Going Global – a Localization Case Study at Cloudflare

Today Cloudflare serves nearly 10% of all global internet requests and more than 80% of our customers are based outside of the United States. Cloudflare is rapidly growing and there is nothing more important to us than being able to better serve our users across the world beyond our global offices in San Francisco, Austin, Champaign, Washington D.C., New York, London, and Singapore.

Earlier this year, we launched a team to focus on global expansion and growth. In June, we presented our agile global market expansion experiment framework at LocWorld Barcelona and wanted to report back on how things were going.

Getting started

"If you talk to a man in a language he understands, that goes to his head. If you talk to him in his language, that goes to his heart" – Nelson Mandela

At Cloudflare, we are motivated by our users from all around the world. Of our top 15 countries by traffic volume, 10 have official languages other than English. As a large part of our users do not speak our primary language of business, our priority is to reach and engage with these users in their native languages through localization.

As a growing company, Continue reading

ARM Servers: Qualcomm Is Now A Contender

Many have tried to wrench the door of the datacenter open with ARM processors, but Qualcomm, which knows a thing or two about creating and selling chips for smartphones and other client devices, has perhaps the best chance of actually selling ARM chips in volume inside of servers.

The combination of a rich and eager target market with a good product design tailored for that market and enough financial strength and stability to ensure many generations of development are what are necessary to break into the datacenter, and the “Falkor” cores that were unveiled this week at Hot Chips were

ARM Servers: Qualcomm Is Now A Contender was written by Timothy Prickett Morgan at The Next Platform.

Top 10 supercomputers of 2017

The fastest of the fastImage by ThinkstockYes, your new gaming PC that supports VR headsets is impressively fast. But can it simulate the entire universe over millions of years? Shed light on the forces that cause destructive summer storms in Europe? Ensure the safety and reliability of nuclear weapons? We didn’t think so; those are jobs for supercomputers.To read this article in full or to leave a comment, please click here

Top 10 supercomputers of 2017

The fastest of the fastImage by ThinkstockYes, your new gaming PC that supports VR headsets is impressively fast. But can it simulate the entire universe over millions of years? Shed light on the forces that cause destructive summer storms in Europe? Ensure the safety and reliability of nuclear weapons? We didn’t think so; those are jobs for supercomputers.To read this article in full or to leave a comment, please click here

IGF-USA: Promoting a More Inclusive Internet

The IGF-USA took place in Washington D.C on July 24, 2017. During the event, the panel "Promoting a More Inclusive Internet" looked at current barriers to an inclusive Internet and explored how access could be expanded to underserved areas and to underrepresented communities. Moderated by Dr. Brandie Nonnecke, Research & Development Manager for CITRIS and the Banatao Institute at the University of California-Berkeley and Chair of the San Francisco-Bay Area Internet Society Chapter Working Group on Internet Governance, the panel brought together several experts on access provision, each with many years experience of connecting the unconnected in the USA and overseas.

Decentralized Approach

Susannah Gray

Ukraine Leaks Russian Social Media Ban

Another development in the long-running conflict between Ukraine and Russia occurred in May of this year when Ukrainian President Petro Poroshenko enacted a ban on Russia’s four most prominent internet companies in the name of national security.  The ban included the two most widely used social media websites, VKontakte (often referred to as the “Russian Facebook“) and Odnoklassniki (“Classmates” in Russian), as well as email service provider Mail.ru and Russian search engine Yandex.

These websites have such a significant Ukrainian user base that Mail.ru says it expects to lose $13 million this year as a result of the ban and Yandex is appealing the ban through Ukraine’s Supreme Administrative Court.

And now it appears that this ban has spilled out into the global routing table.  On 27 July 2017, Ukrainian ISP UARNet (AS3255) began announcing several new BGP routes that were hijacks of the IP address space of these Russian internet companies.  On this day, AS3255 briefly announced more-specific hijacks of each of these four Russian internet companies including 94.100.180.0/24 (Mail.ru), 87.250.250.0/23 (Yandex), 87.240.165.0/24 (Vkontakte) and 217.20.159.0/24 (Odnoklassniki).  While Continue reading

First In-Depth View of Wave Computing’s DPU Architecture, Systems

Propping up a successful silicon startup is no simple feat, but venture-backed Wave Computing has managed to hold its own in the small but critical AI training chip market–so far.

Seven years after its founding and the company’s early access program for beta machines based on its novel DPU manycore architecture is now open, which is prompting Wave to be more forthcoming about the system and chip architecture for deep learning-focused dataflow architecture.

Dr. Chris Nicol, Wave Computing CTO and lead architect of the Dataflow Processing Unit (DPU) admitted to the crowd at Hot Chips this week that maintaining funding

First In-Depth View of Wave Computing’s DPU Architecture, Systems was written by Nicole Hemsoth at The Next Platform.

Get ready for new storage technologies and media

In a push to improve storage density, new, oblong-shaped solid-state drives (SSDs) are coming from Intel by the end of the year, the company has announced. It’s just one of a bunch of new memory forms and technologies that we’ll be seeing in due course, though.Intel’s “ruler” style drives are designed to slip neatly into a standard rack. The concept abandons the premise that memory products should look like traditional magnetic hard disc drives (HDDs) or Peripheral Component Interconnect Express (PCIe) expansion cards.To read this article in full or to leave a comment, please click here

Get ready for new storage technologies and mediums

In a push to improve storage density, new, oblong-shaped solid-state drives (SSDs) are coming from Intel by the end of the year, the company has announced. It’s just one of a bunch of new memory forms and technologies that we’ll be seeing in due course, though.Intel’s “ruler” style drives are designed to slip neatly into a standard rack. The concept abandons the premise that memory products should look like traditional magnetic hard disc drives (HDDs) or Peripheral Component Interconnect Express (PCIe) expansion cards.To read this article in full or to leave a comment, please click here

Connected cars have an ‘indefensible’ security vulnerability

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags.But according to security firm Trend Micro, these safety systems are even more vulnerable to hacking than was previously thought. In a blog post published last week, "The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard," the company publicized an effective, vendor-neutral hack that is “currently indefensible by modern car security technology.”To read this article in full or to leave a comment, please click here

Connected cars have an ‘indefensible’ security vulnerability

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags.But according to security firm Trend Micro, these safety systems are even more vulnerable to hacking than was previously thought. In a blog post published last week, "The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard," the company publicized an effective, vendor-neutral hack that is “currently indefensible by modern car security technology.”To read this article in full or to leave a comment, please click here