White Paper: Secure and Cost-Effective Digital Transformation
A new white paper from Zscaler introduces a powerful solution for providing an efficient and secure experience between users and cloud/SaaS.
A new white paper from Zscaler introduces a powerful solution for providing an efficient and secure experience between users and cloud/SaaS.
There are several competing processor efforts targeting deep learning training and inference but even for these specialized devices, the old performance ghosts found in other areas haunt machine learning as well. …
The Neuromorphic Memory Landscape for Deep Learning was written by Nicole Hemsoth at .


In case you haven’t heard yet, Cloudflare launched a privacy-first DNS resolver service on April 1st. It was no joke! The service, which was our first consumer-focused service, supports emerging DNS standards such as DNS over HTTPS:443 and TLS:853 in addition to traditional protocols over UDP:53 and TCP:53, all in one easy to remember address: 1.1.1.1.
As it was mentioned in the original blog post, our policy is to never, ever write client IP addresses to disk and wipe all logs within 24 hours. Still, the exceptionally privacy-conscious folks might not want to reveal their IP address to the resolver at all, and we respect that. This is why we are launching a Tor hidden service for our resolver at dns4torpnlfs2ifuz2s2yf3fc7rdmsbhm6rw75euj35pac6ap25zgqad.onion and accessible via tor.cloudflare-dns.com.

NOTE: the hidden resolver is still an experimental service and should not be used in production or for other critical uses until it is more tested.
Imagine an alternative Internet where, in order to connect to www.cloudflare.com, instead of delegating the task of finding a path to our servers to your internet provider, you had to go through the following Continue reading
The food sector is one of the few large remaining sectors that have not been radically transformed by new technologies yet. Up to now, the Internet in particular was not involved as much as other sectors. However, in a not-too-distant future, the everyday question “what’s for dinner?” will be answered by algorithms managed by the next generation of food companies. When these algorithms are governing the food industry, they will also be governing people as well as their health and well-being.
As food is online, we will start realizing how important network design has become for our existence. The question “what’s for dinner?” will be replaced by “who decides what we eat?”. The Internet Society members, Johan Jörgensen, Michael Daun and Patrik Fältström, assure that this is the most profound question that the tech revolution has asked so far. That is the reason why they created a Special Interest Group on Internet of Food to focus on general discussions around the future infrastructure and standards for the digital world of food.
The project leader Johan Jörgensen explains: “The initial work in the SIG has been about discussing which standards already exist in the food Continue reading
Three months ago, The Next Platform promised a three part conversation about practical computational balance with the final part focusing on software. …
Practical Computational Balance: The Challenges Of Software was written by James Cuff at .
As a side event before the 2018 G7 Summit this week in Canada, tomorrow, 6 June 2018, the Internet Society will hold a panel to not only talk about the risks and opportunities the Internet of Things (IoT) brings, but also what policy makers can do to build a connected future for everyone.
The panel, Innovation, security, and the Internet of Things, will take place in Ottawa Ontario. If you’re in Ottawa, you can join us from 7:30 to 9:30 a.m. on Wednesday, 6 June, at the Alt Hotel Ottawa at 185 Slater St. If you’re somewhere else, the event will be
livestreamed.
Moderator David Akin (Global News) will facilitate a discussion between:
While the opportunities these connected devices can bring us are virtually unprecedented, the steps we must go through to protect ourselves online can feel overwhelming. At the Internet Society, we believe in a future where manufactures, software developers and service providers put people first and ensure user’s privacy and security is their top priority.
To understand Continue reading
The security startup maintains a massive database of vulnerabilities in open source libraries.
The acquisition follows an $80 million funding round and signals a growth trajectory for the SD-storage company.
Video shows just how boring networking is.
I recently started using kubeadm more extensively than I had in the past to serve as the primary tool by which I stand up Kubernetes clusters. As part of this process, I also discovered the kubeadm alpha phase subcommand, which exposes different sections (phases) of the process that kubeadm init follows when bootstrapping a cluster. In this blog post, I’d like to kick off a series of posts that explore how one could use the kubeadm alpha phase command to better understand the different components within Kubernetes, the relationships between components, and some of the configuration items involved.
Before I go any further, I’d like to point readers to this URL that provides an overview of kubeadm and using it to bootstrap a cluster. If you’re new to kubeadm, go read that before continuing on here.
<aside>Quick side note: it’s my understanding that at some point the intent is to move kubeadm alpha phase out of alpha, at which point the command might look more like kubeadm phase or similar (that hasn’t been fully determined yet as far as I know). If you’re reading this at some point in the future, just make note that this was written back Continue reading