Hello, Colorado! CloudFlare’s 82nd Data Center is Live in Denver

alt

Hello from the Mile High City! Denver is our twelfth data center in the United States, and our 82nd data center globally, improving regional web performance.

Denver Tech Scene

Near the iconic Rocky Mountains, Denver brews more beer than any other American city, and is home to a thriving technology and entrepreneurship community. The Colorado community brought us companies such as Chipotle, HomeAdvisor, and LogRhythm - and is helping build the next great Colorado company.

Mile High, Twice as Fast

Despite having a unique place on the map of the United States, and it's significant distance from other cities (900 miles to Dallas; 1,000 miles to Chicago, 1,000 miles to Los Angeles), Denver has not always been a major point of regional interconnection. Through the efforts of the community, and greater localized peering of traffic, this is changing for the better.

Visitors to millions of websites using ISPs, big or small, such as Aerux, Blackfoot, Comcast and CenturyLink, should see a 2x increase in performance, as they are now served from our Denver data center.

CloudFlare participates at two major internet exchanges: Any2 Denver and IX-Denver.

alt

Latency in milliseconds halves for end user (Denver) to CloudFlare. Source: Cedexis

Global Expansion

Continue reading

SugarCRM is planning a Siri-like agent named Candace

SugarCRM has put AI at the core of its product plans and is working on a new intelligence service along with a Siri-like agent named Candace.Tapping the company's recent acquisitions of Stitch and Contastic, the new technology will be designed to help businesses spend less time entering data into their customer relationship management software and more time learning from and acting upon it.SugarCRM is scheduled to demonstrate the new capabilities Wednesday at its SugarCon conference in San Francisco.To read this article in full or to leave a comment, please click here

Bluetooth 5 to be introduced on Thursday

The Bluetooth SIG will formally introduce Bluetooth 5 on Thursday, offering a significant upgrade in speed and range, and hopefully security as well.Bluetooth 5 will have double the speed and four times the range of the current version, 4.2, which was more focused on power savings than performance. Technical improvements in Bluetooth 5 include new functionality for connectionless services, such as navigation and location-based services, and possibly set up beacons around the world to transmit information.All of these details are spelled out in an update from Mark Powell, executive director of the Bluetooth Special Interest Group (SIG). To read this article in full or to leave a comment, please click here

Two reports reveal details about Russian and Chinese government-backed hackers

Two different reports reveal details about three government-backed hacker groups, two from Russia and one from China.Russian government hacker groups Cozy Bear and Fancy Bear Not one, but two groups of Russian government hackers broke into the computer network of the Democratic National Committee (DNC), spying on internal communications and stealing opposition research on Republican presidential candidate Donald Trump.CrowdStrike said it kicked out the adversary groups “Cozy Bear” and “Fancy Bear” over the weekend.Cozy Bear, which had successfully penetrated the unclassified networks of the White House, State Department and Joint Chiefs of Staff in 2014, infiltrated the DNC last summer and had been monitoring email and chat communications. CrowdStrike believes Cozy Bear may work for Russia’s Federal Security Service (FSB).To read this article in full or to leave a comment, please click here

Two reports reveal details about Russian and Chinese government-backed hackers

Two different reports reveal details about three government-backed hacker groups, two from Russia and one from China.Russian government hacker groups Cozy Bear and Fancy BearNot one, but two groups of Russian government hackers broke into the computer network of the Democratic National Committee (DNC), spying on internal communications and stealing opposition research on Republican presidential candidate Donald Trump.CrowdStrike said it kicked out the adversary groups “Cozy Bear” and “Fancy Bear” over the weekend.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovate Everywhere Challenge

Innovate Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently completed Innovate Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovate Everywhere Challenge

Innovate Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently completed Innovate Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovate Everywhere Challenge

Innovate Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently completed Innovate Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovation Everywhere Challenge

Innovation Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently completed Innovation Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovation Everywhere Challenge

Innovation Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently completed Innovation Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Cisco names winners of Innovation Everywhere Challenge

Innovation Everywhere ChallengeImage by CiscoNearly half of Cisco’s 74,000-member workforce got involved in the company’s recently Innovation Everywhere Challenge, designed to spark startup-like activity among its ranks. More than 1,100 ideas were submitted and 3 winners were selected.To read this article in full or to leave a comment, please click here

Gartner: DDoS defenses have been backsliding but starting a turnaround

Distributed denial-of-service attacks have been getting bigger and lasting longer, and for the past few years defenses haven’t kept pace, but that seems to be changing, Gartner analysts explained at the firm’s Security and Risk Management Summit.Gartner tracks the progress of new technologies as they pass through five stages from the trigger that gets them started to the final stage where they mature and are productive. The continuum is known as the Hype Cycle. Gartner Gartner analyst Lawrence OransTo read this article in full or to leave a comment, please click here

Gartner: DDoS defenses have been backsliding but starting a turnaround

Distributed denial-of-service attacks have been getting bigger and lasting longer, and for the past few years defenses haven’t kept pace, but that seems to be changing, Gartner analysts explained at the firm’s Security and Risk Management Summit.Gartner tracks the progress of new technologies as they pass through five stages from the trigger that gets them started to the final stage where they mature and are productive. The continuum is known as the Hype Cycle. Gartner Gartner analyst Lawrence OransTo read this article in full or to leave a comment, please click here

Announcing NetBox

Update: NetBox has been released!

Several years ago, I lamented the few options available for a provider-grade IPAM solution. Specifically, I explained why building a custom application would be undesirable:

Could I create a custom IPAM solution with everything we need? Sure! The problem is that I'm a network engineer, not a programmer (a natural division of labor which, it seems, is mostly to blame for the lack of robust IPAM solutions available). Even if I had the time to undertake such a project, I have little interest in providing long-term maintenance of it.

But I suppose time makes fools of us all.

Nearly one year ago, I started developing an IPAM application as part of my day job. Leveraging my experience with the Django Python framework, I had a working proof-of-concept in just a week. Over the next several months, the project grew more mature and began to take on additional roles: data center infrastructure management, circuit tracking, and credentials storage. Today, the tool functions as our "source of truth" for many aspects of our infrastructure. We call it NetBox.

Continue reading · 29 comments

Announcing NetBox

Update: NetBox has been released!

Several years ago, I lamented the few options available for a provider-grade IPAM solution. Specifically, I explained why building a custom application would be undesirable:

Could I create a custom IPAM solution with everything we need? Sure! The problem is that I'm a network engineer, not a programmer (a natural division of labor which, it seems, is mostly to blame for the lack of robust IPAM solutions available). Even if I had the time to undertake such a project, I have little interest in providing long-term maintenance of it.

But I suppose time makes fools of us all.

Nearly one year ago, I started developing an IPAM application as part of my day job. Leveraging my experience with the Django Python framework, I had a working proof-of-concept in just a week. Over the next several months, the project grew more mature and began to take on additional roles: data center infrastructure management, circuit tracking, and credentials storage. Today, the tool functions as our "source of truth" for many aspects of our infrastructure. We call it NetBox.

Continue reading · 29 comments

Announcing NetBox

Several years ago, I lamented the few options available for a provider-grade IPAM solution. Specifically, I explained why building a custom application would be undesirable:

Could I create a custom IPAM solution with everything we need? Sure! The problem is that I'm a network engineer, not a programmer (a natural division of labor which, it seems, is mostly to blame for the lack of robust IPAM solutions available). Even if I had the time to undertake such a project, I have little interest in providing long-term maintenance of it.

But I suppose time makes fools of us all.

Nearly one year ago, I started developing an IPAM application as part of my day job. Leveraging my experience with the Django Python framework, I had a working proof-of-concept in just a week. Over the next several months, the project grew more mature and began to take on additional roles: data center infrastructure management, circuit tracking, and credentials storage. Today, the tool functions as our "source of truth" for many aspects of our infrastructure. We call it NetBox.

Continue reading · 6 comments