3D printing is a popular activity among wireless network engineers. Given that they deal with invisible, intangible radio waves all day, maybe it's no surprise they'd enjoy making things they can touch and feel. On today's Heavy Wireless we talk about why the wireless community enjoys 3D printing, and how engineers can make and use printed objects on the job--and at home.
The post Heavy Wireless 008: 3D Printing For Wireless Engineers appeared first on Packet Pushers.
Broadcom has come up with some interesting mechanisms to address the challenges of building an Ethernet-based fabric that supports AI workloads. These mechanisms, which include a scheduling framework, cells, and credits, are intended to minimize congestion, latency, and dropped frames or packets in the fabric. In this post I talk about what I learned at […]
The post A Look At Broadcom’s Jericho3-AI Ethernet Fabric: Schedules, Credits, And Cells appeared first on Packet Pushers.
Deploy real-time network dashboards using Docker compose, describes how to quickly deploy a real-time network analytics stack that includes the sFlow-RT analytics engine, Prometheus time series database, and Grafana to create dashboards. This article describes how to extend the example using the Grafana Network Weathermap Plugin to display network topologies like the ones shown here.
First, add a dashboard panel and select the Network Weathermap visualization. Next define the three metrics shown above. The ifinoctets and ifoutoctets need to be scaled by 8 to convert from bytes per second to bits per second. Creating a custom legend entry makes it easier to select metrics to associate metric instances with weathermap links. Add a color scale that will be used to color links by link utilization. Defining the scale first ensures that links will be displayed correctly when they are added later. Add the nodes to the canvas and drag them to their desired locations. There is a Continue reading

Like other under-resourced organizations, schools face cyber attacks from malicious actors that can impact their ability to safely perform their basic function: teach children. Schools face email, phishing, and ransomware attacks that slow access and threaten leaks of confidential student data. And these attacks have real effects. In a report issued at the end of 2022, the U.S. Government Accountability Office concluded that schools serving kindergarten through 12th grade (K-12) reported significant educational impact and monetary loss due to cybersecurity incidents, such as ransomware attacks. Recovery time can extend from 2 all the way up to 9 months — that’s almost an entire school year.
Cloudflare’s mission is to help build a better Internet, and we have always believed in helping protect those who might otherwise not have the resources to protect themselves from cyberattack.
It is against this backdrop that we’re very excited to introduce an initiative aimed at small K-12 public school districts: Project Cybersafe Schools. Announced as part of the Back to School Safely: K-12 Cybersecurity Summit at the White House on August 8, 2023, Project Cybersafe Schools will support eligible K-12 public school districts with a package of Zero Trust cybersecurity solutions — for Continue reading
I’m currently preparing for a network rollout and the preparation includes assigning subnets to the sites. There are subnets needed for management, wired users, wireless users, guests, and so on. Once subnets have been assigned, for some of the subnets, DHCP scopes need to be created. The team managing the server has requested that information on the subnets, gateway, and what IP the scope begins and ends with be provided as a CSV file. This will allow for easily importing the scopes into the server.
For my scenario, I have the information in a spreadsheet and I’m accessing the information using the openpyxl project. I am then using the ipaddress library to take the prefix from the spreadsheet and performing various calculations. Why use Python for this?
The goal is to create a line of CSV that looks like this:
VLAN 100 User,192.0.2.64,255.255.255.192,192.0.2.65,192.0.2.75,192.0.2.126,US0100 NY,example.com,
This line consists of:
Today on the Tech Bytes podcast we get into Digital Experience Monitoring (DEM). DEM goes beyond traditional SLAs by offering more precise measurements of network and application performance as experienced by end users, and can provide detailed measurements to help network engineers identify and respond to problems. We talk with sponsor Fortinet about how it delivers DEM.
The post Tech Bytes: Spotting Performance Problems Faster With Digital Experience Monitoring (Sponsored) appeared first on Packet Pushers.
Take a Network Break! This week we discuss new charges for IPv4 addresses being levied by AWS, Cisco's acquisition of a BGP monitoring service, and financial results for a host of tech companies. We also speak with J Metz, the Steering Committee Chair of the Ultra Ethernet Consortium to learn more about the organization's goals; and examine the efforts to investigate claims of a breakthrough in superconducting research.
The post Network Break 441: AWS Makes You Pay For IPv4; Superconductor Claims Meet Resistance; An Ultra Ethernet Q&A appeared first on Packet Pushers.
After a lengthy hiatus—prompted by a pandemic and the suspension of in-person events as a result—Spousetivities returns to VMware Explore! VMware Explore, the event formerly known as VMworld, is happening in Las Vegas, NV, and Spousetivities will be there offering organized activities for spouses, partners, significant others, family, or friends traveling with conference attendees. Registration is already open!
Thanks to the support of Veeam and Synterex, Crystal has organized a great set of activities happening during VMware Explore:
Sponsored Feature: Meeting organizational sustainability requirements depends on so much more than optimizing electricity consumption and reducing an enterprise’s carbon footprint. …
The post Paving an intentional road to a sustainable IT future first appeared on The Next Platform.
Paving an intentional road to a sustainable IT future was written by Martin Courtney at The Next Platform.
Private automation hub is the content system for Red Hat Ansible Automation Platform, hosting and serving up content to the platform in a scalable way with an enhanced security posture. The hosted content ranges from collections to container images, whether it's your own content, certified content from Red Hat or partner content from the extensive partner ecosystem, along with open source content from Ansible Galaxy.
Private automation hub is on its way to being the content management system for the Ansible Automation Platform and, with the most recent release, it has made some great steps to cementing itself as the de facto content system choice for Ansible Automation Platform.
Content can be pretty harmful if you cannot trust the source. Much like surfing the internet, we have become accustomed to knowing that if there is a “padlock” in the browser bar then we can consider the site safe. We also know that if we take content from the community, we do so at our own risk, but when you pay for a subscription that offers Red Hat Ansible Certified Content, you expect it to be safe. To drive this manner of safety and instill Continue reading