One of my readers sent me a question along these lines:
How do we determine the number of spines needed in a leaf-and-spine fabric? It’s easy to calculate the number of leaf nodes from the required number of server ports, and two spines give you the redundancy. Does it make sense to have more spines if two are good enough from the capacity perspective?
There are at least two factors to consider:
One of my readers sent me a question along these lines:
How do we determine the number of spines needed in a leaf-and-spine fabric? It’s easy to calculate the number of leaf nodes from the required number of server ports, and two spines give you the redundancy. Does it make sense to have more spines if two are good enough from the capacity perspective?
There are at least two factors to consider:
GPU computing platform maker Nvidia announced its financial results for its fiscal fourth quarter ended in January, which showed the same digestion of already acquired capacity by the hyperscalers and cloud builders and the same hesitation to spend by enterprises that other compute engine makers for datacenter computing are also seeing. …
Nvidia To Build DGX Complexes In Clouds To Better Capitalize On Generative AI was written by Timothy Prickett Morgan at The Next Platform.
The increasing cost of goods and services is making everyone a little crazy, and corporate IT departments are not immune from the effects of the dual concerns of rising inflation and the desire by central banks to use interest rates to curb our economic enthusiasm and slow that inflation to a much more sane level. …
Inflation Up, Economy Jittery, And IT Spending Consequentially Slows was written by Timothy Prickett Morgan at The Next Platform.
For last week’s show, we had Christopher Wood on to talk about oDoH. This week, Chris joins us again to talk about Multiplexed Application Substrate over QUIC Encryption, or masque, which is a more generalized privacy proxy. You can find more about masque at the IETF WG page.
With the release of ChatGPT as a product, Microsoft brought Machine Learning (ML) and Artificial Intelligence (AI) back into focus for millions of users—including network operators, coders, and other folks in information technology. People are once against asking if this technology will make them redundant or how it might change their day-to-day jobs. As always, […]
The post Chatbot Attack Vectors And Failure Modes In Networking And IT appeared first on Packet Pushers.

This is a guest article by NK. You can view the original article Consistent hashing explained on systemdesign.one website.
At a high level, consistent hashing performs the following operations:
This video looks at the fundamentals of Data Processing Units (DPUs) and what they can do with an eye toward helping network engineers and infrastructure professionals. Greg Ferro from the Packet Pushers and Joseph White, a Fellow at Dell Technologies, discuss how DPUs are different from GPUs and CPUs; using DPUs to offload workloads from […]
The post Understanding DPUs For Network Engineers – Packet Pushers Livestream With Dell Technologies – Video appeared first on Packet Pushers.
WebAssembly (Wasm) is an up-and-coming technology that's probably going to fall into the lap of operations folks. WebAssembly is basically a specification on how to compile things to a bytecode format and how to execute that bytecode. On today's Day Two Cloud we start to peel the onion on what WebAssembly, what it's used for, and why you might want to get your hands on it.
The post Day Two Cloud 183: How Did We Get To WebAssembly And What Is It For? appeared first on Packet Pushers.