This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Node.js is an open source, cross-platform runtime environment for server-side and network applications. Since its inception, it’s also become widely used for front-end tooling, APIs, desktop applications, and even controlling IoT hardware like drones. Node.js applications are written in JavaScript. The growing popularity and adoption of Node.js is the result of a confluence of several factors.
First, there is an increasing need by companies of all sizes to quickly build scalable, fast, distributed web applications. Second, large enterprises are finding there is inherent risk associated with running large, complex monolithic applications due to the difficulty and cost of tuning, maintaining, patching, and debugging them — and the challenges this poses to business responsiveness. Third, software developers are looking to develop a skillset that prepares them for the new market reality of agile practices, continuous integration and delivery, cloud-scale application design and a highly mobile and demanding user base.
To read this article in full or to leave a comment, please click here
The post Worth Reading: Apcera NATS messaging service appeared first on 'net work.

The mission of the United State's Government's Consumer Product Safety Commission (CPSC) is to protect consumers from injury by products. It's ironic then that the CPSC is playing an unwitting role in most of the largest DDoS attacks seen on the Internet. To understand how, you need to understand a bit about how you launch a high volume DDoS.
Logo of the Consumer Product Safety Commission
DDoS attacks are inherently about an attacker sending more traffic to a victim than the victim can handle. The challenge for an attacker is to find a way to generate a large amount of traffic. Launching a DDoS attack is a criminal act, so an attacker can't simply go sign up for large transit contracts. Instead, attackers find ways to leverage other people's resources.
One of the most effective strategies is known as an amplification attack. In these attacks, an attacker can amplify their resources by reflecting them off other resources online that magnify the level of traffic. The most popular amplification vector is known as DNS reflection.
We've written about DNS reflection attacks in detail before. The basics are that an attacker generates DNS requests from a network that allows Continue reading