BrandPost: Simplify Cloud Networking with Microsoft Azure

As enterprises continue to rapidly migrate applications and infrastructure to the cloud, SD-WAN technologies are quickly gaining traction. Industry analyst firm IDC estimates that 80 percent of business is transacted from branch and remote offices, which is driving enterprises to deploy SD-WAN solutions to provide secure and direct branch connectivity to the cloud while lowering overall WAN costs.The Silver Peak® Unity EdgeConnect™ SD-WAN solution has been engineered from the ground up for the cloud. Microsoft’s recent announcement of the Azure Virtual WAN service comes in response to customer demand to optimize branch connectivity to their IaaS, PaaS, and SaaS cloud services. By integrating with the Azure Virtual WAN service, Silver Peak enables enterprises to easily connect branch sites and users to Azure services and Microsoft’s global IP backbone.To read this article in full, please click here

What is Transport Layer Security (TLS)?

Despite the goal of keeping Web communications private, flaws in the design and implementation of Transport Layer Security have led to breaches, but the latest version – TLS 1.3 – is an overhaul that strengthens and streamlines the crypto protocol.What is TLS? TLS is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions. It is an IETF standard intended to prevent eavesdropping, tampering and message forgery. Common applications that employ TLS include Web browsers, instant messaging, e-mail and voice over IP.To read this article in full, please click here

What is Transport Layer Security (TLS)?

Despite the goal of keeping Web communications private, flaws in the design and implementation of Transport Layer Security have led to breaches, but the latest version – TLS 1.3 – is an overhaul that strengthens and streamlines the crypto protocol.What is TLS? TLS is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions. It is an IETF standard intended to prevent eavesdropping, tampering and message forgery. Common applications that employ TLS include Web browsers, instant messaging, e-mail and voice over IP.To read this article in full, please click here

What is Transport Layer Security (TLS)?

Despite the goal of keeping Web communications private, flaws in the design and implementation of Transport Layer Security have led to breaches, but the latest version – TLS 1.3 – is an overhaul that strengthens and streamlines the crypto protocol.What is TLS? TLS is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions. It is an IETF standard intended to prevent eavesdropping, tampering and message forgery. Common applications that employ TLS include Web browsers, instant messaging, e-mail and voice over IP.To read this article in full, please click here

What is Transport Layer Security (TLS)?

Despite the goal of keeping Web communications private, flaws in the design and implementation of Transport Layer Security have led to breaches, but the latest version – TLS 1.3 – is an overhaul that strengthens and streamlines the crypto protocol.What is TLS? TLS is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions. It is an IETF standard intended to prevent eavesdropping, tampering and message forgery. Common applications that employ TLS include Web browsers, instant messaging, e-mail and voice over IP.To read this article in full, please click here

Stuff The Internet Says On Scalability For November 9th, 2018

Wake up! It's HighScalability time:

 

@b0rk

 

Do you like this sort of Stuff? Please support me on Patreon. I'd really appreciate it. Know anyone looking for a simple book explaining the cloud? Then please recommend my well reviewed (30 reviews on Amazon and 72 on Goodreads!) book: Explain the Cloud Like I'm 10. They'll love it and you'll be their hero forever.

 

  • $3 billion: Tesla's yearly spend on gigafactories; 18,000: GDPR data breach notifications since May; 30: happy birthday Morris Worm!; 1/3: not opting for new Java; 10x: MySQL TPS improvement in 9 years; 1,300: childhood photos posted by parents by the time they're 13; 100TB: hard drives by 2025; 1000x: faster graphics performance than the original iPad released eight years ago; 13.28B: transistors in  world's first 7nm GPU; 15 million: daily Uber trips; $725 million: opening weekend for Redemption 2; 

  • Quotable Quotes:
    • @kylecyuan: 10/ From computational bio, cloud bio, and digital therapeutics, AI has put Bio on the Moore's Law curve, not Eroom's Law. From wet lab problems to dry lab ones. @vijaypande 's "When Software Eats Bio." This industrializes and Continue reading

Last Month in Internet Intelligence: October 2018

The level of significant Internet disruptions observed through the Oracle Internet Intelligence Map was lower in October, though the underlying reasons for these disruptions remained generally consistent compared to prior months. For enterprises, the importance of redundant Internet connectivity and regularly exercised failover plans is clear. Unfortunately, for state-imposed Internet outages, such planning and best practices may need to include failsafes for operations while periodically offline.

Directed disconnection

On October 10, Ethiopian Prime Minister Abiy Ahmed met with several hundred soldiers who had marched on his office to demand increased pay. The Ethiopian Broadcasting Corporation (formerly known as ETV) did not cover the soldiers marching but noted that Internet connectivity within the country had been shut off for several hours to prevent “fake news” from circulating on social media. This aligned with residents’ reports of a three-hour Internet outage. The figure below shows that the disruption began around 12:00 GMT, significantly impacting both traceroutes to, and DNS query traffic from, Ethiopia for several hours.

The impact of the Internet shutdown is also clearly evident in the figure below, which shows traceroutes into Ethio Telecom, the state-owned telecommunications service provider. Similar to the country-level graph shown above, the number of Continue reading

Making the Case for Community Networks at Africa IGF

Who supplies your Internet? If you live in urban Africa, you probably get Internet access through your mobile phone or through fibre at the office or home. When you travel to rural or underserved areas, there is probably limited or no Internet because mobile network operators and Internet Service Providers (ISPs) have yet to reach these areas. But what if people in rural and underserved areas could build their own networks to provide the telecommunications services that they need?

This notion has been tried successfully in several African countries. In Kenya, Tunapanda Institute has built TunapandaNET a wireless network connecting schools and youth centres in Kibera, Kenya’s largest slum. Bosco is a solar-powered wireless network that connects community ICT centres in Gulu, Northern Uganda. PamojaNet operates a wireless network to the community in Idjwi Island on lake Kivu, Eastern DRC, close to the border with Rwanda. Others such as Machaworks in rural Zambia and Zenzeleni Networks in Eastern Cape of South Africa provide similar services. These networks have been built by local communities to provide access to both offline content and Internet access where possible to the communities that they serve.

During a session at the 2018 Africa Internet Governance Continue reading

Cloud Computing without Containers

Cloud Computing without Containers

Cloudflare has a cloud computing platform called Workers. Unlike essentially every other cloud computing platform I know of, it doesn’t use containers or virtual machines. We believe that is the future of Serverless and cloud computing in general, and I’ll try to convince you why.

Isolates

Cloud Computing without Containers

Two years ago we had a problem. We were limited in how many features and options we could build in-house, we needed a way for customers to be able to build for themselves. We set out to find a way to let people write code on our servers deployed around the world (we had a little over a hundred data centers then, 155 as of this writing). Our system needed to run untrusted code securely, with low overhead. We sit in front of ten million sites and process millions and millions of requests per second, it also had to run very very quickly.

The Lua we had used previously didn’t run in a sandbox; customers couldn’t write their own code without our supervision. Traditional virtualization and container technologies like Kubernetes would have been exceptionally expensive for everyone involved. Running thousands of Kubernetes pods in a single location would be resource intensive, doing it in Continue reading