Archive

Category Archives for "Networking"

BrandPost: The five core components that will drive the next wave of banking innovation

The growth in online banking has been – and will continue to be – rapid. From a valuation of $11.43 billion in 2019, the projections are that it will reach $31.81 billion by 2027, at a CAGR of 13.6%.For the incumbent banking system, this rapid growth poses a real and ongoing challenge, as it has opened the door to unconventional disruption and new competition. Non-banking companies are now able to bring different business models and expertise in customer experience to the financial services sector. New products and services are being adopted enthusiastically by consumers, and indeed, there is the rise of entirely new forms of currency and payments that are changing how we think about money.To read this article in full, please click here

Dennis Jennings and the History of NSFNET

The NSFNET followed the CSNET, connecting the campuses of several colleges and supercomputing systems with a 56K core in 1986. The NSFNET was the first large-scale implementation of Internet technologies in a complex environment of many independently operated networks, and forced the Internet community to iron out technical issues arising from the rapidly increasing number of computers and address many practical details of operations, management and conformance. The NSF eventually became the “seed” of the commercialized core of the Internet, playing an outsized role in the current design of routing, transport, and other Internet technologies.

In this episode of the History of Networking, Dennis Jennings joins Donald Sharp and Russ White to discuss the origins and operation of the NSFNET.

You can find out more about Dennis and the NSFNET in the following links.

https://internethalloffame.org/inductees/dennis-jennings
https://en.wikipedia.org/wiki/National_Science_Foundation_Network
https://www.nsf.gov/news/news_summ.jsp?cntn_id=103050
http://arvidc.weebly.com/nsfnet.html

download

Learn from industry experts at the Kubernetes Security and Observability Summit—next week!

The Kubernetes Security and Observability Summit is only 1 week away! The industry’s first and only conference solely focused on Kubernetes security and observability will be taking place online June 3, 2021.

During the Summit, DevOps, SREs, platform architects, and security teams will enjoy the chance to network with industry experts and explore trends, strategies, and technologies for securing, observing and troubleshooting cloud-native applications.

What does security and observability mean in a cloud-native context? What challenges should Kubernetes practitioners anticipate and what opportunities should they investigate? Join us to explore these types of questions and gain valuable insight you’ll be able to take back to your teams.

Speakers & sessions

Tigera’s President & CEO, Ratan Tipirneni, will kick off the Summit with an opening keynote address. Two additional keynotes from Graeme Hay of Morgan Stanley and Keith Neilson of Discover Financial Services will follow. Attendees will then have the opportunity to attend breakout sessions organized into three tracks:

  1. Stories from the real world
  2. Best practices
  3. Under the hood

During these sessions, experts from industry-leading companies like Amazon, Box, Citi, EY, Mirantis, Morgan Stanley, PayPal, Salesforce, and of course, Tigera, will share real-world stories, best practices, and technical concepts related to Continue reading

Oracle commits to Arm in the cloud

Oracle is not the first name in cloud computing, but never let it be said Larry and company don’t try. It is making a big push with its Oracle Cloud Infrastructure (OCI) by offering Arm processor instances and new initiatives with the open-source community.The new instances are powered by Altra, Ampere’s 64-bit Arm processor, and are priced at 1 cent per core hour, which Oracle claims is the lowest price/performance available when compared to any x86 instance on a per-core basis.To read this article in full, please click here

Oracle commits to Arm in the cloud

Oracle is not the first name in cloud computing, but never let it be said Larry and company don’t try. It is making a big push with its Oracle Cloud Infrastructure (OCI) by offering Arm processor instances and new initiatives with the open-source community.The new instances are powered by Altra, Ampere’s 64-bit Arm processor, and are priced at 1 cent per core hour, which Oracle claims is the lowest price/performance available when compared to any x86 instance on a per-core basis.To read this article in full, please click here

African Women to Drive Digitalization and Transformation: AfChix and Internet Society Renew Partnership

person typing into a laptop while holding a phone

African economies are making bold moves to speed up digitalization and transformation. We want women to play a key part in that. In a new partnership agreement, we are committing to closing the digital gender gap and helping women embrace technology to drive change. Africa’s growing Internet economy has the potential to contribute nearly $180 […]

The post African Women to Drive Digitalization and Transformation: AfChix and Internet Society Renew Partnership appeared first on Internet Society.

The Evolution of Labbing

A trip down memory lane on how things have changed in labbing from using prehistoric switches bought on eBay through emulators that took longer to configure than the labs to the present day solutions that can programmatically build a multi-vendor lab in minutes. Kids today don’t know they are born…..

What’s the Best Service Mesh Proxy?

The perfect service mesh implementation wouldn’t use a general-purpose proxy, but would instead use a service mesh specific proxy—one that does no more than the mesh needs and that is written in a performant language with strong security guarantees like Rust.

Center for Internet Security: 18 security controls you need

The Center for Internet Security has updated its set of safeguards for warding off the five most common types of attacks facing enterprise networks—web-application hacking, insider and privilege misuse, malware, ransomware, and targeted intrusions.In issuing its CIS Controls V8 this month, the organization sought to present practical and specific actions businesses can take to protect their networks and data. These range from making an inventory of enterprise assets to account management to auditing logs.In part the new version was needed to address changes to how businesses operate since V7 was issued three years ago, and those changes guided the work. “Movement to cloud-based computing, virtualization, mobility, outsourcing, work-from-home, and changing attacker tactics have been central in every discussion,” the new controls document says.To read this article in full, please click here

Center for Internet Security: 18 security controls you need

The Center for Internet Security has updated its set of safeguards for warding off the five most common types of attacks facing enterprise networks—web-application hacking, insider and privilege misuse, malware, ransomware, and targeted intrusions.In issuing its CIS Controls V8 this month, the organization sought to present practical and specific actions businesses can take to protect their networks and data. These range from making an inventory of enterprise assets to account management to auditing logs.In part the new version was needed to address changes to how businesses operate since V7 was issued three years ago, and those changes guided the work. “Movement to cloud-based computing, virtualization, mobility, outsourcing, work-from-home, and changing attacker tactics have been central in every discussion,” the new controls document says.To read this article in full, please click here

How We Built an Open Source Drop-In Replacement for gRPC

JT Olio JT is the CTO at Storj. He oversees product development and led the re-architecture of Storj’s distributed cloud storage platform. He was previously Director of Engineering at Space Monkey, which was acquired by Vivint in 2014. JT has an MS in Computer Science from the University of Utah and a BS in Computer Science and Mathematics from the University of Minnesota. Our team at Storj is building a decentralized cloud object storage and when we decided to build it using Go, we thought we’d also utilize

IXP.GT Improves Speed, Lowers Costs, and Increases Resilience and Security of Guatemala’s Internet

view of a highway interchange seen from up in the air

Of the four new Internet traffic exchange points in Latin America, the most advanced is IXP.GT in Guatemala. It started in November 2019 with three participants. A little over a year later it already had 10. Most are Internet service providers (ISPs), plus the university network. “The IXP is the best thing that happened to […]

The post IXP.GT Improves Speed, Lowers Costs, and Increases Resilience and Security of Guatemala’s Internet appeared first on Internet Society.

Building real-time games using Workers, Durable Objects, and Unity

Building real-time games using Workers, Durable Objects, and Unity
Building real-time games using Workers, Durable Objects, and Unity

Durable Objects are an awesome addition to the Workers developer ecosystem, allowing you to address and work inside a specific Worker to provide consistency in your applications. That sounds exciting at a high-level, but if you're like me, you might be wondering "Okay, so what can I build with that?"

There’s nothing like building something real with a technology to truly understand it.

To better understand why Durable Objects matter, and how newer announcements in the Workers ecosystem like WebSockets play with Durable Objects, I turned to a category of software that I've been building in my spare time for a few months now: video games.

The technical aspects of games have changed drastically in the last decade. Many games are online-by-default, and the ubiquity of tools like Unity have made it so anyone can begin experimenting with developing games.

I've heard a lot about the ability of Durable Objects and WebSockets to provide real-time consistency in applications, and to test that use case out, I've built Durable World: a simple 3D multiplayer world that is deployed entirely on our Cloudflare stack: Pages for serving the client-side game, which runs in Unity and WebGL, and Workers as the Continue reading