Archive

Category Archives for "Networking"

New Fujitsu cloud service is based Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Fujitsu cloud service is based on Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Fujitsu cloud service is based on Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Fujitsu cloud service is based on Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Fujitsu cloud service is based on Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Nokia pulls most of its business from Russia

Finland-based telecommunications equipment giant Nokia has announced that it would cease most of its operations in Russia, in response to that country’s month-old invasion of Ukraine.Nokia said in a statement that it would suspend equipment deliveries, accept no new orders and move “our limited R&D activities” out of the country, saying that “it has been clear for Nokia since the early days of the invasion of Ukraine that continuing our presence in Russia would not be possible.”Russia accounted for less than 2% of the company’s net sales in 2021, according to Nokia, which added that the move will not affect the bottom line in a significant way, and that the company expects to hit all of its immediate earnings targets going forward.To read this article in full, please click here

Hedge 126: George Michaelson on ISDN

ISDN, while an old technology, is still around in many parts of the world. When will it go away? George Michaelson joins Tom Ammon and Russ White to discuss the end of ISDN. The conversation then veers into old networking technologies, and the importance of ISDN in setting the terms and ideas we use today—ISDN is one of the key technologies around which network engineers built their mental maps of how to build and maintain networks.

download

Practical Python For Networking: 2.1 – Lab Topology – Video

This episode on Python for networking covers the lab topology we’ll be working with in VIRL, choosing a text editor, and basic lab configurations. Course files are in a GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft Azure. He’s the founder […]

The post Practical Python For Networking: 2.1 – Lab Topology – Video appeared first on Packet Pushers.

The Key to Networking is First Getting a Good Night’s Sleep

Anyone who’s ever gone to a networking event knows that they can be exhausting. You’re constantly meeting new people, exchanging business cards, and trying to make a good impression. It’s no wonder that so many people end up burning out quickly.

The key to networking effectively is actually quite simple: getting a good night’s sleep beforehand.

How much sleep do you need to be at your best for networking events?

Most people need around eight hours of sleep per night to function at their best. However, if you know you have an upcoming networking event, it’s important to get even more sleep than usual. Try to get at least nine or ten hours of sleep the night before. This will help ensure that you’re well-rested and won’t be as likely to feel exhausted during the event.

How can you make sure you get enough sleep?

There are a few different things you can do to make sure you get enough sleep. First, avoid caffeine in the evening. Caffeine can stay in your system for up to eight hours, so it’s best to avoid it after lunchtime. 

Second, establish a bedtime routine and stick to it as much as possible. Continue reading

Day Two Cloud 142: OpenZiti Serves Up Zero Trust For Applications (Sponsored)

Today's Day Two Cloud episode bites into OpenZiti, an open-source project that brings zero trust principles to networks and applications. OpenZiti builds an overlay network to enforce zero trust. It has several moving parts including edge routers, a controller, and SDKs. OpenZiti was created by NetFoundry, our sponsor for this episode. Guest Clint Dovholuk takes us through the nitty-gritty of how it works.

Cloudflare partners with Kentik to enhance on-demand DDoS protection

Cloudflare partners with Kentik to enhance on-demand DDoS protection

We are excited to announce that as of today, network security teams can procure and use Magic Transit, Cloudflare’s industry-leading DDoS mitigation solution, and Kentik’s network observability as an integrated solution. We are excited to help our customers not just with technical simplicity, but business process simplicity as well.

Cloudflare partners with Kentik to enhance on-demand DDoS protection

Why monitoring and mitigation?

Distributed Denial of Service (DDoS) attacks are highly disruptive to businesses everywhere. According to the Cloudflare DDoS Attack Trends report, in the first half of 2021 the world witnessed massive ransomware and ransom DDoS attack campaigns that interrupted critical infrastructure, including oil pipelines, healthcare, and financial services. In the second half, we saw a growing swarm of attacks, including one of the most powerful botnets deployed (Meris), with record-breaking network-layer attacks observed on the Cloudflare network.

Along with an increase in severity, there is a proliferation of automated toolkits that make it simple and cheap for anyone to launch these attacks. Detecting and stopping these attacks manually is not effective, and network security engineers are increasingly turning to automated tools to help ensure network and application availability.

DDoS protection has evolved over the years from appliances to hybrid models to fully Internet-native solutions, like Continue reading

Cisco further incentivizes circular consumption for customers and partners

Cisco is introducing a new payment scheme for customers to encourage the recycling of its hardware, alongside a new partner incentive to repurpose or recycle end-of-use products.The two schemes aim to help Cisco CEO Chuck Robbins build on the vendor’s 2018 sustainability pledge and a commitment to have 100% of hardware returned at the end-of-use.Building the circular economy The Cisco Green Pay payment scheme will see customers offered a 5% incentive on Cisco hardware at the outset of their purchase and a predictable payment strategy over five years. Once the term is up, the product is recovered by Cisco free of charge and the customer receives a certificate confirming that it has entered the circular economy.To read this article in full, please click here

Cisco pushes for more recycling of its used gear

Cisco is introducing a new payment scheme to encourage customers to recycling its hardware, alongside a new partner incentive to repurpose or recycle its end-of-use products.The two schemes aim to help Cisco CEO Chuck Robbins build on the vendor’s 2018 sustainability pledge and a commitment to have 100% of hardware returned at the end-of-use.Building the circular economy The Cisco Green Pay payment scheme will see customers offered a 5% incentive on Cisco hardware at the outset of their purchase and a predictable payment strategy over five years. Once the term is up, the product is recovered by Cisco free of charge and the customer receives a certificate confirming that it has entered the circular economy.To read this article in full, please click here

HS021 The Great Realisation Not Great Resignation

Headlines about ‘great resignation’ tend to ignore that people are moving jobs not quitting work. We believe many people are making  choices about what work they want in their lives. We discuss four reasons:  1) toxic workplaces 2) lifestyle and remote work 3) downstepping and 4) early retirement. We note that recruiters are toxic arms […]

The post HS021 The Great Realisation Not Great Resignation appeared first on Packet Pushers.

Edge computing moves toward full autonomy

Edge computing is rapidly shedding its reputation as a fringe concept, and both adopters and vendors are focusing their sights on the technology's next goal: fully autonomous deployment and operation.The edge deployment experience is drawing closer to the simplicity of unboxing a new mobile phone, says Teresa Tung, cloud first chief technologist at IT advisory and consulting firm Accenture. "We're seeing automated technology that simplifies handling the edge’s unique complexity for application, network, and security deployments."The ability to create and manage containerized applications enables seamless development and deployment in the cloud, with the edge simply becoming a specialized location with more stringent resource constraints, Tung says. "Self-organizing and self-healing wireless mesh communications protocols, such as Zigbee, Z-Wave, ISA100.11a, or WirelessHART can create networks where devices can be deployed ad hoc and self-configure."To read this article in full, please click here

Edge computing moves toward full autonomy

Edge computing is rapidly shedding its reputation as a fringe concept, and both adopters and vendors are focusing their sights on the technology's next goal: fully autonomous deployment and operation.The edge deployment experience is drawing closer to the simplicity of unboxing a new mobile phone, says Teresa Tung, cloud first chief technologist at IT advisory and consulting firm Accenture. "We're seeing automated technology that simplifies handling the edge’s unique complexity for application, network, and security deployments."The ability to create and manage containerized applications enables seamless development and deployment in the cloud, with the edge simply becoming a specialized location with more stringent resource constraints, Tung says. "Self-organizing and self-healing wireless mesh communications protocols, such as Zigbee, Z-Wave, ISA100.11a, or WirelessHART can create networks where devices can be deployed ad hoc and self-configure."To read this article in full, please click here

AWS Automatic EC2 Instance Recovery

On March 30th 2022, AWS announced automatic recovery of EC2 instances. Does that mean that AWS got feature-parity with VMware High Availability, or that VMware got it right from the very start? No and No.

Automatic Instance Recover Is Not High Availability

Reading the AWS documentation (as opposed to the feature announcement) quickly reveals a caveat or two. The automatic recovery is performed if an instance becomes impaired because of an underlying hardware failure or a problem that requires AWS involvement to repair.

AWS Automatic EC2 Instance Recovery

On March 30th 2022, AWS announced automatic recovery of EC2 instances. Does that mean that AWS got feature-parity with VMware High Availability, or that VMware got it right from the very start? No and No.

Automatic Instance Recover Is Not High Availability

Reading the AWS documentation (as opposed to the feature announcement) quickly reveals a caveat or two. The automatic recovery is performed if an instance becomes impaired because of an underlying hardware failure or a problem that requires AWS involvement to repair.