Archive

Category Archives for "Networking"

Debug Queues from the dash: send, list, and ack messages

Debug Queues from the dash: send, list, and ack messages
Debug Queues from the dash: send, list, and ack messages

Today, August 11, 2023, we are excited to announce a new debugging workflow for Cloudflare Queues. Customers using Cloudflare Queues can now send, list, and acknowledge messages directly from the Cloudflare dashboard, enabling a more user-friendly way to interact with Queues. Though it can be difficult to debug asynchronous systems, it’s now easy to examine a queue’s state and test the full flow of information through a queue.

With guaranteed delivery, message batching, consumer concurrency, and more, Cloudflare Queues is a powerful tool to connect services reliably and efficiently. Queues integrate deeply with the existing Cloudflare Workers ecosystem, so developers can also leverage our many other products and services. Queues can be bound to producer Workers, which allow Workers to send messages to a queue, and to consumer Workers, which pull messages from the queue.

We’ve received feedback that while Queues are effective and performant, customers find it hard to debug them. After a message is sent to a queue from a producer worker, there’s no way to inspect the queue’s contents without a consumer worker. The limited transparency was frustrating, and the need to write a skeleton worker just to debug a queue was high-friction.

Debug Queues from the dash: send, list, and ack messages

Now, Continue reading

Introducing scheduled deletion for Cloudflare Stream

Introducing scheduled deletion for Cloudflare Stream
Introducing scheduled deletion for Cloudflare Stream

Designed with developers in mind, Cloudflare Stream provides a seamless, integrated workflow that simplifies video streaming for creators and platforms alike. With features like Stream Live and creator management, customers have been looking for ways to streamline storage management.

Today, August 11, 2023, Cloudflare Stream is introducing scheduled deletion to easily manage video lifecycles from the Stream dashboard or our API, saving time and reducing storage-related costs. Whether you need to retain recordings from a live stream for only a limited time, or preserve direct creator videos for a set duration, scheduled deletion will simplify storage management and reduce costs.

Stream scheduled deletion

Scheduled deletion allows developers to automatically remove on-demand videos and live recordings from their library at a specified time. Live inputs can be set up with a deletion rule, ensuring that all recordings from the input will have a scheduled deletion date upon completion of the stream.

Let’s see how it works in those two configurations.

Getting started with scheduled deletion for on-demand videos

Whether you run a learning platform where students can upload videos for review, a platform that allows gamers to share clips of their gameplay, or anything in between, scheduled deletion can help Continue reading

IBM set to deliver mainframe AI services, support x

As it previewed in March, IBM is set to deliver an AI-infused, hybrid-cloud oriented version of its z/OS mainframe operating system.Set for delivery on Sept. 29, z/OS 3.1, the operating system grows IBM’s AI portfolio to let customers securely deploy AI applications co-located with z/OS applications and data, as well as a variety of new features such as container extensions for Red Hat and Linux applications that better support hybrid cloud applications on the Big Iron.In this release of the mainframe’s OS, AI support is implemented in a feature package called AI System Services for IBM z/OS version 1.1. that lets customers build an AI Framework that IBM says is designed to support initial and future intelligent z/OS management capabilities.To read this article in full, please click here

IBM set to deliver mainframe AI services, support

As it previewed in March, IBM is set to deliver an AI-infused, hybrid-cloud oriented version of its z/OS mainframe operating system.Set for delivery on Sept. 29, z/OS 3.1, the operating system grows IBM’s AI portfolio to let customers securely deploy AI applications co-located with z/OS applications and data, as well as a variety of new features such as container extensions for Red Hat and Linux applications that better support hybrid cloud applications on the Big Iron.In this release of the mainframe’s OS, AI support is implemented in a feature package called AI System Services for IBM z/OS version 1.1. that lets customers build an AI Framework that IBM says is designed to support initial and future intelligent z/OS management capabilities.To read this article in full, please click here

IBM set to deliver mainframe AI services, support x

As it previewed in March, IBM is set to deliver an AI-infused, hybrid-cloud oriented version of its z/OS mainframe operating system.Set for delivery on Sept. 29, z/OS 3.1, the operating system grows IBM’s AI portfolio to let customers securely deploy AI applications co-located with z/OS applications and data, as well as a variety of new features such as container extensions for Red Hat and Linux applications that better support hybrid cloud applications on the Big Iron.In this release of the mainframe’s OS, AI support is implemented in a feature package called AI System Services for IBM z/OS version 1.1. that lets customers build an AI Framework that IBM says is designed to support initial and future intelligent z/OS management capabilities.To read this article in full, please click here

IBM set to deliver mainframe AI services, support

As it previewed in March, IBM is set to deliver an AI-infused, hybrid-cloud oriented version of its z/OS mainframe operating system.Set for delivery on Sept. 29, z/OS 3.1, the operating system grows IBM’s AI portfolio to let customers securely deploy AI applications co-located with z/OS applications and data, as well as a variety of new features such as container extensions for Red Hat and Linux applications that better support hybrid cloud applications on the Big Iron.In this release of the mainframe’s OS, AI support is implemented in a feature package called AI System Services for IBM z/OS version 1.1. that lets customers build an AI Framework that IBM says is designed to support initial and future intelligent z/OS management capabilities.To read this article in full, please click here

Software Is Everywhere

"Software is eating the world." Have truer words ever been spoken other than these words by Marc Andreessen?

I've recently been immersed in a number of home automation projects (lights, heating/cooling, presence detection, and more). I was reflecting on what made all of these automations possible: the drastic increase in the amount of software present in the home. As I was reflecting on this, I realized how different my house is in this respect compared to the house I grew up in.

Now, I'm not saying I'm old. More like, the rate of digitization in the world around us has happened at such a pace that even in my short lifetime, the changes have been deep and wide.

This blog post is a tour of things in my house that are software operated that were not software operated in the house I grew up in. For my purposes here, I define "software operated" as any device that has software or firmware that is upgradable either by me or through an over-the-air process that the device or its cloud service initiates. I'm leaving out "obvious" items like laptops, tablets, and mobile phones.

Read the rest of this post.

Hedge 190: Sunspots

What impact would Electromagnetic Pulses (EMP) from a large-scale sunspot have in the modern world? One this episode of the Hedge, Ulrich Speidel and Jaap Akkerhuis join George Michaelson and Russ White to discuss space weather and its impact on communication systems. Note this is a joint episode with Ping, APNIC’s podcast. Because this is a joint recording, the format is a little different than normal.

download

Calico monthly roundup: July 2023

Welcome to the Calico monthly roundup: July edition! From open source news to live events, we have exciting updates to share—let’s get into it!

 

 

Customer case study: Upwork

Using Calico, Upwork was able to enforce zero-trust security for its newly migrated containerized applications on Amazon EKS. Read our new case study to find out how.

Read case study.

Container security – Self-paced workshop

This self-paced tutorial is designed to help you prevent, detect, and stop breaches in containers and Kubernetes. Learn how to secure all aspects of your containerized applications—all at your own pace!

Get started.

Open source news

  • Calico Live – Join the Calico community every Wednesday at 2:00 pm ET for a live discussion about learning how to leverage Calico and Kubernetes for networking and security. We will explore Kubernetes security and policy design, network flow logs and more. Join us live on Linkedin or YouTube.
  • CNCF webinar – Watch our CNCF on-demand webinar, Container and Kubernetes security policy design: 10 critical best practices, here.
  • Calico eBPF and XDP – Learn how to implement eBPF security policies and XDP to achieve better performance in your Kubernetes cluster. Hands-on lab environment available here.
  • Calico Wall of Continue reading

Cisco bolsters mobile core technology with Working Group Two buy

Cisco continued filling its shopping bag with various technology firms – this time saying it intended to acquire cloud native mobile core developer Working Group Two (WG2) for an undisclosed amount.The WG2 buy is Cisco’s fifth since June and its nineth this year.  WG2 is known for its mobile technology that helps public and private service providers and enterprise customers build secure and scalable mobile backbones.The technology will become part of Cisco’s Mobility Services platform which offers a full-stack cloud-native converged core network and distributed edge support.Introduced in February, the Mobility Service is designed to simplify how service providers build, manage, and deliver new mobile services globally at scale and supports a variety of technologies to bring 5G, edge, and cloud technologies, Cisco says.To read this article in full, please click here

VXLAN/EVPN – What Are the Challenges in L2-based Networks?

Before diving into a new technology, it is always useful to understand the previous generation of technology, what the limitations where, and how the new technology intends to overcome them. In this post, let’s look at what some of the challenges were with L2-based networks and how VXLAN/EVPN can overcome them. Before starting, I want to balance the messaging a bit on the bad reputation that STP gets:

  • Radia Perlman did an excellent job with what was available at that time.
  • A lot of the bad reputation comes from a misunderstanding of the protocol.
  • STP-based networks can run just fine but they are often misconfigured (related to the point above).
  • Many issues come from misbehaving end user devices where protection mechanisms have not been implemented (see the point above).
  • It’s natural for technologies to evolve as more compute becomes available and we gain experience.

Keep in mind that the original 802.1D standard was published in 1990. This was long before internet was generally available and our networks were critically important to us. At that time we didn’t measure outages in seconds or even minutes. That said, let’s look at the limitations of a traditional L2 network.

Convergence – In Continue reading

Nvidia flexes generative AI muscle at SIGGRAPH with new GPUs, development software

Looking to solidify its position as the dominant global supplier of chips that support generative AI workoads, Nvidia announced new GPUs and servers as well as a range of new software offerings at the SIGGRAPH conference in Los Angeles this week.On the hardware side, Nvidia announced a new line of servers, the OVX series. The server line is designed to use up to eight of the company’s L40S GPUs. The GPUs are based on the company's Ada Lovelace architecture, which succeeded Ampere as the microarchitecture in use in its main line graphics cards. Each L40S packs 48GB of memory and is designed with complex AI workloads in mind, boasting 1.45 petaflops of tensor processing power.To read this article in full, please click here

Automated namespace isolation with Calico

Calico has recently introduced a powerful new policy recommendation engine that enables DevOps, SREs, and Kubernetes operators to automatically generate Calico policies to implement namespace isolation and improve the security posture of their clusters.

This new recommendation engine is unique for three reasons:

  1. Calico’s policy recommendations work continuously in the background over a user-configurable time period. This ensures that less frequent traffic flows are also accounted for in recommended policies.
  2. Policy recommendations leverage Calico’s policy tiers. Tiers enforce an order of precedence on how Calico policies are evaluated and enforced. The recommended policies are placed in their own tier and Calico ensures each generated rule does not conflict with other policies you have implemented.
  3. Recommended policies are StagedNetworkPolicies, allowing admins and operators to audit the behavior of these security policies before actively enforcing them.

In this blog, we’ll dive into each of these areas in more detail and provide an in-depth overview of how policy recommendations work and how it can improve the security posture of your cluster.

Before we get started, let’s quickly talk about namespace isolation and why it’s so important.

Why is namespace isolation important?

Namespaces are a foundational concept within Kubernetes. They help divide your Continue reading

BrandPost: Using a Hybrid Mesh Firewall to Increase Network Security

Cybercriminals aren’t slowing down, and their campaigns are becoming more complex and harder to detect. Between advanced persistent attacks, attempts to infiltrate nontraditional devices, and the increase in multifaceted attack strategies, networks are under constant siege. At the same time, the rise of the Internet of Things (IoT), hybrid-cloud computing, and remote work demands, as well as the continued shortage of skilled security professionals, all make it more challenging than ever to secure and manage enterprise environments. To read this article in full, please click here