Cloud Platform Release v20.12.0

Between November 25th and and December 29th platform updates are placed on hold in order to minimize any impact to customers who rely on the holiday season for a significant portion of their revenue. So November and the vast majority of December didn’t see any significant changes released. But we were still working hard behind-the-scenes […]

Creating an Active-Active VPN Tunnel with BGP in Azure

In this article we will outline the steps required to create an active-active VPN tunnel with BGP dynamic routing between Microsoft Azure and the Total Uptime Cloud Platform. By default, Total Uptime requires your devices (servers) to have internet-routable IPv4 or IPv6 addresses so we can direct traffic to them. By creating VPN tunnels between […]

Unchanging Internet Concepts

Internet technology continues to change at a rapid pace, but the fundamentals are the same. Most networks are still using TCP/IP. Networks are designed and analyzed using protocol stacks. And data packet switching is still the lifeblood of the network. In this post, we take a look at some fundamental concepts in networking that the […]

What Is Load Balancing — And Do I Need It?

Unless your job encompasses application availability or delivery, you may not be aware of what load balancing is, what it does, or whether it is even a necessary component. As to the last part of that statement, the answer is simple:  It is absolutely necessary. In today’s demanding online world, load balancing helps to ensure […]

How to Combat Ransomware to Stay Online

Recently we discussed the heavy cost of ransomware, both in the form astronomical ransoms that have been paid recently as well as the cost of dealing with the aftermath of an attack.  When it comes to most serious cyberattacks, a pound of prevention is worth a pound of cure.  The truth is that in most […]

What You Should Know About APIs

We all know how a computer user interface (UI) works — at least in general terms. Humans interact with digital machines using input devices, and we watch everything real-time on computer monitors. When we think of user input, we usually think of Input devices like a mouse, keyboard, touchscreen, trackball, or pointing stick. But we […]

And You Thought Your Transactions Were Safe: SSL Based Attacks

Your plaintext internet traffic is subject to attack. You already knew this.  And it probably won’t surprise you to learn that your encrypted internet traffic is also vulnerable. It’s an unfortunate situation. Carl Herberger, Radware’s VP for Security Solutions, says that the prospect of SSL-based attacks “makes a folly of our existing security infrastructure”. The […]

An Introduction to Form Field Manipulation

You use web forms all the time. All across the internet, you are called upon to give certain information about yourself in order to access a site, use an application, or purchase a product. And the truth is most of us have become more open to these kinds of interactions as we have become immersed […]

Why Ransomware is a Threat to Availability

According to the FBI, ransomware became a billion dollar industry in 2016.  That is right, $1 billion.  If ransomware were a legitimate industry, it would be the focus of case studies in every business school in the world as its growth is unprecedented.  This growth is attributed to four primary reasons. The amount of money […]