Our work is strengthened, and our impact magnified, when we collaborate with partners to build a secure and trustworthy Internet for all. That’s why we’re proud to announce we’ve entered into a Memorandum of Understanding (MoU) with the Global Cyber Alliance (GCA) to work together on routing security, open Internet standards, and other areas of joint interest. The Global Cyber Alliance is an international, cross-sector effort dedicated to reducing cyber risk and improving our connected world.
This relationship is not new. The Internet Society and GCA have a long history of working together, from promoting email and Internet of Things (IoT) security to improving routing security, increasing deployment of open standards, and helping stakeholders participate meaningfully in the multistakeholder management of core Internet resources.
Both organizations have emphasized the importance of research, capacity building, and advocacy to develop key technologies and policies. This work helps promote the Internet, its resources, the need for vigilant user-enabled security, and the need for the Internet to remain open, inclusive, and an enabler of opportunities.
“We’re proud to extend and formalize our long-standing relationship with GCA to create real change for network operators and Internet users around the globe. By joining forces, we can promote enhanced Continue reading
Minh Ha left a great comment describing additional pitfalls of cut-through switching on my Chasing CRC Errors blog post. Here it is (lightly edited).
Ivan, I don’t know about you, but I think cut-through and deep buffer are nothing but scams, and it’s subtle problems like this [fabric-wide crc errors] that open one’s eyes to the difference between reality and academy. Cut-through switching might improve nominal device latency a little bit compared to store-and-forward (SAF), but when one puts it into the bigger end-to-end context, it’s mostly useless.
Privacy matters. Privacy and Compliance are at the heart of Cloudflare's products and solutions. We are committed to providing built-in data protection and privacy throughout our global network and for every product in our portfolio. This is why we have dedicated a whole week to highlight important aspects of how we are working to make sure privacy will stay at the core of all we do as a business.
In case you missed any of the blog posts this week addressing the topics of Privacy and Compliance, you’ll find a summary below.
We started the week with this introduction by Matthew Prince. The blog post summarizes the early decisions that the founding team made to make sure customer data is kept private, that we do not sell or rent this data to third parties, and why trust is the foundation of our business. > Read the full blog post.
Cloudflare’s network is private and compliant by design. Preserving end-user privacy is core to our mission of helping to build a better Internet; we’ve never sold personal data about customers or end-users of our Continue reading
Over the past week, you’ve heard how Cloudflare is making it easy for our customers to control where their data is stored and protected.
We’re not the only ones building these data controls. Around the world, companies are working to figure out where and how to store customer data in a way that is compliant with data localization obligations. For developers, this means new deployment models and new headaches — wrangling infrastructure in multiple regions, partitioning user data based on location, and staying on top of the latest rules from regulators.
Durable Objects, currently in limited beta, already make it easy for customers to manage state on Cloudflare Workers without worrying about provisioning infrastructure. Today, we’re announcing Jurisdictional Restrictions for Durable Objects, which ensure that a Durable Object only stores and processes data in a given geographical region. Jurisdictional Restrictions make it easy for developers to build serverless, stateful applications that not only comply with today’s regulations, but can handle new and updated policies as new regulations are added.
When creating a Durable Object, developers generate a unique ID that lets a Cloudflare Worker communicate with the Object.
Let’s say I want to create a Durable Continue reading
A reporter once asked boxing legend Muhammad Ali how many sit-ups he did each day. I’m sure the reporter wasn’t expecting Ali’s answer. Ali replied with:
I don’t know. I don’t start counting them until it hurts. Those are the only ones that count. That’s what makes you a champion.”
Ali knew that counting things is just a numbers game. Five hundred poor sit-ups don’t count as much a fifty done the right way. With any practice that you do the only things that count are the things that teach your something or that push you to be better.
People used to ask me how long I would spend at night studying for the CCIE lab. I told them I usually spent between five and seven hours depending on what I was studying. Sometimes those people would say things like “I’m not talking about setup time. I’m talking about actual lab work.” I always countered by making them explain why the setup isn’t part of the “real” work. That’s usually when they went quiet.
It’s far too easy to fall into the trap of overlooking things that you think are unimportant. A task Continue reading
Today's Heavy Networking talks about the tradeoffs between commercial and open source software. While open source takes time and effort to make work, is commercial software any better? Guest Daniel Teycheney is here for the debate.
The post Heavy Networking 554: Mistaking Commercial Software For A Security Blanket appeared first on Packet Pushers.