This blog post was initially sent to the subscribers of my SDN and Network Automation mailing list. Subscribe here.
Saša Ratković (Apstra) published a must-read Intent-Based Networking Taxonomy which (not surprisingly) isn’t too far from what I had to say about the topic in a blog post and related webinar.
It’s also interesting to note that the first three levels of intent-based networking he described match closely what we’re discussing in Building Network Automation Solutions online course and what David Barroso described in Network Automation Use Cases webinar:
Read more ...When it comes to machine learning, a lot of the attention in the past six years has focused on the training of neural networks and how the GPU accelerator radically improved the accuracy of networks, thanks to its large memory bandwidth and parallel compute capacity relative to CPUs. …
Nvidia Takes On The Inference Hordes With Turing GPUs was written by Timothy Prickett Morgan at .
The data center giant will pursue business opportunities in NFV, IoT, and 5G services, according to the new CEO.
At the dawn of the mainframe era, Thomas Watson is said to have remarked that perhaps only five such systems would ever be sold in the world and that perhaps, just one machine would be needed to solve the most intractable problems. …
The Cloud is Where Quantum Competition Gets Real was written by Nicole Hemsoth at .
Here at Cumulus, we try to offer a lot of different tutorials for engineers to learn basic open networking commands and configurations, all the way up to advanced configurations (our how-to videos are a great example). But sometimes I find that there are some critical configurations where your desktop OS is a major player in how you configure. So for that reason, this blog post we will configure ONIE and Cumulus ZTP (Zero-Touch Provisioning) IPv4 DHCP Options on a Windows 2016 Server (this should also work with Windows 2012). I’ve broken this up into simple step-by-step instructions so it’s easy to follow.
The first thing we will do is create the options needed for Cumulus Linux.
1. To begin, right click on IPv4 and select “Set Predefined Options…”
2. Next, click the “Add” button:
Fill in the Option Type dialog box with the following:
Name: “default-url”
Data type: String
Code: “114”
Description: “Cumulus Binary Install”
Next, click “OK”
3. Clicking on the “OK” button will present you with the following dialog box that will require a String Value:
The “String Value” is the URL towards a binary image of Cumulus Linux.
4. Repeat “Step #2” in order to Continue reading
VMware’s Rajiv Ramaswami says the virtualization company wants to bring more cloud-native services into customers’ on-premises data centers.
Sprint CTO John Saw said the carrier’s rivals were “trying to make 5G lemonade out of the lemons that they have.” He was referring to Verizon and AT&T using millimeter wave spectrum for 5G.
Tune into our newest addition to our course library: Ubuntu Server (18.04): Installing and Managing openLDAP Directories, with Andrew Mallet to learn the basics of Ubuntu server.
OpenLDAP is a directory service that predates many proprietary systems and provides a universal authentication mechanism for client system to authenticate to and white pages system to search. In this course we will take you through the basics of openLDAP Leading to an install. From there you will learn how to develop your system further by adding and searching entries. Next we will move on to authentication to openLDAP from other Linux clients and services such as Apache HTTPD. Finally we will look at scaling out our system by including replication to add failover and fault-tolerance to the Directly.
Now that it is publicly traded the company intends to continue focusing on acquisitions like its recent purchase of SD-WAN provider Elfiq Networks.
When you think of a Distributed Denial of Service (DDoS) attack, you probably think about an attack which overflows the bandwidth available on a single link; or overflowing the number of half open TCP sessions a device can have open at once, preventing the device from accepting more sessions. In all cases, a DoS or DDoS attack will involve a lot of traffic being pushed at a single device, or across a single link.
But if you look at an entire system, there are a lot of places where resources are scarce, and hence are places where resources could be consumed in a way that prevents services from operating correctly. Such attacks would not need to be distributed, because they could take much less traffic than is traditionally required to deny a service. These kinds of attacks are called tail attacks, because they attack the long tail of resource pools, where these pools are much Continue reading