Introducing: The Cloudflare All-Stars Fantasy League

Introducing: The Cloudflare All-Stars Fantasy League

Introducing: The Cloudflare All-Stars Fantasy League

Baseball season is well underway, and to celebrate, we're excited to introduce the Cloudflare All-Stars Fantasy League: a group of fictitious sports teams that revolve around some of Cloudflare’s most championed products and services. Their mission? To help build a better Internet.

Cloudflare HQ is located just a block away from the San Francisco Giants Stadium. Each time there's a home game, crowds of people walk past Cloudflare's large 2nd street windows and peer in to the office space. The looks in their eyes scream: "Cloudflare! Teach me about your products while giving me something visually stimulating to look at!"

They asked. We listened.

The design team saw a creative opportunity, seized it, and hit it out of the park. Inspired by the highly stylized sports badges and emblems of some real-life sports teams, we applied this visual style to our own team badges. We had a lot of fun coming up with the team names, as well as figuring out which visuals to use for each.

Introducing: The Cloudflare All-Stars Fantasy League

For the next few months, the Cloudflare All-Stars teams will be showcased within the large Cloudflare HQ windows facing 2nd street and en route to Giants Stadium. Feel free to Continue reading

Weather Forecasting Gets A Big Lift In Japan

It has been a long time since the Japan Meteorological Agency has deployed the kind of supercomputing oomph for weather forecasting that the island nation would seem to need to improve its forecasts. But JMA, like its peers in the United States, Europe, and India, is investing heavily in new supercomputers to get caught up, and specifically, has just done a deal with Cray to get a pair of XC50 systems that will have 18.2 petaflops of aggregate performance.

This is a lot more compute capacity than JMA has had available to do generic weather forecasting as well as do

Weather Forecasting Gets A Big Lift In Japan was written by Timothy Prickett Morgan at The Next Platform.

Plan Your DockerCon 2018 Conference Experience: Everything an Enterprise Architect Needs to Know

DockerConSan Francisco 2018 is just around the corner and we’re here to help Enterprise Architects learn what Docker can do for them. DockerCon isn’t just for developers and we want to help you find the sessions and experiences that we’ve created that are developed with this role in mind:

In 2015, I attended DockerCon for the first time. I was sitting in a chair and listening to the amazing stories and ideas presented by speakers at the conference, which set off a chain of events that led to today. I feel privileged, and am really looking forward to being on stage and sharing our transformational journey to inspire the people who would sit in that chair. 
Alex Iankoulski, Principal Software Architect, Baker Hughes GE

The first thing to notice is that as you build your DockerCon agenda this year, we have a “Journey” theme that will help guide you during the conference. Whether you’re just “Getting Started” in your learning about containerization or you want to hear about “Innovation” using the Docker container platform for data sciences, AI, machine learning, and IoT, we have sessions that will be just right for you.

You can will also find content we’ve Continue reading

SSDs get bigger, while prices get smaller

With so much going on in the enterprise storage world, two bits of good news have come out — and it’s only Tuesday. Capacity is going up, and prices are coming down.According to the report from DRAMeXchange, the enterprise SSD market has been growing fast. It projects enterprise SSD sales to top 30 million units this year, up from fewer than 20 million units in 2016, and that rate of growth is expected to continue in the next three years.That’s despite tight supply for memory chips in the first quarter resulting in high average selling prices. For the second quarter, which we are in the midst of, DRAMeXchange expects a rebound in demand due to increased supply.To read this article in full, please click here

IDG Contributor Network: Build your technology layers on a cloud data foundation

The modern enterprise is comprised of a complex set of application stacks that span a disparate variety of virtual machines, physical servers, and proprietary storage hardware. Tentacles reach from headquarters, branch and remote offices, and offshore facilities around the world to technology stacks, SaaS providers and a multitude of applications.Over the years layer after layer of technology has accumulated, but rather than replace what came before, we simply built on top through a long series of incremental decisions and implementations. For many, mainframes were bolstered by a client-server layer that moved into data centers. Web technology added SaaS beyond our data centers before virtualization and server consolidation reorganized everything into more manageable chunks.To read this article in full, please click here

US Senate Makes Moves to Reinstate Net Neutrality, But Sustainable Rules Are Still Necessary

On May 16, the Senate passed a Congressional Review Act (CRA) to overturn the Federal Communication Commission’s (FCC) repeal of the 2015 Open Internet Order. A CRA allows Congress to review regulations issued by government agencies and overrule them with a majority vote. This vote, led by Senator Ed Markey (D-MA), is a step towards reinstating the FCC’s 2015 net neutrality rules.

The CRA will now move to the House, where it will require a majority vote in order to pass before heading to President Trump’s desk for his signature. If the CRA passes the House and gets the President’s signature, the 2015 Order will be reinstated.

Despite the CRA’s success in the Senate, it is unlikely that it will pass the House. In the Senate, every Democrat, two Independents, and three Republicans were needed to pass the CRA. In the House, Democrats hold just 193 of 435 seats and would need to be joined by 25 Republican or Independent Representatives to move the CRA to the President’s desk. Even then, the bill would face another major hurdle, as President Trump has previously expressed support for overturning the FCC’s Open Internet Order.

This is not to mention the court cases Continue reading

Building the Digital Silk Road Together: Kyrgyz Chapter Proposes Ideas for Internet Development in Central Asia at Cambridge University Forum

Central Asia, the most remote landlocked mountainous region in the world, has some of the most expensive Internet in global comparison. The cost of it can easily reach 10-20% of average monthly salary. In absolute terms, the price of the Internet can reach triple digits for 1 Mbps.

Acknowledging such challenges and considering the benefits that the Internet can bring, Central Asian governments are embarking on national digitalization strategies. The Kyrgyz Republic has launched a national program on digital transformation “Taza Koom” (“Transparent Society”). The program focuses on building an open government and a digital economy.

When it comes to digital development strategies, cooperation among countries is a mutually beneficial approach. To foster such collaboration, Cambridge University initiated a common platform called Digital Dialogue for Central Asia. The first meeting of this platform Making Inroads into Digital Transformation took place in Astana in April 2018.

Speaking at the forum on behalf of the Internet Society’s Kyrgyz Chapter, I proposed to jointly build the Digital Silk Road guided by the slogan: “free movement of ideas, people, creativity, technology and innovation”. Central Asia, with its favourable geographical location in Eurasia, could become the connecting host and focal point – a Continue reading

How to use logger on Linux

The logger command provides an easy way to add log files to /var/log/syslog — from the command line, from scripts, or from other files. In today's post, we'll take a look at how it works.How easy is easy? This easy. Just type logger <message> on the command line and your message will be added to the end of the /var/log/syslog file.$ logger comment to be added to log $ tail -1 /vvar/log/syslog May 21 18:02:16 butterfly shs: comment to be added to log Command output You can also add the output from commands by enclosing the commands in backticks.$ logger `who` $ tail -1 /var/log/syslog May 21 18:02:43 butterfly shs: shs pts/0 2018-05-21 15:57 (192.168.0.15) [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] Content from a file The contents of text files can be added by using the -f option. Put the name of the file to be added to the log following the -f option as shown below.To read this article in full, please click here

Using logger on Linux

The logger command provides an easy way to add log files to /var/log/syslog -- from the command line, from scripts or from other files. In today's post, we'll take a look at how it works.How easy is easy? This easy. Just type logger <message> on the command line and your message will be added to the end of the /var/log/syslog file.$ logger comment to be added to log $ tail -1 /vvar/log/syslog May 21 18:02:16 butterfly shs: comment to be added to log Command output You can also add the output from commands by enclosing the commands in backticks.$ logger `who` $ tail -1 /var/log/syslog May 21 18:02:43 butterfly shs: shs pts/0 2018-05-21 15:57 (192.168.0.15) Content from a file The contents of text files can be added by using the -f option. Put the name of the file to be added to the log following the -f option as shown below.To read this article in full, please click here

22 essential security commands for Linux

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems.sudo Running privileged commands with sudo  – instead of switching user to root  – is one essential good practice as it helps to ensure that you only use root privilege when needed and limits the impact of mistakes. Your access to the sudo command depends on settings in the /etc/sudoers and /etc/group files. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ] $ sudo adduser shark Adding user `shark' ... Adding new group `shark' (1007) ... Adding new user `shark' (1007) with group `shark' ... Creating home directory `/home/shark' ... Copying files from `/etc/skel' ... Enter new UNIX password: Retype new UNIX password: passwd: password updated successfully Changing the user information for shark Enter the new value, or press ENTER for the default Full Name []: shark Room Number []: Work Phone []: Home Phone []: Other []: Is the information correct? [Y/n] Y If you run sudo Continue reading

22 essential security commands for Linux

There are many aspects to security on Linux systems – from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems.To read this article in full, please click here(Insider Story)

SafeKeeper: protecting web passwords using trusted execution environments

SafeKeeper: protecting web passwords using trusted execution environments Krawiecka et al., WWW’18

(If you don’t have ACM Digital Library access, the paper can be accessed either by following the link above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page).

Today’s paper is all about password management for password protected web sites / applications. Even if we assume that passwords are salted and hashed in accordance with best practice (NIST’s June 2017 digital identity guidelines now mandate the use of keyed one-way functions such as CMAC), an adversary that can obtain a copy of the back-end database containing the per-user salts and the hash values can still mount brute force guessing attacks against individual passwords.

SafeKeeper goes a lot further in its protection of passwords. What really stands out is the threat model. SafeKeeper keeps end user passwords safe even when we assume that an adversary has unrestricted access to the password database. Not only that, the adversary is able to modify the content sent to the user from the web site (including active content such as client-side scripts). And not only that! The adversary is also able to read all Continue reading

Rate Limiting: Delivering more rules, and greater control

Rate Limiting: Delivering more rules, and greater control

With more and more platforms taking the necessary precautions against DDoS attacks like integrating DDoS mitigation services and increasing bandwidth at weak points, Layer 3 and 4 attacks are just not as effective anymore. For Cloudflare, we have fully automated Layer 3/4 based protections with our internal platform, Gatebot. In the last 6 months we have seen a large upward trend of Layer 7 based DDoS attacks. The key difference to these attacks is they are no longer focused on using huge payloads (volumetric attacks), but based on Requests per Second to exhaust server resources (CPU, Disk and Memory). On a regular basis we see attacks that are over 1 million requests per second. The graph below shows the number of Layer 7 attacks Cloudflare has monitored, which is trending up. On average seeing around 160 attacks a day, with some days spiking up to over 1000 attacks.

Rate Limiting: Delivering more rules, and greater control

A year ago, Cloudflare released Rate Limiting and it is proving to be a hugely effective tool for customers to protect their web applications and APIs from all sorts of attacks, from “low and slow” DDoS attacks, through to bot-based attacks, such as credential stuffing and content scraping. We’re pleased about the Continue reading

The Inevitability Of Death, Taxes, And Clouds

“Death and taxes” is a phrase that is usually attributed to Benjamin Franklin from a quote in a 1789 letter: “In this world nothing can be said to be certain, except death and taxes.” Public cloud computing providers didn’t exist back in the days of Franklin, but if they did, they would have no doubt made the list. Here’s why. Public clouds for large data analysis, just like death and taxes, are clearly inevitable because of two things. One simple and now rather worn out cliché. That would be scale and the slightly more subtle data.

Nation states are racing

The Inevitability Of Death, Taxes, And Clouds was written by James Cuff at The Next Platform.

Research: Robustness in Complex Systems

While the network engineering world tends to use the word resilience to describe a system that will support rapid change in the real world, another word often used in computer science is robustness. What makes a system robust or resilient? If you ask a network engineer this question, the most likely answer you will get is something like there is no single point of failure. This common answer, however, does not go “far enough” in describing resilience. For instance, it is at least sometimes the case that adding more redundancy into a network can actually harm MTTR. A simple example: adding more links in parallel can cause the control plane to converge more slowly; at some point, the time to converge can be reduced enough to offset the higher path availability.

In other cases, automating the response to a change in the network can harm MTTR. For instance, we often nail a static route up and redistribute that, rather than redistributing live routing information between protocols. Experience shows that sometimes not reacting automatically is better than reacting automatically.

This post will look at a paper that examines robustness more deeply, Robustness in Complexity Systems,” by Steven Gribble. While this Continue reading

1 2 3 2,171