#distributed router
Explore tagged Tumblr posts
eddydesh · 2 years ago
Text
Service Router vs Distributed Router in NSX-T (aka NSX 4.x)
In VMware NSX-T, both Service Router (SR) and Distributed Router (DR) are integral components of the networking architecture that play distinct roles in providing routing and connectivity within the virtualized network environment. Let’s delve into the differences between these two router types: Service Router (SR): Role: The Service Router is a centralized routing component that provides…
View On WordPress
0 notes
pochapal-pokespe · 2 years ago
Text
Tumblr media
glad to see the pokespe tradition of "incorporate every key item, no matter how obscure, into the main narrative" continues
3 notes · View notes
reasonsforhope · 11 months ago
Text
African poverty is partly a consequence of energy poverty. In every other continent the vast majority of people have access to electricity. In Africa 600m people, 43% of the total, cannot readily light their homes or charge their phones. And those who nominally have grid electricity find it as reliable as a Scottish summer. More than three-quarters of African firms experience outages; two-fifths say electricity is the main constraint on their business.
If other sub-Saharan African countries had enjoyed power as reliable as South Africa’s from 1995 to 2007, then the continent’s rate of real GDP growth per person would have been two percentage points higher, more than doubling the actual rate, according to one academic paper. Since then South Africa has also had erratic electricity. So-called “load-shedding” is probably the main reason why the economy has shrunk in four of the past eight quarters.
Solar power is increasingly seen as the solution. Last year Africa installed a record amount of photovoltaic (PV) capacity (though this still made up just 1% of the total added worldwide), notes the African Solar Industry Association (AFSIA), a trade group. Globally most solar PV is built by utilities, but in Africa 65% of new capacity over the past two years has come from large firms contracting directly with developers. These deals are part of a decentralised revolution that could be of huge benefit to African economies.
Ground zero for the revolution is South Africa. Last year saw a record number of blackouts imposed by Eskom, the state-run utility, whose dysfunctional coal-fired power stations regularly break down or operate at far below capacity. Fortunately, as load-shedding was peaking, the costs of solar systems were plummeting.
Between 2019 and 2023 the cost of panels fell by 15%, having already declined by almost 90% in the 2010s. Meanwhile battery storage systems now cost about half as much as five years ago. Industrial users pay 20-40% less per unit when buying electricity from private project developers than on the cheapest Eskom tariff.
In the past two calendar years the amount of solar capacity in South Africa rose from 2.8GW to 7.8GW, notes AFSIA, excluding that installed on the roofs of suburban homes. All together South Africa’s solar capacity could now be almost a fifth of that of Eskom’s coal-fired power stations (albeit those still have a higher “capacity factor”, or ability to produce electricity around the clock). The growth of solar is a key reason why there has been less load-shedding in 2024...
Over the past decade the number of startups providing “distributed renewable energy” (DRE) has grown at a clip. Industry estimates suggest that more than 400m Africans get electricity from solar home systems and that more than ten times as many “mini-grids”, most of which use solar, were built in 2016-20 than in the preceding five years. In Kenya DRE firms employ more than six times as many people as the largest utility. In Nigeria they have created almost as many jobs as the oil and gas industry.
“The future is an extremely distributed system to an extent that people haven’t fully grasped,” argues Matthew Tilleard of CrossBoundary Group, a firm whose customers range from large businesses to hitherto unconnected consumers. “It’s going to happen here in Africa first and most consequentially.”
Ignite, which operates in nine African countries, has products that include a basic panel that powers three light bulbs and a phone charger, as well as solar-powered irrigation pumps, stoves and internet routers, and industrial systems. Customers use mobile money to “unlock” a pay-as-you-go meter.
Yariv Cohen, Ignite’s CEO, reckons that the typical $3 per month spent by consumers is less than what they previously paid for kerosene and at phone-charging kiosks. He describes how farmers are more productive because they do not have to get home before dark and children are getting better test scores because they study under bulbs. One family in Rwanda used to keep their two cows in their house because they feared rustlers might come in the dark; now the cattle snooze al fresco under an outside lamp and the family gets more sleep.
...That is one eye-catching aspect of Africa’s solar revolution. But most of the continent is undergoing a more subtle—and significant—experiment in decentralised, commercially driven solar power. It is a trend that could both transform African economies and offer lessons to the rest of the world."
-via The Economist, June 18, 2024. Paragraph breaks added.
417 notes · View notes
javert · 4 months ago
Text
i know i have made this post 500 times and i haven't managed to solve anything by making it the first 500 but maybe the 501st will help.
anyway i feel like i have, idk, 4 or 5 scales i keep trying to balance in my life, like job / chinese class / keeping my house clean and my life generally in order / writing / doing literally anything else
there is a limited amount of time in the week and i am out of it. in fact i do not have enough time to distribute between the scales to the extent that i want them. so every time i want something to go well, i have to extract it from one of the other buckets
and like ok. if my job isn't going well i start to want to kill myself. and if my house is a disaster area i start to want to kill myself. so i can't take much from those buckets without upending the whole scale and causing myself to be in hell for months. so that leaves me with chinese / writing / doing literally anything else to play with. the 'anything else' bucket unfortunately contains a rock that i can't seem to budge that says 'fuck around and do nothing time' so that's annoying. and i pay for chinese class so that forces me to keep putting time into that bucket (this is a good thing)
but that leaves writing with basically nothing. there's PROBABLY a way to get rid of the 'fuck around and do nothing' rock-- i didn't used to have it (or if i did have it, i had less going on that made it an issue)
like what are the levers i can pull?
literally unplug my wifi router so that if i'm at home i can't do anything except write? (well this is not true. i could easily read/draw/play vibeo games/etc instead of writing even without internet)
try to get motivation from somewhere? yelling at myself doesn't seem to help unfortunately :| other people depending on me definitely would but the project i'm working on does not have any kind of external pressure :|
i could probably exercise self discipline enough to just ban myself from all fun until this novel is done, but that would be kinda sad. i might have to do that though :|
winter is almost over and not being cold and in the dark all the time will certainly HELP this problem but idk if it will solve it completely.
like ig it's just hard to solve a problem that is just 100% i have spent all my available time and energy on other stuff and no longer have any time or energy for goals i want to accomplish. like there probably is no solution other than 'push myself into hell' or 'give up some other goal' or 'accept that you're never going to write again'. obviously the first one is what i have to do but wehhhhhhh
13 notes · View notes
kunosoura · 11 months ago
Text
In a world not yet healed but slightly better than ours schools could have entire courses that consisted of like. learning how to repair a computer, both the hardware and software. installing your first linux distribution. how to safely torrent something and share a file. How to crack open a game file and make a slight adjustment for your personal pleasure. How to configure and secure a router. Basic computer literacy stuff that's getting lost in the shuffle of walled garden consumer technology.
19 notes · View notes
fluidangel · 1 year ago
Text
ok since i've been sharing some piracy stuff i'll talk a bit about how my personal music streaming server is set up. the basic idea is: i either buy my music on bandcamp or download it on soulseek. all of my music is stored on an external hard drive connected to a donated laptop that's next to my house's internet router. this laptop is always on, and runs software that lets me access and stream my any song in my collection to my phone or to other computers. here's the detailed setup:
my home server is an old thinkpad laptop with a broken keyboard that was donated to me by a friend. it runs yunohost, a linux distribution that makes it simpler to reuse old computers as servers in this way: it gives you a nice control panel to install and manage all kinds of apps you might want to run on your home server, + it handles the security part by having a user login page & helping you install an https certificate with letsencrypt.
Tumblr media
***
to stream my music collection, i use navidrome. this software is available to install from the yunohost control panel, so it's straightforward to install. what it does is take a folder with all your music and lets you browse and stream it, either via its web interface or through a bunch of apps for android, ios, etc.. it uses the subsonic protocol, so any app that says it works with subsonic should work with navidrome too.
Tumblr media
***
to listen to my music on my phone, i use DSub. It's an app that connects to any server that follows the subsonic API, including navidrome. you just have to give it the address of your home server, and your username and password, and it fetches your music and allows you to stream it. as mentionned previously, there's a bunch of alternative apps for android, ios, etc. so go take a look and make your pick. i've personally also used and enjoyed substreamer in the past. here are screenshots of both:
Tumblr media Tumblr media
***
to listen to my music on my computer, i use tauon music box. i was a big fan of clementine music player years ago, but it got abandoned, and the replacement (strawberry music player) looks super dated now. tauon is very new to me, so i'm still figuring it out, but it connects to subsonic servers and it looks pretty so it's fitting the bill for me.
Tumblr media
***
to download new music onto my server, i use slskd which is a soulseek client made to run on a web server. soulseek is a peer-to-peer software that's found a niche with music lovers, so for anything you'd want to listen there's a good chance that someone on soulseek has the file and will share it with you. the official soulseek client is available from the website, but i'm using a different software that can run on my server and that i can access anywhere via a webpage, slskd. this way, anytime i want to add music to my collection, i can just go to my server's slskd page, download the files, and they directly go into the folder that's served by navidrome.
slskd does not have a yunohost package, so the trick to make it work on the server is to use yunohost's reverse proxy app, and point it to the http port of slskd 127.0.0.1:5030, with the path /slskd and with forced user authentification. then, run slskd on your server with the --url-base slskd, --no-auth (it breaks otherwise, so it's best to just use yunohost's user auth on the reverse proxy) and --no-https (which has no downsides since the https is given by the reverse proxy anyway)
Tumblr media
***
to keep my music collection organized, i use beets. this is a command line software that checks that all of the tags on your music are correct and puts the file in the correct folder (e.g. artist/album/01 trackname.mp3). it's a pretty complex program with a ton of features and settings, i like it to make sure i don't have two copies of the same album in different folders, and to automatically download the album art and the lyrics to most tracks, etc. i'm currently re-working my config file for beets, but i'd be happy to share if someone is interested.
Tumblr media
that's my little system :) i hope it gives the inspiration to someone to ditch spotify for the new year and start having a personal mp3 collection of their own.
34 notes · View notes
techit-rp · 5 months ago
Text
IoT Security Challenges in India: Protecting Smart Homes & Connected Devices
Tumblr media
IoT is transforming the way people live by making their homes smart with devices such as security cameras, smart locks, and voice assistants. In India, IoT technology is adopted at a pace that cyber threats are rising rapidly. With weak security protocols, outdated software, and unawareness, Indian households are vulnerable to cyberattacks. In this blog, we will explore the major IoT security challenges in India and how individuals can safeguard their smart homes and connected devices. If you are looking to strengthen your understanding of cybersecurity, enrolling in a cyber security course can be a game-changer.
The IoT Boom in India
India is witnessing the highest adoption of IoT across homes and businesses. From smart TVs to intelligent thermostats, IoT is revolutionizing life. This booming technology, however, offers a large target size for hackers too who exploit the vulnerability of devices to gain unauthorized access to data.
Fundamental Drivers of IoT Adoption in India:
Increased internet penetration with low-priced data plans
Government initiatives such as Smart Cities Mission and Digital India
Increasing adoption of smart home devices as they become increasingly affordable
Growing application of industrial IoT in health, agriculture, and manufacturing
Chief IoT Security Challenges in India
Poor Authentication & Default Passwords
Most IoT devices have a factory-set password that the user ignores or fails to change. Hackers exploit these default credentials to take over the devices, entry private networks, and crack sensitive information.
Lack of Security Updates & Patches
Most smart devices have limited or no firmware updates, which makes them vulnerable to cyber threats. Many Indian consumers do not check for security updates, leaving their devices susceptible to known exploits.
Data Privacy Concerns
Smart devices collect vast amounts of personal data, from voice recordings to daily routines. Without stringent data protection policies, this information can be misused or leaked by malicious actors.
Botnet Attacks & DDoS Threats
Cybercriminals hijack unprotected IoT devices to form botnets, which are used to launch massive Distributed Denial of Service (DDoS) attacks. These attacks can cripple networks and cause disruptions to online services.
Unsecured Wi-Fi Networks
Many Indian households rely on poorly secured Wi-Fi connections, providing an easy entry point for hackers. Without encryption or strong passwords, attackers can intercept sensitive information and compromise connected devices.
Absence of Specific Cybersecurity Legislation for IoT
India has advanced in data protection with the Digital Personal Data Protection Act, but there is no dedicated IoT security framework. The absence of it leaves the manufacturer to choose cost over security and sell devices which are not so well protected in the market.
How to Secure Smart Homes & Connected Devices
Change Default Credentials
Always change the default usernames and passwords of the IoT after installation. Use strong, unique passwords and implement multi-factor authentication wherever possible.
Update Firmware Periodically
Scan for software and security updates on all smart devices, and install them as soon as they are available. In case your device can no longer get any updates, consider replacing it with a newer version that is at least as secure.
Secure Your Wi-Fi Network
Use a robust Wi-Fi password, and make sure WPA3 encryption is turned on. Limit remote access to your router, and make an IoT-specific network so that those devices can't contaminate your primary network.
Firewall & Security Solutions The use of firewalls and network security solutions monitors traffic and can block malicious activity on IoT networks. 5. Limit Data Sharing & Permissions
Assess permission for smart appliances and reduce or limit the devices from accessing unsecured personal information. De-activate unused add-ons, remote access in devices.
Cyber Security Courses
IoT-based cyber-attacks are minimized if awareness against the threat builds. To boost that awareness further, take time out to become a certified graduate of cyber security by signing for courses in areas like best security practices, principles of ethical hacking, and defending digital systems.
Road Ahead to Improving Indian IoT Security:
The Indian government, device manufacturers, and consumers must take proactive steps to mitigate IoT security risks. Stronger security standards, public awareness, and robust cybersecurity laws are the need of the hour to secure the future of IoT in India.
Conclusion
IoT devices offer incredible convenience but also introduce significant security risks. Protecting smart homes and connected devices requires a combination of best practices, awareness, and robust cybersecurity measures. By staying informed and adopting the right security strategies, individuals can ensure a safer IoT experience.
If you’re passionate about cybersecurity and want to build expertise in protecting digital systems, consider taking a cyber security course to gain hands-on knowledge and skills in ethical hacking, network security, and data protection.
3 notes · View notes
reginaldqueribundus · 2 years ago
Text
the year is 2048. a smiling young farmer in a power wheelchair sells me the biggest bag of muesli I've ever seen out of a market stall built from repurposed drone parts. he sees the toys in my reusable bag and insists on throwing in some homemade cat treats “on the house”. I get an email from the wind farm: they've deposited another $20 in my account for using up excess electricity outside peak hours, so I decide to splurge on some flavoured honey and boba tea. I tell the barista I feel like a billionaire today and she smiles politely and asks me what a “billionaire” is. I run into an old friend handing out free insulin packets and we spend some time catching up. I've got a new gig at the organ printing depot and she's on rotating job assignments with the Workers' Cooperative: this month is insulin distribution, last month was reprogramming robot dogs as automated planters for the pollinator farm, next month she'll be on a work crew converting the old football stadium into a greenhouse. She's been sleeping in the park (by choice, of course, the local housing co-op has tons of suites open) but the climate bureau is cloud seeding this weekend and we're expecting a lot of rain. I invite her to crash at my place. She smiles and says she would like that. Our trolley ride home is briefly halted by an impromptu pride parade and the sun is setting as we pass the ivy-covered sign advertising the golf course that once existed where my neighbourhood now stands. A friendly technician explains she's just finished replacing the faulty router on our block so we can use the public WiFi again. I start a fire in the fireplace and sort through some mail: a postcard from one of my exes in Hawaii installing carbon dioxide scrubbers that double as frog habitats, a flyer for a music recital at the rehab clinic, and a letter from International Blood Services declining my donation because they are fully stocked. I ask my Global Music Archive uplink to select a random decade, country and genre and it starts a playlist while the two of us snuggle together on the couch under a hand-knitted blanket and my cat makes biscuits on top. On TV, a newscaster says global temperatures are at their lowest point in the last 40 years. I flip channels to some standup comedian saying kids these days don't know how to conceal when they're high because there's no cops anymore. We laugh until the rain softly falling on the roof lulls us to sleep.
51 notes · View notes
wolfliving · 9 months ago
Text
Tumblr media
The Federal Bureau of Investigation (FBI), Cyber National Mission Force (CNMF), and National Security Agency (NSA) assess that People’s Republic of China (PRC)-linked cyber actors have compromised thousands of Internet-connected devices, including small office/home office (SOHO) routers, firewalls, network-attached storage (NAS) and Internet of Things (IoT) devices with the goal of creating a network of compromised nodes (a “botnet”) positioned for malicious activity. The actors may then use the botnet as a proxy to conceal their identities while deploying distributed denial of service (DDoS) attacks or compromising targeted U.S. networks.
Integrity Technology Group, a PRC-based company, has controlled and managed a botnet active since mid- 2021. The botnet has regularly maintained between tens to hundreds of thousands of compromised devices. As of June 2024, the botnet consisted of over 260,000 devices. Victim devices part of the botnet have been observed in North America, South America, Europe, Africa, Southeast Asia and Australia.
While devices aged beyond their end-of-life dates are known to be more vulnerable to intrusion, many of the compromised devices in the Integrity Tech controlled botnet are likely still supported by their respective vendors.
FBI, CNMF, NSA, and allied partners are releasing this Joint Cyber Security Advisory to highlight the threat posed by these actors and their botnet activity and to encourage exposed device vendors, owners, and operators to update and secure their devices from being compromised and joining the botnet. Network defenders are advised to follow the guidance in the mitigations section to protect against the PRC-linked cyber actors’ botnet activity. Cyber security companies can also leverage the information in this advisory to assist with identifying malicious activity and reducing the number of devices present in botnets worldwide.
For additional information, see U.S. Department of Justice (DOJ) press release....
4 notes · View notes
mostlysignssomeportents · 2 years ago
Text
You make a thousand copies before breakfast. That doesn't make you part of the entertainment industry.
Tumblr media
This is the LAST WEEKEND to back the Kickstarter campaign for the audiobook of my next novel, The Lost Cause. These kickstarters are how I pay my bills, which lets me publish my free essays nearly every day. If you enjoy my work, please consider backing!
Tumblr media
Back when every book had a printing press in its history, every record a record-pressing plant, every film a film-lab, “making or handling copies of creative works” was a pretty good test to determine whether someone was part of the entertainment industry. Even if it turned out they weren’t, the kind of person who has a record-pressing plant can afford to consult an expert to make sure they’re on the right side of the law.
But a funny thing happened on the way to the 21st Century. We started using computers for everything. And computers work by making copies.
The mere act of reading this article created dozens — if not hundreds — of copies of it. These copies flashed in and out of existence in network buffers, switches and routers, graphics buffers and RAM, in multiple content distribution network caches and in your browser’s cache.
You make a thousand copies before breakfast. That doesn’t make you part of the entertainment industry.
It’s a near-dead-certainty that much of what you do violates the black letter of copyright law. We could simplify copyright until everyone who uses the internet for anything could easily grasp its contours and stay within them. But any copyright that is made simple enough for kids doing their homework and people using a dating site to follow would be way too crude for me and the various parties in my supply chain to follow.
-The Internet's Original Sin
Tumblr media Tumblr media
My next novel is The Lost Cause, a hopeful novel of the climate emergency. Amazon won't sell the audiobook, so I made my own and I'm pre-selling it on Kickstarter!
25 notes · View notes
anniekoh · 1 year ago
Text
connecting gaza
E-sims for Gaza:
www.disabilityvisibilityproject.com/2023/12/25/crips-for-esims-for-gaza/
Palestinians are using donated eSIM cards to stay in touch with the outside world  (Jan 2024, NBC News)
Many of the eSIMs are donated by activists who collect them from donors around the world. Mirna El Helbawi, a 31-year-old Egyptian writer who runs a project called Connecting Gaza, said she has distributed more than 100,000 eSIMs since the war began. www.instagram.com/mirna_elhelbawi
She and other activists use Instagram and X to solicit donors from around the world to purchase eSIMs from international phone carriers. They then pass them to a system of what El Helbawi calls “human routers” across Gaza with functioning eSIMs who can set up their phones as Wi-Fi hot spots to share additional eSIMs with others.
https://www.reuters.com/world/middle-east/desperate-news-gazans-struggle-with-mobile-network-2024-02-02/
https://www.lemonde.fr/en/international/article/2024/02/04/in-gaza-virtual-chips-are-breaking-the-telecommunications-blockade_6493217_4.html
Internet blackouts as weapon (WIRED)
On October 27, Israel reportedly imposed a full internet shutdown in the area, cutting off the last remaining connectivity for about 34 hours as its troops moved into the Gaza Strip. After what’s left of Gaza’s internet access was restored—data shows it stands at around 15 percent or less of usual connectivity—the area has suffered two other, similar connectivity blackouts. The most recent lasted for about 15 hours on Sunday as Israel was carrying out an intense operation to cut off Gaza City in the north from southern Gaza Throughout the Gaza Strip, there are around a dozen internet service providers and cell phone companies that get people online—although cell networks only use 2G technologies, as opposed to the faster 3G, 4G, and 5G connections available across much of Israel. These companies are heavily reliant on Israeli infrastructure to connect to the global internet, with open internet advocacy nonprofit the Internet Society classing Palestine as having “poor” connections to the wider internet. Since the start of the war, mobile and internet providers’ offices, cables, and cell towers have been destroyed. Many are now totally offline.
6 notes · View notes
qcs01 · 1 year ago
Text
Ansible Collections: Extending Ansible’s Capabilities
Ansible is a powerful automation tool used for configuration management, application deployment, and task automation. One of the key features that enhances its flexibility and extensibility is the concept of Ansible Collections. In this blog post, we'll explore what Ansible Collections are, how to create and use them, and look at some popular collections and their use cases.
Introduction to Ansible Collections
Ansible Collections are a way to package and distribute Ansible content. This content can include playbooks, roles, modules, plugins, and more. Collections allow users to organize their Ansible content and share it more easily, making it simpler to maintain and reuse.
Key Features of Ansible Collections:
Modularity: Collections break down Ansible content into modular components that can be independently developed, tested, and maintained.
Distribution: Collections can be distributed via Ansible Galaxy or private repositories, enabling easy sharing within teams or the wider Ansible community.
Versioning: Collections support versioning, allowing users to specify and depend on specific versions of a collection. How to Create and Use Collections in Your Projects
Creating and using Ansible Collections involves a few key steps. Here’s a guide to get you started:
1. Setting Up Your Collection
To create a new collection, you can use the ansible-galaxy command-line tool:
ansible-galaxy collection init my_namespace.my_collection
This command sets up a basic directory structure for your collection:
my_namespace/
└── my_collection/
├── docs/
├── plugins/
│ ├── modules/
│ ├── inventory/
│ └── ...
├── roles/
├── playbooks/
├── README.md
└── galaxy.yml
2. Adding Content to Your Collection
Populate your collection with the necessary content. For example, you can add roles, modules, and plugins under the respective directories. Update the galaxy.yml file with metadata about your collection.
3. Building and Publishing Your Collection
Once your collection is ready, you can build it using the following command:
ansible-galaxy collection build
This command creates a tarball of your collection, which you can then publish to Ansible Galaxy or a private repository:
ansible-galaxy collection publish my_namespace-my_collection-1.0.0.tar.gz
4. Using Collections in Your Projects
To use a collection in your Ansible project, specify it in your requirements.yml file:
collections:
- name: my_namespace.my_collection
version: 1.0.0
Then, install the collection using:
ansible-galaxy collection install -r requirements.yml
You can now use the content from the collection in your playbooks:--- - name: Example Playbook hosts: localhost tasks: - name: Use a module from the collection my_namespace.my_collection.my_module: param: value
Popular Collections and Their Use Cases
Here are some popular Ansible Collections and how they can be used:
1. community.general
Description: A collection of modules, plugins, and roles that are not tied to any specific provider or technology.
Use Cases: General-purpose tasks like file manipulation, network configuration, and user management.
2. amazon.aws
Description: Provides modules and plugins for managing AWS resources.
Use Cases: Automating AWS infrastructure, such as EC2 instances, S3 buckets, and RDS databases.
3. ansible.posix
Description: A collection of modules for managing POSIX systems.
Use Cases: Tasks specific to Unix-like systems, such as managing users, groups, and file systems.
4. cisco.ios
Description: Contains modules and plugins for automating Cisco IOS devices.
Use Cases: Network automation for Cisco routers and switches, including configuration management and backup.
5. kubernetes.core
Description: Provides modules for managing Kubernetes resources.
Use Cases: Deploying and managing Kubernetes applications, services, and configurations.
Conclusion
Ansible Collections significantly enhance the modularity, distribution, and reusability of Ansible content. By understanding how to create and use collections, you can streamline your automation workflows and share your work with others more effectively. Explore popular collections to leverage existing solutions and extend Ansible’s capabilities in your projects.
For more details click www.qcsdclabs.com
2 notes · View notes
twocatsinatrenchcoat · 2 years ago
Text
Also idea: Program that checks your router and hacks into any IoT devices to make a distributed computer network. Computer running slow? Just distribute some of the workload to your fucking fridge!
2 notes · View notes
this-week-in-rust · 2 years ago
Text
This Week in Rust 510
Hello and welcome to another issue of This Week in Rust! Rust is a programming language empowering everyone to build reliable and efficient software. This is a weekly summary of its progress and community. Want something mentioned? Tag us at @ThisWeekInRust on Twitter or @ThisWeekinRust on mastodon.social, or send us a pull request. Want to get involved? We love contributions.
This Week in Rust is openly developed on GitHub and archives can be viewed at this-week-in-rust.org. If you find any errors in this week's issue, please submit a PR.
Updates from Rust Community
Official
Announcing Rust 1.72.0
Change in Guidance on Committing Lockfiles
Cargo changes how arrays in config are merged
Seeking help for initial Leadership Council initiatives
Leadership Council Membership Changes
Newsletters
This Week in Ars Militaris VIII
Project/Tooling Updates
rust-analyzer changelog #196
The First Stable Release of a Memory Safe sudo Implementation
We're open-sourcing the library that powers 1Password's ability to log in with a passkey
ratatui 0.23.0 is released! (official successor of tui-rs)
Zellij 0.38.0: session-manager, plugin infra, and no more offensive session names
Observations/Thoughts
The fastest WebSocket implementation
Rust Malware Staged on Crates.io
ESP32 Standard Library Embedded Rust: SPI with the MAX7219 LED Dot Matrix
A JVM in Rust part 5 - Executing instructions
Compiling Rust for .NET, using only tea and stubbornness!
Ad-hoc polymorphism erodes type-safety
How to speed up the Rust compiler in August 2023
This isn't the way to speed up Rust compile times
Rust Cryptography Should be Written in Rust
Dependency injection in Axum handlers. A quick tour
Best Rust Web Frameworks to Use in 2023
From tui-rs to Ratatui: 6 Months of Cooking Up Rust TUIs
[video] Rust 1.72.0
[video] Rust 1.72 Release Train
Rust Walkthroughs
[series] Distributed Tracing in Rust, Episode 3: tracing basics
Use Rust in shell scripts
A Simple CRUD API in Rust with Cloudflare Workers, Cloudflare KV, and the Rust Router
[video] base64 crate: code walkthrough
Miscellaneous
Interview with Rust and operating system Developer Andy Python
Leveraging Rust in our high-performance Java database
Rust error message to fix a typo
[video] The Builder Pattern and Typestate Programming - Stefan Baumgartner - Rust Linz January 2023
[video] CI with Rust and Gitlab Selfhosting - Stefan Schindler - Rust Linz July 2023
Crate of the Week
This week's crate is dprint, a fast code formatter that formats Markdown, TypeScript, JavaScript, JSON, TOML and many other types natively via Wasm plugins.
Thanks to Martin Geisler for the suggestion!
Please submit your suggestions and votes for next week!
Call for Participation
Always wanted to contribute to open-source projects but did not know where to start? Every week we highlight some tasks from the Rust community for you to pick and get started!
Some of these tasks may also have mentors available, visit the task page for more information.
Hyperswitch - add domain type for client secret
Hyperswitch - deserialization error exposes sensitive values in the logs
Hyperswitch - move redis key creation to a common module
mdbook-i18n-helpers - Write tool which can convert translated files back to PO
mdbook-i18n-helpers - Package a language selector
mdbook-i18n-helpers - Add links between translations
Comprehensive Rust - Link to correct line when editing a translation
Comprehensive Rust - Track the number of times the redirect pages are visited
RustQuant - Jacobian and Hessian matrices support.
RustQuant - improve Graphviz plotting of autodiff computational graphs.
RustQuant - bond pricing implementation.
RustQuant - implement cap/floor pricers.
RustQuant - Implement Asian option pricers.
RustQuant - Implement American option pricers.
release-plz - add ability to mark Gitea/GitHub release as draft
zerocopy - CI step "Set toolchain version" is flaky due to network timeouts
zerocopy - Implement traits for tuple types (and maybe other container types?)
zerocopy - Prevent panics statically
zerocopy - Add positive and negative trait impl tests for SIMD types
zerocopy - Inline many trait methods (in zerocopy and in derive-generated code)
datatest-stable - Fix quadratic performance with nextest
Ockam - Use a user-friendly name for the shared services to show it in the tray menu
Ockam - Rename the Port to Address and support such format
Ockam - Ockam CLI should gracefully handle invalid state when initializing
css-inline - Update cssparser & selectors
css-inline - Non-blocking stylesheet resolving
css-inline - Optionally remove all class attributes
If you are a Rust project owner and are looking for contributors, please submit tasks here.
Updates from the Rust Project
366 pull requests were merged in the last week
reassign sparc-unknown-none-elf to tier 3
wasi: round up the size for aligned_alloc
allow MaybeUninit in input and output of inline assembly
allow explicit #[repr(Rust)]
fix CFI: f32 and f64 are encoded incorrectly for cross-language CFI
add suggestion for some #[deprecated] items
add an (perma-)unstable option to disable vtable vptr
add comment to the push_trailing function
add note when matching on tuples/ADTs containing non-exhaustive types
add support for ptr::writes for the invalid_reference_casting lint
allow overwriting ExpnId for concurrent decoding
avoid duplicate large_assignments lints
contents of reachable statics is reachable
do not emit invalid suggestion in E0191 when spans overlap
do not forget to pass DWARF fragment information to LLVM
ensure that THIR unsafety check is done before stealing it
emit a proper diagnostic message for unstable lints passed from CLI
fix races conditions with SyntaxContext decoding
fix waiting on a query that panicked
improve note for the invalid_reference_casting lint
include compiler flags when you break rust;
load include_bytes! directly into an Lrc
make Sharded an enum and specialize it for the single thread case
make rustc_on_unimplemented std-agnostic for alloc::rc
more precisely detect cycle errors from type_of on opaque
point at type parameter that introduced unmet bound instead of full HIR node
record allocation spans inside force_allocation
suggest mutable borrow on read only for-loop that should be mutable
tweak output of to_pretty_impl_header involving only anon lifetimes
use the same DISubprogram for each instance of the same inlined function within a caller
walk through full path in point_at_path_if_possible
warn on elided lifetimes in associated constants (ELIDED_LIFETIMES_IN_ASSOCIATED_CONSTANT)
make RPITITs capture all in-scope lifetimes
add stable for Constant in smir
add generics_of to smir
add smir predicates_of
treat StatementKind::Coverage as completely opaque for SMIR purposes
do not convert copies of packed projections to moves
don't do intra-pass validation on MIR shims
MIR validation: reject in-place argument/return for packed fields
disable MIR SROA optimization by default
miri: automatically start and stop josh in rustc-pull/push
miri: fix some bad regex capture group references in test normalization
stop emitting non-power-of-two vectors in (non-portable-SIMD) codegen
resolve: stop creating NameBindings on every use, create them once per definition instead
fix a pthread_t handle leak
when terminating during unwinding, show the reason why
avoid triple-backtrace due to panic-during-cleanup
add additional float constants
add ability to spawn Windows process with Proc Thread Attributes | Take 2
fix implementation of Duration::checked_div
hashbrown: allow serializing HashMaps that use a custom allocator
hashbrown: change & to &mut where applicable
hashbrown: simplify Clone by removing redundant guards
regex-automata: fix incorrect use of Aho-Corasick's "standard" semantics
cargo: Very preliminary MSRV resolver support
cargo: Use a more compact relative-time format
cargo: Improve TOML parse errors
cargo: add support for target.'cfg(..)'.linker
cargo: config: merge lists in precedence order
cargo: create dedicated unstable flag for asymmetric-token
cargo: set MSRV for internal packages
cargo: improve deserialization errors of untagged enums
cargo: improve resolver version mismatch warning
cargo: stabilize --keep-going
cargo: support dependencies from registries for artifact dependencies, take 2
cargo: use AND search when having multiple terms
rustdoc: add unstable --no-html-source flag
rustdoc: rename typedef to type alias
rustdoc: use unicode-aware checks for redundant explicit link fastpath
clippy: new lint: implied_bounds_in_impls
clippy: new lint: reserve_after_initialization
clippy: arithmetic_side_effects: detect division by zero for Wrapping and Saturating
clippy: if_then_some_else_none: look into local initializers for early returns
clippy: iter_overeager_cloned: detect .cloned().all() and .cloned().any()
clippy: unnecessary_unwrap: lint on .as_ref().unwrap()
clippy: allow trait alias DefIds in implements_trait_with_env_from_iter
clippy: fix "derivable_impls: attributes are ignored"
clippy: fix tuple_array_conversions lint on nightly
clippy: skip float_cmp check if lhs is a custom type
rust-analyzer: diagnostics for 'while let' loop with label in condition
rust-analyzer: respect #[allow(unused_braces)]
Rust Compiler Performance Triage
A fairly quiet week, with improvements exceeding a small scattering of regressions. Memory usage and artifact size held fairly steady across the week, with no regressions or improvements.
Triage done by @simulacrum. Revision range: d4a881e..cedbe5c
2 Regressions, 3 Improvements, 2 Mixed; 0 of them in rollups 108 artifact comparisons made in total
Full report here
Approved RFCs
Changes to Rust follow the Rust RFC (request for comments) process. These are the RFCs that were approved for implementation this week:
Create a Testing sub-team
Final Comment Period
Every week, the team announces the 'final comment period' for RFCs and key PRs which are reaching a decision. Express your opinions now.
RFCs
No RFCs entered Final Comment Period this week.
Tracking Issues & PRs
[disposition: merge] Stabilize PATH option for --print KIND=PATH
[disposition: merge] Add alignment to the NPO guarantee
New and Updated RFCs
[new] Special-cased performance improvement for Iterator::sum on Range<u*> and RangeInclusive<u*>
[new] Cargo Check T-lang Policy
Call for Testing
An important step for RFC implementation is for people to experiment with the implementation and give feedback, especially before stabilization. The following RFCs would benefit from user testing before moving forward:
No RFCs issued a call for testing this week.
If you are a feature implementer and would like your RFC to appear on the above list, add the new call-for-testing label to your RFC along with a comment providing testing instructions and/or guidance on which aspect(s) of the feature need testing.
Upcoming Events
Rusty Events between 2023-08-30 - 2023-09-27 🦀
Virtual
2023-09-05 | Virtual (Buffalo, NY, US) | Buffalo Rust Meetup
Buffalo Rust User Group, First Tuesdays
2023-09-05 | Virtual (Munich, DE) | Rust Munich
Rust Munich 2023 / 4 - hybrid
2023-09-06 | Virtual (Indianapolis, IN, US) | Indy Rust
Indy.rs - with Social Distancing
2023-09-12 - 2023-09-15 | Virtual (Albuquerque, NM, US) | RustConf
RustConf 2023
2023-09-12 | Virtual (Dallas, TX, US) | Dallas Rust
Second Tuesday
2023-09-13 | Virtual (Boulder, CO, US) | Boulder Elixir and Rust
Monthly Meetup
2023-09-13 | Virtual (Cardiff, UK)| Rust and C++ Cardiff
The unreasonable power of combinator APIs
2023-09-14 | Virtual (Nuremberg, DE) | Rust Nuremberg
Rust Nürnberg online
2023-09-20 | Virtual (Vancouver, BC, CA) | Vancouver Rust
Rust Study/Hack/Hang-out
2023-09-21 | Virtual (Charlottesville, NC, US) | Charlottesville Rust Meetup
Crafting Interpreters in Rust Collaboratively
2023-09-21 | Lehi, UT, US | Utah Rust
Real Time Multiplayer Game Server in Rust
2023-09-21 | Virtual (Linz, AT) | Rust Linz
Rust Meetup Linz - 33rd Edition
2023-09-25 | Virtual (Dublin, IE) | Rust Dublin
How we built the SurrealDB Python client in Rust.
Asia
2023-09-06 | Tel Aviv, IL | Rust TLV
RustTLV @ Final - September Edition
Europe
2023-08-30 | Copenhagen, DK | Copenhagen Rust Community
Rust metup #39 sponsored by Fermyon
2023-08-31 | Augsburg, DE | Rust Meetup Augsburg
Augsburg Rust Meetup #2
2023-09-05 | Munich, DE + Virtual | Rust Munich
Rust Munich 2023 / 4 - hybrid
2023-09-14 | Reading, UK | Reading Rust Workshop
Reading Rust Meetup at Browns
2023-09-19 | Augsburg, DE | Rust - Modern Systems Programming in Leipzig
Logging and tracing in Rust
2023-09-20 | Aarhus, DK | Rust Aarhus
Rust Aarhus - Rust and Talk at Concordium
2023-09-21 | Bern, CH | Rust Bern
Third Rust Bern Meetup
North America
2023-09-05 | Chicago, IL, US | Deep Dish Rust
Rust Happy Hour
2023-09-06 | Bellevue, WA, US | The Linux Foundation
Rust Global
2023-09-12 - 2023-09-15 | Albuquerque, NM, US + Virtual | RustConf
RustConf 2023
2023-09-12 | New York, NY, US | Rust NYC
A Panel Discussion on Thriving in a Rust-Driven Workplace
2023-09-12 | Minneapolis, MN, US | Minneapolis Rust Meetup
Minneapolis Rust Meetup Happy Hour
2023-09-14 | Seattle, WA, US | Seattle Rust User Group Meetup
Seattle Rust User Group - August Meetup
2023-09-19 | San Francisco, CA, US | San Francisco Rust Study Group
Rust Hacking in Person
2023-09-21 | Nashville, TN, US | Music City Rust Developers
Rust on the web! Get started with Leptos
2023-09-26 | Pasadena, CA, US | Pasadena Thursday Go/Rust
Monthly Rust group
2023-09-27 | Austin, TX, US | Rust ATX
Rust Lunch - Fareground
Oceania
2023-09-13 | Perth, WA, AU | Rust Perth
Rust Meetup 2: Lunch & Learn
2023-09-19 | Christchurch, NZ | Christchurch Rust Meetup Group
Christchurch Rust meetup meeting
2023-09-26 | Canberra, ACT, AU | Rust Canberra
September Meetup
If you are running a Rust event please add it to the calendar to get it mentioned here. Please remember to add a link to the event too. Email the Rust Community Team for access.
Jobs
Please see the latest Who's Hiring thread on r/rust
Quote of the Week
In [other languages], I could end up chasing silly bugs and waste time debugging and tracing to find that I made a typo or ran into a language quirk that gave me an unexpected nil pointer. That situation is almost non-existent in Rust, it's just me and the problem. Rust is honest and upfront about its quirks and will yell at you about it before you have a hard to find bug in production.
– dannersy on Hacker News
Thanks to Kyle Strand for the suggestion!
Please submit quotes and vote for next week!
This Week in Rust is edited by: nellshamrell, llogiq, cdmistman, ericseppanen, extrawurst, andrewpollack, U007D, kolharsam, joelmarcey, mariannegoldin, bennyvasquez.
Email list hosting is sponsored by The Rust Foundation
Discuss on r/rust
0 notes
starfieldcanvas · 1 year ago
Text
I know why this happens! (besides tumblr sucking.)
Here is how internet gets into your house:
fiberoptic or coax cable (brings internet from ISP to house) ↓ modem (tells ISP where to send internet: "ISP address") ↓ router (handles distributing internet throughout the house) ↓ wifi (internet signal sent through the air by the router) ↓ your device (your device!)
if your wifi is working great but it's not getting any internet into your device, something is going wrong somewhere BEFORE the internet gets to the router.
double check if the internet is down on a device connected to the router via ethernet cable instead of wifi. if that device is connecting fine, then tumblr is loading slow because tumblr's servers are cranky; if that device doesn't have internet, then the problem isn't the tumblr or the wifi! once you know for sure, you can try restarting the modem and checking for any blinking red lights or error messages. if the modem is working fine, then the problem is in the cable itself and it's your ISP's fault.
No one:
Tumblr when my WiFi is connected and working perfectly:
Tumblr media
255K notes · View notes
digitalwo · 20 hours ago
Text
Mikrotik Reseller UAE and MikroTik Router UAE: Your Gateway to Reliable Networking Solutions
The Growing Demand for Mikrotik in UAE
The UAE has rapidly transformed into a technological hub, with a high demand for advanced networking equipment to support its thriving business environment, smart city initiatives, and expanding telecom sector. Mikrotik, known for its cost-effective yet powerful routers and switches, has become a preferred choice among local businesses, internet service providers, and tech enthusiasts. Its flexible configuration options and extensive feature set make it suitable for a wide range of applications, from small offices to large data centers.
Why Choose a Mikrotik Reseller in UAE?
Purchasing networking devices directly from manufacturers might not always be feasible or cost-effective. That’s where Mikrotik reseller Uae come into play. These authorized partners provide several advantages:
Authentic Products: Certified resellers ensure that you receive genuine Mikrotik devices, preventing issues related to counterfeit products.
Expert Guidance: Resellers are knowledgeable about their product range, offering tailored solutions based on your network requirements.
After-Sales Support: Authorized resellers provide installation assistance, technical support, and warranty services, ensuring smooth operation.
Competitive Pricing: Local resellers often offer better pricing, discounts, and flexible payment options compared to international suppliers.
The Best MikroTik Router Options in UAE
For users seeking reliable networking hardware, the MikroTik router UAE market offers a variety of models tailored to different needs:
MikroTik hEX Series: Ideal for small to medium enterprises, offering robust routing and VPN capabilities.
MikroTik RB Series: Compact and affordable, suitable for home or small office setups.
Tumblr media
MikroTik CCR Series: High-performance routers designed for ISPs and large networks requiring advanced routing features.
MikroTik Cloud Core Routers: For data centers and enterprise-level applications demanding high throughput and scalability.
MikroTik Wholesale Distributor UAE and Russia
For large-volume buyers, resellers and integrators, establishing relationships with MikroTik wholesale distributor UAE is vital. Such distributors provide bulk purchasing options, ensuring supply chain efficiency and better pricing. Interestingly, many distributors also operate in Russia, providing a broader network for sourcing MikroTik devices. TheseMikrotik Reseller Russia entities serve as strategic partners for companies operating across borders, facilitating regional distribution and support.
Why Partner with a Wholesale Distributor?
Cost Savings: Bulk purchasing reduces per-unit costs, making it attractive for large deployments.
Availability: Wholesale distributors maintain large inventories, ensuring quick delivery.
Technical Support: Many distributors offer pre-sales consultation and post-sales technical assistance.
Global Reach: Distributors operating across UAE and Russia help multinational companies streamline procurement processes.
Conclusion
Whether you are a small business owner, a network engineer, or a large enterprise, sourcing genuine MikroTik products through reputable Mikrotik resellers UAE and MikroTik wholesale distributors UAE is essential for ensuring reliable and scalable network infrastructure. The availability of diverse MikroTik routers, switches, and accessories tailored to various needs makes them a versatile choice. Moreover, the interconnected network of Mikrotik reseller Russia further expands access to quality products and support across the region.
0 notes