If the workload-specific datacenter dominates in the near term, it could be RISC-V’s time to shine. …
AI Is RISC-V’s Trojan Horse into the Datacenter was written by Nicole Hemsoth at The Next Platform.
AnsibleFest will be a free, virtual two day event again this year on September 29-30. You can expect all the usual highlights, like customer keynotes, breakout sessions, direct access to Ansible experts and more. We will also be bringing back tracks from last year like Network, Security, Developer and more to give you exactly the type of information you need for wherever you are in your Ansible journey.
Do you have a story to share about how you're using Ansible?
The Call for Proposals will be open from June 8-29. We will be choosing a variety of sessions across all subjects and skill areas. Notifications will be sent out in July for session approval status. Share your automation story with us today!
Want to be the first to hear the latest updates about AnsibleFest? Then sign up to stay connected and up-to-date on all things on the AnsibleFest page.
HTTP headers are central to how the web works. They are used for passing additional information between the client and server, such as which security permissions to apply and information about the client, allowing the correct content to be served.
Today we are announcing the immediate availability of the second action within Transform Rules, “HTTP Request Header Modification”, available for all Cloudflare plans. This new functionality provides Cloudflare administrators with the ability to easily set or remove HTTP request headers as traffic flows through Cloudflare. This allows customers to enrich requests with information such as the Cloudflare Bot Management ‘Bot Score’ prior to being sent to their servers. Previously, HTTP request header modification was done using a Cloudflare Worker. Today we’re introducing an easier way to do this without writing a single line of code.
Think of HTTP headers as the “luggage tag” attached to your bags when you check in at the airport.
Generally, you don't need to know what those numbers and words mean. You just know they are important in getting your suitcase from the boarding desk, to the correct Continue reading
In the previous blog post in this series, I described why it’s (almost) impossible to implement unequal-cost multipathing for anycast services (multiple servers advertising the same IP address or range) with OSPF. Now let’s see how easy it is to solve the same challenge with BGP DMZ Link Bandwidth attribute.
I didn’t want to listen to the fan noise generated by my measly Intel NUC when simulating a full leaf-and-spine fabric, so I decided to implement a slightly smaller network:
In the previous blog post in this series, I described why it’s (almost) impossible to implement unequal-cost multipathing for anycast services (multiple servers advertising the same IP address or range) with OSPF. Now let’s see how easy it is to solve the same challenge with BGP DMZ Link Bandwidth attribute.
I didn’t want to listen to the fan noise generated by my measly Intel NUC when simulating a full leaf-and-spine fabric, so I decided to implement a slightly smaller network:
Hello my friend,
Over the past several articles we have taken a look into the most popular tools for the network troubleshooting. To be precise, we have covered an approach to find your public IP address in a programmable way, how to measure your Internet connectivity speed with Speedtest, how to measure the connectivity speed between your endpoints using iPerf, rapid check of hosts presence in the network with fping, how to check the quality of the path through the network with MTR, and how to see what are in the packets you have in your network. Covering these tools for you and sharing ideas about automation with them led us to creating a new open source tool, which we are happy to share with the community. This time we decided not to think long on its name and just called it the Traceroute Analyzer.
1
2
3
4
5 No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.
Last week, we introduced the Perlmutter supercomputer, the next-gen system at NERSC that will likely secure the #5 spot on the Top 500 list of the world’s most powerful machines. …
A 35 Petabyte All-Flash Balancing Act was written by Nicole Hemsoth at The Next Platform.
When Gajen Kandiah took over as CEO of Hitachi Vantara a year ago after almost 15 years with IT services company Cognizant, he found a company with a deep history in the data storage space, growing strength in services and a presence in the fast-growing edge computing realm. …
Pulling All The Pieces Together at Hitachi Vantara was written by Jeffrey Burt at The Next Platform.
Today’s Tech Bytes podcast dives into Wi-Fi 6E, the extended version of the Wi-Fi 6 standard that takes advantage of newly available spectrum in the 6 GHz band. We’re sponsored today by Aruba, a Hewlett Packard Enterprise company, and we’ll explore highlights of the standard and discuss Aruba’s forthcoming 6E AP.
The post Tech Bytes: Wi-Fi 6E – New Spectrum, New Opportunities (Sponsored) appeared first on Packet Pushers.
Cisco debuts Cloud ACI to unify segmentation policies on prem and in the public cloud, Amazon will activate an opt-out mesh network using your Ring and Echo devices, Microsoft buys an IoT security company, and more tech news in this week's Network Break podcast.
The post Network Break 336: Cisco Announces Cloud ACI And More; Amazon Borrows Wi-Fi Without Asking appeared first on Packet Pushers.
Where’s the beef? Cybercriminals, likely from Russia, shut down a Brazilian meatpacker’s operation for a couple of days using ransomware, Reuters reports. The attack on JBS, the world’s largest meatpacker, came just weeks after ransomware, also likely from Russia, shut down the Colonial Pipeline in the U.S. for several days. The U.S. FBI blamed the […]
The post The Week in Internet News: Yet Another Ransomware Attack appeared first on Internet Society.
As many of you are aware, it has been a difficult period for companies offering free cloud compute [1]. Unfortunately, Docker’s Autobuild service has been targeted by the same bad actors, so today we are disappointed to announce that we will be discontinuing Autobuilds on the free tier starting from June 18, 2021.
In the last few months we have seen a massive growth in the number of bad actors who are taking advantage of this service with the goal of abusing it for crypto mining. For the last 7 years we have been proud to offer our Autobuild service to all our users as the simplest way to set up CI for containerized projects. As well as the increased cost of running the service, this type of abuse periodically impacts performance for paying Autobuild users and induces many sleepless nights for our team
In April we saw the number of build hours spike 2X our usual load and by the end of the month we had already deactivated ~10,000 accounts due to mining abuse The following week we had another ~2200 miners spin up.
As a result of this we have made the hard choice to remove Autobuilds Continue reading
When I started developing AWS- and Azure Networking webinars, I wondered whether they would make sense – after all, you can easily find tons of training offerings focused on public cloud services.
However, it looks like most of those materials focus on developers (no wonder – they are the most significant audience), with little thought being given to the needs of network engineers… at least according to the feedback left by one of ipSpace.net subscribers.