Back in early December we announced our "no browser left behind" initiative to the world. Since then, we have served well over 500 billion SHA-1 certificates to visitors that otherwise would not have been able to communicate securely with our customers’ sites using HTTPS. All the while, we’ve continued to present newer SHA-2 certificates to modern browsers using the latest in elliptic curve cryptography, demonstrating that one does not have to sacrifice security to accommodate all the world’s Internet users. (If you weren’t able to acquire a SHA-1 certificate before CAs ceased issuing them on 2015/12/31, you can still sign up for a paid plan and we will immediately generate one to serve to your legacy visitors.)
Shortly after we announced these new benefits for our paid Universal SSL customers, we started hearing from other technology leaders who were implementing (or already had implemented) similar functionality. At first glance, the logic to identify incoming connections that only support SHA-1 seems straightforward, but as we spoke with our friends at Facebook, Twitter, and Mozilla, I realized that everyone was taking a slightly different approach. Complicating the matter even further was the fact that at CloudFlare we not only Continue reading
In this episode of Infotrek we talk about the future of engineer skill sets and who may or may not benefit from learning how to write code.
The post Infotrek Episode 2: Getting Started In Programming appeared first on Packet Pushers.
In this episode of Infotrek we talk about the future of engineer skill sets and who may or may not benefit from learning how to write code.
The post Infotrek Episode 2: Getting Started In Programming appeared first on Packet Pushers.
The post Worth Reading: Building a Network appeared first on 'net work.
Join the Datanauts for a ride to the land of GIFEE, or Google Infrastructure for Everyone Else. GIFEE is a combination of tools and processes to launch code and applications quickly and at scale. But is it relevant to you? Probably it is!
The post Datanauts 028: Google Infrastructure For Everyone Else (GIFEE) appeared first on Packet Pushers.
Join the Datanauts for a ride to the land of GIFEE, or Google Infrastructure for Everyone Else. GIFEE is a combination of tools and processes to launch code and applications quickly and at scale. But is it relevant to you? Probably it is!
The post Datanauts 028: Google Infrastructure For Everyone Else (GIFEE) appeared first on Packet Pushers.
Amazon is still a speck on the horizon, though.
Congratulations! We have managed to slay the beast that is wireless. We’ve driven a stake through it’s heart and prevented it from destroying civilization. We’ve taken a nascent technology with potential and turned it into the same faceless corporate technology as the Ethernet that it replaced. Alarmist? Not hardly. Let’s take a look at how 802.11 managed to come to an inglorious end.
Wireless used to be the wild frontier of networking. Sure, those access points bridged to the traditional network and produced packets and frames like all the other equipment. But wireless was unregulated. It didn’t conform to the plans of the networking team. People could go buy a wireless access point and put it under their desk to make that shiny new laptop with 802.11b work without needing to be plugged in.
Wireless used to be about getting connectivity. It used to be about squirreling away secret gear in the hopes of getting a leg up on the poor schmuck in the next cube that had to stay chained to his six feet of network connectivity under the desk. That was before the professionals came in. They changed wireless. They put a Continue reading
A bridge is a Layer 2 device that connects two Layer 2 (i.e. Ethernet) segments together. Frames between the two segments are forwarded based on the Layer 2 addresses (i.e. MAC addresses). Although the two words are still often used in different contexts, a bridge is effectively a switch and all the confusion started 20+ years ago for marketing purposes.
Switching was just a fancy name for bridging, and that was a 1980s technology – or so the thinking went.
A bridge makes forwarding decisions based on the MAC address table. Bridge learns MAC addresses by looking into the Frames headers of communicating hosts.
A bridge can be a physical device or implemented entirely in software. Linux kernel is able to perform bridging since 1999. By creating a bridge, you can connect multiple physical or virtual interfaces into a single Layer 2 segment. A bridge that connects two physical interfaces on a Linux host effectively turns this host into a physical switch.
Switches have meanwhile became specialized physical devices and software bridging had almost lost its place. However, with the advent of virtualization, virtual machines running on physical hosts required Layer 2 connection to the physical network Continue reading
In this episode of Network Matters with Ethan Banks, learn about the basics of OpenStack and why the open-source cloud platform has become so popular. Ethan explains exactly what OpenStack is, then dispels some of the myths around IT's expectations for OpenStack adoption.
Ethan is the co-host of the Future of Networking Summit at Interop Las Vegas. Learn more about the conference program or register for Interop, May 2-6 in Las Vegas.
These companies are forging new frontiers in software-defined networking.