Today we are launching the second iteration of the Cloudflare App Developer Fund.
This is an investment fund started in partnership with Venrock, Pelion Venture Partners, and New Enterprise Associates. We created the fund to provide developers with resources so that they can build apps using the Cloudflare network and our serverless product, Workers, which enables developers to create applications without configuring or maintaining infrastructure. The goal is to fuel a new economy that grows into a thriving ecosystem so that developers’ serverless innovations can enjoy commercial success.
Cloudflare Apps with Workers allows developers to package Workers, delivering new worker-powered experiences to Cloudflare customers, all within a few clicks via Cloudflare Apps.
Our CTO, John Graham-Cumming talks about it in a recently recorded video:
In short, Cloudflare is looking for apps that will advance our mission to help build a better Internet: one that is safe, fast and reliable. We are seeking out apps that have a clear vision, delight customers by the ease of use and align with our vision. Having already seen multiple use cases around custom application security, data loss prevention, and bot mitigation, we can’t wait to see what else you come up Continue reading
LEMNA: explaining deep learning based security applications Guo et al., CCS’18
Understanding why a deep learning model produces the outputs it does is an important part of gaining trust in the model, and in some situations being able to explain decisions is a strong requirement. Today’s paper shows that by carefully considering the architectural features of a given model, it’s possible to co-design an explanatory model. The idea is applied to deep learning models in the security domain (to detect the start of functions within binaries, and to detect malware) where for reasons we’ll look at next, the assumptions made by black-box explainers such as LIME don’t apply.
Like LIME, LEMNA approximates a local area of a complex deep learning decision boundary using a simple interpretable model. Unlike LIME, LEMNA can handle non-linear local boundaries, and feature dependencies (e.g., for a sequences fed into RNNs, which explicitly model dependencies in sequential data).
While intrigued by the high accuracy, security practitioners are concerned about the lack of transparency of deep learning models, and thus hesitate to widely adopt deep learning classifiers in security and safety-critical areas.
Explanations that are understandable by security analysts can help Continue reading
The Sequana line of supercomputers from the Bull division of Atos offers some of the highest compute density available in the HPC realm. …
Atos Rejiggers Sequana Supercomputers, Adds AMD Rome CPUs was written by Timothy Prickett Morgan at .
Huawei continues to dominate the worldwide market, with Ciena tops in North America.
We’re at it again with the Cumulus content roundup- November edition. As always, we’ve kept busy this month with lots of great resources and news for you to read. From EVPN Underlay Routing Protocol to the benefits of Layer 3, we’ve rounded it all up right here, so settle in and stay a while!
From Cumulus Networks:
Choosing an EVPN Underlay Routing Protocol: We take a look at the options in routing protocols that could use as an underlay with the objective of understanding what might make them a fit or not for deployment in an EVPN network.
The Benefits of Flexible Multi-Cloud and Multi-Region Networking: Here we explore some of the reasons multi-cloud is fantastic for enterprises when they consider security, flexibility, reliability, and cost-effectiveness.
Cumulus Linux Automation with Standard Linux Tooling: This blog focuses on the different options available for modern automation, & how the Cumulus Linux approach provides the greatest amount of flexibility.
Cumulus Networks Open-Ended NCLU Net Example Command: NCLU is the always helpful Network Command Line Utility and supports both inspection and modification of Cumulus Networks configuration data.
Layer 3 can do it better. I’m convinced. You should be too.: Are you bringing the best solution Continue reading
Illumio is a security company focused on preventing breaches from spreading through an organization using microsegmentation. In this briefing, Illumio discussed their Policy Compute Engine Supercluster. The PCE Supercluster is, as the name implies, a cluster of Policy Compute Engines that spans regions or even the globe. Illumio cited several scenarios driving this available architecture of their central controller.
The post BiB 062: Globally Scalable Microsegmentation With Illumio appeared first on Packet Pushers.
As we well know by now, workloads at supercomputing sites large and small are changing with the introduction of machine learning and more complex applications that require both large and small files. …
Re-Architecting Storage Around HPC’s Mixed Workloads Problem was written by Nicole Hemsoth at .
Docker will be at DEVIntersection 2018 in Las Vegas the first week in December. DEVIntersection now in its fifth year, brings Microsoft leaders, engineers and industry experts together to educate, network, and share their expertise with developers. This year DEVIntersection will have a Developer, SQL Server and AI/Azure tracks integrated into a single event. Docker be featured at DEVIntersection via the following sessions:
Derrick Miller, a Docker Senior Solutions Engineer, will deliver a session focused on using containers as a modernization path for traditional applications, including how to select Windows Server 2008 applications for containerization, implementation tips, and common gotchas.
Alex Iankoulski, a Docker Captain, will highlight how how Baker Hughes, a GE Company, uses Docker to transform software development and delivery. Be inspired by the story of software professionals and scientists who were enabled by Docker to use a common language and work together to create a sophisticated platform for the Oil & Gas Industry. Attendees will see practical examples of how Docker is deployed on Azure.
Dan Wahlin, a Microsoft MVP and Docker Captain, Continue reading
With Cloudflare Workers, our JavaScript environment at the edge, it is possible to send traffic logs to arbitrary locations. In this post we are going to discuss an example Worker implementation on how to achieve this. So if you are building or maintaining your own traffic logging/analytics environment, read on.
To build the underlying script we are going to leverage sub requests. Sub requests, which can be spawned from the initial HTTP/S request, can be used to aggregate and compose a response from several back end services, or, like in the example discussed here, to post data to a specific endpoint. Sub requests can be made asynchronously and after the initial request has been fully served to avoid adding unnecessary latency to the main request.
In this example we assume an Elastic stack has been set up at elk.example.com
and has been configured to receive via HTTP/S PUT
requests a number of fields for each log line. The full script that we are going to look at can be found below:
addEventListener('fetch', event => {
event.respondWith(fetchAndLog(event));
})
async function fetchAndLog(event) {
const response = await fetch(event.request);
event.waitUntil(logToElk(event.request, response));
return response;
Continue reading
Qualcomm will use the fund to invest in startups building AI for autonomous cars, robotics, and machine learning platforms.
Developers only need to upload their own code, which is then automatically deployed to the edge in an isolated runtime environment.
The deal will bring storage to Contrail’s multicloud product as well as expand Juniper’s edge computing portfolio.
Two VMware customers, a Texas Education Service Center and a nationwide hospice company, say NSX and vRealize Network helped them secure and manage networks.
Cloud, containers, serverless, SDN, and security are just some of the technologies that will play a major role in IT in 2019. Hold on and expect next year to bring many changes.