Baseball season is well underway, and to celebrate, we're excited to introduce the Cloudflare All-Stars Fantasy League: a group of fictitious sports teams that revolve around some of Cloudflare’s most championed products and services. Their mission? To help build a better Internet.
Cloudflare HQ is located just a block away from the San Francisco Giants Stadium. Each time there's a home game, crowds of people walk past Cloudflare's large 2nd street windows and peer in to the office space. The looks in their eyes scream: "Cloudflare! Teach me about your products while giving me something visually stimulating to look at!"
They asked. We listened.
The design team saw a creative opportunity, seized it, and hit it out of the park. Inspired by the highly stylized sports badges and emblems of some real-life sports teams, we applied this visual style to our own team badges. We had a lot of fun coming up with the team names, as well as figuring out which visuals to use for each.
For the next few months, the Cloudflare All-Stars teams will be showcased within the large Cloudflare HQ windows facing 2nd street and en route to Giants Stadium. Feel free to Continue reading
On May 16, the Senate passed a Congressional Review Act (CRA) to overturn the Federal Communication Commission’s (FCC) repeal of the 2015 Open Internet Order. A CRA allows Congress to review regulations issued by government agencies and overrule them with a majority vote. This vote, led by Senator Ed Markey (D-MA), is a step towards reinstating the FCC’s 2015 net neutrality rules.
The CRA will now move to the House, where it will require a majority vote in order to pass before heading to President Trump’s desk for his signature. If the CRA passes the House and gets the President’s signature, the 2015 Order will be reinstated.
Despite the CRA’s success in the Senate, it is unlikely that it will pass the House. In the Senate, every Democrat, two Independents, and three Republicans were needed to pass the CRA. In the House, Democrats hold just 193 of 435 seats and would need to be joined by 25 Republican or Independent Representatives to move the CRA to the President’s desk. Even then, the bill would face another major hurdle, as President Trump has previously expressed support for overturning the FCC’s Open Internet Order.
Central Asia, the most remote landlocked mountainous region in the world, has some of the most expensive Internet in global comparison. The cost of it can easily reach 10-20% of average monthly salary. In absolute terms, the price of the Internet can reach triple digits for 1 Mbps.
Acknowledging such challenges and considering the benefits that the Internet can bring, Central Asian governments are embarking on national digitalization strategies. The Kyrgyz Republic has launched a national program on digital transformation “Taza Koom” (“Transparent Society”). The program focuses on building an open government and a digital economy.
When it comes to digital development strategies, cooperation among countries is a mutually beneficial approach. To foster such collaboration, Cambridge University initiated a common platform called Digital Dialogue for Central Asia. The first meeting of this platform Making Inroads into Digital Transformation took place in Astana in April 2018.
Speaking at the forum on behalf of the Internet Society’s Kyrgyz Chapter, I proposed to jointly build the Digital Silk Road guided by the slogan: “free movement of ideas, people, creativity, technology and innovation”. Central Asia, with its favourable geographical location in Eurasia, could become the connecting host and focal point – a Continue reading
Networking engineers familiar with Junos love to tell me how easy it is to configure and operate IBGP EVPN overlay on top of EBGP IP underlay. Krzysztof Szarkowicz was kind enough to send me the (probably) simplest possible configuration (here’s another one by Alexander Grigorenko)
To learn more about EVPN technology and its use in data center fabrics, watch the EVPN Technical Deep Dive webinar.Read more ...
Many of the groups working on edge computing are associated with telco networking. But edge computing is definitely not limited to telco networks.
With more and more platforms taking the necessary precautions against DDoS attacks like integrating DDoS mitigation services and increasing bandwidth at weak points, Layer 3 and 4 attacks are just not as effective anymore. For Cloudflare, we have fully automated Layer 3/4 based protections with our internal platform, Gatebot. In the last 6 months we have seen a large upward trend of Layer 7 based DDoS attacks. The key difference to these attacks is they are no longer focused on using huge payloads (volumetric attacks), but based on Requests per Second to exhaust server resources (CPU, Disk and Memory). On a regular basis we see attacks that are over 1 million requests per second. The graph below shows the number of Layer 7 attacks Cloudflare has monitored, which is trending up. On average seeing around 160 attacks a day, with some days spiking up to over 1000 attacks.
A year ago, Cloudflare released Rate Limiting and it is proving to be a hugely effective tool for customers to protect their web applications and APIs from all sorts of attacks, from “low and slow” DDoS attacks, through to bot-based attacks, such as credential stuffing and content scraping. We’re pleased about the Continue reading
What happened to integrity in cybersecurity? I don’t mean integrity in terms of a company’s missteps in disclosing a data breach, nor around the ethics of sketchy security “research” practices. I’m talking about integrity as a foundational approach in protecting valuable data and systems. —Tim Erlin @Dark Reading
Operators are moving aggressively to tighten their use of OpenStack and Kubernetes to bolster cloud deployments.
While the network engineering world tends to use the word resilience to describe a system that will support rapid change in the real world, another word often used in computer science is robustness. What makes a system robust or resilient? If you ask a network engineer this question, the most likely answer you will get is something like there is no single point of failure. This common answer, however, does not go “far enough” in describing resilience. For instance, it is at least sometimes the case that adding more redundancy into a network can actually harm MTTR. A simple example: adding more links in parallel can cause the control plane to converge more slowly; at some point, the time to converge can be reduced enough to offset the higher path availability.
In other cases, automating the response to a change in the network can harm MTTR. For instance, we often nail a static route up and redistribute that, rather than redistributing live routing information between protocols. Experience shows that sometimes not reacting automatically is better than reacting automatically.
This post will look at a paper that examines robustness more deeply, Robustness in Complexity Systems,” by Steven Gribble. While this Continue reading
The small cell platform supports interface splits between the central unit and the remote radio head, which means operators can use it for fronthaul.
The startup’s technology aims to make digital assistants and bots sound more human.
Microsoft earlier this month said it has seen a 10x increase in Kubernetes usage on Azure.
Take a Network Break! In this week’s episode we examine why HPE acquired Plexxi, dig into the latest batch of security advisories from Cisco, and discuss Intel’s reference architecture for new uCPE gear.
The Appropriations Committee in the U.S. Congress wants to keep up sanctions pressure against ZTE, AWS adds Verizon as a customer, and a new DDoS attack technique looks to thwart a common filter.
Toshiba clears its last hurdle to sell is semiconductor business, Cisco posts a positive third quarter, and Symantec announces an internal audit into its financial results.
ThousandEyes gives you performance visibility from every user to every app over any network, both internal and external, so you can smoothly migrate to the cloud, transform your WAN, troubleshoot faster and deliver exceptional user experiences. Sign up for a free account at thousandeyes.com/packetpushers and choose a free ThousandEyes t-shirt.
Find out how Cisco and its trusted partners Equilibrium Security and ePlus/IGX can help your organization tackle the General Data Protection Regulation, or GDPR. Tune into Packet Pushers Priority Queue episode 147 to get practical insights on how to get your arms around these wide-ranging rules.