Archive

Category Archives for "Networking"

Lessons Learned – Nick Russo – Leadership

There’s always something to learn from other people’s stories so we’re making it a point to spend time talking about past experiences and lessons learned. In this first foray into this format, Nick Russo joins us to talk about a formative leadership experience that happened early in his career and changed his perspective on what leadership and failure looked like.

Nick Russo
Guest
Jordan Martin
Host

The post Lessons Learned – Nick Russo – Leadership appeared first on Network Collective.

Intel’s new 10nm Agilex FPGA will help customers develop IoT, 5G solutions

Intel announced this week it has begun shipping its 10nm Agilex FPGAs to early-access customers, including Microsoft, featuring the Compute Express Link (CXL), a cache and memory coherent CPUs-to-anything interconnect that has an industry consortium of more than 60 members. The company first announced the chips in April.The Agilex FPGA is the product of the Altera group, which Intel bought in 2015 for $16.7 billion. It sold FPGAs under the Stratix brand name, but this line is the first to come out under Intel ownership. CXL replaces OmniPath Connect, a fabric Intel developed but no one else supported. The company ended support for OmniPath earlier this month in favor of CXL, which has wide industry support.To read this article in full, please click here

Intel’s new 10nm Agilex FPGA will help customers develop IoT, 5G solutions

Intel announced this week it has begun shipping its 10nm Agilex FPGAs to early-access customers, including Microsoft, featuring the Compute Express Link (CXL), a cache and memory coherent CPUs-to-anything interconnect that has an industry consortium of more than 60 members. The company first announced the chips in April.The Agilex FPGA is the product of the Altera group, which Intel bought in 2015 for $16.7 billion. It sold FPGAs under the Stratix brand name, but this line is the first to come out under Intel ownership. CXL replaces OmniPath Connect, a fabric Intel developed but no one else supported. The company ended support for OmniPath earlier this month in favor of CXL, which has wide industry support.To read this article in full, please click here

Bluetooth finds a role in the industrial internet of things

Like most people, I think of Bluetooth as a useful but consumer-oriented technology that lets me make easy wireless connections from my smartphone to various headsets, portable speakers, automobile, and other devices. And, of course, billions of people rely on Bluetooth for exactly those capabilities. But according to Chuck Sabin, senior director of market development for the Bluetooth SIG, the technology is growing into a key role in the industrial internet of things (IIoT).To read this article in full, please click here

Announcing the General Availability of API Tokens

Announcing the General Availability of API Tokens

APIs at Cloudflare

Announcing the General Availability of API Tokens

Today we are announcing the general availability of API Tokens - a scalable and more secure way to interact with the Cloudflare API. As part of making a better internet, Cloudflare strives to simplify manageability of a customer’s presence at the edge. Part of the way we do this is by ensuring that all of our products and services are configurable by API. Customers ranging from partners to enterprises to developers want to automate management of Cloudflare. Sometimes that is done via our API directly, and other times it is done via open source software we help maintain like our Terraform provider or Cloudflare-Go library. It is critical that customers who are automating management of Cloudflare can keep their Cloudflare services as secure as possible.

Least Privilege and Why it Matters

Securing software systems is hard. Limiting what a piece of software can do is a good defense to prevent mistakes or malicious actions from having greater impact than they could. The principle of least privilege helps guide how much access a given system should have to perform actions. Originally formulated by Jerome Saltzer, “Every program and every privileged user of the system should operate using Continue reading

Video: Introducing Transmission Technologies

After discussing the challenges one encounters even in the simplest networking scenario connecting two computers with a cable we took a short diversion into an interesting complication: what if the two computers are far apart and we can’t pull a cable between them?

Trying to answer that question we entered the wondrous world of transmission technologies. It’s a topic one can spent a whole life exploring and mastering, so we were not able to do more than cover the fundamentals of modulations and multiplexing technologies.

You need free ipSpace.net subscription to watch the video, or a paid ipSpace.net subscriptions to watch the rest of the webinar.

IBM, Orange Top UK’s SDN Market, Says ISG Report

IBM and Orange Business Services top the list of U.K. SDN vendors, according to an ISG report that...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Rating IoT devices to gauge their impact on your network

One difficulty designing IoT implementations is the large number of moving parts. Most IoT setups are built out of components from many different manufacturers – one company’s sensors here, another’s there, someone else handling the networking and someone else again making the backend.To help you get a ballpark sense of what any given implementation will demand from your network, we’ve come up with a basic taxonomy for rating IoT endpoints. It’s got three main axes: delay tolerance, data throughput and processing power. Here is an explainer for each. (Terminology note: We’ll use “IoT setup” or “IoT implementation” to refer to the entirety of the IoT infrastructure being used by a given organization.)To read this article in full, please click here

Quest Levels Up, Announces Foglight Evolve Platform

Quest Software unveiled Foglight Evolve, which features three new product lines: Foglight Evolve...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Data center-specific AI completes tasks twice as fast

Data centers running artificial intelligence (AI) will be significantly more efficient than those operating with hand-edited algorithm schedules, say experts at MIT. The researchers there say they have developed an automated scheduler that speeds cluster jobs by up to 20 or 30 percent, and even faster (2x) in peak periods.The school’s AI job scheduler works on a type of AI called “reinforcement learning” (RL). That’s a trial-and-error-based machine-learning method that modifies scheduling decisions depending on actual workloads in a specific cluster. AI, when done right, could supersede the current state-of-the-art method, which is algorithms. They often must be fine-tuned by humans, introducing inefficiency.To read this article in full, please click here

Data center-specific AI completes tasks twice as fast

Data centers running artificial intelligence (AI) will be significantly more efficient than those operating with hand-edited algorithm schedules, say experts at MIT. The researchers there say they have developed an automated scheduler that speeds cluster jobs by up to 20 or 30 percent, and even faster (2x) in peak periods.The school’s AI job scheduler works on a type of AI called “reinforcement learning” (RL). That’s a trial-and-error-based machine-learning method that modifies scheduling decisions depending on actual workloads in a specific cluster. AI, when done right, could supersede the current state-of-the-art method, which is algorithms. They often must be fine-tuned by humans, introducing inefficiency.To read this article in full, please click here

CNCF Project Journey Proves Kubernetes Is Everywhere

Google and Red Hat remain the two largest single contributing companies to Kubernetes, but VMware...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Nutanix CEO Dheeraj Pandey: ‘We Don’t Sell Vaporware’

CEO Dheeraj Pandey said Nutanix signed 58 deals worth more than $1 million during Q4 of fiscal...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

T-Mobile US Taps the Brakes on 5G Amid Merger Delays

T-Mobile US is adjusting its 5G deployment plans and has informed some contractors that purchases...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

OnX Adds Cisco SD-WAN to Its Managed Service Portfolio

Toronto-based cloud services provider OnX Canada is now offering Cisco's SD-WAN as a managed...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Celebrating Linux’s 28 years

Linux just turned 28 years old. From its modest beginnings as an interesting project to the OS that now empowers all 500 of the top 500 supercomputers, along with a huge variety of tiny embedded devices, its place in today's computing world is unparalleled.I was still working with SunOS at the time that Linux was announced — a couple years before it evolved into the System V based Solaris. The full ramifications of what it would mean to be "open source" weren't clear at the time. I was in love with Unix, and this clearly related newborn was of some interest, but not enough to draw me away from the servers I was managing and articles I was writing in those days.To read this article in full, please click here

Impostor Syndrome and Loser DNA

Most of you are probably already familiar with impostor syndrome. Wikipedia defines it as:

Despite external evidence of their competence, those experiencing this phenomenon remain convinced that they are frauds, and do not deserve all they have achieved. Individuals with impostorism incorrectly attribute their success to luck, or as a result of deceiving others into thinking they are more intelligent than they perceive themselves to be.

Basically, it’s the feeling that you don’t really know how things work and one day you’ll get caught, your lies will be exposed, and the world will come crashing down.

Let me let you in on a secret, all people has likely felt as an impostor at times. Even the people you look up to the most. Lately, there has been a lot of tweets and blog posts on impostor syndrome, and that is great. Raising awareness is the first step. However, not many people are saying what to do about it or how to prevent you from developing a “loser DNA”. What is loser DNA?

My Friend Nick Russo wrote about it after listening to Gary Vaynerchuck. Loser DNA is when you compare yourself to others that are, at least according to you, a lot more advanced Continue reading