Archive

Category Archives for "Networking"

Database backup: You need to get familiar with the database type being used

In order to back up a database, you need to know how it’s delivered, but you also need to know which of the more than 13 types of database designs it employs. Here we’ll cover four of them—relational, key-value, document, and wide column—that generate a lot of backup questions.Understanding these models will help the backup team create a relationship and trust level with the database admins, and that will help both parties.[Get regularly scheduled insights by signing up for Network World newsletters.] Four database types Relational A relational-database management system (RDBMS) is a series of tables with a defined schema, or layout, with records in rows of one or more attributes, or values.  There are relationships between the tables, which is why it is called a relational database, and why backups generally have to back up and restore everything. Examples of RDMBSs include Oracle, SQL Server, DB2, MySQL, and PostgreSQLTo read this article in full, please click here

Intel announces new roadmaps for Xeon CPUs, Xe GPUs

At this year's Intel's investors' day meeting with Wall Street analysts, CEO Pat Gelsinger revealed new road maps for Xeon CPUs and Xe GPUs that you would typically expect to see reveals at an IDF show that stretches through 2024.Most notable about the Xeon news is that for the first time, Intel is bifurcating the processor line into two microarchitecture types. The two types are a continuation of the current design, and a whole new architecture based on the Alder Lake hybrid architecture currently used in client CPUs.[Get regularly scheduled insights by signing up for Network World newsletters.] Adler Lake uses a different core design than traditional Intel CPUs have used. Up to now, Intel cores have all been the same, identical. But Adler Lake uses two types of cores; the performance core used to do the computing, and the efficient core, used to do small background tests that don’t require a high-performance core. This is hardly an original design; Arm has been doing for years.To read this article in full, please click here

Database backup: Get familiar with the database type being used

In order to back up a database, you need to know how it’s delivered, but you also need to know which of the more than 13 types of database designs it employs. Here we’ll cover four of them—relational, key-value, document, and wide column—that generate a lot of backup questions.Understanding these models will help the backup team create a relationship and trust level with the database admins, and that will help both parties.[Get regularly scheduled insights by signing up for Network World newsletters.] Four database types Relational A relational-database management system (RDBMS) is a series of tables with a defined schema, or layout, with records in rows of one or more attributes, or values.  There are relationships between the tables, which is why it is called a relational database, and why backups generally have to back up and restore everything. Examples of RDMBSs include Oracle, SQL Server, DB2, MySQL, and PostgreSQLTo read this article in full, please click here

Backup for databases: Get familiar with the type you use

In order to back up a database, you need to know how it’s delivered, but you also need to know which of the more than 13 types of database designs it employs. Here we’ll cover four of them—relational, key-value, document, and wide column—that generate a lot of backup questions.Understanding these models will help the backup team create a relationship and trust level with the database admins, and that will help both parties.[Get regularly scheduled insights by signing up for Network World newsletters.] Four database types Relational A relational-database management system (RDBMS) is a series of tables with a defined schema, or layout, with records in rows of one or more attributes, or values.  There are relationships between the tables, which is why it is called a relational database, and why backups generally have to back up and restore everything. Examples of RDMBSs include Oracle, SQL Server, DB2, MySQL, and PostgreSQLTo read this article in full, please click here

Intel announces new roadmaps for Xeon CPUs, Xe GPUs

At this year's Intel's investors' day meeting with Wall Street analysts, CEO Pat Gelsinger revealed new road maps for Xeon CPUs and Xe GPUs that you would typically expect to see reveals at an IDF show that stretches through 2024.Most notable about the Xeon news is that for the first time, Intel is bifurcating the processor line into two microarchitecture types. The two types are a continuation of the current design, and a whole new architecture based on the Alder Lake hybrid architecture currently used in client CPUs.[Get regularly scheduled insights by signing up for Network World newsletters.] Adler Lake uses a different core design than traditional Intel CPUs have used. Up to now, Intel cores have all been the same, identical. But Adler Lake uses two types of cores; the performance core used to do the computing, and the efficient core, used to do small background tests that don’t require a high-performance core. This is hardly an original design; Arm has been doing for years.To read this article in full, please click here

Using pipes on Linux to get a lot more done

One of the things that I have always loved about Unix and then Linux is how it allows me to connect a series of commands together with pipes and get a lot of work done without a lot of effort. I can generate the output that I need in the form that I need it. It's not just the existence of the pipes themselves, but the flexibility of the Linux commands. You can run commands, select portions of the output, sort the results or match on specific strings and you can pare the results down to just what you want to see.In this post, we're going to look at a couple commands that demonstrate the power of the pipe and how easily you can get commands to work together.To read this article in full, please click here

Using pipes on Linux to get a lot more done

One of the things that I have always loved about Unix and then Linux is how it allows me to connect a series of commands together with pipes and get a lot of work done without a lot of effort. I can generate the output that I need in the form that I need it. It's not just the existence of the pipes themselves, but the flexibility of the Linux commands. You can run commands, select portions of the output, sort the results or match on specific strings and you can pare the results down to just what you want to see.In this post, we're going to look at a couple commands that demonstrate the power of the pipe and how easily you can get commands to work together.To read this article in full, please click here

Cache-Based Packet Forwarding

In the previous blog post in this series I described how convoluted routing table lookups could become when you have to deal with numerous layers of indirection (BGP prefix ⇨ BGP next hop ⇨ IGP next hop ⇨ link bundle ⇨ outgoing interface). Modern high-end hardware can deal with the resulting complexity; decades ago we had to use router CPU to do multiple (potentially recursive) lookups in the IP routing table (there was no FIB at that time).

Network devices were always pushed to the bleeding edge of performance, and smart programmers always tried to optimize the CPU-intensive processes. One of the obvious packet forwarding optimizations relied on the fact that within a short timeframe most packets have to be forwarded to a small set of destinations. Welcome to the wonderful world of cache-based forwarding.

Why we are acquiring Area 1

Why we are acquiring Area 1

This post is also available in Français and Español.

Why we are acquiring Area 1

Cloudflare’s mission is to help build a better Internet. We’ve invested heavily in building the world’s most powerful cloud network to deliver a faster, safer and more reliable Internet for our users. Today, we’re taking a big step towards enhancing our ability to secure our customers.

Earlier today we announced that Cloudflare has agreed to acquire Area 1 Security. Area 1’s team has built exceptional cloud-native technology to protect businesses from email-based security threats. Cloudflare will integrate Area 1’s technology with our global network to give customers the most complete Zero Trust security platform available.

Why Email Security?

Back at the turn of the century I was involved in the fight against email spam. At the time, before the mass use of cloud-based email, spam was a real scourge. Clogging users’ inboxes, taking excruciatingly long to download, and running up people’s Internet bills. The fight against spam involved two things, one technical and one architectural.

Technically, we figured out how to use machine-learning to successfully differentiate between spam and genuine. And fairly quickly email migrated to being largely cloud-based. But together these changes didn’t kill spam, but they relegated to a Continue reading

Mobile Wi-Fi: How a wireless router helped catch a thief

As an IT pro, it’s not often that I get to tail a suspect, track down a stolen vehicle and provide digital evidence of the thief’s getaway. But that was all part of a day’s work as some colleagues and I kept tabs on the hijacked maintenance truck and ultimately recovered it with the help of a GPS-enabled mobile router.It happened last summer, and I was on the job the IT department of the transit authority I work for when word came in that one of our maintenance vehicles was stolen.The worker on the truck left it running when he stepped out of the vehicle to check what needed to be done at a city bus stop, and an opportunistic thief drove off with it—a six-figure heist given the value of the truck plus the maintenance gear it carried.To read this article in full, please click here

Access denied: Always check for protocol compatibility

While working on a base-wide network cutover at a military installation recently, I was verifying configurations on core, distribution, and access-node devices. Using a local host computer on the network, I was connected to the distribution node via an Ethernet port in a separate room and successfully pinged the node to verify network connectivity.Then I tried to access the node using PuTTY via SSH (port 22), the recommended and secure method, and received this error message: “Network Error: Connection Refused. The network connection PuTTY tried to make to your device/server was rejected by the server.” This error usually happens because the server does not provide the service which PuTTY is trying to access.To read this article in full, please click here

Tech Bytes: Misconceptions About Connecting Your Network To The Cloud (Sponsored)

This Day Two Cloud Tech Bytes episode, sponsored by Singtel, discusses common customer misconceptions about connecting private networks to the public cloud. For instance, SD-WAN might seem like a simple option, but things get tricky when you're talking about hundreds of sites across different countries. Our guest is Mark Seabrook, Global Solutions Manager at Singtel.

Tech Bytes: Misconceptions About Connecting Your Network To The Cloud (Sponsored)

This Day Two Cloud Tech Bytes episode, sponsored by Singtel, discusses common customer misconceptions about connecting private networks to the public cloud. For instance, SD-WAN might seem like a simple option, but things get tricky when you're talking about hundreds of sites across different countries. Our guest is Mark Seabrook, Global Solutions Manager at Singtel.

The post Tech Bytes: Misconceptions About Connecting Your Network To The Cloud (Sponsored) appeared first on Packet Pushers.