Archive

Category Archives for "Networking"

World’s first exascale supercomputer is the world’s fastest

The first true exascale supercomputer, Frontier, is now the fastest in the world, toppling Fugaku, which held the title for the past two years, according to the latest TOPP500 list of the best performing supercomputers.An exascale computer is one that can perform 1018 (one quintillion) floating point operations per second (1 exaFLOPS), and Frontier, installed at Oak Ridge National Laboratory in Tennessee, weighed in at 1.12 exaFLOPS. [ Get regularly scheduled insights by signing up for Network World newsletters. ] Frontier also captured the title of most energy efficient supercomputer, generating 62.68 GFLOP per watt.To read this article in full, please click here

World’s first exascale supercompuer is the world’s fastest

The first true exascale supercomputer, Frontier, is now the fastest in the world, toppling Fugaku, which held the title for the past two years, according to the latest TOPP500 list of the best performing supercomputers.An exascale computer is one that can perform 1018 (one quintillion) floating point operations per second (1 exaFLOPS), and Frontier, installed at Oak Ridge National Laboratory in Tennessee, weighed in at 1.12 exaFLOPS.Frontier also captured the title of most energy efficient supercomputer, generating 62.68 GFLOP per watt.Frontier’s speed bumps down Fugaku at the RIKEN Center for Computational Science (R-CCS) in Kobe, Japan, from number 1 on the TOPP500 list last fall to number 2 now. Fugaku scored 442 peta FLOPS (PFLOPS) on the  High Performance Linpack (HPL) benchmark, which measures how well systems solve a dense system of linear equations.To read this article in full, please click here

World’s first exascale supercomputer is the world’s fastest

The first true exascale supercomputer, Frontier, is now the fastest in the world, toppling Fugaku, which held the title for the past two years, according to the latest TOPP500 list of the best performing supercomputers.An exascale computer is one that can perform 1018 (one quintillion) floating point operations per second (1 exaFLOPS), and Frontier, installed at Oak Ridge National Laboratory in Tennessee, weighed in at 1.12 exaFLOPS. [ Get regularly scheduled insights by signing up for Network World newsletters. ] Frontier also captured the title of most energy efficient supercomputer, generating 62.68 GFLOP per watt.To read this article in full, please click here

Easier Network Visibility Using SaaS

The following post is by Sehjung Hah at VMware. We thank VMware for being a sponsor. Catch up and listen to VMware’s latest podcast with Packet Pushers introducing vRealize Network Insight Universal with Ethan Banks and Ned Bellavance on Day 2 Cloud 145: Tech Bytes: Flexible Cloud Migration Using VMware vRealize Network Insight Universal. More details are available in […]

The post Easier Network Visibility Using SaaS appeared first on Packet Pushers.

Change an IP address from dynamic to static with a bash script

Changing the IP address of a Linux system from dynamic to static is not difficult, but requires a little care and a set of commands that you likely rarely use. This post provides a bash script that will run through the process, collect the needed information and then issue the commands required to make the changes while asking as little as possible from the person running it.The bulk of the script focusses on making sure that the correct settings are used. For example, it collects the 36-charater universally unique identifier (UUID) from the system so that you never have to type it in or copy and paste it into place. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Use bash to change an IP address from dynamic to static on Linux

Changing the IP address of a Linux system from dynamic to static is not difficult, but requires a little care and a set of commands that you likely rarely use. This post provides a bash script that will run through the process, collect the needed information and then issue the commands required to make the changes while asking as little as possible from the person running it.The bulk of the script focusses on making sure that the correct settings are used. For example, it collects the 36-charater universally unique identifier (UUID) from the system so that you never have to type it in or copy and paste it into place. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Change an IP address from dynamic to static with a bash script

Changing the IP address of a Linux system from dynamic to static is not difficult, but requires a little care and a set of commands that you likely rarely use. This post provides a bash script that will run through the process, collect the needed information and then issue the commands required to make the changes while asking as little as possible from the person running it.The bulk of the script focusses on making sure that the correct settings are used. For example, it collects the 36-charater universally unique identifier (UUID) from the system so that you never have to type it in or copy and paste it into place. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Use bash to change an IP address from dynamic to static on Linux

Changing the IP address of a Linux system from dynamic to static is not difficult, but requires a little care and a set of commands that you likely rarely use. This post provides a bash script that will run through the process, collect the needed information and then issue the commands required to make the changes while asking as little as possible from the person running it.The bulk of the script focusses on making sure that the correct settings are used. For example, it collects the 36-charater universally unique identifier (UUID) from the system so that you never have to type it in or copy and paste it into place. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Learning BGP Module 2 Lesson 5: BGP Communities – Video

Russ White’s BGP course moves on to the concept of BGP communities, including the three basic types of communities, as well as no_export and no_advertise communities. You can subscribe to the Packet Pushers’ YouTube channel for more videos as they are published. It’s a diverse a mix of content from Ethan and Greg, plus selected […]

The post Learning BGP Module 2 Lesson 5: BGP Communities – Video appeared first on Packet Pushers.

Tech Bytes: Enhancing CI/CD Pipelines With Nokia’s Digital Sandbox (Sponsored)

Today we welcome sponsor Nokia back to the Tech Bytes podcast to get more information about its Digital Sandbox, and how this software, part of Nokia’s Fabric Services System, helps enable a continuous integration/continuous delivery, or CI/CD framework, for network engineers. Our guest is Erwan James, Product Line Manager at Nokia.

The post Tech Bytes: Enhancing CI/CD Pipelines With Nokia’s Digital Sandbox (Sponsored) appeared first on Packet Pushers.

Join me at PlatformCon 2022 to learn how to secure could-native applications using open source tools

PlatformCon 2022 is just around the corner and I’m excited to be speaking at the conference alongside other platform practitioners and pioneers. My talk, Using open-source software to secure cloud-native applications, will examine—you guessed it—how to use open-source software like Kubernetes to secure cloud-native applications.

I’m looking forward to giving this talk because I think this topic is extremely relevant to the Platform Engineering community. Cloud-native microservices applications bring so many amazing advantages for many software application needs, but they also bring lots of security challenges, and if those are handled incorrectly it can be a minefield. Ephemeral workloads appear and disappear, workload network addressing is transient, and traditional firewalls can’t police the data path effectively.

Open-source orchestration solutions like Kubernetes define an application-centric component called ‘NetworkPolicy,’ but they do not implement it. In my session I’ll discuss how, with a change of tools and mindset, open-source software can help to implement security for cloud-native applications whilst still allowing the user to benefit from all the advantages. I’m excited to help people understand how to get on the right path and give them enough information to make their own informed decision on how to proceed

What’s special Continue reading

Network Break 384: Broadcom To Buy VMware; DuckDuckGo Slammed For Microsoft Tracking Deal

On today's Network Break we dig into Broadcom's proposed acquisition of VMware for about $61 billion. We also cover a serious VMware vulnerability that is being exploited in the wild, and criticism of DuckDuckGo for a deal with Microsoft that allows some data to be collected from the privacy browser. We also cover the latest financial results from Dell Technologies and Broadcom.

The Future of Zero Trust in a Hybrid World

In the first article in this series, we discussed what zero trust security is and why it matters. In the second article in this series, we talked about the benefits of zero trust network access. In this third article installment, we will dive into using zero trust models within container security. In this fourth article, we will discuss the future of zero trust in a world that is increasingly remote.  While remote work originally appeared en masse as a Band-Aid fix for organizations to keep working during the COVID-19 pandemic, it is now decidedly here to stay. According to research from McKinsey shows that most executives no longer plan to have non-essential staff working on-site five days a week. And employees are happily abiding.

Platform Week wrap-up

Platform Week wrap-up
Platform Week wrap-up

A comprehensive developer platform includes all the necessary storage, compute, and services to effectively deliver an application. Compute that runs globally and auto-scales to execute code without having to worry about the underlying infrastructure; storage for user information, objects, and key-value pairs; and all the related services including delivering video, optimizing images, managing third-party components, and capturing telemetry.

Whether you’re looking to modernize legacy backend infrastructure or are building a brand-new application from the ground up the Cloudflare Developer Platform provides all the building blocks you need to deliver an application on the edge.

Recently, during Platform Week, we made a number of announcements expanding what’s possible with the Developer Platform. Let’s take a look at some of the announcements we made and what this enables you to build. For a complete list visit the Platform Week hub.

Compute

The core of our compute offering is Workers, our serverless runtime. Workers integrates with other Cloudflare offerings helping you route requests, take action on bots, send an email, or route and filter emails, just to name a few.

There are times when you’ll want to use multiple Workers to perform an action, Workers now have the ability to call another Continue reading

VXLAN-Focused Design Clinic in June 2022

ipSpace.net subscribers are probably already familiar with the Design Clinic: a monthly Zoom call in which we discuss real-life design- and technology challenges. I started it in September 2021 and it quickly became reasonably successful; we covered almost two dozen topics so far.

Most of the challenges contributed for the June 2022 session were focused on VXLAN use cases (quite fitting considering I just updated the VXLAN Technical Deep Dive webinar), including:

  • Can we implement Data Center Interconnect (DCI) with VXLAN? (Yes, but…)
  • Can we run VXLAN over SD-WAN (and does it make sense)? (Yes/No)
  • What happened to traditional MPLS/VPN Enterprise core and can we use VXLAN/EVPN instead? (Still there/Maybe)
  • Should we use routers or switches as data center WAN edge devices, and how do we integrate them with VXLAN/EVPN data center fabric? (Yes 😊)

For more details, join us on June 6th. There’s just a minor gotcha: you have to be an active ipSpace.net subscriber to do it.

VXLAN-Focused Design Clinic in June 2022

ipSpace.net subscribers are probably already familiar with the Design Clinic: a monthly Zoom call in which we discuss real-life design- and technology challenges. I started it in September 2021 and it quickly became reasonably successful; we covered almost two dozen topics so far.

Most of the challenges contributed for the June 2022 session were focused on VXLAN use cases (quite fitting considering I just updated the VXLAN Technical Deep Dive webinar), including:

  • Can we implement Data Center Interconnect (DCI) with VXLAN? (Yes, but…)
  • Can we run VXLAN over SD-WAN (and does it make sense)? (Yes/No)
  • What happened to traditional MPLS/VPN Enterprise core and can we use VXLAN/EVPN instead? (Still there/Maybe)
  • Should we use routers or switches as data center WAN edge devices, and how do we integrate them with VXLAN/EVPN data center fabric? (Yes 😊)

For more details, join us on June 6th. There’s just a minor gotcha: you have to be an active ipSpace.net subscriber to do it.