“Ingest it all, keep everything, find that needle in the haystack,” they exclaimed. …
Data Reduction is the Next IT Frontier was written by Nicole Hemsoth at The Next Platform.
Today's Heavy Networking podcast dives into academic research on DDoS attack techniques. Our guests have published a paper about how the TCP protocol and middleboxes such as firewalls can be weaponized by bad actors and used in reflective amplification attacks. We discuss technical details, how they performed this research, potential countermeasures, and more.
The post Heavy Networking 596: Weaponizing Firewalls And Middleboxes For DDoS Attacks appeared first on Packet Pushers.
Enterprises large and small that depend on Hewlett Packard Enterprise to build their systems and certify them for an absolutely enormous amount of software and support them during a long life in the field should send Thank You notes to the venerable systems maker. …
The Venerable Tenacity Of System Supplier HPE was written by Timothy Prickett Morgan at The Next Platform.
A friend of mine pointed out this quote by John Shoch when I started preparing the Network Stack Addressing slide deck for my How Networks Really Work webinar:
The name of a resource indicates what we seek, an address indicates where it is, and a route tells us how to get there.
You might wonder when that document was written… it’s from January 1978. They got it absolutely right 42 years ago, and we completely messed it up in the meantime with the crazy ideas of making IP addresses resource identifiers.
A friend of mine pointed out this quote by John Shoch when I started preparing the Network Stack Addressing slide deck for my How Networks Really Work webinar:
The name of a resource indicates what we seek, an address indicates where it is, and a route tells us how to get there.
You might wonder when that document was written… it’s from January 1978. They got it absolutely right 42 years ago, and we completely messed it up in the meantime with the crazy ideas of making IP addresses resource identifiers.
Ever since Nutanix, the first virtualized server-storage smashup, dropped out of stealth in 2011, we have been watching with great interest to see if this hyperconverged infrastructure would take the world by storm. …
If Hyperconverged Storage Is So Good, Why Is It Not Pervasive And Profitable? was written by Timothy Prickett Morgan at The Next Platform.
The field is littered with the remnants of Arm and RISC-V server startups. …
Ventana Sees Window for Robust RISC-V Server Business was written by Nicole Hemsoth at The Next Platform.
When it comes to allocating budget for cybersecurity there are many approaches to breaking it down into line items. We discuss various ideas and possibilities that might offer some insight for your own situation.
The post HS010 Budgeting for Cybersecurity appeared first on Packet Pushers.


My name is Rishabh Bector, and this summer, I worked as a software engineering intern on the Cloudflare Tunnel team. One of the things I built was quick Tunnels and before departing for the summer, I wanted to write a blog post on how I developed this feature.
Over the years, our engineering team has worked hard to continually improve the underlying architecture through which we serve our Tunnels. However, the core use case has stayed largely the same. Users can implement Tunnel to establish an encrypted connection between their origin server and Cloudflare’s edge.
This connection is initiated by installing a lightweight daemon on your origin, to serve your traffic to the Internet without the need to poke holes in your firewall or create intricate access control lists. Though we’ve always centered around the idea of being a connector to Cloudflare, we’ve also made many enhancements behind the scenes to the way in which our connector operates.
Typically, users run into a few speed bumps before being able to use Cloudflare Tunnel. Before they can create or route a tunnel, users need to authenticate their unique token against a zone on their account. This means in order to simply Continue reading