Xilinx Works From The Edge Towards Datacenters With Versal FPGA Hybrids

The “Everest” family of hybrid compute engines made by Xilinx, which have lots of programmable logic surrounded by hardened transistor blocks and which are sold under the Versal brand, have been known for so long that we sometimes forget – or can’t believe – that Versal chips are not yet available as standalone products in the datacenter or within the Alveo line of PCI-Express cards from the chip maker.

Xilinx Works From The Edge Towards Datacenters With Versal FPGA Hybrids was written by Timothy Prickett Morgan at The Next Platform.

Need to Keep Analytics Data in the EU? Cloudflare Zaraz Can Offer a Solution

Need to Keep Analytics Data in the EU? Cloudflare Zaraz Can Offer a Solution
Need to Keep Analytics Data in the EU? Cloudflare Zaraz Can Offer a Solution

A recent decision from the Austrian Data Protection Authority (the Datenschutzbehörde) has network engineers scratching their heads and EU companies that use Google Analytics scrambling. The Datenschutzbehörde found that an Austrian website’s use of Google Analytics violates the EU General Data Protection Regulation (GDPR) as interpreted by the “Schrems II” case because Google Analytics can involve sending full or truncated IP addresses to the United States.

While disabling such trackers might be one (extreme) solution, doing so would leave website operators blind to how users are engaging with their site. A better approach: find a way to use tools like Google Analytics, but do so with an approach that protects the privacy of personal information and keeps it in the EU, avoiding a data transfer altogether. Enter Cloudflare Zaraz.

But before we get into just how Cloudflare Zaraz can help, we need to explain a bit of the background for the Datenschutzbehörde’s ruling, and why it’s a big deal.

What are the privacy and data localization issues?

The GDPR is a comprehensive data privacy law that applies to EU residents’ personal data, regardless of where it is processed. The GDPR itself does not insist that personal data must Continue reading

Turn tabs into spaces on Linux and vice versa

The Linux expand and unexpand commands sound like they can make files larger and smaller, but what they actually do is turn tabs into spaces and spaces into tabs.In this post, we’ll use some simple text files to demonstrate what happens when you use expand and unexpand. We’ll also compare how these commands work with some likely more familiar commands—sed and awk—that can provide similar results and offer additional options.[Get regularly scheduled insights by signing up for Network World newsletters.] To begin, let’s take a look at this very simple text file:To read this article in full, please click here

Turn tabs into spaces on Linux and vice versa

The Linux expand and unexpand commands sound like they can make files larger and smaller, but what they actually do is turn tabs into spaces and spaces into tabs.In this post, we’ll use some simple text files to demonstrate what happens when you use expand and unexpand. We’ll also compare how these commands work with some likely more familiar commands—sed and awk—that can provide similar results and offer additional options.[Get regularly scheduled insights by signing up for Network World newsletters.] To begin, let’s take a look at this very simple text file:To read this article in full, please click here

Do a Cleanup Before Automating Your Network

Remington Loose sent me an interesting email describing his views on the right approach to network automation after reading my Network Reliability Engineering Should Be More than Software or Automation rant – he’s advocating standardizing network services and cleaning up your network before trying to deploy full-scale automation.


I think you are 100% right to start with a thorough cleanup before automation. Garbage in, garbage out. It is also the case that all that inconsistency and differentiation makes for complexity in automation (as well as general operations) that makes it harder to gain traction.

Do a Cleanup Before Automating Your Network

Remington Loose sent me an interesting email describing his views on the right approach to network automation after reading my Network Reliability Engineering Should Be More than Software or Automation rant – he’s advocating standardizing network services and cleaning up your network before trying to deploy full-scale automation.


I think you are 100% right to start with a thorough cleanup before automation. Garbage in, garbage out. It is also the case that all that inconsistency and differentiation makes for complexity in automation (as well as general operations) that makes it harder to gain traction.

DC Fabric Intelligence Panel at DCD

On the 10th of February (next week) I’m participating in a panel discussing—

A networking strategy involving disaggregation deployment, overlay network virtualization, automation, and visibility can remedy the complexities with better utilization and performance and ultimately enable network slicing and self-healing abilities. Cloudification of the network is here, but how far do we need to go, and what is the impact on the hardware?

You can find more information about joining here.

Cloud Engineering For The Network Pro (Video)

The Packet Pushers are launching a new video series with Michael Levan on cloud engineering for network pros. The first video in the series gets into the basics of cloud networks. Michael covers AWS and Azure in particular. You can watch the video below, or click here to see it on YouTube. You can subscribe […]

The post Cloud Engineering For The Network Pro (Video) appeared first on Packet Pushers.

Juniper adds security upgrades for SASE, security management

Juniper Networks has added firewall-as-a-service, policy, and segmentation features to its cloud-based security family that lets enterprise customers control and protect on-premises or cloud-based resources.The new Juniper Secure Edge package expands and strengthens brings key enterprise security features to Juniper’s core cloud-based management platform Security Director Cloud, but also bolsters the vendor’s secure access service edge (SASE) strategy.  What is SDN and where it’s going Security Director Cloud learns customers’ policies and configurations and syncs them with on-prem firewalls. It includes zero-touch provisioning and configuration wizards for secure connectivity, content security and advanced threat prevention. It also includes Security Director Insights, which correlates attack details with threat intelligence—including attack information gathered from other vendors’ products—to update security policies automatically.To read this article in full, please click here

Cato Networks Adds A Cloud Access Security Broker (CASB) For App Visibility And Control

Cato Networks is announcing the availability of a Cloud Access Security Broker (CASB) capability that will be integrated into Cato’s cloud-based security service, which already includes next-gen firewalls, anti-malware, and more. The CASB provides visibility into, and control over, SaaS, cloud, and on-premises applications. Visibility is a key feature of the CASB service. SaaS and […]

The post Cato Networks Adds A Cloud Access Security Broker (CASB) For App Visibility And Control appeared first on Packet Pushers.

Day Two Cloud 132: What Web3 Means For Infrastructure Engineers

Web3 is the term for an emerging technology movement that aims to create a more decentralized Internet and put more ownership in the hands of individual users and consumers. At present Web3 is associated with cryptocurrencies and NFTs, but it's worth understanding the technological underpinnings of Web3, particularly blockchain and its broader applications. Our guide to Web3 infrastructure is Josh Neuroth.

Day Two Cloud 132: What Web3 Means For Infrastructure Engineers

Web3 is the term for an emerging technology movement that aims to create a more decentralized Internet and put more ownership in the hands of individual users and consumers. At present Web3 is associated with cryptocurrencies and NFTs, but it's worth understanding the technological underpinnings of Web3, particularly blockchain and its broader applications. Our guide to Web3 infrastructure is Josh Neuroth.

The post Day Two Cloud 132: What Web3 Means For Infrastructure Engineers appeared first on Packet Pushers.

Pluribus Netvisor ONE R7 Feature Spotlight: Kubernetes-aware Fabric with the KubeTracker™ Fabric Service

Today, Pluribus released Netvisor 7, which marks another major step forward in our mission to radically simplify deployment and operations for distributed cloud networking. One of the most innovative features of this release is a new suite of monitoring and visibility tools, including FlowTracker and KubeTracker™ fabric services.

In prior releases, Netvisor ONE OS and the Adaptive Cloud Fabric software could capture flow telemetry for TCP flows only. With the introduction of FlowTracker in R7, Pluribus now provides telemetry on every flow traversing the fabric, including TCP, UDP, ICMP and even infrastructure services flows like DCHP, DNS and more.

Amazingly, this comprehensive flow telemetry is achieved without the need for an expensive external TAP and TAP aggregation overlay infrastructure. The cost of procuring and deploying TAPS to capture packet flows for analysis can be daunting and often results in cost/benefit tradeoffs where TAPS are only installed at certain points in the network. With FlowTracker, that expense and those tradeoffs are eliminated, every flow in the fabric is captured, and flow metadata is exported to tools like our UNUM Insight Analytics platform.

The KubeTracker fabric service is a powerful new capability delivered by the Adaptive Cloud Fabric specifically for network operators Continue reading