A debate is starting to roil the networking community, centered around the amount of sprawl network virtualization might spawn across the enterprise.
The last few weeks have seen several high-profile outages in legacy DNS and DDoS-mitigation services due to large scale attacks. Cloudflare's customers have, understandably, asked how we are positioned to handle similar attacks.
While there are limits to any service, including Cloudflare, we are well architected to withstand these recent attacks and continue to scale to stop the larger attacks that will inevitably come. We are, multiple times per day, mitigating the very botnets that have been in the news. Based on the attack data that has been released publicly, and what has been shared with us privately, we have been successfully mitigating attacks of a similar scale and type without customer outages.
I thought it was a good time to talk about how Cloudflare's architecture is different than most legacy DNS and DDoS-mitigation services and how that's helped us keep our customers online in the face of these extremely high volume attacks.
Before delving into our architecture, it's worth taking a second to think about another analogous technology problem that is better understood: scaling databases. From the mid-1980s, when relational databases started taking off, through the early 2000s the way companies thought of scaling Continue reading
Noction is pleased to announce the release of IRP 3.6. The major feature available in the new product version is the capability
The post Noction announces the release of IRP 3.6 appeared first on Noction.
EMA finds that the rise of internet connectivity for next-gen WAN does not spell the death of MPLS.
Check out this selection of tunes tailored for those who work to keep the network up and running.