Archive

Category Archives for "Networking"

Is the Linux 4.18 kernel heading your way?

How soon the 4.18 kernel lands on your system or network depends a lot on which Linux distributions you use. It may be heading your way or you may already be using it.If you have ever wondered whether the same kernel is used in all Linux distributions, the answer is that all Linux distributions use the same kernel more or less but there are several big considerations that make that "more or less" quite significant. Most distributions add or remove code to make the kernel work best for them. Some of these changes might eventually work their way back to the top of the code heap where they will be merged into the mainstream, but they'll make the distribution's kernel unique -- at least for a while. Some releases intentionally hold back and don't use the very latest version of the kernel in order to ensure a more predictable and stable environment. This is particularly true of versions that are targeted for commercial distribution. For example, RHEL (Red Hat Enterprise Edition) will not be nearly as aggressively updated as Fedora. Some distributions use a fork called Linux-libre, which is Linux without any proprietary drivers built in. It omits software Continue reading

Excess data center heat is no longer a bug — it’s a feature!

Every data center admin knows that dealing with excess heat is one of the biggest, most expensive factors involved in running a modern data center.For decades, engineers have been looking for new ways to mitigate the issue, and now Norway is building a brand-new town designed to turn the problem into an opportunity to lower costs, reduce energy usage, and fight climate change.[ Read also: Data center cooling market set to explode in the coming years | Get regularly scheduled insights: Sign up for Network World newsletters ] Hug your servers ... to stay warm According to Fast Company, the town of Lyseparken, now under construction near Bergen, Norway, is being built to use the excess heat generated by a new data center in the heart of the community to keep a nearly 6.5 million square feet of nearby planned business and office space—and eventually up to 5,000 homes—warm. It works like this:To read this article in full, please click here

Excess data center heat is no longer a bug — it’s a feature!

Every data center admin knows that dealing with excess heat is one of the biggest, most expensive factors involved in running a modern data center.For decades, engineers have been looking for new ways to mitigate the issue, and now Norway is building a brand-new town designed to turn the problem into an opportunity to lower costs, reduce energy usage, and fight climate change.[ Read also: Data center cooling market set to explode in the coming years | Get regularly scheduled insights: Sign up for Network World newsletters ] Hug your servers ... to stay warm According to Fast Company, the town of Lyseparken, now under construction near Bergen, Norway, is being built to use the excess heat generated by a new data center in the heart of the community to keep a nearly 6.5 million square feet of nearby planned business and office space—and eventually up to 5,000 homes—warm. It works like this:To read this article in full, please click here

Arista BGP EVPN – Overview and Concepts

Introduction Traditionally, Data Centers used lots of Layer 2 links that spanned entire racks, rows, cages, floors, for as far as the eye could see. These large L2 domains were not ideal for a data center, due to the slow convergence, unnecessary broadcasts, and difficulty in administering. To optimize the data center network, we needed […]

The post Arista BGP EVPN – Overview and Concepts appeared first on Overlaid.

Reaction: Centralization Wins

Warning: in this post, I am going to cross a little into philosophy, governance, and other odd subjects. Here there be dragons. Let me begin by setting the stage:

Decentralized systems will continue to lose to centralized systems until there’s a driver requiring decentralization to deliver a clearly superior consumer experience. Unfortunately, that may not happen for quite some time. —Todd Hoff @High Scalability

And the very helpful diagram which accompanies the quote—

The point Todd Hoff, the author makes, is that five years ago he believed the decentralized model would win, in terms of the way the Internet is structured. However, today he doesn’t believe this; centralization is winning. Two points worth considering before jumping into a more general discussion.

First, the decentralized model is almost always the most efficient in almost every respect. It is the model with the lowest signal-to-noise ratio, and the model with the highest gain. The simplest way to explain this is to note the primary costs in a network is the cost of connectivity, and the primary gain is the amount of support connections provide. The distributed model offers the best balance of these two.

Second, what we are generally talking about here Continue reading

Learn About Social Engineering Techniques with Josue Vargas

Learn in-depth information about social engineering techniques and countermeasures in the course Certified Ethical Hacker: Social Engineering, available as a stand alone download or with your INE.com All Access Pass!

Not Like in Hollywood

When we think of hacking, we often picture a grim fellow opening a laptop, typing really fast and bam! he’s infiltrated the Pentagon. Watching those films when you know one or two things about system and network security is a hilarious experience! If you have been following the Certified Ethical Hacker series, you would know better by now. Hacking is not for the faint-hearted, not just because of the technical difficulty (indeed there are several needed skills to be developed), but because of the resilience needed. I’m talking about the fact that a successful hack comes after many failed attempts in most scenarios.

Because hacking into systems as an outsider is so difficult there’s a key toolkit that every hacker needs to master as much as they master sniffing, session hijacking, application hacking, or any other technical specialty- I’m talking about Social Engineering.

It’s a Dark World

A highly empathetic person might have a hard time with the concept of Social Engineering. It’s pretty Continue reading

BrandPost: Will disruptive healthcare technologies disrupt hospital networks?

Ciena Daniele Loffreda, Senior Advisor, Industry Marketing New innovations stemming from artificial intelligence, machine learning and connected health are changing the way medical professionals treat their patients. Doctors are having to adapt to take advantage of these developments – but has their network adapted to support them?Two newborns are delivered on the same day by the same doctor in the same hospital.  The truth is, the decisions their respective parents are about to make can have an enormous impact on their daughters’ health and quality of life for the next several decades. To read this article in full, please click here

Watch the Experts Session on Encryption from Canberra

Internet Australia and the Internet Society are pleased to invite you to watch the recording of an Experts Session on Encryption on 20 August 2018 at Parliament House, Canberra, Australia.

Encryption technologies enable Internet users to protect the integrity and the confidentiality of their data and communications. From limiting the impact of data breaches, to securing financial transactions, to keeping messages private, encryption is an essential tool for digital security. As a technical foundation for trust on the Internet, encryption promotes commerce, privacy, and user trust, and helps protect data and communications from bad actors.

During the session, international and local experts from across the field discussed the technical aspects of encryption and digital security. They explained how encryption is used to secure communications and data, and explored its role in the Australian digital economy. Experts also discussed the risks associated with attempting to provide exceptional access to encrypted systems.

The post Watch the Experts Session on Encryption from Canberra appeared first on Internet Society.

Will Fujitsu be the first to make an ARM-powered supercomputer?

I’ve long felt Japan has been severely overlooked in recent years due to two “lost decades” and China overshadowing it — and supercomputing is no exception.In 2011, Fujitsu launched the K computer at the Riken Advanced Institute for Computational Science campus in Kobe, Japan. Calling it a computer really is a misnomer, though, as is the case in any supercomputer these days. When I think “computer,” I think of the 3-foot-tall black tower a few feet from me making the room warm. In the case of K, it’s rows and rows of cabinets stuffed with rack-mounted servers in a space the size of a basketball court.With its distributed memory architecture, K had 88,128 eight-core SPARC64 VIIIfx processors in 864 cabinets. Fujitsu was a licensee of Sun Microsystems’ SPARC processor (later Oracle) and did some impressive work on the processor on its own. When it launched in 2011, the K was ranked the world's fastest supercomputer on the TOP500 supercomputer list, at a computation speed of over 8 petaflops. It has since been surpassed by supercomputers from the U.S. and China.To read this article in full, please click here

Will Fujitsu be the first to make an ARM-powered supercomputer?

I’ve long felt Japan has been severely overlooked in recent years due to two “lost decades” and China overshadowing it — and supercomputing is no exception.In 2011, Fujitsu launched the K computer at the Riken Advanced Institute for Computational Science campus in Kobe, Japan. Calling it a computer really is a misnomer, though, as is the case in any supercomputer these days. When I think “computer,” I think of the 3-foot-tall black tower a few feet from me making the room warm. In the case of K, it’s rows and rows of cabinets stuffed with rack-mounted servers in a space the size of a basketball court.With its distributed memory architecture, K had 88,128 eight-core SPARC64 VIIIfx processors in 864 cabinets. Fujitsu was a licensee of Sun Microsystems’ SPARC processor (later Oracle) and did some impressive work on the processor on its own. When it launched in 2011, the K was ranked the world's fastest supercomputer on the TOP500 supercomputer list, at a computation speed of over 8 petaflops. It has since been surpassed by supercomputers from the U.S. and China.To read this article in full, please click here

IDG Contributor Network: Analytics are the key to network uptime, but are they enough?

Imagine you are in a crowded ER, and doctors are running from room to room. In the waiting area, patients are checking in via an online portal, and hospital staff are quickly capturing their confidential medical and insurance information on a mobile device. You look down the hall, where admitted patients are receiving treatment through Wi-Fi enabled biomedical devices, and some are even streaming their favorite show on Netflix while they wait. In a hospital, there are hundreds of individuals conducting critical tasks at any given moment, and they rely on thousands of connected devices to get the job done. But, this begs the question: What happens if that network fails?To read this article in full, please click here

IDG Contributor Network: Analytics are the key to network uptime, but are they enough?

Imagine you are in a crowded ER, and doctors are running from room to room. In the waiting area, patients are checking in via an online portal, and hospital staff are quickly capturing their confidential medical and insurance information on a mobile device. You look down the hall, where admitted patients are receiving treatment through Wi-Fi enabled biomedical devices, and some are even streaming their favorite show on Netflix while they wait. In a hospital, there are hundreds of individuals conducting critical tasks at any given moment, and they rely on thousands of connected devices to get the job done. But, this begs the question: What happens if that network fails?To read this article in full, please click here