Intel claims sustainability for its custom chip that mines bitcoins faster than GPUs

Intel this week announced details of its new Blockscale ASIC chip designed specifically for more efficient blockchain computing than CPUs or GPUs. It first said it was making such a chip just two months ago.Blockscale is specifically designed to process the Secure Hash Algorithm-256 (SHA-256), which is used by blockchain, and the performance is phenomenal, at least on paper. Blockscale has a hash rate operating speed of up to 580GH/s, or gigahashes per second.To read this article in full, please click here

Intel claims sustainability for its custom chip that mines bitcoins faster than GPUs

Intel this week announced details of its new Blockscale ASIC chip designed specifically for more efficient blockchain computing than CPUs or GPUs. It first said it was making such a chip just two months ago.Blockscale is specifically designed to process the Secure Hash Algorithm-256 (SHA-256), which is used by blockchain, and the performance is phenomenal, at least on paper. Blockscale has a hash rate operating speed of up to 580GH/s, or gigahashes per second.To read this article in full, please click here

Intel claims sustainability for its custom chip that mines bitcoins faster than GPUs

Intel this week announced details of its new Blockscale ASIC chip designed specifically for more efficient blockchain computing than CPUs or GPUs. It first said it was making such a chip just two months ago.Blockscale is specifically designed to process the Secure Hash Algorithm-256 (SHA-256), which is used by blockchain, and the performance is phenomenal, at least on paper. Blockscale has a hash rate operating speed of up to 580GH/s, or gigahashes per second.To read this article in full, please click here

IGP vs BGP Explained – 3 Most important things to know!

IGP vs BGP is one of the topics every Network Engineer want to learn in their career. In this post, without going into each IGP protocol detail, where and why IGP or BGP is used and should be used will discuss. As usual, we will look at it from a design aspect and understand the reasons for the protocol selection.

IGP vs BGP comparison from a design perspective using a comparison chart

IGP vs BGP

Although I will not explain the above chart in this blog post in detail, I would like to share it for completeness. Also, please note that we compared BGP with each IGP protocol from a design point of view on the website in different blog posts already.

IGP vs. BGP – BGP is the most scalable routing protocol!

When igp vs BGP is compared, the first thing we should understand is that BGP is the most scalable routing protocol and it is used for the Global Internet.

Global Internet, as of 2022, carries almost a million IPv4 Unicast prefixes.

When we talk about IGP scaling, OSPF, IS-IS, or EIGRP, can carry couple of tens of thousand prefixes, and after that, we may start seeing meltdowns, even in well-designed Continue reading

OSPF LSA Types Explained 11 Types of LSA in OSPF!

OSPF LSA Types is the first topic you need to understand if you are trying to understand OSPF routing protocol. There are 11 different types of LSA in OSPF and we will look at each one of them, why do we have many different LSA in OSPF, we will discuss the topologies and the examples to make it more clear for everyone.

What is LSA in OSPF?

We should start asking the most fundamental question first about OSPF. What is LSA?. LSA stands for Link State Advertisement and it carries, prefix information, interface cost, if advanced technologies such as Traffic Engineering are enabled, can carry link color information, used bandwidth, available bandwidth, and so on.

When a router receives an LSA, it is stored in the Link State Database (LSDB) of OSPF. Once the LSDBs between the routers are synchronized, OSPF uses the SPF/Dijkstra algorithm to calculate the best path for each destination network.

OSPF LSAs are information about a route that is transported inside OSPF Link State Update (LSU) packets.

We can only have scalable, resilient, fast-converged OSPF design when we understand OSPF LSAs and Area types and their restrictions

OSPF LSA Types

Figure -11 Different LSA Types is OSPF v2

 

OSPF LSA Type Continue reading

VPC Endpoints – AWS

Who Should Read: If you are interested in VPC Endpoints or if you want to know more about AWS VPC services please continue.

I have been trying to understand endpoint services and thought I will write up a few posts on it, here are some posts I have written on medium(if you have access), I will port them to the blog by the weekend.

https://towardsaws.com/part-1-aws-advanced-networking-vpc-endpoint-and-types-of-endpoints-covers-exam-44e689d875b

https://towardsaws.com/part-2-setting-up-ipsec-vpn-to-explore-interface-end-points-3048080e5514

https://raaki-88.medium.com/part-3-interface-endpoints-testing-with-s3-and-workspaces-as-services-practically-bb685a6e2e9d

Again, these will be ported here as well along with an audio version.

-Rakesh

A practical guide to container networking

An important part of any Kubernetes cluster is the underlying containers. Containers are the workloads that your business relies on, what your customers engage with, and what shapes your networking infrastructure. Long story short, containers are arguably the soul of any containerized environment.

One of the most popular open-source container orchestration systems, Kubernetes, has a modular architecture. On its own, Kubernetes is a sophisticated orchestrator that helps you manage multiple projects in order to deliver highly available, scalable, and automated deployment solutions. But to do so, it relies on having a suite of underlying container orchestration tools.

This blog post focuses on containers and container networking. Throughout this post, you will find information on what a container is, how you can create one, what a namespace means, and what the mechanisms are that allow Kubernetes to limit resources for a container.

Containers

A container is an isolated environment used to run an application. By utilizing the power of cgroup, namespace, and filesystem from the Linux kernel, containers can be allocated with a limited amount of resources and filesystems inside isolated environments.

Note: Some applications deliver containers that use other technologies. In this post, I will focus on these Continue reading

5 VMware products need patching against serious security vulnerabilities

Virtualization and cloud vendor VMware this week disclosed eight vulnerabilities in five of its products, and urged users of Workspace ONE Access and all its products that include VMware Identity Manager components to patch immediately.Three of those vulnerabilities were rated critical on the CVSSv3 scale—two of them contain the possibility for remote code execution, while the third would allow a bad actor to bypass VMware’s user authentication systems to execute unauthorized operations.To read this article in full, please click here

5 VMware products need patching against serious security vulnerabilities

Virtualization and cloud vendor VMware this week disclosed eight vulnerabilities in five of its products, and urged users of Workspace ONE Access and all its products that include VMware Identity Manager components to patch immediately.Three of those vulnerabilities were rated critical on the CVSSv3 scale—two of them contain the possibility for remote code execution, while the third would allow a bad actor to bypass VMware’s user authentication systems to execute unauthorized operations.To read this article in full, please click here

New from Cisco: Workplace-safety service, branch office firewall

Cisco has taken the wraps off a new firewall and a technology package it says help enterprises better control hybrid workers' access to corporate resources and to enable a safer, more secure return to the office.On the firewall front, Cisco has rolled out a new security appliance: the 1RU, 17 Gbps throughput Secure Firewall 3100. It is the low end of the 3100 series and meant to lower the barrier to entry, better support small branches and boost VPN performance, Cisco stated. The Cisco Secure Series already included the 3120, 3130, and 3140 devices which support 23Gbps-45Gbps throughputs.To read this article in full, please click here

Device Management From The Ground Up: Part 7 – Resetting Device Passwords

In an ideal world, we would never need to know how to reset passwords on network devices. In my utopia, network documentation would be thorough, updated, and readily available. We do not live in the ideal world, however. It is almost inevitable you will encounter a device that you are unable to properly authenticate to. In this lesson, I cover the steps for accessing a device without a password.

The post Device Management From The Ground Up: Part 7 – Resetting Device Passwords appeared first on Packet Pushers.

New Routing Protocol to replace BGP

New routing protocol to replace BGP is one of the most common questions every good Network Engineer in their career at least a few times encounter. In this post, we will look at some of those thoughts and we will discuss aims to replace BGP were real or not.

LISP as a new routing protocol aims to replace BGP?

Locator and Identity Separation Protocol, RFC 6830, as an experimental RFC, was one of those technologies, many Network Engineers thought of as a replacement for BGP, especially over the Internet.

This was probably one of the biggest myths we have been discussing for years when we discuss Routing protocol to replace BGP, but first thing is, LSIP is not a Routing protocol!.

It is an IP in the IP Encapsulation mechanism, or in other words, a tunneling mechanism, which is mainly used to hide the Internal prefixes from the network core to avoid the control plane state. So, LISP helps for Routing protocol scalability but LISP was never aimed to replace BGP.

In fact, I discussed exactly this point in the below video with Dino Farinacci, who is the inventor of the LISP protocol. Dino runs, www.lispers.net, Continue reading

Handling Bursty Traffic in Real-Time Analytics Applications

Dhruba Borthakur Dhruba is CTO and co-founder of Rockset and is responsible for the company's technical direction. He was an engineer on the database team at Facebook, where he was the founding engineer of the RocksDB data store. Earlier at Yahoo, he was one of the founding engineers of the Hadoop Distributed File System. He was also a contributor to the open source Apache HBase project. Note: This post is the third in the series “can spike 10x during Black Friday. There are many other occasions where data traffic balloons suddenly. Halloween causes consumer social media apps to be inundated with photos. Major news events can set the markets afire with electronic trades. A meme can suddenly go viral among teenagers. In the old days of batch analytics, bursts of data traffic were easier to manage. Executives didn’t expect reports more than once a week nor dashboards to have up-to-the-minute data. Though some data Continue reading

Intel suspends all operations in Russia

Intel has become the latest technology firm to suspend its business operations in Russia. The announcement comes a month after the chipmaker announced that it would suspend all shipments to customers in Russia and Belarus.“Intel continues to join the global community in condemning Russia’s war against Ukraine and calling for a swift return to peace,” the company said in a statement.Intel says that it is working to support its 1,200 Russian-based employees and will continue to put business continuity measures in place to minimize disruption to its global operations.To read this article in full, please click here