Archive

Category Archives for "Networking"

Day Two Cloud 178: Implementing Zero Standing Privilege (Sponsored)

On today's sponsored Day Two Cloud podcast we talk about zero standing privilege with strongDM. Zero standing privilege goes beyond just-in-time credentials to a model where no credentials pre-exist, but are created in real-time and paired with appropriate permissions built from policy, also created in real-time. Can such a thing be accomplished technically---and without irritating all your end users? StrongDM's Sebastian Mankowski is here to make the case.

Telemetry steps into the enterprise-networking spotlight

Expect to hear a lot about telemetry this year as its use gains steam in open-source projects and vendors’ observability software.While telemetry has been used for monitoring network and application activity for years, historically it has been siloed in specific use cases, but with the advent of open-source application development along with ML- and AI-based systems, its use is expected expand significantly.“Traditional monitoring and/or siloed visibility does not work in a world driven by hybrid or cloud-native deployments, as application components have become smaller, more distributed, and shorter-lived,” said Carlos Pereira, Cisco Fellow and chief architect in its Strategy, Incubation & Applications group. ““Now it’s more about using that telemetry data to watch over multiple operational domains so you can track experience in real time.”To read this article in full, please click here

Feedback: Docker Networking Deep Dive

While the pundits keeps telling me Docker is dead (looking at its documentation I would say they’re right) and Kubernetes it the way to go (yay!), some people still have to deal with Docker networking, and at least some of them found the Docker Networking Deep Dive webinar useful. Here’s a recent review:

You can scroll over internet pages as long as you can, you will rarely find this kind of specialized knowledge. This is the next level in term of knowledge about Docker.

If you belong to the “Kubernetes will rule the world” camp, we have you covered as well: Stuart Charlton created a phenomenal Kubernetes Networking Deep Dive webinar (approximately half of it is already accessible with free subscription).

Roundup of server vendors selling new Xeon processors

It’s only two years late, but the fourth generation of Xeon Scalable processors, aka Sapphire Rapids, is hitting the ground running, with every major OEM offering new servers featuring the chips.The 4th Gen Xeon Scalable is notable because it contains a number of specialty computing engines in addition to its x86 cores, and it also has lots of cores as well; up to 60. One of the special engines is for AI acceleration, as Intel is determined to make the CPU viable as an AI processor instead of GPUs. So not surprisingly, many of the new servers are built with AI processing in mind.To read this article in full, please click here

Roundup of server vendors using new Xeon processors

It’s only two years late, but the fourth generation of Xeon Scalable processors, aka Sapphire Rapids, is hitting the ground running, with every major OEM offering new servers featuring the chips.The 4th Gen Xeon Scalable is notable because it contains a number of specialty computing engines in addition to its x86 cores, and it also has lots of cores as well; up to 60. One of the special engines is for AI acceleration, as Intel is determined to make the CPU viable as an AI processor instead of GPUs. So not surprisingly, many of the new servers are built with AI processing in mind.To read this article in full, please click here

Roundup of server vendors selling new Xeon processors

It’s only two years late, but the fourth generation of Xeon Scalable processors, aka Sapphire Rapids, is hitting the ground running, with every major OEM offering new servers featuring the chips.The 4th Gen Xeon Scalable is notable because it contains a number of specialty computing engines in addition to its x86 cores, and it also has lots of cores as well; up to 60. One of the special engines is for AI acceleration, as Intel is determined to make the CPU viable as an AI processor instead of GPUs. So not surprisingly, many of the new servers are built with AI processing in mind.To read this article in full, please click here

Roundup of server vendors using new Xeon processors

It’s only two years late, but the fourth generation of Xeon Scalable processors, aka Sapphire Rapids, is hitting the ground running, with every major OEM offering new servers featuring the chips.The 4th Gen Xeon Scalable is notable because it contains a number of specialty computing engines in addition to its x86 cores, and it also has lots of cores as well; up to 60. One of the special engines is for AI acceleration, as Intel is determined to make the CPU viable as an AI processor instead of GPUs. So not surprisingly, many of the new servers are built with AI processing in mind.To read this article in full, please click here

IBM boosts Power CPU core count…for Oracle

Last month, IBM quietly quietly announced it's planning to release a 24-core Power 10 processor specifically for the benefit of an Oracle database, and Oracle doesn’t know why.An announcement dated Dec. 13 called "a statement of general direction" detailed IBM’s plans around the Power S1014 server. The S1014 server is a single-socket, 4U rack mounted server with 16 NVMe SSDs and a maximum memory capacity of 64GB. The document said in part:"IBM intends to announce a high-density 24-core processor for the IBM Power S1014 system (MTM 9105-41B) to address application environments utilizing an Oracle Database with the Standard Edition 2 (SE2) licensing model. It intends to combine a robust compute throughput with the superior reliability and availability features of the IBM Power platform while complying with Oracle Database SE2 licensing guidelines."To read this article in full, please click here

IBM boosts Power CPU core count…for Oracle

Last month, IBM quietly quietly announced it's planning to release a 24-core Power 10 processor specifically for the benefit of an Oracle database, and Oracle doesn’t know why.An announcement dated Dec. 13 called "a statement of general direction" detailed IBM’s plans around the Power S1014 server. The S1014 server is a single-socket, 4U rack mounted server with 16 NVMe SSDs and a maximum memory capacity of 64GB. The document said in part:"IBM intends to announce a high-density 24-core processor for the IBM Power S1014 system (MTM 9105-41B) to address application environments utilizing an Oracle Database with the Standard Edition 2 (SE2) licensing model. It intends to combine a robust compute throughput with the superior reliability and availability features of the IBM Power platform while complying with Oracle Database SE2 licensing guidelines."To read this article in full, please click here

Commands and setting for managing user accounts on Linux

If you’re administering a Linux server, chances are you have a lot of user accounts to manage and, along with these, a lot of files and settings to control. Here are some commands and issues that are important in setting up and managing user accounts and access rights.Dealing with IDs First, in managing user accounts, you need to be aware of both user IDs (UID) and group IDs (GID). Most accounts are set up with each user being the sole member of a group that has the same name as the user’s account. In fact, both are set up when an account is created using the useradd command. When you list a user’s home directory, you should see something like this:To read this article in full, please click here

Commands and settings for managing user accounts on Linux

If you’re administering a Linux server, chances are you have a lot of user accounts to manage and, along with these, a lot of files and settings to control. Here are some commands and issues that are important in setting up and managing user accounts and access rights.Dealing with IDs First, in managing user accounts, you need to be aware of both user IDs (UID) and group IDs (GID). Most accounts are set up with each user being the sole member of a group that has the same name as the user’s account. In fact, both are set up when an account is created using the useradd command. When you list a user’s home directory, you should see something like this:To read this article in full, please click here

Commands and setting for managing user accounts on Linux

If you’re administering a Linux server, chances are you have a lot of user accounts to manage and, along with these, a lot of files and settings to control. Here are some commands and issues that are important in setting up and managing user accounts and access rights.Dealing with IDs First, in managing user accounts, you need to be aware of both user IDs (UID) and group IDs (GID). Most accounts are set up with each user being the sole member of a group that has the same name as the user’s account. In fact, both are set up when an account is created using the useradd command. When you list a user’s home directory, you should see something like this:To read this article in full, please click here

Commands and settings for managing user accounts on Linux

If you’re administering a Linux server, chances are you have a lot of user accounts to manage and, along with these, a lot of files and settings to control. Here are some commands and issues that are important in setting up and managing user accounts and access rights.Dealing with IDs First, in managing user accounts, you need to be aware of both user IDs (UID) and group IDs (GID). Most accounts are set up with each user being the sole member of a group that has the same name as the user’s account. In fact, both are set up when an account is created using the useradd command. When you list a user’s home directory, you should see something like this:To read this article in full, please click here

Kubernetes Security And Networking 1: Why Security Matters And Course Overview

This course looks at securing Kubernetes, with an emphasis, though not exclusively, on network security. Topics we’ll cover in the series include: Role-based access control Securing control planes and worker nodes API security and policy management Dealing with vulnerabilities Security capabilities of a service mesh Security-enabled Container Network Interfaces (CNIs) Securing the ingress controller Scanning […]

The post Kubernetes Security And Networking 1: Why Security Matters And Course Overview appeared first on Packet Pushers.

Full Stack Journey 074: Going The Distance – What Running Can Teach Us About Careers

On today's Full Stack Podcast, Scott is joined by Krithika Chandramouli, a software engineer at Meta, to discuss how the lessons she learned while preparing to run her first-ever half-marathon also apply to careers. They dive into the relationship between consistency and one's progress toward a goal, and how understanding the "why" behind a goal can help motivate you.

The post Full Stack Journey 074: Going The Distance – What Running Can Teach Us About Careers appeared first on Packet Pushers.