Archive

Category Archives for "Networking"

Conservative group takes credit for anti-net neutrality comments

A conservative group took credit for a barrage of anti-net neutrality comments posted on the U.S. Federal Communications Commission's website this week, but it denied generating fake activism.The Center for Individual Freedom said it did not use a bot to generate comments after news reports raised questions about the legitimacy of the posts. Between Monday and early Wednesday afternoon, the FCC had received more than 128,000 comments duplicating the language provided by CFIF.To read this article in full or to leave a comment, please click here

Ad network takes steps to reduce fraud

The fraud rates for online ads are scary, with advertisers losing billions of dollars each year.Last week, Pixalate released a report showing that 35 percent of U.S. desktop ad impressions sold through programmatic advertising networks are fraudulent. Programmatic ads are those purchased through online networks, often through automatic bidding systems, instead of directly from individual publishers.U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8 billion is lost to fraud.To read this article in full or to leave a comment, please click here

Ad network takes steps to reduce fraud

The fraud rates for online ads are scary, with advertisers losing billions of dollars each year.Last week, Pixalate released a report showing that 35 percent of U.S. desktop ad impressions sold through programmatic advertising networks are fraudulent. Programmatic ads are those purchased through online networks, often through automatic bidding systems, instead of directly from individual publishers.U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8 billion is lost to fraud.To read this article in full or to leave a comment, please click here

Intel concerned about name of John McAfee’s privacy phone

Intel has told a court that MGT Capital Investments has gone ahead with the announcement of the “John McAfee Privacy Phone,” even though the company that proposes to change its name to “John McAfee Global Technologies” has previously said that it did not plan to launch products and services under the McAfee mark.The chipmaker claims it acquired the mark when it bought McAfee Inc. in 2011, and has used and promoted it for security products, services, and publications for consumers and businesses. Security expert John McAfee has stated that he did not sign away rights to his personal name.Intel spun off last month its security business as a separate company, called McAfee, in which it now owns 49 percent of the equity, with the balance owned by investment firm TPG. The federal court had earlier refused John McAfee and MGT Capital a preliminary injunction until the resolution of the dispute on Intel’s transfer of marks and related assets containing the word McAfee as part of the spin-out.To read this article in full or to leave a comment, please click here

Intel concerned about name of John McAfee’s privacy phone

Intel has told a court that MGT Capital Investments has gone ahead with the announcement of the “John McAfee Privacy Phone,” even though the company that proposes to change its name to “John McAfee Global Technologies” has previously said that it did not plan to launch products and services under the McAfee mark.The chipmaker claims it acquired the mark when it bought McAfee Inc. in 2011, and has used and promoted it for security products, services, and publications for consumers and businesses. Security expert John McAfee has stated that he did not sign away rights to his personal name.Intel spun off last month its security business as a separate company, called McAfee, in which it now owns 49 percent of the equity, with the balance owned by investment firm TPG. The federal court had earlier refused John McAfee and MGT Capital a preliminary injunction until the resolution of the dispute on Intel’s transfer of marks and related assets containing the word McAfee as part of the spin-out.To read this article in full or to leave a comment, please click here

Cape Town (South Africa): Cloudflare Data Center #113

Cape Town (South Africa): Cloudflare Data Center #113

Cape Town (South Africa): Cloudflare Data Center #113

Five fun facts:

  • Cape Town is where the Atlantic Ocean and the Indian Ocean meet deep in the Southern Hemisphere.
  • The city is the start of the Garden Route, a 185 mile (300 km) glorious coastal drive brimming with native flowers and stunning vistas.
  • Cape Town is the gateway into the Stellenbosch and Franschhoek wine districts that make for very popular weekend excursions.
  • The imposing Table Mountain can be seen from most of Cape Town. When you take the cable car to the top of the mountain, the view from up there is even more stunning.
  • Cape Town is where Cloudflare has placed its 113th data center.

Second data center in South Africa

Back in December 2014, Cloudflare opened our first data center in Africa and our 30th datacenter globally. That was in Johannesburg, which has since seen over 10x growth in traffic delivered to South Africa and surrounding countries.

Now, we are expanding into our second city in South Africa — Cape Town, bringing us 870 miles (1,400km) closer to millions of Internet users. Only 15% smaller than Johannesburg by population, Cape Town commands a majority of the tourism business for the country.

For Cloudflare, our newest Continue reading

Watch Live On May 11 – How does the Internet Affect Society?

Is the Internet bringing us together? Or is it further dividing us? Will the Internet of the future be a force for social cohesion? Or will it lead to greater fragmentation?

Please join us on Thursday, May 11, from 12:30 - 14:00 BST (UTC+1) for a live video stream out of the Royal Institute of International Affairs at Chatham House in London, UK. In the session a panel of experts will address these and many related questions (view the longer description):

Dan York

Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices

Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks.The Persirai botnet has attacked at least four targets, starting in a predictable pattern, according to researchers at Trend Micro.Persirai takes advantage of a known vulnerability in the cameras to infect them, has them download malware from a command and control server, and then puts them to work either infecting other vulnerable cameras or launching DDoS attacks. “Based on the researchers’ observation, once the victim’s IP Camera received C&C commands, which occurs every 24 hours at 12:00 p.m. UTC, the DDoS attacks start,” the researchers say.To read this article in full or to leave a comment, please click here

Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices

Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed denial-of-service attacks.The Persirai botnet has attacked at least four targets, starting in a predictable pattern, according to researchers at Trend Micro.Persirai takes advantage of a known vulnerability in the cameras to infect them, has them download malware from a command and control server, and then puts them to work either infecting other vulnerable cameras or launching DDoS attacks. “Based on the researchers’ observation, once the victim’s IP Camera received C&C commands, which occurs every 24 hours at 12:00 p.m. UTC, the DDoS attacks start,” the researchers say.To read this article in full or to leave a comment, please click here

First iPhone 7s rumor points to Ion-X glass on the rear casing

With good reason, most of the iPhone rumors we see these days center on the highly anticipated iPhone 8. But often lost in the mix is that Apple's 2017 iPhone lineup will not consist of just one device, but three brand new devices. According to a number of recent leaks, Apple's 2017 iPhone lineup will include a flagship iPhone 8 with an OLED display, an iPhone 7s and an iPhone 7s Plus.Now it goes without saying that Apple's iPhone 8 will be the most sought-after device of the bunch, even amid reports that it may come with a $1,000 price tag. Still, because the iPhone 8 launch may not happen until October or November, there's a strong possibility that Apple's other iPhone models will sell in droves in the interim. That said, we've heard curiously little about what Apple plans to do with the iPhone 7s and iPhone 7s Plus. Sure, we know that both devices will feature more advanced internals and perhaps more sophisticated camera modules, but aside from that, most of the attention seems to be focused on all things iPhone 8.To read this article in full or to leave a comment, please click here

How Cloudflare analyzes 1M DNS queries per second

On Friday, we announced DNS analytics for all Cloudflare customers. Because of our scale –– by the time you’ve finished reading this, Cloudflare DNS will have handled millions of DNS queries –– we had to be creative in our implementation. In this post, we’ll describe the systems that make up DNS Analytics which help us comb through trillions of these logs each month.

How logs come in from the edge

Cloudflare already has a data pipeline for HTTP logs. We wanted to utilize what we could of that system for the new DNS analytics. Every time one of our edge services gets an HTTP request, it generates a structured log message in the Cap’n Proto format and sends it to a local multiplexer service. Given the volume of the data, we chose not to record the full DNS message payload, only telemetry data we are interested in such as response code, size, or query name, which has allowed us to keep only ~150 bytes on average per message. It is then fused with processing metadata such as timing information and exceptions triggered during query processing. The benefit of fusing data and metadata at the edge is that we can spread Continue reading

You really should know what the Andrew File System is

When I saw that the creators of the Andrew File System (AFS) had been named recipients of the $35K ACM Software System Award, I said to myself "That's cool, I remember AFS from the days of companies like Sun Microsystems... just please don't ask me to explain what the heck it is."Don't ask my colleagues either. A quick walking-around-the-office survey of a half dozen of them turned up mostly blank stares at the mention of the Andrew File System, a technology developed in the early 1980s and named after Andrew Carnegie and Andrew Mellon. But as the Association for Computing Machinery's award would indicate, AFS is indeed worth knowing about as a foundational technology that paved the way for widely used cloud computing techniques and applications.To read this article in full or to leave a comment, please click here

You really should know what the Andrew File System is

When I saw that the creators of the Andrew File System (AFS) had been named recipients of the $35K ACM Software System Award, I said to myself "That's cool, I remember AFS from the days of companies like Sun Microsystems... just please don't ask me to explain what the heck it is."Don't ask my colleagues either. A quick walking-around-the-office survey of a half dozen of them turned up mostly blank stares at the mention of the Andrew File System, a technology developed in the early 1980s and named after Andrew Carnegie and Andrew Mellon. But as the Association for Computing Machinery's award would indicate, AFS is indeed worth knowing about as a foundational technology that paved the way for widely used cloud computing techniques and applications.To read this article in full or to leave a comment, please click here

The next 5 years in AI will be frenetic, says Intel’s new AI chief

Research into artificial intelligence is going gangbusters, and the frenetic pace won't let up for about five years -- after which the industry will concentrate around a handful of core technologies and leaders, the head of Intel's new AI division predicts.Intel is keen to be among them. In March, it formed an Artificial Intelligence Products Group headed by Naveen Rao. He previously was CEO of Nervana Systems, a deep-learning startup Intel acquired in 2016. Rao sees the industry moving at breakneck speed."It's incredible," he said. "You go three weeks without reading a paper and you're behind. It's just amazing."It wasn't so long ago that artificial intelligence research was solely the domain of university research labs, but tech companies have stormed into the space in the last couple of years and sent technical hurdles tumbling.To read this article in full or to leave a comment, please click here

21% off 32GB Centon Electronics Sport USB DataStick – Deal Alert

Centon is offering their 32GB Sport USB 2.0 flash drive for just $1.37 more than their 8GB model with the current deal on Amazon. The Sport DataStick features a rugged rubberized casing and is designed to be waterproof up to 1.5M with a leakproof cap. If you're looking to pick up some inexpensive storage, see the discounted Centon Electronics Sport 32GB USB DataStick now on Amazon. To read this article in full or to leave a comment, please click here

Google I/O 2017: AI, IoT and VR/AR predictions

Google I/O 2017, Google’s other annual developer conference, begins next week (May 17). It is the other developer conference because Google filled the Moscone Center with 10,000 enterprise cloud developers at its Cloud Next conference last March. Compared that to the 7,000 attendees at Google I/O 2016. The two conferences explain two different developer audiences and Google’s cloud growth ambitions.The list of code labs at Google I/O 2017 confirms this: accessibility, ads, Android, Android devices, Google Assistant, Firebase, IoT, location & maps, machine learning & AI, Flutter, mobile web, Google Play, virtual reality. Though many developers attending I/O will attend both conferences, this is a much different schedule than Cloud Next.To read this article in full or to leave a comment, please click here