Worth Reading: Inside the big Supermicro deal
The post Worth Reading: Inside the big Supermicro deal appeared first on 'net work.
The post Worth Reading: Inside the big Supermicro deal appeared first on 'net work.
China represents a huge opportunity for chip designer ARM as it looks to extend its low-power system-on-a-chip (SoC) architecture beyond the mobile and embedded devices spaces and into new areas, such as the datacenter and emerging markets like autonomous vehicles, drones and the Internet of Things. China is a massive, fast-growing market with tech companies – including such giants as Baidu, Alibaba, and Tencent – looking to leverage such technologies as artificial intelligence to help expand their businesses deeper into the global market and turning to vendors like ARM that can help them fuel that growth.
ARM Holdings, which designs …
ARM Gains Stronger Foothold In China With AI And IoT was written by Jeffrey Burt at The Next Platform.
Watson can spot anomalies in the network.
Network slicing and mobile edge computing are in the works, too.
In the first post on DDoS, I considered some mechanisms to disperse an attack across multiple edges (I actually plan to return to this topic with further thoughts in a future post). The second post considered some of the ways you can scrub DDoS traffic. This post is going to complete the basic lineup of reacting to DDoS attacks by considering how to block an attack before it hits your network—upstream.
The key technology in play here is flowspec, a mechanism that can be used to carry packet level filter rules in BGP. The general idea is this—you send a set of specially formatted communities to your provider, who then automagically uses those communities to create filters at the inbound side of your link to the ‘net. There are two parts to the flowspec encoding, as outlined in RFC5575bis, the match rule and the action rule. The match rule is encoded as shown below—

There are a wide range of conditions you can match on. The source and destination addresses are pretty straight forward. For the IP protocol and port numbers, the operator sub-TLVs allow you to specify a set of conditions to match on, and whether to AND the Continue reading
Serving as Vice President of Solutions Marketing and Strategy for GENBAND, Sanjay Bhatia oversees the company’s product marketing organization and alignment of GENBAND’s go-to-market strategy across different market segments including NFV, Cloud, Enterprise Unified Communications, MSO, and Wireless. Bhatia is an accomplished telecommunications professional with over 28 years of wide-ranging global experience. Bhatia has held... Read more →