eBook: SD-WAN Strategies for 2018
This eBook looks at the growing interest in SD-WAN as well as some of the challenges end-users may encounter when migrating to an SD-WAN environment. Download today.
This eBook looks at the growing interest in SD-WAN as well as some of the challenges end-users may encounter when migrating to an SD-WAN environment. Download today.
The more things change, the more they remain the same — as do the two most critical issues for successful software execution. First, you remove the bugs, then you profile. And while debugging and profiling are not new, they are needed now more than ever, albeit in a modernized form.
The first performance analysis tools were first found on early IBM platforms in the early 1970s. These performance profiles were based on timer interrupts that recorded “status words” set at predetermined specific intervals in an attempt to detect “hot spots” inside running code.
Profiling is even more critical today, …
Mounting Complexity Pushes New GPU Profiling Tools was written by James Cuff at The Next Platform.
While Internet-connected devices afford utility unseen in generations past, they may also create a host of security issues, ranging from insignificant to catastrophic in potential impact. In an effort to mitigate this risk, the Internet Society partnered with Innovation, Science and Economic Development, the Canadian Internet Registration Authority, CANARIE, and CIPPIC to host a multistakeholder meeting on the security of IoT devices. The event takes place in Ottawa, Canada on April 4, 2018.
This meeting will be the first in a year-long process to develop recommendations for a set of norms and/or policies to secure IoT in Canada. This event will serve as an opportunity to begin planning and implementing a bottom-up, organic process to remedy existing and potential security challenges in Canada’s national IoT ecosystem.
This session will focus on IoT as it relates to two specific themes: consumer protection and network resiliency. The event will begin with presentations from engaged stakeholders in order to lay the groundwork for group discussion. Participants will then work in small groups to develop consensus on key IoT issues and determine what can be done to meaningfully impact consumer protection and network resiliency. This will create the basis of discussion Continue reading
The expression, the tail wags the dog, is used when a seemingly unimportant factor or infrequent event actually dominates the situation. It turns out that in modern datacenters, this is precisely the case – with relatively rare events determining overall performance.
As the world continues to undergo a digital transformation, one of the most pressing challenges faced by cloud and web service providers is building hyperscale datacenters to handle the growing pace of interactive and real-time requests, generated by the enormous growth of users and mobile apps. With the increasing scale and demand for services, IT organizations have turned …
In Modern Datacenters, The Latency Tail Wags The Network Dog was written by Timothy Prickett Morgan at The Next Platform.
The software uses a technology Pivot3 calls Intelligent Cloud Engine that extends policy-based management and automation to the cloud.
This is a guest post by Blake Loring, a PhD student at Royal Holloway, University of London. Blake worked at Cloudflare as an intern in the summer of 2017.
Compression is often considered an essential tool when reducing the bandwidth usage of internet services. The impact that the use of such compression schemes can have on security, however, has often been overlooked. The recently detailed CRIME, BREACH, TIME and HEIST attacks on TLS have shown that if an attacker can make requests on behalf of a user then secret information can be extracted from encrypted messages using only the length of the response. Deciding whether an element of a web-page should be secret often depends on the content of the page, however there are some common elements of web-pages which should always remain secret such as Cross-Site Request Forgery (CSRF) tokens. Such tokens are used to ensure that malicious webpages cannot forge requests from a user by enforcing that any request must contain a secret token included in a previous response.
I worked at Cloudflare last summer to investigate possible solutions to this problem. The result is a project called cf-nocompress. The Continue reading