Archive

Category Archives for "Networking"

Buildings should behave like humans

One must be able to walk into a room, including those in data centers, and not only access information about every facet of it, but also importantly, have it automatically solve all of its problems on its own.Site 1001, which specializes in artificial intelligence-run facilities management systems, says the problem should be achieved through neural networks that copy how humans and animals think.The company, a spin-off of JE Dunn Construction Co., demonstrated its all-listening, predictive building maintenance at CES 2018 last week. It says its big data, AI-driven system will ultimately produce smarter and healthier buildings.To read this article in full, please click here

Buildings should behave like humans

One must be able to walk into a room, including those in data centers, and not only access information about every facet of it, but also importantly, have it automatically solve all of its problems on its own.Site 1001, which specializes in artificial intelligence-run facilities management systems, says the problem should be achieved through neural networks that copy how humans and animals think.The company, a spin-off of JE Dunn Construction Co., demonstrated its all-listening, predictive building maintenance at CES 2018 last week. It says its big data, AI-driven system will ultimately produce smarter and healthier buildings.To read this article in full, please click here

Getting started with Linux: the basics – part 2

In part 1 of our series about getting started with Linux, we learned how to download Linux, whether you should use the CLI or the GUI, how to get a SSH client, how to login to Linux and how to get help. In this post, you’ll learn how to know what type of Linux you are using and how to navigate the Linux file system.

How do I know what type of Linux I am using?

Because there are so many different types of Linux, you want to be sure you know what distribution and version you are using (for the sake of searching the right documentation on the Internet, if nothing else). Keep in mind a couple different commands to identify your Linux version.

The uname command shows the basic type of operating system you are using, like this:

david@debian:~$ uname -a
Linux debian 3.16.0-4-686-pae #1 SMP Debian 3.16.43-2 (2017-04-30) i686 GNU/Linux

And the hostnamectl command shows you the hostname of the Linux server as well as other system information, like the machine ID, virtualization hypervisor (if used), operating system and Linux kernel version. Here’s an example:

david@debian:~$ hostnamectl
Static hostname: debian
Icon name: computer-vm
Continue reading

IETF 101

I will be at IETF 101 in London in March. If you have never been to an IETF before and live in the London area, this is a great chance to come see how the standardization process works, and even get involved for the long term.

Wide area networks: What WANs are and where they’re headed

If it weren’t for wide-area networks it wouldn’t be possible to create unified networks for organizations with far-flung locations, to telecommute, or to do online anything. But WANs do exist and have for decades, constantly evolving to carry more and more traffic faster as demands increase and technology becomes more powerful.What is a WAN? A WAN is a network that uses various links – private lines, Multiprotocol Label Switching (MPLS), virtual private networks (VPNs), wireless (cellular), the Internet – to connect smaller metropolitan and campus networks in diverse locations into a single, distributed network. The sites they connect could be a few miles apart or halfway around the globe. In an enterprise, the purposes of a WAN could include connecting branch offices or even individual remote workers with headquarters or the data center, in order to share corporate resources and communications.To read this article in full, please click here

Wide-area networks: What WANs are and where they’re headed

If it weren’t for wide-area networks, it wouldn’t be possible to create unified networks for organizations with far-flung locations, to telecommute, or to do online anything. But WANs do exist and have for decades, constantly evolving to carry more and more traffic faster as demands increase and technology becomes more powerful.What is a WAN? A WAN is a network that uses various links – private lines, Multiprotocol Label Switching (MPLS), virtual private networks (VPNs), wireless (cellular), the Internet – to connect smaller metropolitan and campus networks in diverse locations into a single, distributed network. The sites they connect could be a few miles apart or halfway around the globe. In an enterprise, the purposes of a WAN could include connecting branch offices or even individual remote workers with headquarters or the data center, in order to share corporate resources and communications.To read this article in full, please click here

Wide-area networks: What WANs are and where they’re headed

If it weren’t for wide-area networks, it wouldn’t be possible to create unified networks for organizations with far-flung locations, to telecommute, or to do online anything. But WANs do exist and have for decades, constantly evolving to carry more and more traffic faster as demands increase and technology becomes more powerful.What is a WAN? A WAN is a network that uses various links – private lines, Multiprotocol Label Switching (MPLS), virtual private networks (VPNs), wireless (cellular), the Internet – to connect smaller metropolitan and campus networks in diverse locations into a single, distributed network. The sites they connect could be a few miles apart or halfway around the globe. In an enterprise, the purposes of a WAN could include connecting branch offices or even individual remote workers with headquarters or the data center, in order to share corporate resources and communications.To read this article in full, please click here

Deprecating SPDY

Deprecating SPDY

Democratizing the Internet and making new features available to all Cloudflare customers is a core part of what we do. We're proud to be early adopters and have a long record of adopting new standards early, such as HTTP/2, as well as features that are experimental or not yet final, like TLS 1.3 and SPDY.

Participating in the Internet democracy occasionally means that ideas and technologies that were once popular or ubiquitous on the net lose their utility as newer technologies emerge. SPDY is one such technology. Several years ago, Google drafted a proprietary and experimental new protocol called SPDY. SPDY offered many performance improvements over the aging HTTP/1.1 standard and these improvements resulted in significantly faster page load times for real-world websites. Stemming from its success, SPDY became the starting point for HTTP/2 and, when the new HTTP standard was finalized, the SPDY experiment came to an end where it gradually fell into disuse.

As a result, we're announcing our intention to deprecate the use of SPDY for connections made to Cloudflare's edge by February 21st, 2018.

Remembering 2012

Five and a half years ago, when the majority of the web was unencrypted and web developers Continue reading