SlideShare a Scribd company logo
www.misti.com
© 2018 MIS Training Institute Holdings, Inc. All rights reserved.
ON THE BLEEDING EDGE:
8 PREDICTIONS FOR THE INTERNET IN 2018
On the Bleeding Edge: 8 Predictions for the internet in 2018
15 February, 2018 | 2:00-3:00 PM
Cloudflare’s mission is to “create a better Internet.” With 10% of Internet traffic passing through
Cloudflare’s global network of 120+ data-centers, we have insight into evolving and emerging
technologies. In this webcast, John Graham-Cumming, Cloudflare’s CTO will review his 2017
predictions and compare them to what really happened, and also make his
2018 predictions for the Internet and technology spaces.
The webcast will feature a discussion with:
To ask a question, use the
green “Q&A” button on the left
side of your screen. All
questions are anonymous.
John Graham-Cummings
Chief Technology Officer
Cloudflare
Tim Fong
Product Marketing Manager
Cloudflare
On the Bleeding Edge: 8 Predictions for the
Internet in 2018
Agenda
• What were our 2017 predictions and what really happened?
• Our predictions for 2018
• Q & A session
2017
1Tbps DDoS attacks will become the baseline
for ‘massive attacks’
IPv6 will become the defacto for mobile
networks
A SHA-1 collision will be announced
e1964edb8bcafc43de6d1d99240e
80dfc710fbe1
e1964edb8bcafc43de6d1d99240
e80dfc710fbe1
8e984df6f4a63cee798f9f6bab938308ebad8adf
67daba349ec856aad07b6406
f20f44527f039371f0aa51bc9f68789262416c5
f2f9cefc6ff0451de8378f909
SHA-1
SHA-256
The security of DNS will be taken seriously
2018 Predictions
By the end of 2018 more than 50% of HTTPS connections
will happen over TLS 1.3
#1
Vendor lock-in with Cloud Computing vendors becomes
dominant worry for enterprises
#2
Deep learning hype will subside as self-driving cars don't
become a reality
#3
k8s becomes the dominant platform for cloud computing
#4
Quantum resistant crypto will be widely deployed in
machine-to-machine links across the internet
#5
Stable BTC/USD exchanges will emerge as others die off
from security-based Darwinism
#6
Mobile traffic will account for 60% of all Internet traffic by
the end of the year
#7
Adoption of edge computing accelerates
#8
Q & A
www.misti.com
© 2018 MIS Training Institute Holdings, Inc. All rights reserved.
ON THE BLEEDING EDGE:
8 PREDICTIONS FOR THE INTERNET IN 2018
THANK YOU FOR JOINING US TODAY!
JOHN GRAHAM-CUMMINGS, CHIEF TECHNOLOGY OFFICER, CLOUDFLARE
TIM FONG, PRODUCT MARKETING MANAGER, CLOUDFLARE
Please send any feedback or questions about today’s presentation to customerservice@misti.com.

More Related Content

Similar to On the Bleeding Edge: 8 Predictions for the Internet in 2018

Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope
 
Global technology 2016 outlook
Global technology 2016 outlookGlobal technology 2016 outlook
Global technology 2016 outlook
Bloomberg LP
 
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
Dean Bonehill ♠Technology for Business♠
 
Don't Move To Cloud
Don't Move To CloudDon't Move To Cloud
Don't Move To Cloud
Kirill Bensonoff
 
How You can Leverage Cloud Platforms to Transform Digital Experience
How You can Leverage Cloud Platforms to Transform Digital ExperienceHow You can Leverage Cloud Platforms to Transform Digital Experience
How You can Leverage Cloud Platforms to Transform Digital Experience
Alaina Carter
 
IoT And Inevitable Decentralization of The Internet
IoT And Inevitable Decentralization of The InternetIoT And Inevitable Decentralization of The Internet
IoT And Inevitable Decentralization of The Internet
Paul Brody
 
Drupal Camp La Keynoter4 Update 2009
Drupal Camp La Keynoter4 Update 2009Drupal Camp La Keynoter4 Update 2009
Drupal Camp La Keynoter4 Update 2009
troyangrignon
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
Appian
 
Cloud Distribution Forecast: Unsettled
Cloud Distribution Forecast: UnsettledCloud Distribution Forecast: Unsettled
Cloud Distribution Forecast: Unsettled
Dan Young
 
EARTHLINK How To Predict Impact The Network Impact of Apps
EARTHLINK  How To Predict Impact The Network Impact of Apps EARTHLINK  How To Predict Impact The Network Impact of Apps
EARTHLINK How To Predict Impact The Network Impact of Apps Joe Maglitta
 
Forecast on Cloud Computing Trends 2015
Forecast on  Cloud Computing  Trends 2015Forecast on  Cloud Computing  Trends 2015
Forecast on Cloud Computing Trends 2015
IMC Institute
 
5G Networks - What's next for Broadband
5G Networks - What's next for Broadband5G Networks - What's next for Broadband
5G Networks - What's next for Broadband
paul young cpa, cga
 
My Little Blurb From Cloud Connect 2010
My Little Blurb From Cloud Connect 2010My Little Blurb From Cloud Connect 2010
My Little Blurb From Cloud Connect 2010
Bharath Ram Srinivasan
 
Metaverse - A Guide to the Next generation Internet by Credit Suisse
Metaverse - A Guide to the Next generation Internet by Credit SuisseMetaverse - A Guide to the Next generation Internet by Credit Suisse
Metaverse - A Guide to the Next generation Internet by Credit Suisse
Harsha MV
 
5G & Edge: High Performance with Zero-Trust Security
5G & Edge: High Performance with Zero-Trust Security5G & Edge: High Performance with Zero-Trust Security
5G & Edge: High Performance with Zero-Trust Security
Rebekah Rodriguez
 
11 Cloud Statistics you must know in 2020
11 Cloud Statistics you must know in 202011 Cloud Statistics you must know in 2020
11 Cloud Statistics you must know in 2020
Inspirisys Solutions Limited
 
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Crisis-Ready Crisis-Proof IT Infrastructure for the New NormalCrisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Kalin Hitrov
 
Microsoft nine things we learned about cloud compliance latin america
Microsoft   nine things we learned about cloud compliance latin americaMicrosoft   nine things we learned about cloud compliance latin america
Microsoft nine things we learned about cloud compliance latin america
Robert Ivanschitz
 
Microsoft "Nine things we learned about cloud compliance in Latin America"
Microsoft "Nine things we learned about cloud compliance in Latin America"Microsoft "Nine things we learned about cloud compliance in Latin America"
Microsoft "Nine things we learned about cloud compliance in Latin America"
Robert Ivanschitz
 
5 important trends in big data cloud & big data services
5 important trends in big data cloud & big data services5 important trends in big data cloud & big data services
5 important trends in big data cloud & big data services
johnmerchant
 

Similar to On the Bleeding Edge: 8 Predictions for the Internet in 2018 (20)

Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Global technology 2016 outlook
Global technology 2016 outlookGlobal technology 2016 outlook
Global technology 2016 outlook
 
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
 
Don't Move To Cloud
Don't Move To CloudDon't Move To Cloud
Don't Move To Cloud
 
How You can Leverage Cloud Platforms to Transform Digital Experience
How You can Leverage Cloud Platforms to Transform Digital ExperienceHow You can Leverage Cloud Platforms to Transform Digital Experience
How You can Leverage Cloud Platforms to Transform Digital Experience
 
IoT And Inevitable Decentralization of The Internet
IoT And Inevitable Decentralization of The InternetIoT And Inevitable Decentralization of The Internet
IoT And Inevitable Decentralization of The Internet
 
Drupal Camp La Keynoter4 Update 2009
Drupal Camp La Keynoter4 Update 2009Drupal Camp La Keynoter4 Update 2009
Drupal Camp La Keynoter4 Update 2009
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
Cloud Distribution Forecast: Unsettled
Cloud Distribution Forecast: UnsettledCloud Distribution Forecast: Unsettled
Cloud Distribution Forecast: Unsettled
 
EARTHLINK How To Predict Impact The Network Impact of Apps
EARTHLINK  How To Predict Impact The Network Impact of Apps EARTHLINK  How To Predict Impact The Network Impact of Apps
EARTHLINK How To Predict Impact The Network Impact of Apps
 
Forecast on Cloud Computing Trends 2015
Forecast on  Cloud Computing  Trends 2015Forecast on  Cloud Computing  Trends 2015
Forecast on Cloud Computing Trends 2015
 
5G Networks - What's next for Broadband
5G Networks - What's next for Broadband5G Networks - What's next for Broadband
5G Networks - What's next for Broadband
 
My Little Blurb From Cloud Connect 2010
My Little Blurb From Cloud Connect 2010My Little Blurb From Cloud Connect 2010
My Little Blurb From Cloud Connect 2010
 
Metaverse - A Guide to the Next generation Internet by Credit Suisse
Metaverse - A Guide to the Next generation Internet by Credit SuisseMetaverse - A Guide to the Next generation Internet by Credit Suisse
Metaverse - A Guide to the Next generation Internet by Credit Suisse
 
5G & Edge: High Performance with Zero-Trust Security
5G & Edge: High Performance with Zero-Trust Security5G & Edge: High Performance with Zero-Trust Security
5G & Edge: High Performance with Zero-Trust Security
 
11 Cloud Statistics you must know in 2020
11 Cloud Statistics you must know in 202011 Cloud Statistics you must know in 2020
11 Cloud Statistics you must know in 2020
 
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Crisis-Ready Crisis-Proof IT Infrastructure for the New NormalCrisis-Ready Crisis-Proof IT Infrastructure for the New Normal
Crisis-Ready Crisis-Proof IT Infrastructure for the New Normal
 
Microsoft nine things we learned about cloud compliance latin america
Microsoft   nine things we learned about cloud compliance latin americaMicrosoft   nine things we learned about cloud compliance latin america
Microsoft nine things we learned about cloud compliance latin america
 
Microsoft "Nine things we learned about cloud compliance in Latin America"
Microsoft "Nine things we learned about cloud compliance in Latin America"Microsoft "Nine things we learned about cloud compliance in Latin America"
Microsoft "Nine things we learned about cloud compliance in Latin America"
 
5 important trends in big data cloud & big data services
5 important trends in big data cloud & big data services5 important trends in big data cloud & big data services
5 important trends in big data cloud & big data services
 

More from Cloudflare

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
Cloudflare
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
Cloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
Cloudflare
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Cloudflare
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
Cloudflare
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Cloudflare
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cloudflare
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
Cloudflare
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
Cloudflare
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
Cloudflare
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
Cloudflare
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
Cloudflare
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
Cloudflare
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Cloudflare
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
Cloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
Cloudflare
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
Cloudflare
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
Cloudflare
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
Cloudflare
 

More from Cloudflare (20)

Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021Why Zero Trust Architecture Will Become the New Normal in 2021
Why Zero Trust Architecture Will Become the New Normal in 2021
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 

On the Bleeding Edge: 8 Predictions for the Internet in 2018

  • 1. www.misti.com © 2018 MIS Training Institute Holdings, Inc. All rights reserved. ON THE BLEEDING EDGE: 8 PREDICTIONS FOR THE INTERNET IN 2018 On the Bleeding Edge: 8 Predictions for the internet in 2018 15 February, 2018 | 2:00-3:00 PM Cloudflare’s mission is to “create a better Internet.” With 10% of Internet traffic passing through Cloudflare’s global network of 120+ data-centers, we have insight into evolving and emerging technologies. In this webcast, John Graham-Cumming, Cloudflare’s CTO will review his 2017 predictions and compare them to what really happened, and also make his 2018 predictions for the Internet and technology spaces. The webcast will feature a discussion with: To ask a question, use the green “Q&A” button on the left side of your screen. All questions are anonymous. John Graham-Cummings Chief Technology Officer Cloudflare Tim Fong Product Marketing Manager Cloudflare
  • 2. On the Bleeding Edge: 8 Predictions for the Internet in 2018
  • 3. Agenda • What were our 2017 predictions and what really happened? • Our predictions for 2018 • Q & A session
  • 5. 1Tbps DDoS attacks will become the baseline for ‘massive attacks’
  • 6. IPv6 will become the defacto for mobile networks
  • 7. A SHA-1 collision will be announced e1964edb8bcafc43de6d1d99240e 80dfc710fbe1 e1964edb8bcafc43de6d1d99240 e80dfc710fbe1 8e984df6f4a63cee798f9f6bab938308ebad8adf 67daba349ec856aad07b6406 f20f44527f039371f0aa51bc9f68789262416c5 f2f9cefc6ff0451de8378f909 SHA-1 SHA-256
  • 8. The security of DNS will be taken seriously
  • 10. By the end of 2018 more than 50% of HTTPS connections will happen over TLS 1.3 #1
  • 11. Vendor lock-in with Cloud Computing vendors becomes dominant worry for enterprises #2
  • 12. Deep learning hype will subside as self-driving cars don't become a reality #3
  • 13. k8s becomes the dominant platform for cloud computing #4
  • 14. Quantum resistant crypto will be widely deployed in machine-to-machine links across the internet #5
  • 15. Stable BTC/USD exchanges will emerge as others die off from security-based Darwinism #6
  • 16. Mobile traffic will account for 60% of all Internet traffic by the end of the year #7
  • 17. Adoption of edge computing accelerates #8
  • 18. Q & A
  • 19. www.misti.com © 2018 MIS Training Institute Holdings, Inc. All rights reserved. ON THE BLEEDING EDGE: 8 PREDICTIONS FOR THE INTERNET IN 2018 THANK YOU FOR JOINING US TODAY! JOHN GRAHAM-CUMMINGS, CHIEF TECHNOLOGY OFFICER, CLOUDFLARE TIM FONG, PRODUCT MARKETING MANAGER, CLOUDFLARE Please send any feedback or questions about today’s presentation to customerservice@misti.com.