Archive

Category Archives for "Networking"

Nvidia joins with Dell to target on-prem generative AI

Dell Technologies and Nvidia are jointly launching an initiative called Project Helix that will help enterprises to build and manage generative AI models on-premises, they said Tuesday.The companies will combine their hardware and software infrastructure in the project to support the complete generative AI lifecycle from infrastructure provisioning through modeling, training, fine-tuning, application development, and deployment, to deploying inference and streamlining results, they said in a joint statement.Dell will contribute its PowerEdge servers, such as the PowerEdge XE9680 and PowerEdge R760xa, which are optimized to deliver performance for generative AI training and AI inferencing, while Nvidia contribution to Project Helix, will be its H100 Tensor Core GPUs and Nvidia Networking to form the infrastructure backbone for generative AI workloads.To read this article in full, please click here

Nvidia joins with Dell to target on-prem generative AI

Dell Technologies and Nvidia are jointly launching an initiative called Project Helix that will help enterprises to build and manage generative AI models on-premises, they said Tuesday.The companies will combine their hardware and software infrastructure in the project to support the complete generative AI lifecycle from infrastructure provisioning through modeling, training, fine-tuning, application development, and deployment, to deploying inference and streamlining results, they said in a joint statement.Dell will contribute its PowerEdge servers, such as the PowerEdge XE9680 and PowerEdge R760xa, which are optimized to deliver performance for generative AI training and AI inferencing, while Nvidia contribution to Project Helix, will be its H100 Tensor Core GPUs and Nvidia Networking to form the infrastructure backbone for generative AI workloads.To read this article in full, please click here

Now on sale at Bed Bath & Beyond: One slightly used data center

With Bed Bath & Beyond filing for bankruptcy last month, it’s liquidation-sale time. That doesn’t mean just  blankets and cookware; it also includes its data center in North Carolina. Not just its servers but the whole facility.The data center in Claremont, N.C., was built in 2013 with a total of 47,500 square feet, 9,500 feet of which is raised floor space, with the ability to double the amount of raised floor space and boost the total power from 1MW to 3.5MW.It is rated a Tier III on the data-center ranking scale of I through IV. Tier III data centers have redundant components and infrastructure for power and cooling, with a guaranteed 99.982% availability.To read this article in full, please click here

Now on sale at Bed Bath & Beyond: One slightly used data center

With Bed Bath & Beyond filing for bankruptcy last month, it’s liquidation-sale time. That doesn’t mean just  blankets and cookware; it also includes its data center in North Carolina. Not just its servers but the whole facility.The data center in Claremont, N.C., was built in 2013 with a total of 47,500 square feet, 9,500 feet of which is raised floor space, with the ability to double the amount of raised floor space and boost the total power from 1MW to 3.5MW.It is rated a Tier III on the data-center ranking scale of I through IV. Tier III data centers have redundant components and infrastructure for power and cooling, with a guaranteed 99.982% availability.To read this article in full, please click here

Dealing with Cisco ACI Quirks

Sebastian described an interesting Cisco ACI quirk they had the privilege of chasing around:

We’ve encountered VM connectivity issues after VM movements from one vPC leaf pair to a different vPC leaf pair with ACI. The issue did not occur immediately (due to ACI’s bounce entries) and only sometimes, which made it very difficult to reproduce synthetically, but due to DRS and a large number of VMs it occurred frequently enough, that it was a serious problem for us.

Here’s what they figured out:

Dealing with Cisco ACI Quirks

Sebastian described an interesting Cisco ACI quirk they had the privilege of chasing around:

We’ve encountered VM connectivity issues after VM movements from one vPC leaf pair to a different vPC leaf pair with ACI. The issue did not occur immediately (due to ACI’s bounce entries) and only sometimes, which made it very difficult to reproduce synthetically, but due to DRS and a large number of VMs it occurred frequently enough, that it was a serious problem for us.

Here’s what they figured out:

BrandPost: The role of network access control in Zero Trust security

By: Eve-Marie Lanza, Senior Security Solutions Marketing Manager, HPE Aruba Networking.An advertising campaign from the 1980s posited that peanut butter and chocolate were, “two great tastes that taste great together.” While confectionary tastes may vary, there’s no denying that some things just work better together. When it comes to IT security, network access control, and Zero Trust security are like peanut butter and chocolate—great on their own, undeniably better together.Network access control vs. Zero Trust securityNetwork access control and Zero Trust security are not the same, but they are related.To read this article in full, please click here

FCC’s latest spectrum move rewards satellite providers

The FCC’s latest spectrum policy announcement, which preserves 500MHz of the 12GHz band for satellite use while designating another 500MHz for terrestrial radios, is a recognition that satellite internet providers like Starlink are being heard, according to experts.The commission’s latest notice of proposed rulemaking, posted May 18, reflects a more even-handed approach than has been adopted in the past. In carving up the airwaves for C-band usage, substantial amounts of spectrum were taken away from incumbent satellite users and handed off to terrestrial operators, most notably major telecom providers.To read this article in full, please click here

Ethernet turns 50, but its voyage has only begun

You’d be hard pressed to find another technology that has been as useful, successful, and ultimately influential as Ethernet, and as it celebrates its 50th anniversary this week, it is clear that Ethernet’s journey is far from over.Since its invention by Bob Metcalf and David Boggs back in 1973, Ethernet has continuously been expanded and adapted to become the go-to Layer 2 protocol in computer networking across industries.To read this article in full, please click here

Tech Bytes: Pica8 NOS Enables Multi-Vendor Networking To Solve Campus Supply Chain Problems (Sponsored)

Today on the Tech Bytes podcast we speak with sponsor Pica8 about how whitebox networking gives engineers the flexibility to choose the hardware and software that best meets their campus needs. Because Pica8’s network OS can run on multiple hardware platforms, engineers can overcome challenges including supply chain disruptions, end-of-life hardware, and security events.

The post Tech Bytes: Pica8 NOS Enables Multi-Vendor Networking To Solve Campus Supply Chain Problems (Sponsored) appeared first on Packet Pushers.

Tech Bytes: Pica8 NOS Enables Multi-Vendor Networking To Solve Campus Supply Chain Problems (Sponsored)

Today on the Tech Bytes podcast we speak with sponsor Pica8 about how whitebox networking gives engineers the flexibility to choose the hardware and software that best meets their campus needs. Because Pica8’s network OS can run on multiple hardware platforms, engineers can overcome challenges including supply chain disruptions, end-of-life hardware, and security events.

Network Break 431: Juniper NAC Emerges From The Mist; New Google TLDs Are A Bad Idea

This week's Network Break looks at a new Network Access Control (NAC) offering from Juniper, plus a ChatGPT integration with Juniper's Marvis. Google debuts new Top-Level Domains that have security experts worried, Cisco reports a robust Q3, Broadcom tries to assuage EU regulators about its VMware acquisition, and more tech news.

The post Network Break 431: Juniper NAC Emerges From The Mist; New Google TLDs Are A Bad Idea appeared first on Packet Pushers.

5G network slices could be vulnerable to attack, researchers say

5G promises increased speed, lower latency, and support for a significantly larger number of connected devices. But the growth in devices and in new applications that will ensue also will expand the attack surface, offering new opportunities for malicious actors to take advantage of security gaps.Plus, as with any new technology, there is a great deal of potential for misconfigurations, errors, and unpatched vulnerabilities while companies are still learning how to deploy and secure 5G at scale.About 75% of communication service providers worldwide said that they had experienced up to six security breaches of 5G networks within the past year, according to a November 2022 survey by GlobalData and Nokia. Half of the respondents said that they experienced an attack that resulted in the leakage of customer data, and nearly three quarters said that an attack had caused a service outage.To read this article in full, please click here