Archive

Category Archives for "Networking"

Ecommerce websites on Cloudflare: best practices

Ecommerce websites on Cloudflare: best practices

Cloudflare provides numerous benefits to ecommerce sites, including advanced DDOS protection and an industry-leading Web Application Firewall (WAF) that helps secure your transactions and protect customers’ private data.

A key Cloudflare feature is caching, which allows content to be served closer to the end user from our global network of data centers. Doing so improves the user's shopping experience and contributes to increasing the proportion of people completing a purchase (conversion rate).

For example:

  • Walmart found improving page load time by 1 second increased their conversion rate by 2%
  • Research for Amazon showed every 0.1 second of delay costs 1% of sales
  • The Barack Obama campaign website saw an 80% page load time boost resulted in a 14% increase in donations

What is caching?

Cloudflare operates over 110 data centers around the world. When a website implements Cloudflare, visitor requests for the site will proxy through the nearest Cloudflare data center instead of connecting directly to the webserver hosting the site (origin). This means Cloudflare can store content such as images, JavaScript, CSS and HTML on our servers, speeding up access to those resources for end-users.

Most ecommerce websites rely on a backend database containing product descriptions and metadata Continue reading

SOAPA Services Opportunities Abound

Security operations is changing, driven by a wave of diverse data types, analytics tools, and new operational requirements.  These changes are initiating an evolution from monolithic security technologies to a more comprehensive event-driven software architecture (along the lines of SOA 2.0) where disparate security technologies connect via enterprise-class middleware for things like data exchange, message queueing, and risk-driven trigger conditions.  ESG refers to this as a Security Operations and Analytics platform architecture or SOAPA.    When speaking, or writing about SOAPA, I often compare this evolution to an analogous IT trend in the 1990s.  Way back then, large organizations abandoned stand-alone departmental applications in favor or a more integrated software architecture, ERP.  This transition resulted in a new generation of business applications acting as a foundation for greater automation, efficiency, and profitability.To read this article in full or to leave a comment, please click here

SOAPA services opportunities abound

Security operations is changing, driven by a wave of diverse data types, analytics tools and new operational requirements. These changes are initiating an evolution from monolithic security technologies to a more comprehensive event-driven software architecture (along the lines of SOA 2.0) where disparate security technologies connect via enterprise-class middleware for things like data exchange, message queueing and risk-driven trigger conditions. ESG refers to this as a Security Operations and Analytics platform architecture or SOAPA.    When speaking or writing about SOAPA, I often compare this evolution to an analogous IT trend in the 1990s. Way back then, large organizations abandoned stand-alone departmental applications in favor or a more integrated software architecture, ERP. This transition resulted in a new generation of business applications acting as a foundation for greater automation, efficiency and profitability.To read this article in full or to leave a comment, please click here

SOAPA Services Opportunities Abound

Security operations is changing, driven by a wave of diverse data types, analytics tools, and new operational requirements.  These changes are initiating an evolution from monolithic security technologies to a more comprehensive event-driven software architecture (along the lines of SOA 2.0) where disparate security technologies connect via enterprise-class middleware for things like data exchange, message queueing, and risk-driven trigger conditions.  ESG refers to this as a Security Operations and Analytics platform architecture or SOAPA.    When speaking, or writing about SOAPA, I often compare this evolution to an analogous IT trend in the 1990s.  Way back then, large organizations abandoned stand-alone departmental applications in favor or a more integrated software architecture, ERP.  This transition resulted in a new generation of business applications acting as a foundation for greater automation, efficiency, and profitability.To read this article in full or to leave a comment, please click here

SOAPA services opportunities abound

Security operations is changing, driven by a wave of diverse data types, analytics tools and new operational requirements. These changes are initiating an evolution from monolithic security technologies to a more comprehensive event-driven software architecture (along the lines of SOA 2.0) where disparate security technologies connect via enterprise-class middleware for things like data exchange, message queueing and risk-driven trigger conditions. ESG refers to this as a Security Operations and Analytics platform architecture or SOAPA.    When speaking or writing about SOAPA, I often compare this evolution to an analogous IT trend in the 1990s. Way back then, large organizations abandoned stand-alone departmental applications in favor or a more integrated software architecture, ERP. This transition resulted in a new generation of business applications acting as a foundation for greater automation, efficiency and profitability.To read this article in full or to leave a comment, please click here

Silver Peak enhances its SD-WAN edge device to improve the branch experience  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  If you want to get a sense for how rapidly the SD-WAN market is evolving, go back and read some of the articles from, say, two years ago. Some of the talk was about startup companies entering the market, while other items describe how traditional WAN hardware vendors were pivoting to get into the lucrative new market of building network functions in software.Predictions of the eventual market size varied back then, but everyone knew it would be big. Doyle Research thought it might get to $3.2 billion by 2018. IDC projected a $6 billion market by 2020. I wouldn’t be surprised if those estimates from a few years ago turn out to be too conservative.To read this article in full or to leave a comment, please click here

Silver Peak enhances its SD-WAN edge device to improve the branch experience  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  If you want to get a sense for how rapidly the SD-WAN market is evolving, go back and read some of the articles from, say, two years ago. Some of the talk was about startup companies entering the market, while other items describe how traditional WAN hardware vendors were pivoting to get into the lucrative new market of building network functions in software.Predictions of the eventual market size varied back then, but everyone knew it would be big. Doyle Research thought it might get to $3.2 billion by 2018. IDC projected a $6 billion market by 2020. I wouldn’t be surprised if those estimates from a few years ago turn out to be too conservative.To read this article in full or to leave a comment, please click here

5G wireless behind AT&T, Verizon’s big buys

5G technology, despite some fairly breathless hype, is still in the embryonic stages of development, but the pace is quickening. The major U.S. carriers are racing to buy up critical spectrum that will be necessary for the realization of 5G’s potential, which could include support for speeds up to 1Gbps and support for the ever-expanding Internet of Things.AT&T has made two major purchases with that end in mind – January saw the company announce the acquisition, for an undisclosed sum, of bankrupt wireless backhaul provider FiberTower, and just this week AT&T said that it would spend about $1.6 billion in an all-stock deal to acquire Straight Path Communications (Note: A Reuters report overnight cited sources as saying Verizon might try to top AT&T’s bid).To read this article in full or to leave a comment, please click here

5G wireless behind AT&T, Verizon’s big buys

5G technology, despite some fairly breathless hype, is still in the embryonic stages of development, but the pace is quickening. The major U.S. carriers are racing to buy up critical spectrum that will be necessary for the realization of 5G’s potential, which could include support for speeds up to 1Gbps and support for the ever-expanding Internet of Things.AT&T has made two major purchases with that end in mind – January saw the company announce the acquisition, for an undisclosed sum, of bankrupt wireless backhaul provider FiberTower, and just this week AT&T said that it would spend about $1.6 billion in an all-stock deal to acquire Straight Path Communications (Note: A Reuters report overnight cited sources as saying Verizon might try to top AT&T’s bid).To read this article in full or to leave a comment, please click here

Understanding Our Cache and the Web Cache Deception Attack

About a month ago, security researcher Omer Gil published the details of an attack that he calls the Web Cache Deception attack. It works against sites that sit behind a reverse proxy (like Cloudflare) and are misconfigured in a particular way. Unfortunately, the definition of "misconfigured" for the purposes of this attack changes depending on how the cache works. In this post, we're going to explain the attack and then describe the algorithm that our cache uses to decide whether or not to cache a given piece of content so that customers can be sure that they are secure against this attack.

The Attack

First, we'll explain the basics of the Web Cache Deception attack. For those who want a more in-depth explanation, Omer's original post is a great resource.

CC BY-SA 2.0 image by shelleygibb

Imagine that you run the social media website example.com, and that each of your users has a newsfeed at example.com/newsfeed. When a user navigates to their newsfeed, the HTTP request generated by their browser might look something like this:

GET /newsfeed HTTP/1.1  
Host: example.com  
...

If you use Cloudflare, you don't want us to cache this request because if Continue reading

24% off NETGEAR CM700 DOCSIS 3.0 Cable Modem 1.4Gbps Certified for XFINITY, Time Warner, Charter, and More – Deal Alert

The NETGEAR CM700 High Speed Cable Modem is certified to work with most major cable providers, and may save you $100 or more annually by eliminating modem rental fees you may currently be paying. It provides a connection to high-speed cable Internet with speeds up to 1.4 Gbps. It is CableLabs certified DOCSIS 3.0 that is 32X faster than 2.0 devices. A Gigabit Ethernet port provides faster access and downloads. Its typical list price of $129.99 has been reduced to $99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

24% off NETGEAR CM700 DOCSIS 3.0 Cable Modem 1.4Gbps Certified for XFINITY, Time Warner, Charter, and More – Deal Alert

The NETGEAR CM700 High Speed Cable Modem is certified to work with most major cable providers, and may save you $100 or more annually by eliminating modem rental fees you may currently be paying. It provides a connection to high-speed cable Internet with speeds up to 1.4 Gbps. It is CableLabs certified DOCSIS 3.0 that is 32X faster than 2.0 devices. A Gigabit Ethernet port provides faster access and downloads. Its typical list price of $129.99 has been reduced to $99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Avaya’s post-bankruptcy plan should not impact customers, partners

On Good Friday 2017, the Easter Bunny dropped off Avaya’s Chapter 11 plan for reorganization at the U.S. Bankruptcy Court for the Southern District of N.Y. The plan is aimed at significantly cutting Avaya’s pre-filing debt, which had become an anchor around an otherwise healthy and profitable company. The reduction of debt will strengthen the company’s balance sheet, putting the company in a position to be successful in the future. A healthy financial position leads to M&A opportunities, funding of R&D, hiring of new sales people or any other number of options. + Also on Network World: Avaya files Chapter 11 reorg plan, reduces debt by $4 billion | 4 possible outcomes for Avaya + The proposed plan includes the following terms:To read this article in full or to leave a comment, please click here

Avaya’s post-bankruptcy plan should not impact customers, partners

On Good Friday 2017, the Easter Bunny dropped off Avaya’s Chapter 11 plan for reorganization at the U.S. Bankruptcy Court for the Southern District of N.Y. The plan is aimed at significantly cutting Avaya’s pre-filing debt, which had become an anchor around an otherwise healthy and profitable company. The reduction of debt will strengthen the company’s balance sheet, putting the company in a position to be successful in the future. A healthy financial position leads to M&A opportunities, funding of R&D, hiring of new sales people or any other number of options. + Also on Network World: Avaya files Chapter 11 reorg plan, reduces debt by $4 billion | 4 possible outcomes for Avaya + The proposed plan includes the following terms:To read this article in full or to leave a comment, please click here