Enterprises that want to kick the tires on the open-source network operating system SONiC got a new option this week as Aviz Networks and a group of well-established industry vendors and organizations said they would collaborate on a new testing facility.The lab, the Open Networking Experience (ONE) Center for SONiC is being offered by SONiC startup Aviz and will be supported by collaboration with the Linux Foundation, The Open Compute Project, Celestica, Cisco, Edgecore, Nvidia, Ragile, Supermicro, Wistron, and Keysight.The center will feature online and in-person access at no cost for network operators to try out the capabilities of SONiC across a wide range of hardware, according to Aviz. To read this article in full, please click here
Enterprises that want to kick the tires on the open-source network operating system SONiC got a new option this week as Aviz Networks and a group of well-established industry vendors and organizations said they would collaborate on a new testing facility.The lab, the Open Networking Experience (ONE) Center for SONiC is being offered by SONiC startup Aviz and will be supported by collaboration with the Linux Foundation, The Open Compute Project, Celestica, Cisco, Edgecore, Nvidia, Ragile, Supermicro, Wistron, and Keysight.The center will feature online and in-person access at no cost for network operators to try out the capabilities of SONiC across a wide range of hardware, according to Aviz. To read this article in full, please click here
Once again it has been awhile. But I wanted to get some new content out. This year I was elected as a member of the board for WAA. Part of my time on the board will include writing articles for our membership. From the second I heard this I knew what I wanted to do. …
Today's Day Two Cloud delves into cloud security and cloud cost optimization for SaaS and public clouds. Our guest is Jo Peterson. On the security front, we compare and contrast traditional on-prem and cloud security challenges, explore the shared responsibility model of cloud security, and more. For cost optimization we discuss the growing concern about cloud costs, why optimization tools still need humans, tips for tracking multicloud spending, and more.
Today's Day Two Cloud delves into cloud security and cloud cost optimization for SaaS and public clouds. Our guest is Jo Peterson. On the security front, we compare and contrast traditional on-prem and cloud security challenges, explore the shared responsibility model of cloud security, and more. For cost optimization we discuss the growing concern about cloud costs, why optimization tools still need humans, tips for tracking multicloud spending, and more.
Amid growing threats from bad actors, geopolitics, and climate change, Zayo Group announces a new submarine cable route between New York and Manchester.
“Life is Good” has this great shirt I have a few of – “WTF: Where’s the Fish?” It is actually a question I get asked a lot. Where did I go? Where are my blogs? Where are my YouTubes? Where... Read More ›
When shopping for DDR4 memory modules, we typically look at the memory density and memory speed. For example a 32GB DDR4-2666 memory module has 32GB of memory density, and the data rate transfer speed is 2666 mega transfers per second (MT/s).
If we take a closer look at the selection of DDR4 memories, we will then notice that there are several other parameters to choose from. One of them is rank x organization, for example 1Rx8, 2Rx4, 2Rx8 and so on. What are these and does memory module rank and organization have an effect on DDR4 module performance?
In this blog, we will study the concepts of memory rank and organization, and how memory rank and organization affect the memory bandwidth performance by reviewing some benchmarking test results.
Memory rank
Memory rank is a term that is used to describe how many sets of DRAM chips, or devices, exist on a memory module. A set of DDR4 DRAM chips is always 64-bit wide, or 72-bit wide if ECC is supported. Within a memory rank, all chips share the address, command and control signals.
The concept of memory rank is very similar to memory bank. Memory rank is a term used Continue reading
While I was developing Network Automation Concepts webinar and the network automation online course, I wrote numerous blog posts on the Network Infrastructure as Code (NIaC) concepts, challenges, implementation details, tools, and sample solutions.
While I was developing Network Automation Concepts webinar and the network automation online course, I wrote numerous blog posts on the Network Infrastructure as Code (NIaC) concepts, challenges, implementation details, tools, and sample solutions.
In 1998 any lingering doubts about the ultimate success of the Internet as a global communications medium had been thoroughly dispelled. The Internet was no longer just a research experiment, or an intermediate way stop on the road to adoption of the Open Systems Interconnect (OSI) framework. There was nothing else left standing in the data communications landscape that could serve our emerging needs for data communications. IP was now the communications technology for the day, if not for the coming century. No longer could the traditional telecommunications enterprises view the Internet with some polite amusement or even overt derision. The Internet had arrived.
Cisco’s Talos security intelligence group issued a warning today about an uptick in highly sophisticated attacks on network infrastructure including routers and firewalls.The Cisco warning piggybacks a similar joint warning issued today from The UK National Cyber Security Centre (NCSC), the US National Security Agency (NSA), US Cybersecurity and Infrastructure Security Agency (CISA) and US Federal Bureau of Investigation (FBI) that noted an uptick in threats in part utilizing an exploit that first came to light in 2017. That exploit targeted an SNMP vulnerability in Cisco routers that the vendor patched in 2017. To read this article in full, please click here
Cisco’s Talos security intelligence group issued a warning today about an uptick in highly sophisticated attacks on network infrastructure including routers and firewalls.The Cisco warning piggybacks a similar joint warning issued today from The UK National Cyber Security Centre (NCSC), the US National Security Agency (NSA), US Cybersecurity and Infrastructure Security Agency (CISA) and US Federal Bureau of Investigation (FBI) that noted an uptick in threats in part utilizing an exploit that first came to light in 2017. That exploit targeted an SNMP vulnerability in Cisco routers that the vendor patched in 2017. To read this article in full, please click here
On today's Full Stack Journey podcast, Scott Lowe talks with Alexandria Leary who left a career as a financial advisor to break into cybersecurity. Alexandria and Scott discuss the reasons why she changed careers, and provide some information and resources useful for others who are seeking to find a career in cybersecurity.
On today's Full Stack Journey podcast, Scott Lowe talks with Alexandria Leary who left a career as a financial advisor to break into cybersecurity. Alexandria and Scott discuss the reasons why she changed careers, and provide some information and resources useful for others who are seeking to find a career in cybersecurity.