States. All of the arrested were allegedly involved in buying or selling illegal goods on the dark web. The authorities found some articles in the possession of the arrested that strengthened their case: EUR 26.7 million (USD 31 million) in cash and virtual currencies, 234 kg of drugs, and 45 firearms.Italian authorities also managed to close down two dark web markets that boasted over 100,000 listings for illegal goods, DeepSea and Berlusconi. [7]
3. Operation DisrupTor exposes a dark web drugs distribution center
Amid the Covid pandemic, most businesses were struggling. Meanwhile, Operation DisrupTor suggests the drug business was still prospering. In February 2020, a group of FBI agents found 50 pounds of methamphetamine and thousands of Adderall pills in a storage shed in Los Angeles. The drugs, and the firearms that were also found, belonged to a crime network that had completed over 18,000 drug sales on the dark web. The criminal syndicate hid the drugs in a shed that they had made to look like a legitimate mail-order business. Their dark web drug sales included shipments to other dark net vendors, street dealers, and actual consumers. [7]
WATCH FULL VIDEO [8]
4. Attempt to hire a dark web hitman backfires
Now and then, crazy deep web stories pop up about how easy it is to hire a dark web hitman. One of these urban legends, however, turned out to be true. In February 2024, a woman from Canberra, Australia, pleaded guilty to inciting another to murder. The woman claimed to have contacted a dark web hitman (on the dark web marketplace Sinaloa Cartel) to murder her wealthy parents as part of an inheritance scheme. Supposedly, the total agreed-upon sum for the murder was $20,000, of which she had already paid $6,000 as a downpayment, using Bitcoin. It’s hard to say if the woman was actually talking to a contract killer or a scammer. Let’s just say we’re just happy the Australian court system was on to her before we could find out. While we don’t encourage anyone to go looking for a hitman on the dark web or elsewhere, this case goes to show that even on the dark web and while using crypto, many actions are retraceable. We always recommend people with good intentions to go for maximum privacy, as it’s no one’s business what they’re doing on the dark web. A great way to improve your privacy is by using NordVPN. NordVPN hides your IP address and encrypts your traffic, plus it blocks malicious links. [7]
5. No Love Deep Web takes dark web enthusiasts on a treasure hunt
Back in August of 2012, visitors on the dark web could find clues scattered on the network that led them through a fascinating alternate reality game. Much like Cicada 3031’s 4chan game, the clues led regular users through an array of clever clues set up like a treasure hunt. The dark web game employed a lot of encryption means to hide its hints, including the Caesar cipher, QR codes, Morse code, and a lot of other similar encryption methods. All of the clues were spread around dark websites, and one participant recounts the experience as quite thrilling:
So what was going on? Well, it wasn’t a secret government agency recruiting new members, and it wasn’t a feat of a group of cybercriminals.
Rather, the game was created by the experimental hip-hop group Death Grips to promote their new album, No Love Deep Web. [7]
READ MORE CASES [7]
Law Enforcement and the Fight Against Dark Web Crime
Despite the anonymity and encryption, law enforcement agencies around the world have made significant progress in cracking down on dark web criminality. In 2021, a multinational law enforcement effort, Operation Dark HunTor, led to the arrest of 150 individuals across multiple countries, targeting major drug vendors and illegal marketplaces on the dark web .
Undercover operations, improved digital forensics, and advances in cryptocurrency tracing have given authorities new tools to combat the hidden crimes of the dark web. However, for every takedown, new marketplaces and forums emerge, reflecting the cat-and-mouse dynamic between law enforcement and cybercriminals. [6]
Conclusion
While the dark web itself is not inherently evil, its secrecy has allowed criminals to thrive in ways that are difficult to regulate or even detect. From drug trafficking and cybercrime to human exploitation, the hidden crimes of the dark web reveal a darker side of digital anonymity. As law enforcement and technology continue to evolve, so too will the battle to uncover and combat these underground activities. Nonetheless, the dark web serves as a potent reminder that as technology advances, so too does the need for robust security measures and ethical oversight.
.
.
.
.
sources:
https://www.varutra.com/the-hidden-internet-exploring-the-secrets-of-the-dark-web/
2.https://sopa.tulane.edu/blog/everything-you-should-know-about-dark-web
3. https://www.unsw.edu.au/research/ndarc/news-events/blogs/2016/01/dark-net-drug-marketplaces-begin-to-emulate-organised-street-cri
4. https://www.euda.europa.eu/darknet_en
5. https://www.findlaw.com/criminal/criminal-charges/dark-web-crimes.html
6. https://syntheticdrugs.unodc.org/syntheticdrugs/en/cybercrime/detectandrespond/investigation/darknet.html
7. file:///D:/New%20folder/The%2013%20Most%20Notorious%20Cases%20on%20the%20Dark%20Web.html
8. https://youtu.be/d4NSfrOtMfU?feature=shared
#crime#cyberpunk 2077#cybersecurity#internet#dark web#criminal case#laws#murder mystery#mental health
4 notes
·
View notes
Text
connecting gaza
E-sims for Gaza:
www.disabilityvisibilityproject.com/2023/12/25/crips-for-esims-for-gaza/
Palestinians are using donated eSIM cards to stay in touch with the outside world (Jan 2024, NBC News)
Many of the eSIMs are donated by activists who collect them from donors around the world. Mirna El Helbawi, a 31-year-old Egyptian writer who runs a project called Connecting Gaza, said she has distributed more than 100,000 eSIMs since the war began. www.instagram.com/mirna_elhelbawi
She and other activists use Instagram and X to solicit donors from around the world to purchase eSIMs from international phone carriers. They then pass them to a system of what El Helbawi calls “human routers” across Gaza with functioning eSIMs who can set up their phones as Wi-Fi hot spots to share additional eSIMs with others.
https://www.reuters.com/world/middle-east/desperate-news-gazans-struggle-with-mobile-network-2024-02-02/
https://www.lemonde.fr/en/international/article/2024/02/04/in-gaza-virtual-chips-are-breaking-the-telecommunications-blockade_6493217_4.html
Internet blackouts as weapon (WIRED)
On October 27, Israel reportedly imposed a full internet shutdown in the area, cutting off the last remaining connectivity for about 34 hours as its troops moved into the Gaza Strip. After what’s left of Gaza’s internet access was restored—data shows it stands at around 15 percent or less of usual connectivity—the area has suffered two other, similar connectivity blackouts. The most recent lasted for about 15 hours on Sunday as Israel was carrying out an intense operation to cut off Gaza City in the north from southern Gaza Throughout the Gaza Strip, there are around a dozen internet service providers and cell phone companies that get people online—although cell networks only use 2G technologies, as opposed to the faster 3G, 4G, and 5G connections available across much of Israel. These companies are heavily reliant on Israeli infrastructure to connect to the global internet, with open internet advocacy nonprofit the Internet Society classing Palestine as having “poor” connections to the wider internet. Since the start of the war, mobile and internet providers’ offices, cables, and cell towers have been destroyed. Many are now totally offline.
6 notes
·
View notes
Text
Ansible Collections: Extending Ansible’s Capabilities
Ansible is a powerful automation tool used for configuration management, application deployment, and task automation. One of the key features that enhances its flexibility and extensibility is the concept of Ansible Collections. In this blog post, we'll explore what Ansible Collections are, how to create and use them, and look at some popular collections and their use cases.
Introduction to Ansible Collections
Ansible Collections are a way to package and distribute Ansible content. This content can include playbooks, roles, modules, plugins, and more. Collections allow users to organize their Ansible content and share it more easily, making it simpler to maintain and reuse.
Key Features of Ansible Collections:
Modularity: Collections break down Ansible content into modular components that can be independently developed, tested, and maintained.
Distribution: Collections can be distributed via Ansible Galaxy or private repositories, enabling easy sharing within teams or the wider Ansible community.
Versioning: Collections support versioning, allowing users to specify and depend on specific versions of a collection. How to Create and Use Collections in Your Projects
Creating and using Ansible Collections involves a few key steps. Here’s a guide to get you started:
1. Setting Up Your Collection
To create a new collection, you can use the ansible-galaxy command-line tool:
ansible-galaxy collection init my_namespace.my_collection
This command sets up a basic directory structure for your collection:
my_namespace/
└── my_collection/
├── docs/
├── plugins/
│ ├── modules/
│ ├── inventory/
│ └── ...
├── roles/
├── playbooks/
├── README.md
└── galaxy.yml
2. Adding Content to Your Collection
Populate your collection with the necessary content. For example, you can add roles, modules, and plugins under the respective directories. Update the galaxy.yml file with metadata about your collection.
3. Building and Publishing Your Collection
Once your collection is ready, you can build it using the following command:
ansible-galaxy collection build
This command creates a tarball of your collection, which you can then publish to Ansible Galaxy or a private repository:
ansible-galaxy collection publish my_namespace-my_collection-1.0.0.tar.gz
4. Using Collections in Your Projects
To use a collection in your Ansible project, specify it in your requirements.yml file:
collections:
- name: my_namespace.my_collection
version: 1.0.0
Then, install the collection using:
ansible-galaxy collection install -r requirements.yml
You can now use the content from the collection in your playbooks:--- - name: Example Playbook hosts: localhost tasks: - name: Use a module from the collection my_namespace.my_collection.my_module: param: value
Popular Collections and Their Use Cases
Here are some popular Ansible Collections and how they can be used:
1. community.general
Description: A collection of modules, plugins, and roles that are not tied to any specific provider or technology.
Use Cases: General-purpose tasks like file manipulation, network configuration, and user management.
2. amazon.aws
Description: Provides modules and plugins for managing AWS resources.
Use Cases: Automating AWS infrastructure, such as EC2 instances, S3 buckets, and RDS databases.
3. ansible.posix
Description: A collection of modules for managing POSIX systems.
Use Cases: Tasks specific to Unix-like systems, such as managing users, groups, and file systems.
4. cisco.ios
Description: Contains modules and plugins for automating Cisco IOS devices.
Use Cases: Network automation for Cisco routers and switches, including configuration management and backup.
5. kubernetes.core
Description: Provides modules for managing Kubernetes resources.
Use Cases: Deploying and managing Kubernetes applications, services, and configurations.
Conclusion
Ansible Collections significantly enhance the modularity, distribution, and reusability of Ansible content. By understanding how to create and use collections, you can streamline your automation workflows and share your work with others more effectively. Explore popular collections to leverage existing solutions and extend Ansible’s capabilities in your projects.
For more details click www.qcsdclabs.com
#redhatcourses#information technology#linux#containerorchestration#container#kubernetes#containersecurity#docker#dockerswarm#aws
2 notes
·
View notes
Text
Also idea: Program that checks your router and hacks into any IoT devices to make a distributed computer network. Computer running slow? Just distribute some of the workload to your fucking fridge!
2 notes
·
View notes
Text
Multiprotocol Label Switching (MPLS)
Multiprotocol Label Switching (MPLS) adalah sebuah teknologi jaringan yang digunakan untuk memindahkan lalu lintas data dari suatu titik ke titik lain dalam jaringan secara cepat dan efisien. MPLS menggabungkan beberapa teknologi jaringan seperti circuit switching dan packet switching sehingga memungkinkan jaringan untuk memprioritaskan lalu lintas data berdasarkan jenis aplikasi atau kepentingannya dalam suatu jaringan.
Dalam MPLS, setiap paket data yang masuk ke dalam jaringan diberi label atau tanda khusus yang menunjukkan rute yang harus diambil untuk mencapai tujuan akhir. Dengan cara ini, MPLS dapat memindahkan data dengan lebih cepat karena tidak perlu melakukan routing paket secara terus-menerus saat melewati setiap node jaringan. Selain itu, MPLS juga dapat memprioritaskan lalu lintas data yang lebih penting seperti video atau voice call untuk memastikan kualitas layanan yang lebih baik.
MPLS tidak mengharuskan suatu topologi jaringan tertentu karena MPLS bekerja di lapisan 2 dan 3 dalam model referensi OSI, sehingga dapat diimplementasikan pada berbagai topologi jaringan seperti ring, mesh, dan star. Namun, untuk mengilustrasikan contoh konfigurasi MPLS, berikut adalah topologi jaringan dasar yang menggunakan MPLS:
Pada topologi di atas, CE1 dan CE2 adalah customer edge routers yang terhubung ke provider edge routers PE1 dan PE2 melalui jalur Layer 2 atau Layer 3. Jalur ini disebut Virtual Private Wire Service (VPWS) untuk koneksi Layer 2 atau Virtual Private Network (VPN) untuk koneksi Layer 3. PE1 dan PE2 kemudian terhubung ke router core atau P routers, seperti P1 dan P2.
Untuk mengkonfigurasi MPLS pada topologi ini, beberapa langkah dasar yang perlu dilakukan adalah sebagai berikut:
Aktifkan fitur MPLS pada semua router di jaringan, yaitu CE1, CE2, PE1, PE2, P1, dan P2.
Atur label distribution protocol (LDP) pada semua router agar dapat saling mengenal dan membagikan label.
Terapkan label pada semua prefix (network address) di setiap router menggunakan LDP.
Atur penunjukan jalur (path) menggunakan label yang diberikan oleh LDP.
Terapkan MPLS traffic engineering jika diperlukan untuk memprioritaskan lalu lintas jaringan yang penting.
Langkah-langkah tersebut dapat diimplementasikan dengan menggunakan perangkat lunak router vendor tertentu, seperti Cisco IOS atau Juniper JunOS, yang biasanya memiliki konfigurasi MPLS yang mudah digunakan dan dipahami. Namun, karena MPLS merupakan teknologi jaringan yang kompleks, diperlukan pengetahuan dan pengalaman yang cukup untuk mengkonfigurasikannya dengan benar.
3 notes
·
View notes
Text
Stop calling it Jailbreaking
Jailbreaking vs. Softmodding: Unleashing Hardware Potential
Jailbreaking and softmodding both involve modifying electronic devices to access additional functionalities or install custom software. However, the distinction lies in the devices being modified. Jailbreaking typically refers to the act of bypassing software restrictions on mobile devices like iPhones or iPads, while softmodding pertains to modifying game consoles, routers, or other hardware devices.
The Misleading and Lazy Nature of the term: “Jailbreaking"
Calling the act of modifying software "jailbreaking" can be misleading and oversimplified. Originally coined for bypassing restrictions on iOS devices, the term "jailbreaking" implies a sense of unlawfulness or hacking, which may not accurately reflect the intentions of those engaging in hardware modifications. By using this term, we perpetuate the idea that such modifications are inherently illegal or malicious, disregarding the legitimate motivations and benefits that come with expanding hardware capabilities with unofficial software modifications.
Embrace Official Softmodding Community Guides
When venturing into the world of software modifications, it is essential to rely on official softmodding community guides rather than following generic video tutorials. Community guides provide a comprehensive understanding of the process, ensuring that users are informed about potential risks, compatibility issues, and the best practices for achieving desired results.
Official community guides are developed and maintained by experienced individuals who have extensive knowledge of the specific hardware and software involved. They are more likely to provide accurate and up-to-date information, minimizing the risk of encountering outdated or incorrect instructions. Since videos are an “edit-once, post-once”- medium of information distribution- and rely on one sole source of knowledge, its bound to be out of date. You also have to assume that the person in the video is not omitting any crucial information- and leaving out core parts/concepts of the softmod process
Joining an official softmodding community allows individuals to connect with like-minded enthusiasts who can offer guidance, answer questions, and provide assistance throughout the process. This collaborative environment fosters a sense of community and ensures that users have access to reliable support when encountering challenges.
Following official guides reduces the risk of unintentional damage to the hardware or compromising its functionality. These guides often include safety precautions, warnings, and troubleshooting tips to ensure a smooth and successful softmodding experience.
Some official community maintained softmod guides:
2 notes
·
View notes
Text
This Week in Rust 510
Hello and welcome to another issue of This Week in Rust! Rust is a programming language empowering everyone to build reliable and efficient software. This is a weekly summary of its progress and community. Want something mentioned? Tag us at @ThisWeekInRust on Twitter or @ThisWeekinRust on mastodon.social, or send us a pull request. Want to get involved? We love contributions.
This Week in Rust is openly developed on GitHub and archives can be viewed at this-week-in-rust.org. If you find any errors in this week's issue, please submit a PR.
Updates from Rust Community
Official
Announcing Rust 1.72.0
Change in Guidance on Committing Lockfiles
Cargo changes how arrays in config are merged
Seeking help for initial Leadership Council initiatives
Leadership Council Membership Changes
Newsletters
This Week in Ars Militaris VIII
Project/Tooling Updates
rust-analyzer changelog #196
The First Stable Release of a Memory Safe sudo Implementation
We're open-sourcing the library that powers 1Password's ability to log in with a passkey
ratatui 0.23.0 is released! (official successor of tui-rs)
Zellij 0.38.0: session-manager, plugin infra, and no more offensive session names
Observations/Thoughts
The fastest WebSocket implementation
Rust Malware Staged on Crates.io
ESP32 Standard Library Embedded Rust: SPI with the MAX7219 LED Dot Matrix
A JVM in Rust part 5 - Executing instructions
Compiling Rust for .NET, using only tea and stubbornness!
Ad-hoc polymorphism erodes type-safety
How to speed up the Rust compiler in August 2023
This isn't the way to speed up Rust compile times
Rust Cryptography Should be Written in Rust
Dependency injection in Axum handlers. A quick tour
Best Rust Web Frameworks to Use in 2023
From tui-rs to Ratatui: 6 Months of Cooking Up Rust TUIs
[video] Rust 1.72.0
[video] Rust 1.72 Release Train
Rust Walkthroughs
[series] Distributed Tracing in Rust, Episode 3: tracing basics
Use Rust in shell scripts
A Simple CRUD API in Rust with Cloudflare Workers, Cloudflare KV, and the Rust Router
[video] base64 crate: code walkthrough
Miscellaneous
Interview with Rust and operating system Developer Andy Python
Leveraging Rust in our high-performance Java database
Rust error message to fix a typo
[video] The Builder Pattern and Typestate Programming - Stefan Baumgartner - Rust Linz January 2023
[video] CI with Rust and Gitlab Selfhosting - Stefan Schindler - Rust Linz July 2023
Crate of the Week
This week's crate is dprint, a fast code formatter that formats Markdown, TypeScript, JavaScript, JSON, TOML and many other types natively via Wasm plugins.
Thanks to Martin Geisler for the suggestion!
Please submit your suggestions and votes for next week!
Call for Participation
Always wanted to contribute to open-source projects but did not know where to start? Every week we highlight some tasks from the Rust community for you to pick and get started!
Some of these tasks may also have mentors available, visit the task page for more information.
Hyperswitch - add domain type for client secret
Hyperswitch - deserialization error exposes sensitive values in the logs
Hyperswitch - move redis key creation to a common module
mdbook-i18n-helpers - Write tool which can convert translated files back to PO
mdbook-i18n-helpers - Package a language selector
mdbook-i18n-helpers - Add links between translations
Comprehensive Rust - Link to correct line when editing a translation
Comprehensive Rust - Track the number of times the redirect pages are visited
RustQuant - Jacobian and Hessian matrices support.
RustQuant - improve Graphviz plotting of autodiff computational graphs.
RustQuant - bond pricing implementation.
RustQuant - implement cap/floor pricers.
RustQuant - Implement Asian option pricers.
RustQuant - Implement American option pricers.
release-plz - add ability to mark Gitea/GitHub release as draft
zerocopy - CI step "Set toolchain version" is flaky due to network timeouts
zerocopy - Implement traits for tuple types (and maybe other container types?)
zerocopy - Prevent panics statically
zerocopy - Add positive and negative trait impl tests for SIMD types
zerocopy - Inline many trait methods (in zerocopy and in derive-generated code)
datatest-stable - Fix quadratic performance with nextest
Ockam - Use a user-friendly name for the shared services to show it in the tray menu
Ockam - Rename the Port to Address and support such format
Ockam - Ockam CLI should gracefully handle invalid state when initializing
css-inline - Update cssparser & selectors
css-inline - Non-blocking stylesheet resolving
css-inline - Optionally remove all class attributes
If you are a Rust project owner and are looking for contributors, please submit tasks here.
Updates from the Rust Project
366 pull requests were merged in the last week
reassign sparc-unknown-none-elf to tier 3
wasi: round up the size for aligned_alloc
allow MaybeUninit in input and output of inline assembly
allow explicit #[repr(Rust)]
fix CFI: f32 and f64 are encoded incorrectly for cross-language CFI
add suggestion for some #[deprecated] items
add an (perma-)unstable option to disable vtable vptr
add comment to the push_trailing function
add note when matching on tuples/ADTs containing non-exhaustive types
add support for ptr::writes for the invalid_reference_casting lint
allow overwriting ExpnId for concurrent decoding
avoid duplicate large_assignments lints
contents of reachable statics is reachable
do not emit invalid suggestion in E0191 when spans overlap
do not forget to pass DWARF fragment information to LLVM
ensure that THIR unsafety check is done before stealing it
emit a proper diagnostic message for unstable lints passed from CLI
fix races conditions with SyntaxContext decoding
fix waiting on a query that panicked
improve note for the invalid_reference_casting lint
include compiler flags when you break rust;
load include_bytes! directly into an Lrc
make Sharded an enum and specialize it for the single thread case
make rustc_on_unimplemented std-agnostic for alloc::rc
more precisely detect cycle errors from type_of on opaque
point at type parameter that introduced unmet bound instead of full HIR node
record allocation spans inside force_allocation
suggest mutable borrow on read only for-loop that should be mutable
tweak output of to_pretty_impl_header involving only anon lifetimes
use the same DISubprogram for each instance of the same inlined function within a caller
walk through full path in point_at_path_if_possible
warn on elided lifetimes in associated constants (ELIDED_LIFETIMES_IN_ASSOCIATED_CONSTANT)
make RPITITs capture all in-scope lifetimes
add stable for Constant in smir
add generics_of to smir
add smir predicates_of
treat StatementKind::Coverage as completely opaque for SMIR purposes
do not convert copies of packed projections to moves
don't do intra-pass validation on MIR shims
MIR validation: reject in-place argument/return for packed fields
disable MIR SROA optimization by default
miri: automatically start and stop josh in rustc-pull/push
miri: fix some bad regex capture group references in test normalization
stop emitting non-power-of-two vectors in (non-portable-SIMD) codegen
resolve: stop creating NameBindings on every use, create them once per definition instead
fix a pthread_t handle leak
when terminating during unwinding, show the reason why
avoid triple-backtrace due to panic-during-cleanup
add additional float constants
add ability to spawn Windows process with Proc Thread Attributes | Take 2
fix implementation of Duration::checked_div
hashbrown: allow serializing HashMaps that use a custom allocator
hashbrown: change & to &mut where applicable
hashbrown: simplify Clone by removing redundant guards
regex-automata: fix incorrect use of Aho-Corasick's "standard" semantics
cargo: Very preliminary MSRV resolver support
cargo: Use a more compact relative-time format
cargo: Improve TOML parse errors
cargo: add support for target.'cfg(..)'.linker
cargo: config: merge lists in precedence order
cargo: create dedicated unstable flag for asymmetric-token
cargo: set MSRV for internal packages
cargo: improve deserialization errors of untagged enums
cargo: improve resolver version mismatch warning
cargo: stabilize --keep-going
cargo: support dependencies from registries for artifact dependencies, take 2
cargo: use AND search when having multiple terms
rustdoc: add unstable --no-html-source flag
rustdoc: rename typedef to type alias
rustdoc: use unicode-aware checks for redundant explicit link fastpath
clippy: new lint: implied_bounds_in_impls
clippy: new lint: reserve_after_initialization
clippy: arithmetic_side_effects: detect division by zero for Wrapping and Saturating
clippy: if_then_some_else_none: look into local initializers for early returns
clippy: iter_overeager_cloned: detect .cloned().all() and .cloned().any()
clippy: unnecessary_unwrap: lint on .as_ref().unwrap()
clippy: allow trait alias DefIds in implements_trait_with_env_from_iter
clippy: fix "derivable_impls: attributes are ignored"
clippy: fix tuple_array_conversions lint on nightly
clippy: skip float_cmp check if lhs is a custom type
rust-analyzer: diagnostics for 'while let' loop with label in condition
rust-analyzer: respect #[allow(unused_braces)]
Rust Compiler Performance Triage
A fairly quiet week, with improvements exceeding a small scattering of regressions. Memory usage and artifact size held fairly steady across the week, with no regressions or improvements.
Triage done by @simulacrum. Revision range: d4a881e..cedbe5c
2 Regressions, 3 Improvements, 2 Mixed; 0 of them in rollups 108 artifact comparisons made in total
Full report here
Approved RFCs
Changes to Rust follow the Rust RFC (request for comments) process. These are the RFCs that were approved for implementation this week:
Create a Testing sub-team
Final Comment Period
Every week, the team announces the 'final comment period' for RFCs and key PRs which are reaching a decision. Express your opinions now.
RFCs
No RFCs entered Final Comment Period this week.
Tracking Issues & PRs
[disposition: merge] Stabilize PATH option for --print KIND=PATH
[disposition: merge] Add alignment to the NPO guarantee
New and Updated RFCs
[new] Special-cased performance improvement for Iterator::sum on Range<u*> and RangeInclusive<u*>
[new] Cargo Check T-lang Policy
Call for Testing
An important step for RFC implementation is for people to experiment with the implementation and give feedback, especially before stabilization. The following RFCs would benefit from user testing before moving forward:
No RFCs issued a call for testing this week.
If you are a feature implementer and would like your RFC to appear on the above list, add the new call-for-testing label to your RFC along with a comment providing testing instructions and/or guidance on which aspect(s) of the feature need testing.
Upcoming Events
Rusty Events between 2023-08-30 - 2023-09-27 🦀
Virtual
2023-09-05 | Virtual (Buffalo, NY, US) | Buffalo Rust Meetup
Buffalo Rust User Group, First Tuesdays
2023-09-05 | Virtual (Munich, DE) | Rust Munich
Rust Munich 2023 / 4 - hybrid
2023-09-06 | Virtual (Indianapolis, IN, US) | Indy Rust
Indy.rs - with Social Distancing
2023-09-12 - 2023-09-15 | Virtual (Albuquerque, NM, US) | RustConf
RustConf 2023
2023-09-12 | Virtual (Dallas, TX, US) | Dallas Rust
Second Tuesday
2023-09-13 | Virtual (Boulder, CO, US) | Boulder Elixir and Rust
Monthly Meetup
2023-09-13 | Virtual (Cardiff, UK)| Rust and C++ Cardiff
The unreasonable power of combinator APIs
2023-09-14 | Virtual (Nuremberg, DE) | Rust Nuremberg
Rust Nürnberg online
2023-09-20 | Virtual (Vancouver, BC, CA) | Vancouver Rust
Rust Study/Hack/Hang-out
2023-09-21 | Virtual (Charlottesville, NC, US) | Charlottesville Rust Meetup
Crafting Interpreters in Rust Collaboratively
2023-09-21 | Lehi, UT, US | Utah Rust
Real Time Multiplayer Game Server in Rust
2023-09-21 | Virtual (Linz, AT) | Rust Linz
Rust Meetup Linz - 33rd Edition
2023-09-25 | Virtual (Dublin, IE) | Rust Dublin
How we built the SurrealDB Python client in Rust.
Asia
2023-09-06 | Tel Aviv, IL | Rust TLV
RustTLV @ Final - September Edition
Europe
2023-08-30 | Copenhagen, DK | Copenhagen Rust Community
Rust metup #39 sponsored by Fermyon
2023-08-31 | Augsburg, DE | Rust Meetup Augsburg
Augsburg Rust Meetup #2
2023-09-05 | Munich, DE + Virtual | Rust Munich
Rust Munich 2023 / 4 - hybrid
2023-09-14 | Reading, UK | Reading Rust Workshop
Reading Rust Meetup at Browns
2023-09-19 | Augsburg, DE | Rust - Modern Systems Programming in Leipzig
Logging and tracing in Rust
2023-09-20 | Aarhus, DK | Rust Aarhus
Rust Aarhus - Rust and Talk at Concordium
2023-09-21 | Bern, CH | Rust Bern
Third Rust Bern Meetup
North America
2023-09-05 | Chicago, IL, US | Deep Dish Rust
Rust Happy Hour
2023-09-06 | Bellevue, WA, US | The Linux Foundation
Rust Global
2023-09-12 - 2023-09-15 | Albuquerque, NM, US + Virtual | RustConf
RustConf 2023
2023-09-12 | New York, NY, US | Rust NYC
A Panel Discussion on Thriving in a Rust-Driven Workplace
2023-09-12 | Minneapolis, MN, US | Minneapolis Rust Meetup
Minneapolis Rust Meetup Happy Hour
2023-09-14 | Seattle, WA, US | Seattle Rust User Group Meetup
Seattle Rust User Group - August Meetup
2023-09-19 | San Francisco, CA, US | San Francisco Rust Study Group
Rust Hacking in Person
2023-09-21 | Nashville, TN, US | Music City Rust Developers
Rust on the web! Get started with Leptos
2023-09-26 | Pasadena, CA, US | Pasadena Thursday Go/Rust
Monthly Rust group
2023-09-27 | Austin, TX, US | Rust ATX
Rust Lunch - Fareground
Oceania
2023-09-13 | Perth, WA, AU | Rust Perth
Rust Meetup 2: Lunch & Learn
2023-09-19 | Christchurch, NZ | Christchurch Rust Meetup Group
Christchurch Rust meetup meeting
2023-09-26 | Canberra, ACT, AU | Rust Canberra
September Meetup
If you are running a Rust event please add it to the calendar to get it mentioned here. Please remember to add a link to the event too. Email the Rust Community Team for access.
Jobs
Please see the latest Who's Hiring thread on r/rust
Quote of the Week
In [other languages], I could end up chasing silly bugs and waste time debugging and tracing to find that I made a typo or ran into a language quirk that gave me an unexpected nil pointer. That situation is almost non-existent in Rust, it's just me and the problem. Rust is honest and upfront about its quirks and will yell at you about it before you have a hard to find bug in production.
– dannersy on Hacker News
Thanks to Kyle Strand for the suggestion!
Please submit quotes and vote for next week!
This Week in Rust is edited by: nellshamrell, llogiq, cdmistman, ericseppanen, extrawurst, andrewpollack, U007D, kolharsam, joelmarcey, mariannegoldin, bennyvasquez.
Email list hosting is sponsored by The Rust Foundation
Discuss on r/rust
0 notes