Cloudflare Apps Fund 2.0

Today we are launching the second iteration of the Cloudflare App Developer Fund.

This is an investment fund started in partnership with Venrock, Pelion Venture Partners, and New Enterprise Associates. We created the fund to provide developers with resources so that they can build apps using the Cloudflare network and our serverless product, Workers, which enables developers to create applications without configuring or maintaining infrastructure. The goal is to fuel a new economy that grows into a thriving ecosystem so that developers’ serverless innovations can enjoy commercial success.  

Cloudflare Apps with Workers allows developers to package Workers, delivering new worker-powered experiences to Cloudflare customers, all within a few clicks via Cloudflare Apps.

Our CTO, John Graham-Cumming talks about it in a recently recorded video:

In short, Cloudflare is looking for apps that will advance our mission to help build a better Internet: one that is safe, fast and reliable.   We are seeking out apps that have a clear vision, delight customers by the ease of use and align with our vision. Having already seen multiple use cases around custom application security, data loss prevention, and bot mitigation, we can’t wait to see what else you come up Continue reading

LEMNA: explaining deep learning based security applications

LEMNA: explaining deep learning based security applications Guo et al., CCS’18

Understanding why a deep learning model produces the outputs it does is an important part of gaining trust in the model, and in some situations being able to explain decisions is a strong requirement. Today’s paper shows that by carefully considering the architectural features of a given model, it’s possible to co-design an explanatory model. The idea is applied to deep learning models in the security domain (to detect the start of functions within binaries, and to detect malware) where for reasons we’ll look at next, the assumptions made by black-box explainers such as LIME don’t apply.

Like LIME, LEMNA approximates a local area of a complex deep learning decision boundary using a simple interpretable model. Unlike LIME, LEMNA can handle non-linear local boundaries, and feature dependencies (e.g., for a sequences fed into RNNs, which explicitly model dependencies in sequential data).

Why explainability matters

While intrigued by the high accuracy, security practitioners are concerned about the lack of transparency of deep learning models, and thus hesitate to widely adopt deep learning classifiers in security and safety-critical areas.

Explanations that are understandable by security analysts can help Continue reading

AWS does hybrid cloud with on-prem hardware, VMware help

Amazon Web Services took square aim at the data center this week by tying in VMware technology and rolling out two new services and on-remise hardware  to help customers build and support hybrid clouds.The new service, called Outposts, lets users choose between on premises servers and storage, which they can order in quarter, half, and full rack units.  Outposts can be upgraded with the latest hardware and next-generation instances to run all native AWS and VMware applications, AWS stated. A second version VMware Cloud on AWS Outposts lets customers use the a VMware control plane and APIs to run the hybrid environment.To read this article in full, please click here

Cumulus content roundup: November

We’re at it again with the Cumulus content roundup- November edition. As always, we’ve kept busy this month with lots of great resources and news for you to read. From EVPN Underlay Routing Protocol to the benefits of Layer 3, we’ve rounded it all up right here, so settle in and stay a while!

From Cumulus Networks:

Choosing an EVPN Underlay Routing Protocol: We take a look at the options in routing protocols that could use as an underlay with the objective of understanding what might make them a fit or not for deployment in an EVPN network.

The Benefits of Flexible Multi-Cloud and Multi-Region Networking: Here we explore some of the reasons multi-cloud is fantastic for enterprises when they consider security, flexibility, reliability, and cost-effectiveness.

Cumulus Linux Automation with Standard Linux Tooling: This blog focuses on the different options available for modern automation, & how the Cumulus Linux approach provides the greatest amount of flexibility.

Cumulus Networks Open-Ended NCLU Net Example Command: NCLU is the always helpful Network Command Line Utility and supports both inspection and modification of Cumulus Networks configuration data.

Layer 3 can do it better. I’m convinced. You should be too.: Are you bringing the best solution Continue reading

BiB 062: Globally Scalable Microsegmentation With Illumio

Illumio is a security company focused on preventing breaches from spreading through an organization using microsegmentation. In this briefing, Illumio discussed their Policy Compute Engine Supercluster. The PCE Supercluster is, as the name implies, a cluster of Policy Compute Engines that spans regions or even the globe. Illumio cited several scenarios driving this available architecture of their central controller.

The post BiB 062: Globally Scalable Microsegmentation With Illumio appeared first on Packet Pushers.

Docker at DEVIntersection 2018

 

 

Docker will be at DEVIntersection 2018 in Las Vegas the first week in December. DEVIntersection now in its fifth year, brings Microsoft leaders, engineers and industry experts together to educate, network, and share their expertise with developers. This year DEVIntersection will have a Developer, SQL Server and AI/Azure tracks integrated into a single event. Docker be featured at DEVIntersection via the following sessions:

Modernizing .NET Applications with Docker on Azure

Derrick Miller, a Docker Senior Solutions Engineer, will deliver a session focused on using containers as a modernization path for traditional applications, including how to select Windows Server 2008 applications for containerization, implementation tips, and common gotchas.

Depend on Docker – Get It Done with Docker on Azure

Alex Iankoulski, a Docker Captain, will highlight how how Baker Hughes, a GE Company, uses Docker to transform software development and delivery. Be inspired by the story of software professionals and scientists who were enabled by Docker to use a common language and work together to create a sophisticated platform for the Oil & Gas Industry. Attendees will see practical examples of how Docker is deployed on Azure.

Docker for Web Developers

Dan Wahlin, a Microsoft MVP and Docker Captain, Continue reading

Logs from the Edge

Logs from the Edge

With Cloudflare Workers, our JavaScript environment at the edge, it is possible to send traffic logs to arbitrary locations. In this post we are going to discuss an example Worker implementation on how to achieve this. So if you are building or maintaining your own traffic logging/analytics environment, read on.

To build the underlying script we are going to leverage sub requests. Sub requests, which can be spawned from the initial HTTP/S request, can be used to aggregate and compose a response from several back end services, or, like in the example discussed here, to post data to a specific endpoint. Sub requests can be made asynchronously and after the initial request has been fully served to avoid adding unnecessary latency to the main request.

Logs from the Edge

The Worker Code

In this example we assume an Elastic stack has been set up at elk.example.com and has been configured to receive via HTTP/S PUT requests a number of fields for each log line. The full script that we are going to look at can be found below:

addEventListener('fetch', event => {
  event.respondWith(fetchAndLog(event));
})

async function fetchAndLog(event) {
  const response = await fetch(event.request);
  event.waitUntil(logToElk(event.request, response));
  return response;
 Continue reading

Linux will seem to be everywhere in 2019

IDG 2019 just might be the Year of Linux — the year in which Linux is fully recognized as the powerhouse it has become. With Linux playing key roles in the Internet of Things (IoT), cloud technology, supercomputing and artificial intelligence (AI), and with a plethora of conferences and new releases on the horizon, Linux is poised to have a very exciting 2019. Let’s examine some of what we can expect to see.To read this article in full, please click here

What to expect of Linux in 2019

2019 just might be the Year of Linux — the year in which Linux is fully recognized as the powerhouse it has become. With Linux playing key roles in the Internet of Things (IoT), cloud technology, supercomputing and artificial intelligence (AI), and with a plethora of conferences and new releases on the horizon, Linux is poised to have a very exciting 2019. Let’s examine some of what we can expect to see.Linux behind the scenes The fact is that most people today are using Linux without ever knowing it — whether on their phones, online when using Google, Facebook, Twitter, GPS devices, and maybe even in their cars, or when using cloud storage for personal or business use. While the presence of Linux on all of these systems may go largely unnoticed by consumers, the role that Linux plays in this market is a sign of how critical it has become.To read this article in full, please click here