Archive

Category Archives for "Networking"

IBM, Bharti Airtel partner on edge cloud offerings in India

IBM will work with telecom provider Bharti Airtel to offer edge cloud services to organizations in India, providing a new option for companies looking to leverage edge services and keep their data in-country.The partnership, announced Wednesday, will extend across 20 of India’s largest cities, with a grand total of 120 network data centers included in the system. The idea is to offer business customers the ability to use cutting-edge new capabilities—for example, automated inspection for manufacturing, or high-level analytics for healthcare providers—without using global cloud services that might take data out of the country or having to implement that type of system completely in-house.To read this article in full, please click here

IBM, Bharti Airtel partner on edge cloud offerings in India

IBM will work with telecom provider Bharti Airtel to offer edge cloud services to organizations in India, providing a new option for companies looking to leverage edge services and keep their data in-country.The partnership, announced Wednesday, will extend across 20 of India’s largest cities, with a grand total of 120 network data centers included in the system. The idea is to offer business customers the ability to use cutting-edge new capabilities—for example, automated inspection for manufacturing, or high-level analytics for healthcare providers—without using global cloud services that might take data out of the country or having to implement that type of system completely in-house.To read this article in full, please click here

Service Mesh And Ingress In Kubernetes: Lesson 4 – Ingress With Nginx Ingress – Video

Video four in this series provides a hands-n view of deploying NGINX Ingress running on AKS. Michael Levan brings his background in system administration, software development, and DevOps to this video series. He has Kubernetes experience as both a developer and infrastructure engineer. He’s also a consultant and Pluralsight author, and host of the “Kubernetes […]

The post Service Mesh And Ingress In Kubernetes: Lesson 4 – Ingress With Nginx Ingress – Video appeared first on Packet Pushers.

Hedge 147: The SRE with Niall Murphy (part 1)

It seems like only yesterday we started talking about the Site Reliability Engineer, and their place in the IT ecosystem. Over the last several years, the role of the SRE has changed—and it’s bound to continue changing. On this episode of the Hedge, Niall Murphy joins Tom Ammon and Russ White to discuss the changing role of the SRE, and what the SRE could be.

download

If you want to read more on this topic, check out Niall’s article over a USENIX.

Day Two Cloud 163: Is The Tech Market Too Focused On Developers?

Today on the Day Two Cloud podcast we have a frank discussion about tech marketing. Why? Because engineers are a target of marketing, so it's helpful to know how marketing works, what's trying to be communicated, and how it could be better. We also discuss whether the tech industry has over-committed on chasing developers while ignoring operations and sysadmins, why ops and sysadmins shouldn't be ignored, and more. Our guest is Gina Rosenthal, founder of Digital Sunshine Solutions.

The post Day Two Cloud 163: Is The Tech Market Too Focused On Developers? appeared first on Packet Pushers.

Day Two Cloud 163: Is The Tech Market Too Focused On Developers?

Today on the Day Two Cloud podcast we have a frank discussion about tech marketing. Why? Because engineers are a target of marketing, so it's helpful to know how marketing works, what's trying to be communicated, and how it could be better. We also discuss whether the tech industry has over-committed on chasing developers while ignoring operations and sysadmins, why ops and sysadmins shouldn't be ignored, and more. Our guest is Gina Rosenthal, founder of Digital Sunshine Solutions.

Why You Should Read Intent-Based Networking for Dummies

When it comes to networking, there’s no shortage of technical jargon and complicated concepts. In order to fully understand the inner workings of modern networking systems, you need to have a solid foundation in basic networking principles and a clear understanding of how new advances and developments are changing the face of the industry.

The Intent-Based Networking for Dummies by Jeff Doyle and Cisco is the perfect resource for anyone looking to learn more about the principles of modern networking.

Why You Should Read Intent-Based Networking for Dummies

The following are just a few of the reasons why Intent-Based Networking for Dummies is essential reading for anyone looking to understand and master the intricacies of modern networking systems:

It provides a comprehensive overview of the principles and practices that lie at the heart of modern networking systems.

The book breaks down the key concepts of networking in simple, easy-to-understand language so that anyone can grasp them. This is perfect for people who want to learn more about the basics of networking without having to wade through dense technical jargon.

It offers practical insights and advice on how to effectively apply these principles in real-world scenarios.

It explains the concepts of Continue reading

How to work on Linux with filenames that contain blanks

Personally, I always try to avoid filenames with blanks, usually by filling those places where less blank-phobic people would use them with underscores or hyphens. The filenames are still easy to decipher, and I don’t have to trouble myself with enclosing them in quotes when I want to use them. As a result, some of my files look like this:locking-accts Lost_World I also rarely add .txt file extensions to the end of text files unless I plan to share them with my Windows system.Use quotes When blanks in file names are preferable for any reason, however, there are several easy ways to work with them. To reference existing files, you can enclose the filenames in single or double quotes. In fact, you can make this easier by starting with a quote mark, typing as much of the filename as needed to differentiate it from other files and then pressing the tab key to initiate filename completion. For example, typing the portion of a filename as shown in the example below and then pressing tab should add the rest of the filename to the “file n” beginning:To read this article in full, please click here

How to work on Linux with filenames that contain blanks

Personally, I always try to avoid filenames with blanks, usually by filling those places where less blank-phobic people would use them with underscores or hyphens. The filenames are still easy to decipher, and I don’t have to trouble myself with enclosing them in quotes when I want to use them. As a result, some of my files look like this:locking-accts Lost_World I also rarely add .txt file extensions to the end of text files unless I plan to share them with my Windows system.Use quotes When blanks in file names are preferable for any reason, however, there are several easy ways to work with them. To reference existing files, you can enclose the filenames in single or double quotes. In fact, you can make this easier by starting with a quote mark, typing as much of the filename as needed to differentiate it from other files and then pressing the tab key to initiate filename completion. For example, typing the portion of a filename as shown in the example below and then pressing tab should add the rest of the filename to the “file n” beginning:To read this article in full, please click here

How we built Pingora, the proxy that connects Cloudflare to the Internet

How we built Pingora, the proxy that connects Cloudflare to the Internet

Introduction

How we built Pingora, the proxy that connects Cloudflare to the Internet

Today we are excited to talk about Pingora, a new HTTP proxy we’ve built in-house using Rust that serves over 1 trillion requests a day, boosts our performance, and enables many new features for Cloudflare customers, all while requiring only a third of the CPU and memory resources of our previous proxy infrastructure.

As Cloudflare has scaled we’ve outgrown NGINX. It was great for many years, but over time its limitations at our scale meant building something new made sense. We could no longer get the performance we needed nor did NGINX have the features we needed for our very complex environment.

Many Cloudflare customers and users use the Cloudflare global network as a proxy between HTTP clients (such as web browsers, apps, IoT devices and more) and servers. In the past, we’ve talked a lot about how browsers and other user agents connect to our network, and we’ve developed a lot of technology and implemented new protocols (see QUIC and optimizations for http2) to make this leg of the connection more efficient.

Today, we’re focusing on a different part of the equation: the service that proxies traffic between our network and servers on the Internet. This proxy Continue reading

VLAN Interfaces and Subinterfaces

Early bridges implemented a single bridging domain across all ports. Within a few years, we got multiple bridging domains within a single device (including bridging implementation in Cisco IOS). The capability to have multiple bridging domains stretched across several devices was still missing… until the modern-day Pandora opened the VLAN box and forever swamped us in the complexities of large-scale bridging.

Software-defined perimeter: What it is and how it works

A growing number of organizations are drawing an invisible line around their internet-connected resources in an effort to keep attackers at bay. Called software-defined perimeter (SDP), it is based on the relatively simple idea of throwing a virtual barrier around servers, routers, printers, and other enterprise network components.The goal of SDP is to protect networks behind a flexible, software-based perimeter. "Advantages include stronger security and greater flexibility and consistency," says Ron Howell, principal SD-WAN and SASE architect at IT and business consulting firm Capgemini Americas.To read this article in full, please click here

Software-defined perimeter: What it is and how it works

A growing number of organizations are drawing an invisible line around their internet-connected resources in an effort to keep attackers at bay. Called software-defined perimeter (SDP), it is based on the relatively simple idea of throwing a virtual barrier around servers, routers, printers, and other enterprise network components.The goal of SDP is to protect networks behind a flexible, software-based perimeter. "Advantages include stronger security and greater flexibility and consistency," says Ron Howell, principal SD-WAN and SASE architect at IT and business consulting firm Capgemini Americas.To read this article in full, please click here

Cisco expands its SD-WAN software for wider reach, better security

Cisco has broadened the scope of Cisco SD-WAN software by growing its reach and security, and expanding its support for deploying multi-region WAN fabric.The idea behind the new features is to help manage the complexity and security of connecting to cloud resources from the edge of the network, said JP Shukla, director, product management, in Cisco’s Enterprise Cloud & SD-WAN group. “They want to connect these users as reliably and securely as these users would be in an office environment,” he said. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Cisco expands its SD-WAN software for wider reach, better security

Cisco has broadened the scope of Cisco SD-WAN software by growing its reach and security, and expanding its support for deploying multi-region WAN fabric.The idea behind the new features is to help manage the complexity and security of connecting to cloud resources from the edge of the network, said JP Shukla, director, product management, in Cisco’s Enterprise Cloud & SD-WAN group. “They want to connect these users as reliably and securely as these users would be in an office environment,” he said. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

What’s new in Calico Cloud: General availability of new container security features

Summer is almost over but we are bringing the heat back with the official release of Tigera’s new container security features. With this official launch, Calico leads the industry by offering a complete line of solutions across every stage of a cloud-native application CI/CD pipeline. From a new and improved approach to scanning container images for vulnerabilities to strengthening runtime security with improved performance, we’ve significantly improved and enhanced our Image Assurance and Runtime Threat Defense features for this exciting new phase of our Calico Cloud offering. Let’s take a look at the new container security features of this release.

Vulnerability management through Image Assurance

Scanning container images for vulnerabilities is a critical first step in stopping malicious software from being deployed. As business demands grow, development teams are pushed to churn out updates and new features faster. As a result, DevOps teams require assistance to help them quickly identify vulnerabilities in the registries where the container images are pulled from. Calico Cloud is now offering a CLI-based scanner for on-demand scanning, where customers can locally scan for vulnerabilities in their build stage. A lightweight downloadable binary is all it takes to perform these scans and integrate the process into Continue reading

VMware to pay $8M fine, settling charges it fudged the timing of backlogged orders

At a time when vendor order backlogs are at an all-time high and scrutiny of them is as well, VMware has agreed to pay an $8 million fine for disingenuous backlog reporting practices in 2019 and 2020.The Securities and Exchange Commission had charged VMware for misleading investors about its order backlog management practices, specifically stating that VMware had  moved revenue into future quarters by delaying product deliveries to customers, concealing the company’s slowing performance relative to its projections, the SEC stated. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Nvidia Hopper GPU slays predecessor in ML benchmarks

Nvidia has released performance data for its forthcoming Hopper generation of GPUs, and the initial benchmarks are tremendous.The metrics are based on MLPerf Inference v2.1, an industry-standard benchmark that analyzes the performance of inferencing tasks using a machine-learning model against new data.Nvidia claims its Hopper-based H100 Tensor Core GPUs delivered up to 4.5x greater performance than its previous A100 Ampere GPUs. (Read more about Hopper: Nvidia unveils a new GPU architecture designed for AI data centers) It’s a remarkable jump in just one generation. For comparison, CPU benchmarks often grow 5% to 10% from one generation to the next. To read this article in full, please click here

Nvidia Hopper GPU slays predecessor in ML benchmarks

Nvidia has released performance data for its forthcoming Hopper generation of GPUs, and the initial benchmarks are tremendous.The metrics are based on MLPerf Inference v2.1, an industry-standard benchmark that analyzes the performance of inferencing tasks using a machine-learning model against new data.Nvidia claims its Hopper-based H100 Tensor Core GPUs delivered up to 4.5x greater performance than its previous A100 Ampere GPUs. (Read more about Hopper: Nvidia unveils a new GPU architecture designed for AI data centers) It’s a remarkable jump in just one generation. For comparison, CPU benchmarks often grow 5% to 10% from one generation to the next. To read this article in full, please click here