Archive

Category Archives for "Networking"

4 Data Center Security Issues That Will Make You Rethink Firewalling

Recall what was happening a decade ago? While 2011 doesn’t seem that long ago (you rememberthe Royal Wedding, Kim Kardashian’s divorce, and of course Charlie Sheen’s infamous meltdown), a lot has changed in 10 years. Back then, most data centers were just starting to experiment with virtualization. Remember when it was considered safe for only a handful of non-essential workloads to go virtual? Well, today about half of the servers globally have become virtualized, and we’ve moved well beyond just virtualization. Nearly every enterprise data center has become a hybrid environment, with a mix of physical and virtual storage and compute resources. Containerization and the technologies supporting it are starting to take hold. And of course, cloud computing has become pervasive in all aspects of enterprise computing. 

Now, the business benefits of today’s software-defined data center are many, especially in terms of resource efficiency and cost savings. But there’s no denying that complexity has also increased, because all the same resources are still needed—compute, storage, switching, routingbut now any number of these resources may be on-prem or in the Continue reading

Loose Lips

When I was in the military we were constantly drilled about the problem of Essential Elements of Friendly Information, or EEFIs. What are EEFis? If an adversary can cast a wide net of surveillance, they can often find multiple clues about what you are planning to do, or who is making which decisions. For instance, if several people married to military members all make plans to be without their spouses for a long period of time, the adversary can be certain a unit is about to be deployed. If the unit of each member can be determined, then the strength, positioning, and other facts about what action you are taking can be guessed.

Given enough broad information, an adversary can often guess at details that you really do not want them to know.

What brings all of this to mind is a recent article in Dark Reading about how attackers take advantage of publicly available information to form Spear Phishing attacks—

Most security leaders are acutely aware of the threat phishing scams pose to enterprise security. What garners less attention is the vast amount of publicly available information about organizations and their employees that enables these attacks.

Going back further Continue reading

The Week in Internet News: Encryption Faces Serious Threats

Encryption in danger: Encryption is essential, but a number of countries are trying to weaken its protections, Wired.com says. Recent attempts to weaken encryption have happened in Germany, Brazil, India, and other countries. “Technical as encryption can be, it is really about something at the very core of how we live our lives today: Should […]

The post The Week in Internet News: Encryption Faces Serious Threats appeared first on Internet Society.

Network Break 328: Arista CloudVision Adds Config Workflow Automation; Innovium ASICs Embrace SONiC

On this week's Network Break we cover Arista's careful steps into automation, new support for SONiC from Innovium, a cash injection for whitebox NOS maker Pica8, a startup tackling cloud infrastructure and application experience, and why you can blame cosmic rays the next time there's a network problem.

The post Network Break 328: Arista CloudVision Adds Config Workflow Automation; Innovium ASICs Embrace SONiC appeared first on Packet Pushers.

Developer Challenges

Developer Challenges
Developer Challenges

Welcome to Developer Week at Cloudflare! We are excited to announce we are running a series of Developer Challenges throughout the week to give you the excuse you needed to play with all our new features.

Between now and April 19 you’ll get to know the Cloudflare developer tools and walk away with a fun new app (or five) to your name. You’ll also become a part of the Cloudflare Developer community!

We hope that some of you will be inspired to create your next project using Cloudflare Workers, Workers KV, Pages, Durable Objects and all the developer-focussed products that Cloudflare offers. There’s already a vibrant community building applications using the Workers ecosystem; we hope the Developer Challenges inspire you to build on Cloudflare.

What are Developer Challenges?

We know that some people are new to the Cloudflare services for developers and that some of you have been using them for a while, so we have come up with two streams of challenges.

If you’re just getting started with Cloudflare, there will be a new challenge each day of the week that will help you level up your knowledge in no time. There’s also an extra bonus challenge Continue reading

Packet Pushers LiveStream – Alkira and Multi-cloud Networking

We are doing the first ever Packet Pushers LiveStream on Thursday, April 22nd 1000PST/1300CET/1700GMT. Our take on a LiveStream is a cross between live podcast, presentation and interviews where the audience  can join us live for recording.   Our sponsor is Alkira and Multi-Cloud Networking. The Alkira product is interesting in its ability to build network […]

Cloudflare Pages is now Generally Available

Cloudflare Pages is now Generally Available
Cloudflare Pages is now Generally Available

In December, we announced the beta of Cloudflare Pages: a fast, secure, and free way for frontend developers to build, host, and collaborate on Jamstack sites.

It’s been incredible to see what happens when you put a powerful tool in developers’ hands. In just a few months of beta, thousands of developers have deployed over ten thousand projects, reaching millions of people around the world.

Today, we’re excited to announce that Cloudflare Pages is now available for anyone and ready for your production needs. We’re also excited to show off some of the new features we’ve been working on over the course of the beta, including: web analytics, built in redirects, protected previews, live previews, and optimized images (oh, my!). Lastly, we’ll give you a sneak peek into what we'll be working on next to make Cloudflare Pages your go-to platform for deploying not just static sites, but full-stack applications.

What is Cloudflare Pages?

Cloudflare Pages radically simplifies the process of developing and deploying sites by taking care of all the tedious parts of web development. Now, developers can focus on the fun and creative parts instead.

Seamless builds for developers

Getting started with Cloudflare Pages is as Continue reading

Live stream to multiple platforms with Stream Connect

Live stream to multiple platforms with Stream Connect
Live stream to multiple platforms with Stream Connect

Today, we are announcing the Stream Connect beta, the first step towards supporting end-to-end live broadcasting on Cloudflare. You can use Stream Connect to push RTMPS feeds to the Cloudflare edge and have it restreamed to your audience on any platform that supports RTMPS such as Facebook, YouTube and Twitch.

What is restreaming?

Facebook, YouTube and Twitch are great platforms for creators to broadcast live video to reach billions. They each have their own unique communities and benefits for creators. If you have a band and want to broadcast a live performance for your fans, broadcasting to only one platform limits your reach. Restreaming enables you to push the live video to multiple platforms at the same time so you can meet your fans on their preferred platform.

Live video platforms accept incoming connections using a protocol called RTMP or RTMPS. Stream Connect allows you to continue using the same protocol as before. However, instead of using your local connection to send the video feed to multiple platforms, you only send it to Stream Connect. Connect uses the Cloudflare network to send your live feed to the configured media platforms.

How Stream Connect increases reliability and lowers latency

Live stream to multiple platforms with Stream Connect

Eliminating the Continue reading

Why Being A Late Technology Adopter Pays Off

As a technologist helping an organization form an IT strategy, I’m usually hesitant to recommend new tech. Why? Because it’s new. Adopting technology early in its lifecycle is a risky endeavor. For most organizations, I find that shiny new tech isn’t worth the risk.

Emerging products and protocols are often accompanied by great fanfare. Talks are delivered at conferences, whitepapers are written, and Gartner Cool Vendor designations are awarded. The idea is to make you and me believe that this new tech solves a problem in a novel way that’s never been done before. This is the thing we’ve been waiting for. This is so much better than it used to be in the bad old times. Right. I’m sure it is.

Despite my cynical tone, I am hopeful when it comes to new tech. I really am. In part, technologists are employed because of tech’s ever-changing landscape. But I am also dubious during any technology’s formative years. I take a wait-and-see approach, and I’ve never been sorry for doing so. I believe that being a late, not early, adopter of technology pays off for most organizations.

You Aren’t Stuck With Abandoned Tech

If you adopt early, you are hoping Continue reading

How to shop for a colocation provider

If you want to move assets out of your data center but for whatever reason can’t shift to the cloud, a colocation, or “colo” for short, is increasingly a viable option.Colo is where the client buys the compute, storage, and networking equipment but instead of putting it into their own data centers, they put them in the data center of a hosting company. They still own and manage the hardware, but they don’t have responsibility for manage the facilities—heating, cooling, lighting, physical security, etcNow see "How to manage your power bill while adopting AI" As such, colocation facilities attract considerable interest from enterprises. IDC puts the 2020 US colocation market at $9 billion, growing to $12.2 billion by 2024 for a compound annual growth rate (CAGR) of 8%. Grand View Research estimates the global data-center colocation market size was valued at $40.31 billion US dollars in 2019 and is expected to grow at a CAGR of 12.9% from 2020 to 2027. Gartner makes the bravest prediction, saying that by 2025, 85% of infrastructure strategies will integrate on-premises, colocation, cloud, and edge delivery options, compared with 20% in 2020.To read this article in full, please click here

Samsung demos 512GB DDR5 memory aimed at supercomputing, AI workloads

Samsung Electronics last month announced the creation of a 512GB DDR5 memory module, its first since the JEDEC consortium developed and released the DDR5 standard in July of last year.The new modules are double the max capacity of existing DDR4 and offer up to 7,200Mbps in data transfer rate, double that of conventional DDR4. The memory will be able to handle high-bandwidth workloads in applications such as supercomputing, artificial intelligence, machine learning, and data analytics, the company says. Read more: World's fastest supercomputers: Fugaku still No. 1To read this article in full, please click here

Will open networking lock you in?

There’s open, then there’s open.  At least that seems to be the case with network technology. Maybe it’s the popularity and impact of open-source software, or maybe it’s just that the word “open” makes you think of being wild, happy, and free—whatever it is, the concept of openness in networking is catching on. Which means, of course, that the definition is getting fuzzier every day.When I talk with enterprises, they seem to think that openness in networking is the opposite of proprietary, which they then define is a technology for which there is a single source. That suggests that open networking is based on technology for which multiple sources exist, but as logical as that sounds, it may not help much.To read this article in full, please click here

How to shop for a colocation provider

If you want to move assets out of your data center but for whatever reason can’t shift to the cloud, a colocation, or “colo” for short, is increasingly a viable option.Colo is where the client buys the compute, storage, and networking equipment but instead of putting it into their own data centers, they put them in the data center of a hosting company. They still own and manage the hardware, but they don’t have responsibility for manage the facilities—heating, cooling, lighting, physical security, etcNow see "How to manage your power bill while adopting AI" As such, colocation facilities attract considerable interest from enterprises. IDC puts the 2020 US colocation market at $9 billion, growing to $12.2 billion by 2024 for a compound annual growth rate (CAGR) of 8%. Grand View Research estimates the global data-center colocation market size was valued at $40.31 billion US dollars in 2019 and is expected to grow at a CAGR of 12.9% from 2020 to 2027. Gartner makes the bravest prediction, saying that by 2025, 85% of infrastructure strategies will integrate on-premises, colocation, cloud, and edge delivery options, compared with 20% in 2020.To read this article in full, please click here

Samsung demos 512GB DDR5 memory aimed at supercomputing, AI workloads

Samsung Electronics last month announced the creation of a 512GB DDR5 memory module, its first since the JEDEC consortium developed and released the DDR5 standard in July of last year.The new modules are double the max capacity of existing DDR4 and offer up to 7,200Mbps in data transfer rate, double that of conventional DDR4. The memory will be able to handle high-bandwidth workloads in applications such as supercomputing, artificial intelligence, machine learning, and data analytics, the company says. Read more: World's fastest supercomputers: Fugaku still No. 1To read this article in full, please click here

Major League Baseball makes a run at network visibility

Major League Baseball is taking network visibility to the next level.“There were no modern network-management systems in place before I came in. It was all artisanally handcrafted configurations,” says Jeremy Schulman, who joined MLB two years ago as principal network-automation software engineer. Tech Spotlight: Analytics Analytics in the cloud: Key challenges and how to overcome them (CIO) Collaboration analytics: Yes, you can track employees. Should you? (Computerworld) How data poisoning attacks corrupt machine learning models (CSO) How to excel with data analytics (InfoWorld) Major League Baseball makes a run at network visibility (Network World) Legacy systems, including PRTG for SNMP-based monitoring and discrete management tools from network vendors, allowed MLB to collect data from switches and routers, for example, and track metrics such as bandwidth usage. But the patchworked tools were siloed and didn’t provide comprehensive visibility.To read this article in full, please click here

Major League Baseball makes a run at network visibility

Major League Baseball is taking network visibility to the next level.“There were no modern network-management systems in place before I came in. It was all artisanally handcrafted configurations,” says Jeremy Schulman, who joined MLB two years ago as principal network-automation software engineer. Tech Spotlight: Analytics Analytics in the cloud: Key challenges and how to overcome them (CIO) Collaboration analytics: Yes, you can track employees. Should you? (Computerworld) How data poisoning attacks corrupt machine learning models (CSO) How to excel with data analytics (InfoWorld) Major League Baseball makes a run at network visibility (Network World) Legacy systems, including PRTG for SNMP-based monitoring and discrete management tools from network vendors, allowed MLB to collect data from switches and routers, for example, and track metrics such as bandwidth usage. But the patchworked tools were siloed and didn’t provide comprehensive visibility.To read this article in full, please click here

Start Automating Public Cloud Deployments with Infrastructure-as-Code

One of my readers sent me a series of “how do I get started with…” questions including:

I’ve been doing networking and security for 5 years, and now I am responsible for our cloud infrastructure. Anything to do with networking and security in the cloud is my responsibility along with another team member. It is all good experience but I am starting to get concerned about not knowing automation, IaC, or any programming language.

No need to worry about that, what you need (to start with) is extremely simple and easy-to-master. Infrastructure-as-Code is a simple concept: infrastructure configuration is defined in machine-readable format (mostly text files these days) and used by a remediation tool like Terraform that compares the actual state of the deployed infrastructure with the desired state as defined in the configuration files, and makes changes to the actual state to bring it in line with how it should look like.