{"id":97940,"date":"2019-10-29T02:02:58","date_gmt":"2019-10-29T09:02:58","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2019\/10\/supercomputer-analyzes-web-traffic-across-entire-internet"},"modified":"2019-10-29T02:02:58","modified_gmt":"2019-10-29T09:02:58","slug":"supercomputer-analyzes-web-traffic-across-entire-internet","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2019\/10\/supercomputer-analyzes-web-traffic-across-entire-internet","title":{"rendered":"Supercomputer analyzes web traffic across entire internet"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/supercomputer-analyzes-web-traffic-across-entire-internet.jpg\"><\/a><\/p>\n<p>Using a supercomputing system, MIT researchers have developed a model that captures what web traffic looks like around the world on a given day, which can be used as a measurement tool for internet research and many other applications.<\/p>\n<p>Understanding <a href=\"https:\/\/techxplore.com\/tags\/web+traffic\/\" rel=\"tag\" class=\"\">web traffic<\/a> patterns at such a large scale, the researchers say, is useful for informing <a href=\"https:\/\/techxplore.com\/tags\/internet\/\" rel=\"tag\" class=\"\">internet<\/a> policy, identifying and preventing outages, defending against cyberattacks, and designing more efficient computing infrastructure. A paper describing the approach was presented at the recent IEEE High Performance Extreme Computing Conference.<\/p>\n<p>For their work, the researchers gathered the largest publicly available internet traffic dataset, comprising 50 billion data packets exchanged in different locations across the globe over a period of several years.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using a supercomputing system, MIT researchers have developed a model that captures what web traffic looks like around the world on a given day, which can be used as a measurement tool for internet research and many other applications. Understanding web traffic patterns at such a large scale, the researchers say, is useful for informing [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418,31,44],"tags":[],"class_list":["post-97940","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet","category-policy","category-supercomputing"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/97940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=97940"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/97940\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=97940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=97940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=97940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}