Roundup of server vendors selling new Xeon processors

It’s only two years late, but the fourth generation of Xeon Scalable processors, aka Sapphire Rapids, is hitting the ground running, with every major OEM offering new servers featuring the chips.The 4th Gen Xeon Scalable is notable because it contains a number of specialty computing engines in addition to its x86 cores, and it also has lots of cores as well; up to 60. One of the special engines is for AI acceleration, as Intel is determined to make the CPU viable as an AI processor instead of GPUs. So not surprisingly, many of the new servers are built with AI processing in mind.To read this article in full, please click here

IBM boosts Power CPU core count…for Oracle

Last month, IBM quietly quietly announced it's planning to release a 24-core Power 10 processor specifically for the benefit of an Oracle database, and Oracle doesn’t know why.An announcement dated Dec. 13 called "a statement of general direction" detailed IBM’s plans around the Power S1014 server. The S1014 server is a single-socket, 4U rack mounted server with 16 NVMe SSDs and a maximum memory capacity of 64GB. The document said in part:"IBM intends to announce a high-density 24-core processor for the IBM Power S1014 system (MTM 9105-41B) to address application environments utilizing an Oracle Database with the Standard Edition 2 (SE2) licensing model. It intends to combine a robust compute throughput with the superior reliability and availability features of the IBM Power platform while complying with Oracle Database SE2 licensing guidelines."To read this article in full, please click here

IBM boosts Power CPU core count…for Oracle

Last month, IBM quietly quietly announced it's planning to release a 24-core Power 10 processor specifically for the benefit of an Oracle database, and Oracle doesn’t know why.An announcement dated Dec. 13 called "a statement of general direction" detailed IBM’s plans around the Power S1014 server. The S1014 server is a single-socket, 4U rack mounted server with 16 NVMe SSDs and a maximum memory capacity of 64GB. The document said in part:"IBM intends to announce a high-density 24-core processor for the IBM Power S1014 system (MTM 9105-41B) to address application environments utilizing an Oracle Database with the Standard Edition 2 (SE2) licensing model. It intends to combine a robust compute throughput with the superior reliability and availability features of the IBM Power platform while complying with Oracle Database SE2 licensing guidelines."To read this article in full, please click here

Commands and settings for managing user accounts on Linux

If you’re administering a Linux server, chances are you have a lot of user accounts to manage and, along with these, a lot of files and settings to control. Here are some commands and issues that are important in setting up and managing user accounts and access rights.Dealing with IDs First, in managing user accounts, you need to be aware of both user IDs (UID) and group IDs (GID). Most accounts are set up with each user being the sole member of a group that has the same name as the user’s account. In fact, both are set up when an account is created using the useradd command. When you list a user’s home directory, you should see something like this:To read this article in full, please click here

Commands and settings for managing user accounts on Linux

If you’re administering a Linux server, chances are you have a lot of user accounts to manage and, along with these, a lot of files and settings to control. Here are some commands and issues that are important in setting up and managing user accounts and access rights.Dealing with IDs First, in managing user accounts, you need to be aware of both user IDs (UID) and group IDs (GID). Most accounts are set up with each user being the sole member of a group that has the same name as the user’s account. In fact, both are set up when an account is created using the useradd command. When you list a user’s home directory, you should see something like this:To read this article in full, please click here

Commands and setting for managing user accounts on Linux

If you’re administering a Linux server, chances are you have a lot of user accounts to manage and, along with these, a lot of files and settings to control. Here are some commands and issues that are important in setting up and managing user accounts and access rights.Dealing with IDs First, in managing user accounts, you need to be aware of both user IDs (UID) and group IDs (GID). Most accounts are set up with each user being the sole member of a group that has the same name as the user’s account. In fact, both are set up when an account is created using the useradd command. When you list a user’s home directory, you should see something like this:To read this article in full, please click here

Commands and setting for managing user accounts on Linux

If you’re administering a Linux server, chances are you have a lot of user accounts to manage and, along with these, a lot of files and settings to control. Here are some commands and issues that are important in setting up and managing user accounts and access rights.Dealing with IDs First, in managing user accounts, you need to be aware of both user IDs (UID) and group IDs (GID). Most accounts are set up with each user being the sole member of a group that has the same name as the user’s account. In fact, both are set up when an account is created using the useradd command. When you list a user’s home directory, you should see something like this:To read this article in full, please click here

Kubernetes Security And Networking 1: Why Security Matters And Course Overview

This course looks at securing Kubernetes, with an emphasis, though not exclusively, on network security. Topics we’ll cover in the series include: Role-based access control Securing control planes and worker nodes API security and policy management Dealing with vulnerabilities Security capabilities of a service mesh Security-enabled Container Network Interfaces (CNIs) Securing the ingress controller Scanning […]

The post Kubernetes Security And Networking 1: Why Security Matters And Course Overview appeared first on Packet Pushers.

AAP 2.3 Introducing Remote Execution Mesh Nodes for Openshift

phil blog 1

Last year Ansible Automation Platform (AAP) 2 introduced major changes around the mechanics on how automation is run. The main focus was to enhance the foundational pieces of the platform while providing flexibility and simplicity for automators to automate at enterprise scale. One of those foundational pieces introduced was automation mesh

Automation mesh provides a simple, flexible and reliable way to scale automation of large inventories across diverse network topologies, platforms and teams. It was important to evolve how the platform was developed, managed, operated to meet business demands and needs, for the large majority of customers.

 

Pre 2.3 Automation Mesh in OCP

Prior to AAP 2.3, the automation mesh was mostly a VM deployment base option and feature. I’ve tried to highlight the main differences between platform choices in this diagram:

We are now starting to level up the feature parity, and this brings remote mesh execution nodes to non-VM supported deployments. Before we look more at the new feature, let’s look at the options that were available before:

For VM based deployments, the automation mesh introduced horizontal scaling, the ability to scale your automation needs out, whether locally or globally. We did this by Continue reading

Full Stack Journey 074: Going The Distance – What Running Can Teach Us About Careers

On today's Full Stack Podcast, Scott is joined by Krithika Chandramouli, a software engineer at Meta, to discuss how the lessons she learned while preparing to run her first-ever half-marathon also apply to careers. They dive into the relationship between consistency and one's progress toward a goal, and how understanding the "why" behind a goal can help motivate you.

Full Stack Journey 074: Going The Distance – What Running Can Teach Us About Careers

On today's Full Stack Podcast, Scott is joined by Krithika Chandramouli, a software engineer at Meta, to discuss how the lessons she learned while preparing to run her first-ever half-marathon also apply to careers. They dive into the relationship between consistency and one's progress toward a goal, and how understanding the "why" behind a goal can help motivate you.

The post Full Stack Journey 074: Going The Distance – What Running Can Teach Us About Careers appeared first on Packet Pushers.

Adding Stuff to Netbox with Pynetbox

As a warning to everyone, I am not a developer. I am a network engineer who is trying to do some automation stuff. Some of what I’m doing sounds logical to me, but I would not trust my own opinions for production work. I’m sure you can find a Slack channel or Mastodon instance with people who can tell you how to do things properly.

I think there’s a theme in the last few posts. I can’t quite put my finger on it, though. 🙂 We’ve talked about querying Netbox, but it’s pretty useless without data actually in it. Let’s look at how to get stuff in there using pynetbox.

Here’s the environment I’m running. All this code is in my Github repo.

Python         :  3.9.10 
Pynetbox       :  7.0.0  
Netbox version :  3.4.2  (Docker)

Adding sites is pretty logical first step in a new Netbox install. They don’t have any required fields that have to be created first, so let’s start there. I’ve got a YAML file called sites.yml that contains the site data I want to import. Here’s what that looks like.

### sites.yml
- name: NYC
  description: New York  Continue reading

Adding Stuff to Netbox with Pynetbox

As a warning to everyone, I am not a developer. I am a network engineer who is trying to do some automation stuff. Some of what I’m doing sounds logical to me, but I would not trust my own opinions for production work. I’m sure you can find a Slack channel or Mastodon instance with people who can tell you how to do things properly.

I think there’s a theme in the last few posts. I can’t quite put my finger on it, though. 🙂 We’ve talked about querying Netbox, but it’s pretty useless without data actually in it. Let’s look at how to get stuff in there using pynetbox.

Here’s the environment I’m running. All this code is in my Github repo.

Python         :  3.9.10 
Pynetbox       :  7.0.0  
Netbox version :  3.4.2  (Docker)

Adding sites is pretty logical first step in a new Netbox install. They don’t have any required fields that have to be created first, so let’s start there. I’ve got a YAML file called sites.yml that contains the site data I want to import. Here’s what that looks like.

### sites.yml
- name: NYC
  description: New York City
   Continue reading

BrandPost: Top 6 Networking Predictions for 2023

By David Hughes, Chief Product and Technology Officer, at Aruba, a Hewlett Packard Enterprise company.As we enter 2023, the events of the last couple of years have left their mark with staffing shortages, inflationary pressures, supply chain disruption, and geo-political unrest. These dynamics have accelerated or even forced business transition and, in some cases, caused a rethinking of fundamental business models. The network now plays an even stronger role, powering the transformation journey that’s needed to thrive during uncertainty and preparing organizations for what comes next in 2023. (You can also register for the webinar where we'll cover these topics more in depth.)To read this article in full, please click here

Three new winners of Project Jengo, and more defeats for the patent troll

Three new winners of Project Jengo, and more defeats for the patent troll
Three new winners of Project Jengo, and more defeats for the patent troll

Project Jengo is a Cloudflare effort to fight back against patent trolls by flipping the incentive structure that has encouraged the growth of patent trolls who extract settlements out of companies using frivolous lawsuits. We do this by asking the public to identify prior art that can invalidate any of the patents that a troll holds – not just the ones that are asserted against Cloudflare.

Since we launched Project Jengo over five years ago, we’ve given out over $135,000 to individuals who helped us find prior art to invalidate patents owned by patent trolls. By invalidating those patents – many of which are so blatantly marginal or broad that they never should have been granted in the first place – we hope to decrease the amount of harassment and frivolous lawsuits that patent trolls bring against innovative technology companies.

Today, we’re excited to announce three new Project Jengo winners. These individuals have helped us push forward our effort to take down patent trolls, and continue to fight trolling in favor of innovation.

The patent troll

The current case involves a patent troll called Sable Networks who asserted four patents that generally describe a flow-based router or a mechanism Continue reading