Hiding Behind MASQUEs

Privacy was a difficult topic for Internet protocols at the outset of the Internet. Things took a very different turn some 10 years ago following the disclosures of mass surveillence programs in the US, when the IETF declared that pervasive monitoring of users consititued at attack and Internet protocols needed to take measures to contain the way in which data was accessed in the network. The latest offerings in the area of improved privacy include Oblivious HTTP and MASQUE. Lets look at these approaches and the way that they attempt to contain the potential leakage of data.

Arista embraces routing

Arista Networks has taken its first direct step into WAN routing with new software, hardware and services, an enterprise-class system designed to link critical resources with core data-center and campus networks.The package, called the Arista WAN Routing System ties together three new components—enterprise-class routing hardware, software for its CloudVision management platform called Pathfinder, and the ability to set up neutral peering points called Transit Hubs. This trio enables setting up carrier-neutral and cloud-adjacent facilities to provide self-healing and path-optimization links across core, aggregation, and cloud networking interconnects, according to Doug Gourlay, vice president and general manager of Arista’s Cloud Networking Software group in a blog about the new package.To read this article in full, please click here

Arista embraces SD-WAN

Arista Networks has taken its first direct step into WAN routing with new software, hardware and services, an enterprise-class system designed to link critical resources with core data-center and campus networks.The package, called the Arista WAN Routing System ties together three new components—enterprise-class routing hardware, software for its CloudVision management platform called Pathfinder, and the ability to set up neutral peering points called Transit Hubs. This trio enables setting up carrier-neutral and cloud-adjacent facilities to provide self-healing and path-optimization links across core, aggregation, and cloud networking interconnects, according to Doug Gourlay, vice president and general manager of Arista’s Cloud Networking Software group in a blog about the new package.To read this article in full, please click here

Oracle ties up with Nvidia to offer AI supercomputing service

Oracle is partnering with Nvidia to offer a new AI supercomputing service, dubbed DGX Cloud and available immediately, using Oracle Cloud Infrastructure's Supercluster.“OCI has excellent performance. They have a two-tier computing fabric and management network," Nvidia CEO Jensen Huang said during his keynote at the company’s annual GTC conference on Tuesday.Nvidia is working with other cloud providers to provide similar services, but Oracle is its first partner to go live with an offering. "Nvidia's CX7 along with Oracle’s non-blocking remote direct access memory (RDMA) forms the computing fabric," Huang said. "And Bluefield 3 will be the infrastructure processor for the management network. The combination is a state-of-the-art DGX AI supercomputer that can be offered as a multitenant cloud service.”To read this article in full, please click here

Oracle ties up with Nvidia to offer AI supercomputing service

Oracle is partnering with Nvidia to offer a new AI supercomputing service, dubbed DGX Cloud and available immediately, using Oracle Cloud Infrastructure's Supercluster.“OCI has excellent performance. They have a two-tier computing fabric and management network," Nvidia CEO Jensen Huang said during his keynote at the company’s annual GTC conference on Tuesday.Nvidia is working with other cloud providers to provide similar services, but Oracle is its first partner to go live with an offering. "Nvidia's CX7 along with Oracle’s non-blocking remote direct access memory (RDMA) forms the computing fabric," Huang said. "And Bluefield 3 will be the infrastructure processor for the management network. The combination is a state-of-the-art DGX AI supercomputer that can be offered as a multitenant cloud service.”To read this article in full, please click here

Counting and modifying lines, words and characters in Linux text files

Linux includes some useful commands for counting when it comes to text files. This post examines some of the options for counting lines and words and making changes that might help you see what you want.Counting lines Counting lines in a file is very easy with the wc command. Use a command like that shown below, and you'll get a quick response.$ wc -l myfile 132 myfile What the wc command is actually counting is the number of newline characters in a file. So, if you had a single-line file with no newline character at the end, it would tell you the file has 0 lines,The wc -l command can also count the lines in any text that is piped to it. In the example below, wc -l is counting the number of files and directories in the current directory.To read this article in full, please click here

Counting and modifying lines, words and characters in Linux text files

Linux includes some useful commands for counting when it comes to text files. This post examines some of the options for counting lines and words and making changes that might help you see what you want.Counting lines Counting lines in a file is very easy with the wc command. Use a command like that shown below, and you'll get a quick response.$ wc -l myfile 132 myfile What the wc command is actually counting is the number of newline characters in a file. So, if you had a single-line file with no newline character at the end, it would tell you the file has 0 lines,The wc -l command can also count the lines in any text that is piped to it. In the example below, wc -l is counting the number of files and directories in the current directory.To read this article in full, please click here

Build Your K8s Environment For The Real World Part 1 – Day Zero Ops

When you’re designing a Kubernetes environment, whether it’s small or large, there are a few things that you must think about prior to writing the code to deploy the cluster or implementing the GitOps Controller for all of your Continuous Delivery needs. First, you must plan. Planning is the most important phase. In blog one […]

The post Build Your K8s Environment For The Real World Part 1 – Day Zero Ops appeared first on Packet Pushers.

BrandPost: Wi-Fi Location-based Services: How Did We Get Here?

By: Dorothy Stanley, Fellow and Head, Wireless Standards Strategy, Aruba, a Hewlett Packard Enterprise company.Wi-Fi systems are so ubiquitous indoors that location-based services are a natural extension. Retail analytics, indoor navigation, and high-value asset tracking (such as medical devices in health care) are a just a few of the use cases that organizations are deploying using Wi-Fi location-based services to improve business outcomes. In this post, I’ll delve into the evolution of Wi-Fi location-based services and give you a preview of where the standards are taking us and how your organization can take advantage of them.To read this article in full, please click here