-
## Objective
Make LocalNet be able to access arbitrary configurations to spin up any complex network. Nodes should be able to be fed arbitrary commands to act as different kinds of actors in the syst…
-
Concerning IT Modernization Part 1 of 6
After reading some of the stuff I sent earlier I think it may be too confusing for a nontechnical reader and too disorganized for a technical reader so here…
-
There are approximately 5 million mining devices on the bitcoin network. It's necessary for monitoring purposes to have each device report a hash on a ~minute timescale even if it doesn't hit the bitc…
-
- [x] more data augmentation and transforms
- [x] make intel classification network bigger
- [x] plot loss after training
- [x] use tensorboard for monitoring
- [x] use learning rate scheduler
- …
-
### TL;DR
See also #2013
I'm seeing a permadrift which may or may not be related to having manually (outside of tf) enabled a kubelet config setting. I am somewhat confident that before this chan…
-
We now kick off metadata syncs continuously, which is great. This also happens if we're still downloading replies/messages from a previous sync. This causes some additional complexity:
- We'll need…
-
**How to categorize this issue?**
/area robustness
/kind technical-debt
**Why is this needed**:
Currently `gardener` depends on `github.com/gardener/etcd-druid v0.22.5` but does not follow t…
-
install and set up Icinga along side MaNGOS as a system monitor. This is enhancement should give you a 5 second overview of the entire system. running processes memory usage network traffic just to na…
-
Browsing the AWS cost center I've noted that we spent a unreasonable chunk of change on "EC2-other" charges, which on closer inspection revealed themselves to be almost exclusively networking related …
-
ITRB suggests to use Incapsula for inbound traffic monitoring to prevent any attacks.
This includes:
- Work with network team to setup Incapsula
- Test it with drone setup
- Apply to productio…