Best Tips on Networking for Artists

Networking is a vital part of success in any career, but for artists it can be especially tough. They don’t have the same opportunities to meet new people and build up networks as someone who works at an office. So in this article we will discuss how artists can improve their networking game and reach their full potential for success.

Art gallery events are a great opportunity to meet people and learn about new artists, especially the upcoming ones. Follow your favorite galleries on Instagram or Twitter to find out when they hold their openings and make sure you attend as many of them as possible.

Learn About Your Fellow Artists 

Networking is more than just meeting people; it’s learning how to work with other creative too. Find out which local art communities exist in your area so that you can be a part of those groups and become friends with fellow artists who share similar interests. 

Show Encouragement for the Work of Other Artists 

Artists tend to be very critical of their own work, but you should try not to be. When someone asks for your opinion on their artwork always remember that Continue reading

IPng Networks – Colocation

Introduction

As with most companies, it started with an opportunity. I got my hands on a location which has a raised floor at 60m2 and a significant power connection of 3x200A, and a metro fiber connection at 10Gbps. I asked my buddy Luuk ‘what would it take to turn this into a colo?’ and the rest is history. Thanks to Daedalean AG who benefit from this infrastructure as well, making this first small colocation site was not only interesting, but also very rewarding.

The colocation business is murder in Zurich - there are several very large datacenters (Equinix, NTT, Colozüri, Interxion) all directly in or around the city, and I’m known to dwell in most of these. The networking and service provider industry is quite small and well organized into Network Operator Groups, so I work under the assumption that everybody knows everybody. I definitely like to pitch in and share what I have built, both the physical bits but also the narrative.

This article describes the small serverroom I built at a partner’s premises in Zurich Albisrieden. The colo is open for business, that is to say: Please feel free to reach out if you’re interested.

Continue reading

Backup for databases: Get familiar with the type you use

In order to back up a database, you need to know how it’s delivered, but you also need to know which of the more than 13 types of database designs it employs. Here we’ll cover four of them—relational, key-value, document, and wide column—that generate a lot of backup questions.Understanding these models will help the backup team create a relationship and trust level with the database admins, and that will help both parties.[Get regularly scheduled insights by signing up for Network World newsletters.] Four database types Relational A relational-database management system (RDBMS) is a series of tables with a defined schema, or layout, with records in rows of one or more attributes, or values.  There are relationships between the tables, which is why it is called a relational database, and why backups generally have to back up and restore everything. Examples of RDMBSs include Oracle, SQL Server, DB2, MySQL, and PostgreSQLTo read this article in full, please click here

Database backup: Get familiar with the database type being used

In order to back up a database, you need to know how it’s delivered, but you also need to know which of the more than 13 types of database designs it employs. Here we’ll cover four of them—relational, key-value, document, and wide column—that generate a lot of backup questions.Understanding these models will help the backup team create a relationship and trust level with the database admins, and that will help both parties.[Get regularly scheduled insights by signing up for Network World newsletters.] Four database types Relational A relational-database management system (RDBMS) is a series of tables with a defined schema, or layout, with records in rows of one or more attributes, or values.  There are relationships between the tables, which is why it is called a relational database, and why backups generally have to back up and restore everything. Examples of RDMBSs include Oracle, SQL Server, DB2, MySQL, and PostgreSQLTo read this article in full, please click here

Intel announces new roadmaps for Xeon CPUs, Xe GPUs

At this year's Intel's investors' day meeting with Wall Street analysts, CEO Pat Gelsinger revealed new road maps for Xeon CPUs and Xe GPUs that you would typically expect to see reveals at an IDF show that stretches through 2024.Most notable about the Xeon news is that for the first time, Intel is bifurcating the processor line into two microarchitecture types. The two types are a continuation of the current design, and a whole new architecture based on the Alder Lake hybrid architecture currently used in client CPUs.[Get regularly scheduled insights by signing up for Network World newsletters.] Adler Lake uses a different core design than traditional Intel CPUs have used. Up to now, Intel cores have all been the same, identical. But Adler Lake uses two types of cores; the performance core used to do the computing, and the efficient core, used to do small background tests that don’t require a high-performance core. This is hardly an original design; Arm has been doing for years.To read this article in full, please click here

Intel announces new roadmaps for Xeon CPUs, Xe GPUs

At this year's Intel's investors' day meeting with Wall Street analysts, CEO Pat Gelsinger revealed new road maps for Xeon CPUs and Xe GPUs that you would typically expect to see reveals at an IDF show that stretches through 2024.Most notable about the Xeon news is that for the first time, Intel is bifurcating the processor line into two microarchitecture types. The two types are a continuation of the current design, and a whole new architecture based on the Alder Lake hybrid architecture currently used in client CPUs.[Get regularly scheduled insights by signing up for Network World newsletters.] Adler Lake uses a different core design than traditional Intel CPUs have used. Up to now, Intel cores have all been the same, identical. But Adler Lake uses two types of cores; the performance core used to do the computing, and the efficient core, used to do small background tests that don’t require a high-performance core. This is hardly an original design; Arm has been doing for years.To read this article in full, please click here

Database backup: You need to get familiar with the database type being used

In order to back up a database, you need to know how it’s delivered, but you also need to know which of the more than 13 types of database designs it employs. Here we’ll cover four of them—relational, key-value, document, and wide column—that generate a lot of backup questions.Understanding these models will help the backup team create a relationship and trust level with the database admins, and that will help both parties.[Get regularly scheduled insights by signing up for Network World newsletters.] Four database types Relational A relational-database management system (RDBMS) is a series of tables with a defined schema, or layout, with records in rows of one or more attributes, or values.  There are relationships between the tables, which is why it is called a relational database, and why backups generally have to back up and restore everything. Examples of RDMBSs include Oracle, SQL Server, DB2, MySQL, and PostgreSQLTo read this article in full, please click here

Using pipes on Linux to get a lot more done

One of the things that I have always loved about Unix and then Linux is how it allows me to connect a series of commands together with pipes and get a lot of work done without a lot of effort. I can generate the output that I need in the form that I need it. It's not just the existence of the pipes themselves, but the flexibility of the Linux commands. You can run commands, select portions of the output, sort the results or match on specific strings and you can pare the results down to just what you want to see.In this post, we're going to look at a couple commands that demonstrate the power of the pipe and how easily you can get commands to work together.To read this article in full, please click here

Using pipes on Linux to get a lot more done

One of the things that I have always loved about Unix and then Linux is how it allows me to connect a series of commands together with pipes and get a lot of work done without a lot of effort. I can generate the output that I need in the form that I need it. It's not just the existence of the pipes themselves, but the flexibility of the Linux commands. You can run commands, select portions of the output, sort the results or match on specific strings and you can pare the results down to just what you want to see.In this post, we're going to look at a couple commands that demonstrate the power of the pipe and how easily you can get commands to work together.To read this article in full, please click here

Cache-Based Packet Forwarding

In the previous blog post in this series I described how convoluted routing table lookups could become when you have to deal with numerous layers of indirection (BGP prefix ⇨ BGP next hop ⇨ IGP next hop ⇨ link bundle ⇨ outgoing interface). Modern high-end hardware can deal with the resulting complexity; decades ago we had to use router CPU to do multiple (potentially recursive) lookups in the IP routing table (there was no FIB at that time).

Network devices were always pushed to the bleeding edge of performance, and smart programmers always tried to optimize the CPU-intensive processes. One of the obvious packet forwarding optimizations relied on the fact that within a short timeframe most packets have to be forwarded to a small set of destinations. Welcome to the wonderful world of cache-based forwarding.

Cache-Based Packet Forwarding

In the previous blog post in this series I described how convoluted routing table lookups could become when you have to deal with numerous layers of indirection (BGP prefix ⇨ BGP next hop ⇨ IGP next hop ⇨ link bundle ⇨ outgoing interface). Modern high-end hardware can deal with the resulting complexity; decades ago we had to use router CPU to do multiple (potentially recursive) lookups in the IP routing table (there was no FIB at that time).

Network devices were always pushed to the bleeding edge of performance, and smart programmers always tried to optimize the CPU-intensive processes. One of the obvious packet forwarding optimizations relied on the fact that within a short timeframe most packets have to be forwarded to a small set of destinations. Welcome to the wonderful world of cache-based forwarding.