Archive

Category Archives for "Networking"

Google launches VMs powered by newest Intel Xeon

Google Cloud announced new virtual machines as part of its cloud platform based on Intel’s newest Xeon Scalable processors.In addition to the new C3 virtual machine series, Google also announced it is deploying Infrastructure Processing Units (IPU), which are designed to intelligently route network traffic and take the load of network data processing off the CPU. The  company made the announcements at its Google Cloud Next ’22 conference held virtually.The IPU chip, formally known as the E2000, was co-designed by Google and Intel together and features 16 Arm Neoverse cores and 200GbE networking.C3 machine instances deliver performance gains of up to 20% over previous generation of C2 instances. They also benefit from a recent product launch called Hyperdisk, a block storage system that offers 80% higher IOPS per vCPU for data analytics and DBMS workloads when compared to other hyperscalers,To read this article in full, please click here

Hedge 150: Micah Beck and Universal Broadband

What would the Internet look like—or what kinds of services would need to be developed and deployed—to make boradband class service available to every user? What could this kind of development do to drive entire societies forward? Micah Beck, from the University of Tennessee, joins Tom Ammon and Russ White to discuss universal broadband on this episode of the Hedge.

download

Day Two Cloud 167: Interviewing At A Huge Tech Company

On today's Day Two Cloud we talk about what it's like to interview for a job at a massive tech company. How do you get yourself in line? What can you expect from the interview? How do you prepare? How do you overcome your own imposter syndrome? Our guest is Nathaniel Avery, Outbound Product Manager at Google Cloud. He recently ran the gauntlet of the tech interview, and is here to share tips and insights on the process.

Day Two Cloud 167: Interviewing At A Huge Tech Company

On today's Day Two Cloud we talk about what it's like to interview for a job at a massive tech company. How do you get yourself in line? What can you expect from the interview? How do you prepare? How do you overcome your own imposter syndrome? Our guest is Nathaniel Avery, Outbound Product Manager at Google Cloud. He recently ran the gauntlet of the tech interview, and is here to share tips and insights on the process.

The post Day Two Cloud 167: Interviewing At A Huge Tech Company appeared first on Packet Pushers.

Confluent: Have We Entered the Age of Streaming?

Three years ago, when we posed the question, “Apache Kafka was emerging as the default go-to-publish/subscribe messaging engine for the cloud era. At the time, we drew comparisons with IPO’ed while Databricks continues Pulsar recently emerged as a competing project, but is it game over? Hyperscalers are offering alternatives like Azure Event Hub, and AWS co-markets Confluent Cloud, with a similar arrangement with Jay Kreps evangelized streaming using electricity as the metaphor. Kreps positioned streaming as pivotal to the next wave of apps in chicken and egg terms. That is, when electricity Continue reading

Cloudflare DDoS threat report 2022 Q3

Cloudflare DDoS threat report 2022 Q3

This post is also available in Français, Español, Português, 한국어, 简体中文, 繁體中文, and 日本語.

Cloudflare DDoS threat report 2022 Q3

Welcome to our DDoS Threat Report for the third quarter of 2022. This report includes insights and trends about the DDoS threat landscape - as observed across Cloudflare’s global network.

Multi-terabit strong DDoS attacks have become increasingly frequent. In Q3, Cloudflare automatically detected and mitigated multiple attacks that exceeded 1 Tbps. The largest attack was a 2.5 Tbps DDoS attack launched by a Mirai botnet variant, aimed at the Minecraft server, Wynncraft. This is the largest attack we’ve ever seen from the bitrate perspective.

It was a multi-vector attack consisting of UDP and TCP floods. However, Wynncraft, a massively multiplayer online role-playing game Minecraft server where hundreds and thousands of users can play on the same server, didn’t even notice the attack, since Cloudflare filtered it out for them.

Cloudflare DDoS threat report 2022 Q3
The 2.5 Tbps DDoS attack that targeted Wynncraft — launched by Mirai

Overall this quarter, we've seen:

  • An increase in DDoS attacks compared to last year.
  • Longer-lasting volumetric attacks, a spike in attacks generated by the Mirai botnet and its variants.
  • Surges in attacks targeting Continue reading

OSPF External Routes (Type-5 LSA) Mysteries

Daniel Dib posted a number of excellent questions on Twitter, including:

While forwarding a received Type-5 LSA to other areas, why does the ABR not change the Advertising Router ID to it’s own IP address? If ABR were able to change the Advertising Router ID in the Type-5 LSA, then there would be no need for Type-4 LSA which meant less OSPF overhead on the network.

TL&DR: The current implementation of external routes in OSPF minimizes topology database size (memory utilization)

Before going to the details, try to imagine the environment in which OSPF was designed, and the problems it was solving.

What is a network router?

By most definitions, the network router’s purpose is defined by its name – it routes packets from one location to another. But over the course of decades of internet networking, the value of the router has grown significantly, offering enterprises additional functions such as network security, content filtering, quality of service, and more.At its most basic level, a router is a device that connects networks to each other, forwarding data packets from one location to another until they reaches their destination. Within a local area network (LAN), a router can also allow multiple devices to use the same Internet connection, such as how a home router allows users to connect their laptops, phones and tablets (among countless other devices) at the same time.To read this article in full, please click here

What is a network router?

By most definitions, the network router’s purpose is defined by its name – it routes packets from one location to another. But over the course of decades of internet networking, the value of the router has grown significantly, offering enterprises additional functions such as network security, content filtering, quality of service, and more.At its most basic level, a router is a device that connects networks to each other, forwarding data packets from one location to another until they reaches their destination. Within a local area network (LAN), a router can also allow multiple devices to use the same Internet connection, such as how a home router allows users to connect their laptops, phones and tablets (among countless other devices) at the same time.To read this article in full, please click here

Tech Bytes: Get Early Attack Detection And Fast Response With Fortinet FortiDeceptor (Sponsored)

Today on the Tech Bytes podcast we’re talking deception. That is, deceiving attackers that try to exploit your network by creating fake assets and infrastructure. Sponsor Fortinet is here to talk about using deception techniques to spot intruders via its FortiDeceptor product. We’ll also talk about threat reconnaissance capabilities of a product called FortiRecon. Our guest is Moshe Ben Simon, VP of Product Management.

The post Tech Bytes: Get Early Attack Detection And Fast Response With Fortinet FortiDeceptor (Sponsored) appeared first on Packet Pushers.

Tech Bytes: Get Early Attack Detection And Fast Response With Fortinet FortiDeceptor (Sponsored)

Today on the Tech Bytes podcast we’re talking deception. That is, deceiving attackers that try to exploit your network by creating fake assets and infrastructure. Sponsor Fortinet is here to talk about using deception techniques to spot intruders via its FortiDeceptor product. We’ll also talk about threat reconnaissance capabilities of a product called FortiRecon. Our guest is Moshe Ben Simon, VP of Product Management.

Using functions in bash to selectively run a group of Linux commands

Using a function in bash allows you to create something in Linux that works as if it were a script within a script. Whenever the data being processed matches a set of conditions, your script can call a function that does further processing.The format of a function is very straightforward. The syntax looks like this:<function_name> () { <commands> } You can also use the following format that uses the word "function" if you prefer:function <function_name> { <commands> } In fact, you can also create a function on a single line if the commands to be run are limited, but note the required “;” that follows the command(s):To read this article in full, please click here

Using functions in bash to selectively run a group of Linux commands

Using a function in bash allows you to create something in Linux that works as if it were a script within a script. Whenever the data being processed matches a set of conditions, your script can call a function that does further processing.The format of a function is very straightforward. The syntax looks like this:<function_name> () { <commands> } You can also use the following format that uses the word "function" if you prefer:function <function_name> { <commands> } In fact, you can also create a function on a single line if the commands to be run are limited, but note the required “;” that follows the command(s):To read this article in full, please click here