Archive

Category Archives for "Networking"

Edge security: There’s lots of attack surfaces to worry about

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades.But the edge adds its own wrinkles to those problems, making them, in many cases, more difficult to address. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The most common IoT vulnerability occurs because many sensors and edge computing devices are running some kind of built-in web server to allow for remote access and management. This is an issue because many end-users don’t – or, in some cases, can’t – change default login and password information, nor are they able to seal them off from the Internet at large. There are dedicated gray-market search sites out there to help bad actors find these unsecured web servers, and they can even be found with a little creative Googling, although Joan Pepin, CISO at security and authentication vendor Auth0, said that the search giant has taken steps recently to make that process Continue reading

Wi-Fi 6, 5G play big in Cisco’s mobile forecast

The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here

Wi-Fi 6, 5G play big in Cisco’s mobile forecast

The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here

Wi-Fi 6, 5G play big in Cisco’s mobile forecast

The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here

BrandPost: Top Ten Reasons to Think Outside the Router – No. 3: It’s MPLS Contract Renewal Time

Silver Peak continues to count down the Top Ten Reasons to Think Outside the Router in our homage to the iconic David Letterman Top Ten List from his former Late Show. Click for the #4,  #5, #6, #7, #8, #9 and #10 reasons to replace conventional branch routers with a business-driven SD-WAN platform.To read this article in full, please click here

BrandPost: Top Ten Reasons to Think Outside the Router – No. 3: It’s MPLS Contract Renewal Time

Silver Peak continues to count down the Top Ten Reasons to Think Outside the Router in our homage to the iconic David Letterman Top Ten List from his former Late Show. Click for the #4,  #5, #6, #7, #8, #9 and #10 reasons to replace conventional branch routers with a business-driven SD-WAN platform.To read this article in full, please click here

IDG Contributor Network: Why blockchain may be blockchain’s best cybersecurity option

One of the hallmark features of blockchain is that it is supposedly much more secure, adding remarkable levels of transparency that could help better identify and mitigate cyber threats. But, at a time when we’re approaching 2,000 blockchain projects in development worldwide, watching thousands of crypto miners do their thing each day and seeing billions of investment dollars pouring in each year, are we taking warnings about potential threats seriously? Has the greater community taken some aspects of blockchain’s security for granted? The hard truths reveal affirmatives to both questions.To read this article in full, please click here

IDG Contributor Network: Why blockchain may be blockchain’s best cybersecurity option

One of the hallmark features of blockchain is that it is supposedly much more secure, adding remarkable levels of transparency that could help better identify and mitigate cyber threats. But, at a time when we’re approaching 2,000 blockchain projects in development worldwide, watching thousands of crypto miners do their thing each day and seeing billions of investment dollars pouring in each year, are we taking warnings about potential threats seriously? Has the greater community taken some aspects of blockchain’s security for granted? The hard truths reveal affirmatives to both questions.To read this article in full, please click here

IDG Contributor Network: Why blockchain may be blockchain’s best cybersecurity option

One of the hallmark features of blockchain is that it is supposedly much more secure, adding remarkable levels of transparency that could help better identify and mitigate cyber threats. But, at a time when we’re approaching 2,000 blockchain projects in development worldwide, watching thousands of crypto miners do their thing each day and seeing billions of investment dollars pouring in each year, are we taking warnings about potential threats seriously? Has the greater community taken some aspects of blockchain’s security for granted? The hard truths reveal affirmatives to both questions.To read this article in full, please click here

Why predictive maintenance hasn’t taken off as expected

“Two years ago, predictive maintenance was forecast to be one of the most promising uses of the industrial Internet of Things (IoT).”That’s the lead of report based on a recent Bain & Company survey of more than 600 high-tech executives (Beyond Proofs of Concept: Scaling the Industrial IoT, by Bain partners Michael Schallehn, Christopher Schorling, Peter Bowen and Oliver Straehle). The report goes on to note that identifying precisely when equipment might fail “seemed like a no-brainer.” And yet, the report concludes, “predictive maintenance has failed to take off as broadly as expected.” In fact, industrial leaders were not as excited about predictive maintenance as they were back in a 2016 survey.To read this article in full, please click here

Why predictive maintenance hasn’t taken off as expected

“Two years ago, predictive maintenance was forecast to be one of the most promising uses of the industrial Internet of Things (IoT).”That’s the lead of report based on a recent Bain & Company survey of more than 600 high-tech executives (Beyond Proofs of Concept: Scaling the Industrial IoT, by Bain partners Michael Schallehn, Christopher Schorling, Peter Bowen and Oliver Straehle). The report goes on to note that identifying precisely when equipment might fail “seemed like a no-brainer.” And yet, the report concludes, “predictive maintenance has failed to take off as broadly as expected.” In fact, industrial leaders were not as excited about predictive maintenance as they were back in a 2016 survey.To read this article in full, please click here

Announcing workers.dev

Announcing workers.dev

We are working really hard to allow you to deploy Workers without having a Cloudflare domain. You will soon be able to deploy your Cloudflare Workers to a subdomain-of-your-choice.workers.dev, which you can go claim now on workers.dev!

Why are we doing this?

You may have read the announcement blog post for Workers (or one of the many tutorials and guest posts), and thought “let me give this a try!”. If you’re an existing Cloudflare customer, you logged into the dashboard, and found a new icon called “Workers”, paid $5 and were on your way. If you’re not, you clicked “Sign Up”, but instead of getting to create and deploy a Worker, we asked you for your domain (if you didn’t have one, we had you register one), and move your nameservers.

Since launch, we have had tons of people who wanted to build a new serverless project from scratch or just try Workers out, but found it difficult to get started. We want to make it easier for anyone to get started building and deploying serverless applications.

How did we get here?

The way you get started on Workers today reflects our journey as a company. Continue reading