In 2022, with nearly five billion people around the world (as well as an untold number of “bots”) using the Internet, analyzing aggregate data about this usage can uncover some very interesting trends. To that end, we’re excited to present the Cloudflare Radar 2022 Year In Review, featuring interactive charts, graphs, and maps you can use to explore notable Internet trends observed throughout this past year. The Year In Review website is part of Cloudflare Radar, which celebrated its second birthday in September with the launch of Radar 2.0.
We have organized the trends we observed around three different topic areas: Traffic, Adoption, and Security. The content covered within each of these areas is described in more detail in their respective sections below. Building on the 2021 Year In Review, we have incorporated several additional metrics this year, and have also improved the underlying methodology. (As such, the charts are not directly comparable to develop insights into year-over-year changes.)
Website visualizations shown at a weekly granularity cover the period from January 2 through November 26, 2022 (the start of the first full week of the year through the end of the last full Continue reading
National handwashing awareness week is an annual event celebrated in December to focus on the importance of proper hand hygiene and general health. It is designed to remind everyone that clean hands can help prevent illness, disease, and the spread of germs. Encouraging hand hygiene among your employees is essential for workplace safety. Teaching handwashing techniques can help provide an extra layer of protection, lessen the spread of germs, and show employees that you care about their health and well-being. To ensure hand hygiene at work, here’s what you should teach your employees:
Warm water helps to remove more dirt, oils, and germs from the skin than cold water. Employees should use hot water if it’s available and always make sure to wet their hands with clean running water before applying soap. All surfaces of the hands should be washed thoroughly, including the backs of the hands, wrists, between fingers, and under fingernails.
After wetting their hands with clean running water, employees should apply soap and lather up their hands while scrubbing them together in a back-and-forth motion for at least 20 seconds. This includes scrubbing Continue reading
Starting today, we’re adding support on all zone plans to add custom comments on your DNS records. Users on the Pro, Business and Enterprise plan will also be able to tag DNS records.
DNS records play an essential role when it comes to operating a website or a web application. In general, they are used to mapping human-readable hostnames to machine-readable information, most commonly IP addresses. Besides mapping hostnames to IP addresses they also fulfill many other use cases like:
With all these different use cases, it is easy to forget what a particular DNS record is for and it is not always possible to derive the purpose from the name, type and Continue reading
https://codingpackets.com/blog/docker-and-postgresql-for-development
https://codingpackets.com/blog/docker-and-postgresql-for-development
Microservices are loosely coupled software that provides flexibility and scalability to a cloud environment. However, securing this open architecture from vulnerabilities and malicious actors can be challenging without a service mesh.
This blog post will demonstrate how you can create an Istio and Calico integration to establish a service mesh that will manipulate HTTP traffic in the application layer. This Istio-Calico integration provides a unified way to write security policies interacting with applications and implement restrictions without disturbing the entire system.
A service mesh is a software layer that sits between the microservices that form your workload. After deploying and enabling a service mesh system for your workloads, an injector will add a sidecar container to each. These sidecars then collect and manipulate information via the rules you provide, allowing you to secure your cluster on an application level without requiring any change inside your software.
Without a service mesh, to ensure communication integrity and confidentiality between workloads, you must modify each to embed encryption methods. On top of that, gathering insight into the events that are happening in the application layer will require modifying the workload application itself, which all requires a good amount of Continue reading