Archive

Category Archives for "Networking"

10 hot hybrid-cloud startups to watch

As the cloud matures, many businesses are finding that not every application belongs in public clouds. Due to regulatory issues, security risks, data ownership concerns, and fears of cloud lock-in, many applications are stubbornly rooted in on-premises architectures.The startups in this roundup understand that, and rather than trying to sweet talk enterprises into forklift upgrades, these startups are willing to work under hybrid-cloud constraints.[ Now see After virtualization and cloud, what's left on premises?] The startups below federate data, making it available from any cloud to any application; provide application virtualization software, which enables enterprises to move workloads to and from various clouds at will; provide cloud file systems that optimize and mobilize data, and much more.To read this article in full, please click here

Reflections on the Cloud Networking Decade

When I joined Arista ten years ago, we were in the midst of developing a novel purpose-built software architecture from a clean sheet of paper for networking. The financial services industry was in crisis, with the collapse of major banks like Lehman Brothers. In parallel, emerging slowly but surely, was a new breed of hyper-scale cloud operators. Amazon AWS, Microsoft Azure and Google GCP were in the early stages of shaping what was to become the public cloud. The requirements of these new titans provided a source of inspiration for the Arista founders and me. We couldn’t have predicted the pace nor the impact of this cloud fury; it came strongly and rapidly. As I reminisce over the past decade, it is clear that the cloud inflection has forever changed the face of enterprise IT for the better. Yet it is just the beginning, and there is much ahead.

The new Apple Watch 4 represents an epic fail for smartwatches

Remember when we thought smartwatches and wearable technology were going to change the world?According to much of the consumer tech press, the new Apple Watch Series 4 stole the show from the iPhones announced in Apple’s big fall press event. Reviews were generally positive for the new wearable device, and along with the new edge-to-edge display and other improvements, much of the love centered around new heart-health monitoring features, including an electrocardiogram (ECG), low heart rate detection, and atrial fibrillation (AFib) detection. There’s also a new fall-detection feature designed to automatically summon help if needed.To read this article in full, please click here

Apple Watch 4 represents an epic fail for smartwatches in business

Remember when we thought smartwatches and wearable technology were going to change the world — and the enterprise? That doesn't seem to be happening quite yet.According to much of the consumer tech press, the new Apple Watch Series 4 stole the show from the iPhones announced in Apple’s big fall press event. Reviews were generally positive for the new wearable device, and along with the new edge-to-edge display and other improvements, much of the love centered around new heart-health monitoring features, including an electrocardiogram (ECG), low heart rate detection, and atrial fibrillation (AFib) detection. There’s also a new fall-detection feature designed to automatically summon help if needed.To read this article in full, please click here

Linux tricks that even you can love

Good Linux command line tricks don’t only save you time and trouble. They also help you remember and reuse complex commands, making it easier for you to focus on what you need to do, not how you should go about doing it. In this post, we’ll look at some handy command line tricks that you might come to appreciate.Editing your commands When making changes to a command that you're about to run on the command line, you can move your cursor to the beginning or the end of the command line to facilitate your changes using the ^a (control key plus “a”) and ^e (control key plus “e”) sequences.You can also fix and rerun a previously entered command with an easy text substitution by putting your before and after strings between ^ characters -- as in ^before^after^.To read this article in full, please click here

Linux tricks that can save you time and trouble

Good Linux command line tricks don’t only save you time and trouble. They also help you remember and reuse complex commands, making it easier for you to focus on what you need to do, not how you should go about doing it. In this post, we’ll look at some handy command line tricks that you might come to appreciate.Editing your commands When making changes to a command that you're about to run on the command line, you can move your cursor to the beginning or the end of the command line to facilitate your changes using the ^a (control key plus “a”) and ^e (control key plus “e”) sequences.You can also fix and rerun a previously entered command with an easy text substitution by putting your before and after strings between ^ characters -- as in ^before^after^.To read this article in full, please click here

End-to-End Integrity with IPFS

End-to-End Integrity with IPFS

This post describes how to use Cloudflare's IPFS gateway to set up a website which is end-to-end secure, while maintaining the performance and reliability benefits of being served from Cloudflare’s edge network. If you'd rather read an introduction to the concepts behind IPFS first, you can find that in our announcement. Alternatively, you could skip straight to the developer docs to learn how to set up your own website.

By 'end-to-end security', I mean that neither the site owner nor users have to trust Cloudflare to serve the correct documents, like they do now. This is similar to how using HTTPS means you don't have to trust your ISP to not modify or inspect traffic.

End-to-End Integrity with IPFS
End-to-End Integrity with IPFS

CNAME Setup with Universal SSL

The first step is to choose a domain name for your website. Websites should be given their own domain name, rather than served directly from the gateway by root hash, so that they are considered a distinct origin by the browser. This is primarily to prevent cache poisoning, but there are several functional advantages as well. It gives websites their own instance of localStorage and their own cookie jar which are sandboxed from inspection and manipulation by malicious third-party documents. Continue reading