Is There a Future for Networking Engineers?

Someone sent me this observation after reading my You Cannot Have Public Cloud without Networking blog post:

As much as I sympathize with your view, scales matter. And if you make ATMs that deal with all the massive client population, the number of bank tellers needed will go down. A lot.

Based on what I read a while ago a really interesting thing happened in financial industry: while the number of tellers went down, number of front-end bank employees did not go down nearly as dramatically, they just turned into “consultants”.

Read more ...

Mergeable replicated data types – Part II

Mergeable replicated data types – part II Kaki et al., OOPLSA ’19

Last time out we saw how Mergeable Replicated Data Types (MRDTs) use a bijection between the natural domain of a data type and relational sets to define merge semantics between two concurrently modified versions given their lowest common ancestor (LCA). Today we’re picking things up in §4 of the paper, starting with how to derive a merge function for an arbitrary data type.

The basic approach so far has been to take the difference between each version and the LCA, and add those differences to the LCA state. But using an example of a pair data type holding pairs of integers, the authors show that what we’ve been doing so far isn’t quite good enough. We need to merge the pair state, and also the state of the first and second members of the pair.

The pair example demonstrates the need and opportunity to make merges compositional. The specification of such a composite merge function is invariably compositional in terms of the merge specifications of the types involved.

Given a merge function for counters, we can construct a merge function for a pair of counters. Given a Continue reading

SD-WAN Vendor GTT Ditches Its Infrastructure Division

The company picked Credit Suisse and Goldman Sachs to help offload non-strategic infrastructure...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Dell Posts Mixed Q3 Amid RSA Sale Rumors

Bloomberg reported earlier today that Dell Technologies is considering selling RSA Security for at...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Nvidia quietly unveils faster, lower power Tesla GPU accelerator

Nvidia was all over Supercomputing 19 last week, not surprisingly, and made a lot of news which we will get into later. But overlooked was perhaps the most interesting news of all: a new generation graphics-acceleration card that is faster and way more power efficient.Multiple attendees and news sites spotted it at the show, and Nvidia confirmed to me that this is indeed a new card. Nvidia’s “Volta” generation of Tesla GPU-accelerator cards has been out since 2017, so an upgrade was well overdue.[Get regularly scheduled insights by signing up for Network World newsletters.] The V100S comes only in PCI Express 3 form factor for now but is expected to eventually support Nvidia’s SXM2 interface. SXM is a dual-slot card design by Nvidia that requires no connection to the power supply, unlike the PCIe cards. SXM2 allows the GPU to communicate either with each other or to the CPU through Nvidia’s NVLink, a high-bandwidth, energy-efficient interconnect that can transfer data up to ten times faster than PCIe.To read this article in full, please click here

Nvidia quietly unveils faster, lower power Tesla GPU accelerator

Nvidia was all over Supercomputing 19 last week, not surprisingly, and made a lot of news which we will get into later. But overlooked was perhaps the most interesting news of all: a new generation graphics-acceleration card that is faster and way more power efficient.Multiple attendees and news sites spotted it at the show, and Nvidia confirmed to me that this is indeed a new card. Nvidia’s “Volta” generation of Tesla GPU-accelerator cards has been out since 2017, so an upgrade was well overdue.[Get regularly scheduled insights by signing up for Network World newsletters.] The V100S comes only in PCI Express 3 form factor for now but is expected to eventually support Nvidia’s SXM2 interface. SXM is a dual-slot card design by Nvidia that requires no connection to the power supply, unlike the PCIe cards. SXM2 allows the GPU to communicate either with each other or to the CPU through Nvidia’s NVLink, a high-bandwidth, energy-efficient interconnect that can transfer data up to ten times faster than PCIe.To read this article in full, please click here

Nutanix Q1 Wows Wall Street, CEO Warns Bloody Oceans Ahead

“It’s a very large market, and large markets are red oceans. Red oceans are whales and red...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Full Stack Journey 036: Starting Your IT Career With Kori Younger

Today's Full Stack Journey goes back to the beginning with an IT pro just getting started in her career. Kori Younger is a recent college graduate planning on a career in IT. She and Scott talk about how she's prepared for this career, college vs. certifications, the role of dinner-table conversations and their influence on career choice, diversity and inclusion, and more.

Full Stack Journey 036: Starting Your IT Career With Kori Younger

Today's Full Stack Journey goes back to the beginning with an IT pro just getting started in her career. Kori Younger is a recent college graduate planning on a career in IT. She and Scott talk about how she's prepared for this career, college vs. certifications, the role of dinner-table conversations and their influence on career choice, diversity and inclusion, and more.

The post Full Stack Journey 036: Starting Your IT Career With Kori Younger appeared first on Packet Pushers.

HPE Q4: Intelligent Edge, Hybrid IT Revenues Slump

CEO Antonio Neri cited deliberate action to realign HPE’s portfolio along with macroeconomic...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Nokia Kills COO Role Amid Struggles

Current COO Joerg Erlemeier will leave the company after a 25-year run on Jan. 1. His functions...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Palo Alto Acquires Aporeto for $150M, Posts Mixed Q1

The acquisition will enable customers to secure their applications at scale. Meanwhile, weak Q2...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Displaying dates and times your way in Linux

The date command on Linux systems is very straightforward. You type “date” and the date and time are displayed in a useful way. It includes the day-of-the-week, calendar date, time and time zone:$ date Tue 26 Nov 2019 11:45:11 AM EST As long as your system is configured properly, you’ll see the date and current time along with your time zone.[Get regularly scheduled insights by signing up for Network World newsletters.] The command, however, also offers a lot of options to display date and time information differently. For example, if you want to display dates in the most useful format for sorting, you might want to use a command like this:To read this article in full, please click here

Displaying dates and times your way

The date command on Linux systems is very straightforward. You type “date” and the date and time are displayed in a useful way. It includes the day-of-the-week, calendar date, time and time zone:$ date Tue 26 Nov 2019 11:45:11 AM EST As long as your system is configured properly, you’ll see the date and current time along with your time zone.[Get regularly scheduled insights by signing up for Network World newsletters.] The command, however, also offers a lot of options to display date and time information differently. For example, if you want to display dates in the most useful format for sorting, you might want to use a command like this:To read this article in full, please click here

What Is a Man in the Middle (MITM) Attack?

Simply put, MITM is an attack in which a third party gains access to the communications between two other parties, without either of those parties realising it. The third party might read the contents of the communication, or in some cases also manipulate it. So, for example, if Gerald sends Leila a message, intending it to be private, and Max intercepts the message, reads it, and passes it on to Leila, that would be a MITM attack. If Gerald wants to transfer £100 to Leila’s bank account, and Max intercepts the transaction and replaces Leila’s account number with his own, that would also be a MITM attack (in this case, Max is putting himself ‘in the middle’ between Gerald and his bank).

Why should I care?

Partly because MITM attacks can undermine so much of our modern way of life. In a connected life, we depend on the reliability and security of every connection. It’s not just about your conversations, messages and emails, either. If you can’t trust the connections you make to websites and online services, you may be vulnerable to fraud or impersonation, and if your connected devices and objects can’t communicate securely and reliably, they may put Continue reading

Guest blog on network automation at THG Tech

Hello my friend,

I’m very proud of working for THG as we are developing really outstanding technical solutions with a high level of automation. If you run massive-scale networks (like we do in the data centre field), the automation is a single option to survive.

These days many people speak about network automation, but what is it in a nutshell? What role does it play? What are the customer expectations to the network and IT business related to the network automation.

Some answers to these questions and many more useful and interesting information you can find in my guest blog in THG Tech blog

Follow me there as well, if you like the post.

Support us





P.S.

If you have further questions or you need help with your networks, I’m happy to assist you, just send me message. Also don’t forget to share the article on your social media, if you like it.

BR,

Anton Karneliuk