Archive

Category Archives for "Networking"

Packaging an out-of-tree module for Debian with DKMS

DKMS is a framework designed to allow individual kernel modules to be upgraded without changing the whole kernel. It is also very easy to rebuild modules as you upgrade kernels.

On Debian-like systems,1 DKMS enables the installation of various drivers, from ZFS on Linux to VirtualBox kernel modules or NVIDIA drivers. These out-of-tree modules are not distributed as binaries: once installed, they need to be compiled for your current kernel. Everything is done automatically:

# apt install zfs-dkms
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
  binutils cpp cpp-6 dkms fakeroot gcc gcc-6 gcc-6-base libasan3 libatomic1 libc-dev-bin libc6-dev
  libcc1-0 libcilkrts5 libfakeroot libgcc-6-dev libgcc1 libgomp1 libisl15 libitm1 liblsan0 libmpc3
  libmpfr4 libmpx2 libnvpair1linux libquadmath0 libstdc++6 libtsan0 libubsan0 libuutil1linux libzfs2linux
  libzpool2linux linux-compiler-gcc-6-x86 linux-headers-4.9.0-6-amd64 linux-headers-4.9.0-6-common
  linux-headers-amd64 linux-kbuild-4.9 linux-libc-dev make manpages manpages-dev patch spl spl-dkms
  zfs-zed zfsutils-linux
[…]
3 upgraded, 44 newly installed, 0 to remove and 3 not upgraded.
Need to get 42.1 MB of archives.
After this operation, 187 MB of additional disk space will be used.
Do you want to continue? [Y/n]
[…]
# dkms status
spl, 0.6.5.9, 4.9.0-6-amd64, x86_64:  Continue reading

Episode 23 – Cloud Connectivity Part II

Miguel Villareal and Scott Wheeler come back and join Network Collective for a second episode, discussing the complexities involved in connecting to cloud infrastructure services and some strategies on how to mitigate them.

 


 

We would like to thank Cumulus Networks for sponsoring this episode of Network Collective. Cumulus invites you to find out more about how Linux is changing the data center networking space by downloading their free ebook “Linux Networking 101” here: http://cumulusnetworks.com/NetworkCollectiveLinux

 


Miguel Villareal
Guest
Scott Wheeler
Guest

Jordan Martin
Host
Eyvonne Sharp
Host
Russ White
Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 23 – Cloud Connectivity Part II appeared first on Network Collective.

New Spectre derivative bug haunts Intel processors

Intel just can’t catch a break these days. Researchers at Ohio State University have found a way to use the Spectre design flaw to break into the SGX secure environment of an Intel CPU to steal information.SGX stands for Software Guard eXtensions. It was first introduced in 2014 and is a mechanism that allows applications to put a ring around sections of memory that blocks other programs, the operating system, or even a hypervisor from accessing it.To read this article in full, please click here

New Spectre derivative bug haunts Intel processors

Intel just can’t catch a break these days. Researchers at Ohio State University have found a way to use the Spectre design flaw to break into the SGX secure environment of an Intel CPU to steal information.SGX stands for Software Guard eXtensions. It was first introduced in 2014 and is a mechanism that allows applications to put a ring around sections of memory that blocks other programs, the operating system, or even a hypervisor from accessing it.To read this article in full, please click here

Shine the Light: Six Women Making a Difference

This International Women’s Day, we’re boosting the profiles of incredible women around the world who are pushing boundaries using technology – and we encourage you to do the same!

Last month, during Safer Internet Day – a call to action for everyone to play their part in creating a better Internet for everyone – women in the Internet Society’s 25 Under 25 group, using just their smartphones to record video, answered the question, “What does a safer Internet mean to me?”

Watch the videos, explore the different ways these young women are using technology to shape tomorrow, then Shine The Light on some of the incredible women you know who are making an impact. Join the #ShineTheLight tweet chat with @SIGWomenISOC on March 8th… then join SIG Women!

Poornima Meegammana (Sri Lanka)
“A safer Internet to me is a place where a girl’s voice can be heard without harassment.”

Mary Helda Akongo (Uganda)
“To me, a safer Internet would be a place that is free and safe for me to have my voice heard, a place where I can share my creative content, share my opinions and my thoughts without ridicule, backlash and hate from different people Continue reading

Reykjavík, Cloudflare’s northernmost location

Reykjavík, Cloudflare’s northernmost location

Iceland is a small country in Northern Europe, a land of active volcanoes and boiling hot geysers. The geology and climate creates unique conditions for running compute power. With an abundance of green electricity and natural cooling, many companies are placing high power machines in Iceland to run power intensive, heat generating operations. Reykjavík is our 125th location globally.

Reykjavík, Cloudflare’s northernmost location

Connecting to the rest of the world

A unique aspect about Iceland relates to how it connects to the Internet, being situated on the Mid-Atlantic Ridge means submarine cables are necessary to reach networks in other countries. Iceland has three active fibre optic submarine cables that land on its shores: FARICE-1, DANICE and Greenland Connect. Due to the distance, latency to the nearest Cloudflare locations in London and Copenhagen starts at 35 milliseconds. By deploying in Reykjavík, we're able to drive down latency even further to a minimum of under 1 millisecond.

Iceland is unique in many ways, but is no different from other countries when it comes to exchanging internet traffic. ISNIC, Iceland's Network Information Centre runs RIX, the Reykjavík Internet Exchange. Cloudflare is the only CDN network connected to RIX, allowing traffic to flow directly to Continue reading

Cisco bolsters Tetration for better cloud, workload security

Cisco this week expanded its Tetration Analytics system to let users quickly detect software vulnerabilities and more easily manage the security of the key components in their data centers.Introduced in 2016, the Cisco Tetration Analytics system gathers information from hardware and software sensors and analyzes the information using big data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. The idea behind Tetration includes the ability to dramatically improve enterprise security monitoring, simplify operational reliability and move along application migrations to Software Defined Networking.To read this article in full, please click here

EdgeMicro announces 30-city edge-network deployment

There is quite a rush on to build out edge computing networks, that vital link between the massive amount of Internet of Things (IoT) devices and data centers. One of the companies involved is newcomer EdgeMicro, which announced plans to deploy micro-data centers in 30 cities around the U.S. for an unnamed cellular partner.EdgeMicro said “a leading North American mobile network operator” has begun verification tests of its technology. It did not name the operator, but if it’s a national operator covering 30 major cities, there are only four obvious candidates — Verizon Wireless, AT&T, Sprint, or T-Mobile.To read this article in full, please click here

Cisco bolsters Tetration for better cloud, workload security

Cisco this week expanded its Tetration Analytics system to let users quickly detect software vulnerabilities and more easily manage the security of the key components in their data centers.Introduced in 2016, the Cisco Tetration Analytics system gathers information from hardware and software sensors and analyzes the information using big data analytics and machine learning to offer IT managers a deeper understanding of their data center resources. The idea behind Tetration includes the ability to dramatically improve enterprise security monitoring, simplify operational reliability and move along application migrations to Software Defined Networking.To read this article in full, please click here

EdgeMicro announces 30-city edge-network deployment

There is quite a rush on to build out edge computing networks, that vital link between the massive amount of Internet of Things (IoT) devices and data centers. One of the companies involved is newcomer EdgeMicro, which announced plans to deploy micro-data centers in 30 cities around the U.S. for an unnamed cellular partner.EdgeMicro said “a leading North American mobile network operator” has begun verification tests of its technology. It did not name the operator, but if it’s a national operator covering 30 major cities, there are only four obvious candidates — Verizon Wireless, AT&T, Sprint, or T-Mobile.To read this article in full, please click here