Archive

Category Archives for "Networking"

How Many Spines Should a Leaf-and-Spine Fabric Have?

One of my readers sent me a question along these lines:

How do we determine the number of spines needed in a leaf-and-spine fabric? It’s easy to calculate the number of leaf nodes from the required number of server ports, and two spines give you the redundancy. Does it make sense to have more spines if two are good enough from the capacity perspective?

There are at least two factors to consider:

Dell launches new PowerEdge servers, private 5G partnerships at MWC

Dell today announced the forthcoming availability of a new line of PowerEdge servers powered by 4th Generation Xeon Scalable processors, as well as new partnerships with cloud networking providers and hardware makers for private 5G networks.The new PowerEdge server models, which will be availabe in May, are the XR8000, XR7620, and XR5610. They’re designed with modularity and scalability in mind, with the idea of making it easy to deploy and maintain them, even in difficult conditions. (The systems are meant to support temperatures ranging from -5 to 55 degrees Celsius in the field.)To read this article in full, please click here

Dell launches new PowerEdge servers, private 5G partnerships at MWC

Dell today announced the forthcoming availability of a new line of PowerEdge servers powered by 4th Generation Xeon Scalable processors, as well as new partnerships with cloud networking providers and hardware makers for private 5G networks.The new PowerEdge server models, which will be availabe in May, are the XR8000, XR7620, and XR5610. They’re designed with modularity and scalability in mind, with the idea of making it easy to deploy and maintain them, even in difficult conditions. (The systems are meant to support temperatures ranging from -5 to 55 degrees Celsius in the field.)To read this article in full, please click here

Chatbot Attack Vectors And Failure Modes In Networking And IT

With the release of ChatGPT as a product, Microsoft brought Machine Learning (ML) and Artificial Intelligence (AI) back into focus for millions of users—including network operators, coders, and other folks in information technology. People are once against asking if this technology will make them redundant or how it might change their day-to-day jobs. As always, […]

The post Chatbot Attack Vectors And Failure Modes In Networking And IT appeared first on Packet Pushers.

Cisco: Maybe stop yanking on that Ethernet cable

Cisco issued field notices this week outlining what has apparently become a persistent issue: failed Ethernet connections due to a connected Webex device being moved around too much by pulling on its Ethernet cable.The product involved is the Cisco Webex Room Navigator, a small touchscreen device that combines on-screen, controls, sensors and a power-over-Ethernet port used as a controller for Webex conferencing devices and scheduling conference spaces.The problem, as the field notice describes, is that  “the Ethernet port might fail when the Cisco Room Navigator is pulled across the table by the Ethernet cable frequently over a period of several months.”To read this article in full, please click here

Understanding DPUs For Network Engineers – Packet Pushers Livestream With Dell Technologies – Video

This video looks at the fundamentals of Data Processing Units (DPUs) and what they can do with an eye toward helping network engineers and infrastructure professionals. Greg Ferro from the Packet Pushers and Joseph White, a Fellow at Dell Technologies, discuss how DPUs are different from GPUs and CPUs; using DPUs to offload workloads from […]

The post Understanding DPUs For Network Engineers – Packet Pushers Livestream With Dell Technologies – Video appeared first on Packet Pushers.

Day Two Cloud 183: How Did We Get To WebAssembly And What Is It For?

WebAssembly (Wasm) is an up-and-coming technology that's probably going to fall into the lap of operations folks. WebAssembly is basically a specification on how to compile things to a bytecode format and how to execute that bytecode. On today's Day Two Cloud we start to peel the onion on what WebAssembly, what it's used for, and why you might want to get your hands on it.

The post Day Two Cloud 183: How Did We Get To WebAssembly And What Is It For? appeared first on Packet Pushers.

Day Two Cloud 183: How Did We Get To WebAssembly And What Is It For?

WebAssembly (Wasm) is an up-and-coming technology that's probably going to fall into the lap of operations folks. WebAssembly is basically a specification on how to compile things to a bytecode format and how to execute that bytecode. On today's Day Two Cloud we start to peel the onion on what WebAssembly, what it's used for, and why you might want to get your hands on it.

AWS boosts its infrastructure for memory-intensive tasks

Amazon Web Services (AWS) has announced availability of its new Amazon EC2 M7g and R7g instances, the latest generation of instances for memory-intensive applications and running Amazons custom Arm processor, known as Graviton3.This is the second offering of Graviton3-based instances from AWS. It previously announced specific instances for compute-intensive workloads last May.Both the M7g and the R7g instances deliver up to 25% higher performance than equivalent sixth-generation instances. Part of the performance bump comes from the adoption of DDR5 memory, which offers up to 50% higher memory bandwidth than DDR4. But there’s also considerable performance gain from the new Graviton3 chip.To read this article in full, please click here

Tailoring your Linux command prompt

The command prompt in a Linux terminal window is often just a $ unless you’ve logged in or sudo’ed your way into the root account, in which case you'd expect a #.Sometimes, though, your prompt will be more complicated, with a format like [lucky@fedora ~]$. But it's possible to change your prompt to some friendlier character, word, or phrase, and if you’re so inclined, you can even change its color. This post shows how easy it is to make these kinds of changes.Changing the format To get started, one thing you need to know is that your command prompt is not just something your shell creates on the fly. Instead, it’s a variable and its name is PS1. To see how your prompt is defined, display its value like this:To read this article in full, please click here

Tailoring your Linux command prompt

The command prompt in a Linux terminal window is often just a $ unless you’ve logged in or sudo’ed your way into the root account, in which case you'd expect a #.Sometimes, though, your prompt will be more complicated, with a format like [lucky@fedora ~]$. But it's possible to change your prompt to some friendlier character, word, or phrase, and if you’re so inclined, you can even change its color. This post shows how easy it is to make these kinds of changes.Changing the format To get started, one thing you need to know is that your command prompt is not just something your shell creates on the fly. Instead, it’s a variable and its name is PS1. To see how your prompt is defined, display its value like this:To read this article in full, please click here