When you finish building your web application or mobile app and launch your product, you may start worrying about protection against external threats, such as DDoS attacks. DDoS attacks will make your application unavailable. In some cases, the Internet service provider (ISP) could blackhole the website.
In this article, I will explain how to use Alibaba Cloud’s Anti-DDoS Premium to protect your applications against DDoS attacks and CC attacks. This accelerates the access from Mainland China users to applications hosted outside of Mainland China. …
By Raghav K.
Service Mesh manages the network traffic between services. The service has been designed to provide a more scalable and easy approach by cutting down on manual intervention, implementing an error-free workflow, and getting rid of operational burdens through automation and a unified solution structure. Alibaba Cloud Service Mesh (ASM) works between the core infrastructure and Kubernetes to enable seamless communications between services and heightened security and reliability.
Service Mesh enables path tracking of a service using the routing rules. It controls the flow of traffic and dynamically adjusts it to accelerate delivery. …
By Chaoqun Zan, Researcher of the Alibaba Cloud; Julian Zhou, Staff Product Manager of the Alibaba Cloud
It is no surprise that analytics is all about data. For enterprises, discovering the value in data and turning it into business value is the core logic for analytics development.
Similarly, data-driven analytics products have a long history in Alibaba Group. They play a vital role in ensuring stable business operations as well as helping Alibaba Group expand its business seamlessly. …
Unlike traditional industrial optimization, all agents in a multi-agent system are replaceable by each other and their working process is non-linear, which makes it difficult to directly model the system efficiency. The system efficiency is often approached indirectly by adjusting task assignment and moving paths and optimizing the total task route. However, in practice, we find that the task route is poorly related to system efficiency. With limited cost budget, the number of agents is often limited. When the task route is optimized, some agents are overburdened while some others are idle.
By Raghav K.
Enterprise networks have their share of complexities and advantages. In a distributed setting, there are different factors to counter and leverage. Networks have faced infiltration attempts for years. Barricading as a preventive measure helped keep networks and resources secure. While that was not a comprehensive approach to maintaining security, infrastructure integrity, and solutions, it was the only line of defense against malicious attacks.
After the introduction of cloud-native, containers based on Kubernetes have helped enterprises achieve their true potential. Cloud-native microservices have provided many advantages for building large applications that require a faster development to deployment cycle…
By Raghav K.
In Part 1 of this series, I gave an overview of zero-trust security architecture. The cloud-native architecture has responded to industry demands for software delivery implementation that automates and channels builds to release and helps with management. Containerization is the answer. Kubernetes with cloud-native architecture has led to a significant shift for organizations adopting the cloud-native approach to build business applications.
The concepts of DevOps also lacked a total end-to-end security solution that had a significant impact on services. DevSecOps was introduced to overcome the security shortcomings of DevOps. …
By Raghav K.
A decade has passed since the zero-trust security model was introduced. Today, in the ever-changing technological overlays, security is a paramount concern for organizations worldwide. Digital transformation has led to a major shift in the standard operating policies for organizations in all industries with practices ranging from multiple business types.
Enterprises have been implementing the zero-trust security architecture rapidly. After a decade, zero-trust architecture has moved to a more mainstream zone, with enterprises depending on the model to protect the most sensitive systems. You may ask why? Attacks are becoming more sophisticated. …
By Wang Siyu (Jiuzhu)
OpenKruise is an open-source cloud-native application automation management suite from Alibaba Cloud. It is currently a Sandbox project hosted under the Cloud-Native Computing Foundation (CNCF). Based on years of Alibaba’s experience in container and cloud-native technologies, OpenKruise is a Kubernetes-based standard extension component widely used in Alibaba’s internal production environment. It follows the standards of the upstream community with the technical concepts and best practices for large-scale Internet scenarios.
OpenKruise released v0.8.0 on March 4, 2021. Please visit this website to view the changelog. This article gives an overview of the latest version.
If you are…
By Raghav K.
Today, the world is highly interconnected and can count on seamless communication and data processing to make life easier. Enterprises are implementing solutions using technologies that accelerate growth and provide easy access to flexible, scalable, and practically unlimited computing, storage, security, and network solutions. Edge computing is the next big thing within the IT infrastructure. Its high-performance approach differs completely from how data is processed by a traditional data center or the cloud.
Edge computing technology is based on the concepts of distributed computing that incorporates edge devices (or nodes) to bring intelligence into the concept of…
To learn more about how to store, manage and process your content with ease, download How to Ready Your Content for Today’s Media Market whitepaper today.
Digitization has hit the media industry, hard. Consumers now demand high-quality content, available without any restrictions and across any device, location and platform. This places media organizations under tremendous pressure to store, manage and process their content, fast.
But traditional content management tasks are highly resource-intensive — from both a data and human perspective. This is where a cloud-based solution can help, providing you with intuitive solutions including scalable storage options and fast content…
Follow me to keep abreast with the latest technology news, industry insights, and developer trends.