US blocks sale of some Nvidia and AMD AI chips to China

The US government has banned AMD and Nvidia from exporting chips used to support artificial intelligence work to China.The ban affects Nvidia’s A100 chips, often deployed in data centers to speed up the training of machine learning models, and its forthcoming H100 chip, while AMD has also received new license requirements that will stop its MI250 advanced AI chip from being exported to China.In a filing with the SEC, Nvidia said: “The US government has imposed a new license requirement, effective immediately, for any future export to China (including Hong Kong) and Russia of the Company’s A100 and forthcoming H100 integrated circuit.”To read this article in full, please click here

US government blocks sale of some Nvidia and AMD AI chips to China

The US government has banned AMD and Nvidia from exporting chips used to support artificial intelligence work to China.The ban affects Nvidia’s A100 chips, often deployed in data centers to speed up the training of machine learning models, and its forthcoming H100 chip, while AMD has also received new license requirements that will stop its MI250 advanced AI chip from being exported to China.In a filing with the SEC, Nvidia said: “The US government has imposed a new license requirement, effective immediately, for any future export to China (including Hong Kong) and Russia of the Company’s A100 and forthcoming H100 integrated circuit.”To read this article in full, please click here

Service Mesh & Ingress In Kubernetes: Lesson 1 – Service Mesh and Ingress Architecture – Video

This is the first video in a new series that explores service mesh and ingress in Kubernetes. This video provides a basic overview of ingress and service mesh, how they work, and the roles they play in a Kubernetes cluster. Michael Levan brings his background in system administration, software development, and DevOps to this video […]

The post Service Mesh & Ingress In Kubernetes: Lesson 1 – Service Mesh and Ingress Architecture – Video appeared first on Packet Pushers.

Router Interfaces and Switch Ports

When I started implementing the netlab VLAN module, I encountered (at least) three different ways of configuring physical interfaces and bridging domains even though the underlying packet forwarding operations (and sometimes even the forwarding hardware) are the same. That confusopoly is guaranteed to make your head spin for years, and the only way to figure out what’s going on behind the scenes is to go back to the fundamentals.

Router Interfaces and Switch Ports

When I started implementing the netlab VLAN module, I encountered (at least) three different ways of configuring physical interfaces and bridging domains even though the underlying packet forwarding operations (and sometimes even the forwarding hardware) are the same. That confusopoly is guaranteed to make your head spin for years, and the only way to figure out what’s going on behind the scenes is to go back to the fundamentals.

VMware Aria: If You Can’t Beat Public Cloud, Maybe You Can Manage It

VMware  announced an ambitious project, VMware Aria, at VMware Explore 2022. Aria offers multi-cloud management for enterprises that use services in more than one public cloud. The speed and sprawl of cloud adoption has become a problem for enterprises. Companies are having a hard time containing costs, monitoring performance, and enforcing security and compliance policies. […]

The post VMware Aria: If You Can’t Beat Public Cloud, Maybe You Can Manage It appeared first on Packet Pushers.

Meta’s Velox Means Database Performance Is Not Subject To Interpretation

A decade and a half ago, when Dennard scaling ran out of gas and many of us were starting to first think about what the end of Moore’s Law might look like should that day ever come, a bunch of us were kicking around what it might mean.

Meta’s Velox Means Database Performance Is Not Subject To Interpretation was written by Timothy Prickett Morgan at The Next Platform.

DoH, DoT and plain old DNS

We’d like to understand the extent to which encrypted DNS technologies have been taken up in the public Internet. To this end, we've been able to analyse the query data from a large open recursive resolver system to provide some insights as to how much use is being made of DNS over HTTPS and DNS over TLS.

DDoS Sonification

Sonification presents data as sounds instead of visual charts. One of the best known examples of sonification is the representation of radiation level as a click rate in a Geiger counter. This article describes ddos-sonify, an experiment to see if sound can be usefully employed to represent information about Distributed Denial of Service (DDoS) attacks. The DDoS attacks and BGP Flowspec responses testbed was used to create the video demonstration at the top of this page in which a series of simulated DDoS attacks are detected and mitigated. Play the video to hear the results.

The software uses the Tone.js library to control Web Audio sound generation functionality in a web browser.

var voices = {};
var loop;
var loopInterval = '4n';
$('#sonify').click(function() {
if($(this).prop("checked")) {
voices.synth = new Tone.PolySynth(Tone.Synth).toDestination();
voices.metal = new Tone.PolySynth(Tone.MetalSynth).toDestination();
voices.pluck = new Tone.PolySynth(Tone.PluckSynth).toDestination();
voices.membrane = new Tone.PolySynth(Tone.MembraneSynth).toDestination();
voices.am = new Tone.PolySynth(Tone.AMSynth).toDestination();
voices.fm = new Tone.PolySynth(Tone.FMSynth).toDestination();
voices.duo = new Tone.PolySynth(Tone.DuoSynth).toDestination();
Tone.Transport.bpm.value=80;
loop = new Tone.Loop((now) => {
sonify(now);
},loopInterval).start(0);
Continue reading

Palo Alto Networks bulks-up its SASE portfolio

Palo Alto Networks is reinforcing the security and operational features of its Prisma secure-access service edge (SASE) package.New features include the ability to adjust security settings for multiple software-as-a-service-based apps, new security capabilities, and AIOPs support. In addition the company is expanding its family of Ion SD-WAN security devices to provide additional configuration options. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Palo Alto Networks bulks-up its SASE portfolio

Palo Alto Networks is reinforcing the security and operational features of its Prisma secure-access service edge (SASE) package.New features include the ability to adjust security settings for multiple software-as-a-service-based apps, new security capabilities, and AIOPs support. In addition the company is expanding its family of Ion SD-WAN security devices to provide additional configuration options. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Palo Alto Networks bulks-up its SASE portfolio

Palo Alto Networks is reinforcing the security and operational features of its Prisma secure-access service edge (SASE) package.New features include the ability to adjust security settings for multiple software-as-a-service-based apps, new security capabilities, and AIOPs support. In addition the company is expanding its family of Ion SD-WAN security devices to provide additional configuration options. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Palo Alto Networks bulks-up its SASE portfolio

Palo Alto Networks is reinforcing the security and operational features of its Prisma secure-access service edge (SASE) package.New features include the ability to adjust security settings for multiple software-as-a-service-based apps, new security capabilities, and AIOPs support. In addition the company is expanding its family of Ion SD-WAN security devices to provide additional configuration options. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Day Two Cloud 161: Tech Marketing Sucks; Let’s Make It Better

Tech marketing is often terrible. The problem is that marketers tend to develop material aimed at "C-level" or executive audiences, which doesn't resonate with developers and engineers who influence buying decisions and actually use products. Today's Day Two Cloud podcast examines how to improve tech marketing, and why communication is a good skill for technologists themselves.

Cloudflare’s abuse policies & approach

Cloudflare's abuse policies & approach
Cloudflare's abuse policies & approach

Cloudflare launched nearly twelve years ago. We’ve grown to operate a network that spans more than 275 cities in over 100 countries. We have millions of customers: from small businesses and individual developers to approximately 30 percent of the Fortune 500. Today, more than 20 percent of the web relies directly on Cloudflare’s services.

Over the time since we launched, our set of services has become much more complicated. With that complexity we have developed policies around how we handle abuse of different Cloudflare features. Just as a broad platform like Google has different abuse policies for search, Gmail, YouTube, and Blogger, Cloudflare has developed different abuse policies as we have introduced new products.

We published our updated approach to abuse last year at:

https://www.cloudflare.com/trust-hub/abuse-approach/

However, as questions have arisen, we thought it made sense to describe those policies in more detail here.  

The policies we built reflect ideas and recommendations from human rights experts, activists, academics, and regulators. Our guiding principles require abuse policies to be specific to the service being used. This is to ensure that any actions we take both reflect the ability to address the harm and minimize unintended consequences. We believe that Continue reading

Cloud networking certs: Which is right for you?

For network professionals looking to advance their career, cloud certifications can lead to more employment opportunities at higher salaries. In fact, the most in-demand certification across all of IT for 2022 is the entry level AWS Certified Cloud Practitioner, according to the latest report from recruiting firm Robert Half.A credential can be exceptionally beneficial because it allows holders to demonstrate that they understand complex network designs and are able to help their organizations achieve business objectives in the cloud, says Ruby Nahal, cloud architect at Mission Cloud Services, a managed services provider.To read this article in full, please click here

Cloud networking certs: Which is right for you?

For network professionals looking to advance their career, cloud certifications can lead to more employment opportunities at higher salaries. In fact, the most in-demand certification across all of IT for 2022 is the entry level AWS Certified Cloud Practitioner, according to the latest report from recruiting firm Robert Half.A credential can be exceptionally beneficial because it allows holders to demonstrate that they understand complex network designs and are able to help their organizations achieve business objectives in the cloud, says Ruby Nahal, cloud architect at Mission Cloud Services, a managed services provider.To read this article in full, please click here

Cloud networking certifications: Which one is right for you?

For network professionals looking to advance their career, cloud certifications can lead to more employment opportunities at higher salaries. In fact, the most in-demand certification across all of IT for 2022 is the entry level AWS Certified Cloud Practitioner, according to the latest report from recruiting firm Robert Half.A credential can be exceptionally beneficial because it allows holders to demonstrate that they understand complex network designs and are able to help their organizations achieve business objectives in the cloud, says Ruby Nahal, cloud architect at Mission Cloud Services, a managed services provider.To read this article in full, please click here

VMware CEO highlights tech upgrades, skims over looming Broadcom buy

VMware CEO Raghu Raghuram kicked off the company’s flagship user conference in San Francisco, noting the event’s new name and its return to an in-person venue after two years of being held virtually due to the pandemic. What used to be called VMworld is now VMware Explore in a switch that acknowledges how the audience has changed over the years.“When we started VMworld, it was a community for data center professionals. But over the years we have broadened,” Raghuram said. Now it’s a community for application developers, platform engineering teams, cloud operations teams, and security teams, he said. “It's about all of these roles… not only in the data center, but across clouds. It is truly a multi-cloud community.”To read this article in full, please click here