Archive

Category Archives for "Networking"

Video: End-to-End Latency Is Not Zero

After the “shocking” revelation that a network can never be totally reliable, I addressed another widespread lack of common sense: due to laws of physics, the client-server latency is never zero (and never even close to what a developer gets from the laptop’s loopback interface).

You need Free ipSpace.net Subscription to watch the video, and the Standard ipSpace.net Subscription to register for upcoming live sessions.

NS1 Builds on DNS to Speed Traffic Management

When user experience is increasingly synonymous with speed and reliability, new traffic management sub-teams are appearing at elite digital enterprises. In this episode of The New Stack Makers podcast, we talk to NS1, the networking automation company or, as he calls it, “the system of record for many, many of the key domains and the applications on the internet today.” Subscribe: Fireside.fm | Stitcher | Overcast | TuneIn He says that each of us interacts with NS1 dozens of times a day, like when we are connecting on LinkedIn or sharing files on DropBox. NS1 sits at the base of this new traffic management stack, steering that traffic across our increasingly complex and distributed systems. This stack also includes content networking delivery networks (CDN), load-balancing tooling, edge networking footprints, service meshes, and software for service discovery and egress optimization. This new role isn’t just about measuring if traffic is working correctly, but really understanding both your users and systems Continue reading

Networking with a Purpose Using Technology

Technology is here to stay, and it is only natural that technology has started to play a role in networking. Social media, cell phones, texting, and even sites such as YouTube all can help you use technology in networking with a purpose.

Here are some ways you can engage in networking with a purpose using technology.

Use Those Social Media Sites to Sustain Your Relationship with Contacts

One of the most difficult things to do is to try and maintain the relationships with the contacts you have made through networking efforts. Texting and social media make it easier to maintain those relationships and to check in with those in your network semi-regularly. Even if the contact is just a brief message asking about their family or about their interests, your contacts will notice your sincere interest in them.

Technology Can Keep Your Informed Regarding a Contact’s Need That You May Fill

When networking with a purpose, the first thing you should do is to find out what your contact needs and try and fill that need without asking anything in return. It doesn’t have to be all about business, you might be able to recommend a dentist to a client Continue reading

Daily Roundup: Huawei Security Concern Ignites RSA Panel

Huawei security concerns ignited RSA panel discussion; Airline exec dished advice to security...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Sprint Expands Its VeloCloud SD-WAN Global Reach

The expansion more than doubles the reach of the U.S.-based carrier's SD-WAN service compared to a...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Sanjay Poonen Talks VMware’s Multi-Billion-Dollar Security Strategy

“We see a tremendous opportunity to create a multi-billion-dollar security company,” Poonen...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Nutanix Hammered by Coronavirus-Tainted Outlook

The vendor actually posted stronger-than-expected earnings for its latest fiscal quarter, but its...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Akamai: The Financial Sector Is Seeing More APIs-Based Attacks

Cyberattackers are now increasingly targeting APIs, especially in the financial sector, according to content delivery network Akamai’s between 15% and 30% of all web traffic. The Cambridge, Massachusetts-based company hAndy Ellis neatly summarized the resultsemail to VentureBeat, Akamai explained some of the advantages of automation: criminals “use bots and tools that allow threading, or multiple simultaneous connections, to attempt multiple logins at once.” And by targeting APIs, “they hope to avoid some front-end defenses and speed up their validation times.” A recent Franck V. on 

Microsoft’s Ann Johnson: Security Needs AI With Human Spirit

“We need to combine AI with that human apathy,” she said during an RSA keynote. “We need both...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Gen X Performance Tuning

Gen X Performance Tuning
Gen X Performance Tuning

We are using AMD 2nd Gen EPYC 7642 for our tenth generation “Gen X” servers. We found many aspects of this processor compelling such as its increase in performance due to its frequency bump and cache-to-core ratio. We have partnered with AMD to get the best performance out of this processor and today, we are highlighting our tuning efforts that led to an additional 6% performance.

Gen X Performance Tuning

Thermal Design Power & Dynamic Power

Thermal design power (TDP) and dynamic power, amongst others, play a critical role when tuning a system. Many share a common belief that thermal design power is the maximum or average power drawn by the processor. The 48-core AMD EPYC 7642 has a TDP rating of 225W which is just as high as the 64-core AMD EPYC 7742. It comes to mind that fewer cores should translate into lower power consumption, so why is the AMD EPYC 7642 expected to draw just as much power as the AMD EPYC 7742?

Gen X Performance Tuning
TDP Comparison between the EPYC 7642, EPYC 7742 and top-end EPYC 7H12

Let’s take a step back and understand that TDP does not always mean the maximum or average power that the processor will draw. At a glance, Continue reading

Upcoming Events and Webinars (March 2020)

Starting with a short message to anyone interested in our on-site events in Switzerland: on March 10th we’re running our first 2020 workshop, focusing on Docker and containers.

I totally reworked the material, adding tons of new Docker networking examples (including deep dive into iptables) and a few fun things like building an Ansible container, or starting the whole NetBox stack with a single command. Even if you don’t plan to deploy containers in your production network, you might drop by just for that part.

And now for the upcoming webinars:

Read more ...

Upcoming Events and Webinars (March 2020)

Starting with a short message to anyone interested in our on-site events in Switzerland: on March 10th we’re running our first 2020 workshop, focusing on Docker and containers.

I totally reworked the material, adding tons of new Docker networking examples (including deep dive into iptables) and a few fun things like building an Ansible container, or starting the whole NetBox stack with a single command. Even if you don’t plan to deploy containers in your production network, you might drop by just for that part.

And now for the upcoming webinars:

Fiery Debate Ensues Over Huawei Supply Chain Risk

A discussion with panelists from the U.S. Department of Defense, Huawei, a conservative think tank,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Google Pledges $10B Investment in Data Centers, Offices This Year

While substantial, the investment pledge is down from the $13 billion Google invested in the space...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Genomics and Privacy Collide at RSA Conference

Informed consent of genetic data is critical, but people aren’t always clear about what they are...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

TIP Launches Radio, Takes on Open Routing, Fields Tech

The Facebook-backed consortium announced a string of new initiatives including the launch of its...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Daily Roundup: Cisco SD-WAN Targets FedRAMP

Cisco SD-WAN targeted FedRAMP; Verizon warned of mobile security risks; and the Russians are coming...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco security warnings include firewall holes, Nexus software weaknesses

Cisco has issued another batch of security warnings that include problems in its Firepower firewall (FXOS),  Unified Computing System (UCS) software and Nexus switch operating system (NX-OS) .Network pros react to new Cisco certification curriculum The firewall and UCS vulnerabilities all have a severity level of “high” on the Common Vulnerability Scoring System and include:To read this article in full, please click here

Airline Exec Dishes Advice to Security Vendors at RSA

Southwest Airlines’ Carrie Mills says CISOs want less agents, fewer point products, and more...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.