Microsoft’s first cloud region in Italy launched in Lombardy

Microsoft is launching its first cloud region in Italy, the company said on Monday.The new region, which will have three data centers, will be located in Lombardy — an administrative area in Northern Italy whose capital is Milan.Enterprises will be able to start using the new region using Microsoft Azure or Microsoft 365 in the coming weeks, the company said, adding that other services such as Dynamics 365 and Power Platform are expected to follow soon.To read this article in full, please click here

Microsoft’s first cloud region in Italy launched in Lombardy

Microsoft is launching its first cloud region in Italy, the company said on Monday.The new region, which will have three data centers, will be located in Lombardy — an administrative area in Northern Italy whose capital is Milan.Enterprises will be able to start using the new region using Microsoft Azure or Microsoft 365 in the coming weeks, the company said, adding that other services such as Dynamics 365 and Power Platform are expected to follow soon.To read this article in full, please click here

Waiting for things to happen on Linux

There are always things to wait for on a Linux system—upgrades to complete, processes to finish, coworkers to log in and help resolve problems, status reports to be ready.Fortunately, you don’t have to sit twiddling your thumbs. Instead, you can get Linux to do the waiting and let you know when the work is done. You can do this with a script or you can use the wait command, a bash built-in that watches for processes running in the background to complete.Crafting waiting within scripts There are many ways to craft waiting within a script. Here’s a simple example of simply waiting for a period of time before moving on to the next task:To read this article in full, please click here

Waiting for things to happen on Linux

There are always things to wait for on a Linux system—upgrades to complete, processes to finish, coworkers to log in and help resolve problems, status reports to be ready.Fortunately, you don’t have to sit twiddling your thumbs. Instead, you can get Linux to do the waiting and let you know when the work is done. You can do this with a script or you can use the wait command, a bash built-in that watches for processes running in the background to complete.Crafting waiting within scripts There are many ways to craft waiting within a script. Here’s a simple example of simply waiting for a period of time before moving on to the next task:To read this article in full, please click here

How to wait for things to happen on Linux

There are always things to wait for on a Linux system – for upgrades to complete, for a process to finish, for coworkers to log in and help resolve a problem, or for a status report to be ready. Fortunately, you don’t have to sit twiddling your thumbs. Instead, you can get Linux to do the waiting and let you know when the work is done. You can do this by crafting the waiting and the condition for which you are waiting in a script, or you can use the wait command – a bash builtin that will watch for a process running in the background to complete.Crafting waiting within scripts There are many ways to craft waiting within a script. Here's a simple example of simply waiting for a period of time before moving on to the next task:To read this article in full, please click here

Network Break 433: NVIDIA Melds Switches, DPUs For AI Networking Fabric; FTC Says Amazon Ring Employee Spied On Female Customers

This week's Network Break discusses a new Google offering to interconnect public clouds, NVIDIA's platform for AI networking fabrics using Ethernet switches and DPUs, and Cisco's latest security acquisition. We also cover Riverbed getting a new private equity owner, Amazon paying a pittance to the FTC to settle allegations of customer privacy violations, and more tech news.

Network Break 433: NVIDIA Melds Switches, DPUs For AI Networking Fabric; FTC Says Amazon Ring Employee Spied On Female Customers

This week's Network Break discusses a new Google offering to interconnect public clouds, NVIDIA's platform for AI networking fabrics using Ethernet switches and DPUs, and Cisco's latest security acquisition. We also cover Riverbed getting a new private equity owner, Amazon paying a pittance to the FTC to settle allegations of customer privacy violations, and more tech news.

The post Network Break 433: NVIDIA Melds Switches, DPUs For AI Networking Fabric; FTC Says Amazon Ring Employee Spied On Female Customers appeared first on Packet Pushers.

What’s new in Calico v3.26

We are excited to announce the release of Calico v3.26! This latest milestone brings a range of enhancements and new features to the Calico ecosystem, delivering an optimized and secure networking solution. This release has a strong emphasis on product performance, with strengthened security measures, expanded compatibility with Windows Server 2022 and OpenStack Yoga, and notable improvements to the Calico eBPF dataplane.

As always, let’s begin by thanking our awesome community members who helped us in this release.

Community shoutout

Big thanks to our GitHub users afshin-deriv, blue-troy, and winstonu for their valuable contributions in enhancing the Kind installation and VXLAN documentation, as well as improving the code comments.

Additionally, we would like to extend our appreciation to laibe and yankay for their efforts in updating the flannel version and improving the IPtables detection mechanism. Their contributions have been instrumental in improving the overall functionality and reliability of our project.

Finally, a huge thank-you to dilyevsky, detailyang, mayurjadhavibm, and olljanat for going above and beyond in pushing Calico beyond its original scope and for generously sharing their solutions with the rest of the community.

Community-driven enhancement request: Fine-grained BGP route control

The primary responsibility Continue reading

Tech Bytes: Building The Branch Of The Future With Palo Alto Networks SD-WAN And SASE (Sponsored)

Today on the Tech Bytes podcast we explore the branch of the future with sponsor Palo Alto Networks. We talk about how SD-WAN and SASE come together with Digital Experience Management (DEM) to meet the challenges of security, cloud, and hybrid work at the branch.

The post Tech Bytes: Building The Branch Of The Future With Palo Alto Networks SD-WAN And SASE (Sponsored) appeared first on Packet Pushers.

EU countries reject plan for big tech companies to fund 5G rollout

Telecom ministers from at least 18 EU countries have rejected a proposal by network operators to have major technology companies fund the rollout of 5G and broadband.The proposal, put forward by telecom lobbying groups GSMA and ETNO, which represent 160 operators across Europe, says that big tech companies that account for more than 5% of a provider’s peak average internet traffic should help foot the bill for rolling out the services across Europe.The EU launched a consultation on the issue in February 2022. According to a report by Reuters, telecom ministers met with EU Commissioner Thierry Breton to raise their objections, with those who are against the proposal saying there is a lack of analysis to prove the measure would actually work, with some citing concerns that tech companies would end up passing these costs onto the consumer.To read this article in full, please click here

Nine years of Project Galileo and how the last year has changed it

Nine years of Project Galileo and how the last year has changed it
Nine years of Project Galileo and how the last year has changed it

If you follow Cloudflare, you know that Birthday Week is a big deal. We’ve taken a similar approach to Project Galileo since its founding in 2014. For the anniversary, we typically give an overview of what we have learned to protect the most vulnerable in the last year and announce new product features, partnerships, and how we’ve been able to expand the project.

When our Cloudflare Impact team was preparing for the anniversary, we noticed a theme. Many of the projects we worked on throughout the year involved Project Galileo. From access to new products, development of privacy-enhancing technologies, collaborations with civil society and governments, we saw that the project played a role in either facilitating conversation with the right people or bridging gaps.

After reflecting on the last year, we’ve seen a project that was initially intended to keep journalism and media sites online grew into more. So, for this year, in addition to new announcements, we want to take the time to reflect on how we have seen Project Galileo transform and how we look toward the future in protecting the most vulnerable on the Internet.

Project Galileo +

The original goal of Project Galileo was simple. Although Continue reading

How IT pros might learn to believe in AI-driven network-management

IT organizations that apply artificial intelligence and machine learning (AI/ML) technology to network management are finding that AI/ML can make mistakes, but most organizations believe that AI-driven network management will improve their network operations.To realize these benefits, network managers must find a way to trust these AI solutions despite their foibles. Explainable AI tools could hold the key.A survey finds network engineers are skeptical. In an Enterprise Management Associates (EMA) survey of 250 IT professionals who use AI/ML technology for network management, 96% said those solutions have produced false or mistaken insights and recommendations. Nearly 65% described these mistakes as somewhat to very rare, according to the recent EMA report “AI-Driven Networks: Leveling Up Network Management.” Overall, 44% percent of respondents said they have strong trust in their AI-driven network-management tools, and another 42% slightly trust these tools.To read this article in full, please click here

Default EBGP Policy (RFC 8212)

One of the most common causes of Internet routing leaks is an undereducated end-customer configuring EBGP sessions with two (or more) upstream ISPs.

Without basic-level BGP knowledge or further guidance from the service providers, the customer network engineer1 might start a BGP routing process and configure two EBGP sessions, similar to the following industry-standard CLI2 configuration:

Default EBGP Policy (RFC 8212)

One of the most common causes of Internet routing leaks is an undereducated end-customer configuring EBGP sessions with two (or more) upstream ISPs.

Without basic-level BGP knowledge or further guidance from the service providers, the customer network engineer1 might start a BGP routing process and configure two EBGP sessions, similar to the following industry-standard CLI2 configuration: