Archive

Category Archives for "Networking"

Intel’s 18-core Xeon chips tuned for machine learning, analytics

Smaller servers are taking over data centers, but Intel believes the future is also bright for powerful big-iron servers, thanks to companies’ embrace of machine learning, which requires a lot of horsepower to process complex algorithms and large data sets.With its new top-line Xeon E7 v3 server chips based on the Haswell microarchitecture, Intel hopes to capitalize on the demand for this type of server. With up to 18 CPU cores, the chips are Intel’s fastest, and designed for databases, ERP (enterprise resource planning) systems and analytics related to machine learning.Complex machine learning models can’t be distributed over the cloud or a set of smaller hyperscale servers in a data center. Instead, a more powerful cluster of servers is needed to run deep-learning systems, where the larger number of cores could power more precise analysis of oceans of data.To read this article in full or to leave a comment, please click here

French lawmakers take first step toward gathering all communications metadata

French lawmakers have taken a first step toward allowing real-time surveillance of Internet and mobile phone use in France.Following attacks on satirical newspaper Charlie Hebdo and a supermarket in Paris in January, the government rushed out a bill that will allow French intelligence services to collect communications metadata on the entire country’s phone calls and Internet traffic, in some cases installing their own equipment on operators’ networks. On Tuesday, the French National Assembly approved the bill by 438 votes to 86.The proposed surveillance measures have encountered opposition from many quarters: Internet service providers, civil liberties groups, and even an association of motorcyclists, concerned about the potential for government monitoring of lobby groups.To read this article in full or to leave a comment, please click here

French lawmakers take first step toward gathering all communications metadata

French lawmakers have taken a first step toward allowing real-time surveillance of Internet and mobile phone use in France.Following attacks on satirical newspaper Charlie Hebdo and a supermarket in Paris in January, the government rushed out a bill that will allow French intelligence services to collect communications metadata on the entire country’s phone calls and Internet traffic, in some cases installing their own equipment on operators’ networks. On Tuesday, the French National Assembly approved the bill by 438 votes to 86.The proposed surveillance measures have encountered opposition from many quarters: Internet service providers, civil liberties groups, and even an association of motorcyclists, concerned about the potential for government monitoring of lobby groups.To read this article in full or to leave a comment, please click here

Understanding NPV: Part 1 of a 2-part Series

N-Port Virtualization (NPV), and N-port ID Virtualization (NPIV) have been around for quite some time now. Enhancements have been made to the traditional NPV and NPIV implementations, making it more convenient for unified fabric topologies (which is what we will be discussing today). This blog, part 1 in a 2-part series, will be discussing the ‘fcoe-npv’ implementation of NPV/NPIV, while the next blog will be focused on the traditional implementation.

NPV and NPIV were created as a method in which we could add additional switches (i.e. port density), to a given fabric, without consuming additional domain-id’s, or adding to the administrative burden of a growing SAN (managing zoning, domain-id’s, principle switch elections, FSPF routing, etc…). A lot of this concern stemmed from the fact that the Fibre Channel standard limits us to 239 usable domain id’s. Essentially 8-bits, or the most significant byte in the Fibre Channel ID (FCID), is reserved for this domain-id. This byte is what is used within FSPF protocol to route traffic throughout a Fibre Channel fabric. While this gives us 256 addresses, only 239 are usable, as some are reserved. Beyond this, many vendors restrict us too a much smaller number of domain-id’s on Continue reading

Telerik pitches new framework for building Android, iOS, Windows apps

With Telerik’s open source framework NativeScript, programmers with expertise in JavaScript have a new option for cross-platform mobile app development. The resulting applications will be able to run directly on Android, iOS and Windows.After launching a beta in March, Progress Software-owned Telerik on Tuesday launched the first generally available version of NativeScript. The company describes it as a native framework that lets developers build apps for Android, iOS and later this year, Windows phones, with much of the same code. The choice of JavaScript as the underlying language wasn’t a coincidence.“We think it’s one of the most universal languages and skill sets out there,” said Todd Anglin, vice president of product management and marketing at Telerik.To read this article in full or to leave a comment, please click here

The Present Impact of Open Networking & Whitebox Switching

Dell is all about open networking, and several whitebox vendors had their wares on display at Interop. IP Infusion has released OcNOS, an open networking operating system with a rich feature set right out of the gate. Ethernet switching continues to change. If you are Yet Another Cisco Buyer, do you care? I think you should. There are real dollars at stake. Eventually, it gets silly and/or irresponsible to spend money on Cadillacs.

Juniper EX4550. EX1113. EX063. What?

Juniper EX4550

I came across some weird behavior (I think) in Junos recently. Nothing major, but an annoyance nonetheless.

Juniper EX4550

Let’s check out some statistics on this beautiful looking EX4550 stack, shall we?

john@EX4550> show pfe statistics bridge

Slot 0

PFE:                         0
----------------------------------------
----  Ingress Counters ----
-- Set0 --
Received:            654383803
VLAN Filtered:               0
Security Filtered:           0
Other Discards:            324
-- Set1 --
Received:            654383797
VLAN Filtered:               0
Security Filtered:           0
Other Discards:            324
[...]

Oh dear look, 324 “Other” discards on my EX4550. I sure hope they aren’t incrementing. Let’s issue the command again and check if the 324 figure has increased?

{master:0}
john@EX4550> show pfe statistics bridge

Slot 0

PFE:                         0
----------------------------------------
----  Ingress Counters ----
-- Set0 --
Received:               913272
VLAN Filtered:               0
Security Filtered:           0
Other Discards:              0
-- Set1 --
Received:               913267
VLAN Filtered:               0
Security Filtered:           0
Other Discards:              0
[...]

No it hasn’t. In fact it has mysteriously reset itself along with all the other PFE statistics. That is, well, suboptimal to say the least.

Countaz

It’s probably a known bug, though it’s not important enough for me to go look it up. Maybe it’s even intentional (though for the life of Continue reading

Zuckerberg’s zeal for free Internet shows in Internet.org video

Facebook CEO Mark Zuckerberg isn't an evangelical preacher, but his latest video promoting the new Internet.org Platform is filled with a missionary zeal for free basic Internet for the 4 billion people worldwide without access.The nearly seven-minute video is also partly an ethical appeal by Zuckerberg to the tech community to put those without basic Internet service before their interest in "the intellectual purity of technology."Even though the appeal is evidently heartfelt, almost spiritual, analysts noted that Facebook, the corporation, stands to benefit ultimately from its free basic Internet message.To read this article in full or to leave a comment, please click here

Do you need a container-specific Linux distribution?

You've always been able to run containers on a variety of operating systems: Zones on Solaris; Jails on BSD; Docker on Linux and now Windows Server; OpenVZ on Linux, and so on. As Docker in particular and containers in general explode in popularity, operating system companies are taking a different tack. They're now arguing that to make the most of containers you need a skinny operating system to go with them.To read this article in full or to leave a comment, please click here

The Carly Fiorina teardown begins as ’16 race heats up

Carly Fiorina has been described as flamboyant, bold, polarizing, decisive, imperious and unqualified. Her six-year tenure as CEO of Hewlett-Packard ended with her forced resignation, something that's not helpful as she begins a presidential run.If Fiorina's bid for the Republican nomination, announced on Monday, registers more than a single digit in the polls, her tenure at HP will be scrutinized -- as will her exit. (Though she might be able to explain the latter away.)+ A LOOK BACK: Carly Fiorina features Cisco in political attack ad +To read this article in full or to leave a comment, please click here

Please Sponsor Me: Abseil the Spinnaker Tower

Original content from Roger's CCIE Blog Tracking the journey towards getting the ultimate Cisco Certification. The Routing & Switching Lab Exam
If you are a regular visitor to this site or a new one and have learnt anything from it and would like to give something back now is your chance. Please donate whatever you can to support me via the link below. https://www.justgiving.com/Roger-Perkin I will be doing a sponsored Abseil of the Spinnaker Tower in... [Read More]

Post taken from CCIE Blog

Original post Please Sponsor Me: Abseil the Spinnaker Tower

Interview of Everything: Cisco CEO Chambers on white boxes, SDN, leadership and the cloud

Little did we know that our interview with John Chambers at Cisco’s Texas Data Center Day in April might be our last with him as the company’s CEO. As we learned this week, he’ll hand the reins to Chuck Robbins in July, though will remain the company’s chairman and become its executive chairman as well. He’ll also hand Robbins the challenge of making Cisco the No.1 IT company by forging ahead with its data center, cloud and Internet of Everything initiatives. Chambers discussed those topics and more with IDG Enterprise VP and Chief Content Officer John Gallant.To read this article in full or to leave a comment, please click here

Interview of Everything: Cisco CEO Chambers on white boxes, SDN, leadership and the cloud

Little did we know that our interview with John Chambers at Cisco’s Texas Data Center Day in April might be our last with him as the company’s CEO. As we learned this week, he’ll hand the reins to Chuck Robbins in July, though will remain the company’s chairman and become its executive chairman as well. He’ll also hand Robbins the challenge of making Cisco the No.1 IT company by forging ahead with its data center, cloud and Internet of Everything initiatives. Chambers discussed those topics and more with IDG Enterprise VP and Chief Content Officer John Gallant.To read this article in full or to leave a comment, please click here

Interview of Everything: Cisco CEO Chambers on white boxes, SDN, leadership and the cloud

Little did we know that our interview with John Chambers at Cisco’s Texas Data Center Day in April might be our last with him as the company’s CEO. As we learned this week, he’ll hand the reins to Chuck Robbins in July, though will remain the company’s chairman and become its executive chairman as well. He’ll also hand Robbins the challenge of making Cisco the No.1 IT company by forging ahead with its data center, cloud and Internet of Everything initiatives. Chambers discussed those topics and more with IDG Enterprise VP and Chief Content Officer John Gallant.To read this article in full or to leave a comment, please click here

Cybercriminals borrow from APT playbook in attack against PoS vendors

Cybercriminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.This change in tactics has been observed among those who launch attacks, as well as those who create and sell attack tools on the underground market.A recent example of such behavior was seen in a cybercriminal attack against vendors of point-of-sale systems that researchers from RSA documented last week.The attackers sent emails to specific vendors impersonating small businesses such as restaurants. This technique, known as spear-phishing, is typically associated with advanced persistent threats (APTs)—highly targeted, customized attacks whose goal is usually long-term cyberespionage.To read this article in full or to leave a comment, please click here