足球竞猜app软件 //m.banksfrench.com en - us 星期四,2023年6月29日21:23:27 -0700 星期四,2023年6月29日21:23:27 -0700 https://idge.staticworld.net/nww/networkworld510x510.png 足球竞猜app软件 //m.banksfrench.com 143年 143年 思科防火墙升级提高可视性加密流量 星期四,2023年6月29日08:55:00 -0700

The software that runs Cisco’s new Firewall 4200 Series now includes the ability to see into encrypted traffic without decrypting it, which the vendor says will allow enterprise customers to better protect hybrid and multicloud applications.

The enhanced Cisco Encrypted Visibility Engine (EVE) is part of the 7.4 version of the Secure Firewall operating system. Version 7.4 also includes zero-trust capabilities and improved application access control. The 4200 Series’ operating system also helps improve overall firewall performance – it’s twice as fast as previous high-end Cisco firewalls, the company says.

EVE, which has been available since version 7.2 of the software, takes things further than traditional firewalls because it now lets customers detect the client application within an encrypted tunnel, according to Rick Miles, vice president of product management, cloud and network security in Cisco’s security business group.

To read this article in full, please click here

//m.banksfrench.com/article/3701388/cisco-firewall-upgrade-boosts-visibility-into-encrypted-traffic.html tk.rss_all //m.banksfrench.com/article/3701388/cisco-firewall-upgrade-boosts-visibility-into-encrypted-traffic.html tk.rss_all 思科防火墙升级提高可视性加密流量 思科系统公司 网络设备 网络安全 云安全
人工智能需求超过许多IT团队基础设施功能,研究发现 星期四,2023年6月29日04:50:00 -0700

As adoption of artificial intelligence (AI) technology accelerates, IT organizations are concerned that their existing infrastructure isn’t powerful enough to keep up.

AI hardware – especially training hardware – is becoming more and more power hungry, according to Equinix, which just released its 2023 Global Tech Trends Survey.

The power draw from traditional racks in a data center is between 5 kW and 10 kW per rack. But, increasingly, newer generations of GPU-based racks are pushing power draws north of 30 kW per rack, and in some cases as high as 72 kW per rack, according to Kaladhar Voruganti, senior technologist at Equinix. “So, definitely, it's very hard to host this type of infrastructure in private data centers,” he said.

To read this article in full, please click here

//m.banksfrench.com/article/3700655/ai-requirements-exceed-infrastructure-capabilities-for-many-it-teams-study-finds.html tk.rss_all //m.banksfrench.com/article/3700655/ai-requirements-exceed-infrastructure-capabilities-for-many-it-teams-study-finds.html tk.rss_all 人工智能需求超过许多IT团队基础设施功能,研究发现 2020欧洲杯预赛
恢复选项:即写即拷vs redirect-on-write快照 星期四,2023年6月29日就是-0700

Snapshots are a very popular way to create virtual copies of an entire system in order to facilitate very quick (or even instant) recovery.  A properly designed snapshot-based recovery system can recover very large volumes in just minutes and can often do so to a point in time just minutes ago. In contrast, a typical restore of such size would likely take many hours and would typically lose at least a day’s worth of data.

There are two distinct approaches when it comes to creating snapshots: copy-on-write and redirect-on-write. Let’s talk about the advantages and disadvantages associated with each method, as they will greatly determine the impact on system performance, and therefore your ability to keep snapshots for a long time.

To read this article in full, please click here

//m.banksfrench.com/article/3701268/recovery-options-copy-on-write-vs-redirect-on-write-snapshots.html tk.rss_all //m.banksfrench.com/article/3701268/recovery-options-copy-on-write-vs-redirect-on-write-snapshots.html tk.rss_all 恢复选项:即写即拷vs redirect-on-write快照 备份系统和服务
以各种各样的方式找到文件在Linux上 -0700年结婚,2023年6月28日09:39:00

The Linux find command can locate files based on almost any criteria that you might need. This post describes the many criteria you can use to find what you’re looking for – even when you can’t remember what you named a file or when you last changed it or added content.

Basic find syntax

The basic syntax for the find command looks like this:

$ find [starting location] [criteria] [options] [action to take] 

The starting location can be a directory name (e.g., /var/log), the current directory (.), your home directory whether you’re sitting in it or not (~), or a directory relative to your current position (e.g., ./bin). You can be as specific as you want when entering the starting location.

To read this article in full, please click here

//m.banksfrench.com/article/3700872/finding-files-on-linux-in-all-sorts-of-ways.html tk.rss_all //m.banksfrench.com/article/3700872/finding-files-on-linux-in-all-sorts-of-ways.html tk.rss_all 以各种各样的方式找到文件在Linux上 Linux
我们重芯片进一步限制对中国的出口 -0700年结婚,2023年6月28日09:37:00

US semiconductor manufacturers such as Nvidia and AMD will face new controls on exports of their chips to China, with the US Department of Commerce set to announce the restrictions as early as July, according to a report in the Wall Street Journal.

In 2022, after the US placed new restrictions on exports to China of chips used in AI systems, Nvidia said it would offer a new export-compliant advanced A800 chip to the country, in addition to making changes to its H100 so that it would also comply with the changes to regulations.

However, new restrictions could see sales of A800 chips to China banned unless Nvidia obtains a special US export license, according to the Wall Street report, citing people familiar with the situation.

To read this article in full, please click here

//m.banksfrench.com/article/3700779/us-weighs-further-restrictions-on-chip-exports-to-china.html tk.rss_all //m.banksfrench.com/article/3700779/us-weighs-further-restrictions-on-chip-exports-to-china.html tk.rss_all 我们重芯片进一步限制对中国的出口 计算机部件 监管 科技行业
与SASE BrandPost:使工作场所转换四个用例 -0700年结婚,2023年6月28日06:36:00 品牌发布

By: Gabriel Gomane, Sr Product Marketing Manager, HPE Aruba Networking.

The advent of digital transformation has brought about a complete overhaul in the workplace and revolutionized the way we access applications. This transformation can be attributed to four pivotal factors: the emergence of hybrid working, the migration of business applications to the cloud, the rapid proliferation of IoT devices, and the growing concerns surrounding cybersecurity risks.

To enable this transformation, organizations can deploy SASE and tailor their SASE journey to align with their specific security and business goals. They can start their SASE journey by securing remote workers with ZTNA or they can begin by addressing application performance issues in branches with SD-WAN. There are no right or wrong choices, but it’s rather a matter of prioritizing specific use cases.

To read this article in full, please click here

//m.banksfrench.com/article/3700690/enable-workplace-transformation-with-sase-in-four-use-cases.html tk.rss_all //m.banksfrench.com/article/3700690/enable-workplace-transformation-with-sase-in-four-use-cases.html tk.rss_all 与SASE BrandPost:使工作场所转换四个用例 SASE
思科购买网络监控公司SamKnows更好的最后一英里的可见性 星期二,2023年6月27日08:44:00 -0700

Cisco again opened its checkbook this week and snatched up privately held broadband-network monitoring company SamKnows for an undisclosed amount.

Founded in 2008, the London-based firm uses a global network of software agents located in everything from home systems to mobile devices and service provider netoworks to get a real-time measurement of internet performance and customer experience. Through a central dashboard the  company can analyze the results and identify faults and the root cause of problems to help with remediation.

SamKnows technology will be integrated into Cisco’s ThousandEyes cloud-based network intelligence software that analyzes everything from the performance of local and wide-area networks to ISP, cloud, and collaboration-application performance to the health of the internet.

To read this article in full, please click here

//m.banksfrench.com/article/3700616/cisco-to-buy-network-monitoring-firm-samknows-for-better-last-mile-visibility.html tk.rss_all //m.banksfrench.com/article/3700616/cisco-to-buy-network-monitoring-firm-samknows-for-better-last-mile-visibility.html tk.rss_all 思科购买网络监控公司SamKnows更好的最后一英里的可见性 网络监控 思科系统公司
Linux使用腻子连接 星期二,2023年6月27日07:51:00 -0700

PuTTY is a great tool for connecting between systems of different types. In case you’re not familiar with the tool, the name has no connection to Silly Putty. Instead, the capitalization of the TTY part of the name suggests its connection with the acronym tty. It provides an easy way to log into a Linux system from Windows as well as many other systems.

Say you want to log into your Linux system from a Windows system. This tool will allow you to set up a connection (IP address, host name, etc.) and control the size, colors and font to be used. This post explains how to set PuTTY up to optimize your view of the Linux command line. PuTTY was actually born on Windows to make this kind of connection possible.

To read this article in full, please click here

//m.banksfrench.com/article/3700968/using-putty-to-connect-to-linux.html tk.rss_all //m.banksfrench.com/article/3700968/using-putty-to-connect-to-linux.html tk.rss_all Linux使用腻子连接 Linux
每周网络健康检查,美国和全世界 星期二,2023年6月27日07:33:00 -0700

The reliability of services delivered by ISPs, cloud providers and conferencing services (a.k.a. unified communications-as-a-service (UCaaS)) is an indication of how well served businesses are via the internet.

ThousandEyes is monitoring how these providers are handling the performance challenges they face. It will provide Network World a roundup of interesting events of the week in the delivery of these services, and Network World will provide a summary here. Stop back next week for another update, and see more details here.

//m.banksfrench.com/article/3534130/covid-19-weekly-health-check-of-isps-cloud-providers-and-conferencing-services.html tk.rss_all //m.banksfrench.com/article/3534130/covid-19-weekly-health-check-of-isps-cloud-providers-and-conferencing-services.html tk.rss_all 每周网络健康检查,美国和全世界 网络
卡托网络发射AI-powered追踪恶意软件指挥和控制 星期二,2023年6月27日05:31:00 -0700

Cato Networks’ new deep learning algorithms are designed to identify malware command and control domains and block them more quickly than traditional systems based on domain reputation, thanks to extensive training on the company’s own data sets.

Cato, a SASE provider based in Tel Aviv, announced the new algorithmic security system today. The system is predicated on the idea that domain reputation tracking is insufficient to quickly identify the command servers used to remotely control malware. That’s because most modern malware uses a domain generation algorithm (DGA) to rapidly generate pseudorandom domain names — which the deployed malware also has a copy of.

To read this article in full, please click here

//m.banksfrench.com/article/3700794/cato-networks-launches-ai-powered-tracker-for-malware-command-and-control.html tk.rss_all //m.banksfrench.com/article/3700794/cato-networks-launches-ai-powered-tracker-for-malware-command-and-control.html tk.rss_all 卡托网络发射AI-powered追踪恶意软件指挥和控制 网络安全
日本支持其芯片行业设备制造商JSR的收购 星期一,2023年6月26日09:08:00 -0700

Japanese semiconductor equipment maker JSR has accepted a buyout offer of $6.4 billion (909.3 billion yen) from the Japanese government, in the country’s latest move to bolster its domestic chip industry.

JSR is the world's leading maker of photoresists , the chemicals used for the process of printing circuit designs on chip wafers. It is also one of three Japanese companies that controls the world’s supply of fluorinated polyimide and hydrogen fluoride, compounds which are used to make the semiconductors found in supercomputers, AI-harnessing data centers and iPhones.

Under the plan, Japan Investment Corp (JIC) – state-backed investment enterprise of Japan, specializing in private equity and venture capital investments primarily in Japan – would offer JSR $31.25 (4,350 yen) per share, a price that represents a 35% premium on the company’s share price when the markets closed on Friday. The resulting deal will see the company go private and provide Japan with a greater control over a technological process of which it is already a global leader.

To read this article in full, please click here

//m.banksfrench.com/article/3700793/japan-bolsters-its-chip-industry-with-buyout-of-equipment-maker-jsr.html tk.rss_all //m.banksfrench.com/article/3700793/japan-bolsters-its-chip-industry-with-buyout-of-equipment-maker-jsr.html tk.rss_all 日本支持其芯片行业设备制造商JSR的收购 计算机部件 科技行业 合并和收购
IT人员如何受益于生成人工智能安全吗 星期一,2023年6月26日03:00:00 -0700

The enterprise IT landscape is littered with supposedly paradigm-shifting technologies that failed to live up to the hype, and until now, one could argue that AI fell into that category. But generative AI, which has taken the world by storm in the form of OpenAI’s ChatGPT chatbot, just might be the real deal.

Chris Bedi, chief digital information officer at ServiceNow, says the release of ChatGPT last November was “an iPhone moment,” an event that captured the public’s attention in a way that “changed everything forever.” He predicts that generative AI will become embedded into the fabric of every enterprise, and he recommends that CIOs and other IT leaders should begin now to develop their generative AI strategies.

To read this article in full, please click here

//m.banksfrench.com/article/3700788/how-it-pros-can-benefit-from-generative-ai-safely.html tk.rss_all //m.banksfrench.com/article/3700788/how-it-pros-can-benefit-from-generative-ai-safely.html tk.rss_all IT人员如何受益于生成人工智能安全吗 网络监控 网络安全 网络管理软件 生成的人工智能
AMD芯片研发花费135美元在爱尔兰对人工智能,数据中心,移动技术2020欧洲杯预赛 星期四,2023年6月22日08:37:00 -0700

AMD has unveiled plans to invest $135 million over the next four years in several strategic research and development projects in Ireland. To support its R&D efforts there, targeted at developing technology for data centers, networking, 6G infrastructure, and next generation AI, AMD said it will hire 290 engineers and researchers, in addition to a number of additional support roles.

To read this article in full, please click here

//m.banksfrench.com/article/3700708/amd -花- 135 m - -芯片- rd -爱尔兰- - ai -数据中心-移动tech.html # tk.rss_all //m.banksfrench.com/article/3700708/amd -花- 135 m - -芯片- rd -爱尔兰- - ai -数据中心-移动tech.html # tk.rss_all AMD芯片研发花费135美元在爱尔兰对人工智能,数据中心,移动技术2020欧洲杯预赛 计算机部件 2020欧洲杯预赛 移动 人工智能 中小企业
建议构建一个家实验室网络认证的准备工作 星期四,2023年6月22日03:00:00 -0700 tferrill@gmail.com

Hands-on experience with network hardware and software can solidify certification-test concepts or let you practice skills that may be part of a cert exam, and the process can be helped along by use of a home lab. But how do you go about building one?

Start by identifying your learning goals and figuring out the hardware and software they’ll require. If you’re focused on applications, server environments, automation, or identity management, a server for hosting virtual environments may suffice. But if you’re interested in networking at Layers 1, 2 and 3, you’ll need some physical networking hardware such as routers, switches, or hardware firewalls. This is especially true if you’re seeking vendor certification on specific devices.

To read this article in full, please click here

//m.banksfrench.com/article/3699948/tips-for-building-a-home-lab-to-prep-for-network-certifications.html tk.rss_all //m.banksfrench.com/article/3699948/tips-for-building-a-home-lab-to-prep-for-network-certifications.html tk.rss_all 建议构建一个家实验室网络认证的准备工作 网络 虚拟化 职业生涯
HPE宣布大型语言模型的云服务 -0700年结婚,2023年6月21日10:58:00

Hewlett Packard Enterprise (HPE) is offering support for demanding AI applications with a new cloud-based service underpinned by the company’s supercomputers.

The initial service is designed specifically to facilitate large language models (LLM), but the company says it plans to roll out similar AI services for domain- and industry-specific applications in climate modeling, healthcare and life sciences, financial services, manufacturing, and transportation.

All of these will fall under HPE’s GreenLake portfolio, but unlike the rest of GreenLake services, these will be hosted entirely in the cloud. The other services run either entirely on customer premises or in a hybrid on-prem/cloud environment.

To read this article in full, please click here

//m.banksfrench.com/article/3700155/hpe-announces-a-cloud-service-for-large-language-models.html tk.rss_all //m.banksfrench.com/article/3700155/hpe-announces-a-cloud-service-for-large-language-models.html tk.rss_all HPE宣布大型语言模型的云服务 云计算 生成的人工智能
思科购买网络监视、分析公司Accedian网络 -0700年结婚,2023年6月21日08:35:00

Looking to improve network visibility, Cisco plans to buy Accedian Networks, makers of software for monitoring and analyzing network performance.

Founded 2004, Accecian sells Skylight, a platform that diagnoses problems and recommends remediation to fix them. The package is aimed at mobile backhaul, data-center services, service providers, and cloud-connectivity customers.

The company, which competes with players including IBM, SolarWinds, Progress, NetScout, and Kentik, is already a Cisco business partner. Cisco offers Skylight for near-real-time network performance monitoring, analytics, and assurance within its Cisco Crosswork Network Automation platform for service providers.

To read this article in full, please click here

//m.banksfrench.com/article/3700077/cisco-is-buying-network-monitoring-analysis-firm-accedian-networks.html tk.rss_all //m.banksfrench.com/article/3700077/cisco-is-buying-network-monitoring-analysis-firm-accedian-networks.html tk.rss_all 思科购买网络监视、分析公司Accedian网络 网络监控 网络管理软件 思科系统公司
英特尔的德国芯片工厂计划扩大 星期二,-0700年6月2023 14:02:00 20

Intel will spend more than $32 billion to open two high-end microchip fabrication facilities in Magdeburg, Germany, in an expansion of the chipmaking giant’s plans for European growth.

In an announcement on Monday, Intel also said that the facilities would use its more advanced Angstrom manufacturing process, which is used to manufacture sub-nanometer chips. The use of this technology has always been in the plans for the Magdeburg site, for which Intel acquired the land in November 2022. That initial plan, announced in March 2022, earmarked $18.55 billion for the site.

The company said that the facility will enter production in four to five years, “following the European Commission’s approval of the incentive package.” About 30% of the costs for the Magdeburg facility (roughly $5.5 billion) will be covered by government subsidies, according to a report from Bloomberg at the time of the deal’s initial announcement. That figure is set to increase to nearly $11 billion as of yesterday’s announcement.

To read this article in full, please click here

//m.banksfrench.com/article/3700310/intels-german-chip-fab-plans-expand.html tk.rss_all //m.banksfrench.com/article/3700310/intels-german-chip-fab-plans-expand.html tk.rss_all 英特尔的德国芯片工厂计划扩大 计算机部件
思科集人工智能网络基础设施的基础 星期二,-0700年6月2023 12:55:00 20

Cisco is taking the wraps off new high-end programmable Silicon One processors aimed at underpinning large-scale Artificial Intelligence (AI)/Machine Learning (ML) infrastructure for enterprises and hyperscalers.

The company has added the 5nm 51.2Tbps Silicon One G200 and 25.6Tbps G202 to its now 13-member Silicon One family that can be customized for routing or switching  from a single chipset, eliminating the need for different silicon architectures for each network function. This is accomplished with a common operating system, P4 programmable forwarding code, and an SDK.

To read this article in full, please click here

//m.banksfrench.com/article/3700308/cisco-sets-a-foundation-for-ai-network-infrastructure.html tk.rss_all //m.banksfrench.com/article/3700308/cisco-sets-a-foundation-for-ai-network-infrastructure.html tk.rss_all 思科集人工智能网络基础设施的基础 思科系统公司 网络
BrandPost:关闭安全漏洞与网络访问控制 星期二,-0700年6月2023 11:14:00 20 品牌发布

By: Eve-Marie Lanza, Senior Security Solutions Marketing Manager, HPE Aruba Networking.

IT security gaps caused by lack of visibility and control into user and device activities persist for many organizations, according to a report recently released by security research firm Ponemon Institute.

In the report sponsored by Hewlett Packard Enterprise, The 2023 Global Study on Closing the IT Security Gap: Addressing Cybersecurity Gaps from Edge to Cloud, 67% of respondents indicated that identifying and authenticating IoT devices accessing their network is critical to their organizations’ security strategy. Yet nearly the same number of respondents (63%) said their security teams lack visibility and control into all the activity of every device connected to their IT infrastructure.

To read this article in full, please click here

//m.banksfrench.com/article/3700052/closing-it-security-gaps-with-network-access-control.html tk.rss_all //m.banksfrench.com/article/3700052/closing-it-security-gaps-with-network-access-control.html tk.rss_all BrandPost:关闭安全漏洞与网络访问控制 安全
供应链的约束数据中心宕机 星期二,-0700年6月2023 06:58:00 20

Shortages due to supply-chain problems has faded from the headlines, but they persist and are actually getting worse in some sectors.

A report from AFCOM, an organization of data-center professionals, found that 44% of data-center operators surveyed had suffered downtime or an outage because they couldn’t get needed parts.

In the report “State of the Data Center 2023,” 94% of respondents said that they have had supply-chain issues of one kind or another. The most commonly cited items in short supply (59%) are basic IT equipment such as servers and switches, followed by power systems (51%) including generators and UPSes.

But even acquiring security systems (34%) such as secure doors and cameras and building materials like concrete (35%) were an issue for many respondents.

To read this article in full, please click here

//m.banksfrench.com/article/3700151/supply-chain-constraints-spike-data-center-outages.html tk.rss_all //m.banksfrench.com/article/3700151/supply-chain-constraints-spike-data-center-outages.html tk.rss_all 供应链的约束数据中心宕机 2020欧洲杯预赛
如何浏览MSP活动的社会性难题 星期一,2023年6月19日03:00:00 -0700

Co-management is a key part of many arrangements between enterprise IT teams and their managed service providers (MSP), but it’s not always clear where the management boundaries and overlaps exist and how they should be handled.

Oftentimes, enterprises land on a co-management approach because they don’t want to give up total control, and the MSP may be promising productive cooperation with prospective customers to provide reassurance and close the deal. In practice, co-managed technology services can vary widely depending on the type of services being offered and the parties involved.

For the sake of this article, let’s assume that enterprises are already committed to outsourcing some elements of their IT and communications services to an MSP partner. The benefits of outsourcing – such as expense or headcount reduction, increased expertise, improved productivity, core business focus and enhanced capability – are well established, and the potential risks and concerns – including loss of control, reduced flexibility, dwindling internal expertise and fears about data protection and ownership – are also well known.

To read this article in full, please click here

//m.banksfrench.com/article/3699714/how-to-navigate-the-co-management-conundrum-in-msp-engagements.html tk.rss_all //m.banksfrench.com/article/3699714/how-to-navigate-the-co-management-conundrum-in-msp-engagements.html tk.rss_all 如何浏览MSP活动的社会性难题 网络 电信
联想宣布AI推动边缘服务器的10亿美元 星期五,2023年6月16日05:46:00 -0700

Lenovo is planning a major push into AI with a $1 billion investment in new hardware and software over the next three years. Its AI focus is not only on the data center, where a lot of the action is, but also on the edge. To that end, it announced two new edge servers specifically designed for AI processing.

First up is the new ThinkEdge SE360 V2, an edge server designed to provide advanced computing performance for AI applications such as computer vision, voice AI, and generative AI. The ThinkEdge SE360 V2 is built on Intel and Nvidia processors with support for Nvidia's AI Enterprise software platform and Qualcomm's Cloud AI 100 platform for processing intense workloads at the data source. It features a compact size and ruggedized form factor designed to withstand remote and rugged environments.

To read this article in full, please click here

//m.banksfrench.com/article/3699949/lenovo宣布-边-服务器- - 10亿- ai -的-部分push.html # tk.rss_all //m.banksfrench.com/article/3699949/lenovo宣布-边-服务器- - 10亿- ai -的-部分push.html # tk.rss_all 联想宣布AI推动边缘服务器的10亿美元 2020欧洲杯预赛 生成的人工智能
IBM吹捧错误缓解大量子计算的性能 星期四,2023年6月15日09:32:00 -0700

Error mitigation for quantum computers could ultimately lead to more reliable and useful systems, according to IBM, which recently demonstrated how its error-handling technology enabled a quantum computer to outperform a classical supercomputing approach.

Quantum computing excels at solving large, data-heavy problems, and future applications are expected to significantly advance areas such as AI and machine-learning in industries including automotive, finance, and healthcare. But among the challenges developers face are the noisiness of today's quantum systems and the errors they generate.

To read this article in full, please click here

//m.banksfrench.com/article/3699789/ibm-touts-error-mitigation-for-greater-quantum-computing-performance.html tk.rss_all //m.banksfrench.com/article/3699789/ibm-touts-error-mitigation-for-greater-quantum-computing-performance.html tk.rss_all IBM吹捧错误缓解大量子计算的性能 云计算
AMD揭示人工智能处理器,看起来Nvidia的挑战 -0700年结婚,2023年6月14日14:40:00

AMD is coming for Nvidia’s AI crown in a big way with the launch of its new Instinct processor, which it claims can do the work of multiple GPUs.

CEO Lisa Su called the Instinct MI300X “the most complex thing we’ve ever built.” She held up the chip, which is about the size of a drink coaster, at an event on Tuesday in San Francisco.

Weighing in at 146 billion transistors, the MI300X comes with up to 192GB of high-bandwidth HBM3 memory shared by both the CPU and GPU. It has a total of 13 chiplets on the die. The chip also has a memory bandwidth of 5.2 TB/s, which is 60% faster than Nvidia’s H100.

The chip consists of Zen CPU cores and AMD’s next-generation CDNA 3 GPU architecture. The enormous amount of memory is the real selling point, according to Su.

To read this article in full, please click here

//m.banksfrench.com/article/3699434/amd-unveils-ai-processor-looks-to-challenge-nvidia.html tk.rss_all //m.banksfrench.com/article/3699434/amd-unveils-ai-processor-looks-to-challenge-nvidia.html tk.rss_all AMD揭示人工智能处理器,看起来Nvidia的挑战 2020欧洲杯预赛 生成的人工智能
BrandPost:你的校园核心交换机应该得到更多吗? -0700年结婚,2023年6月14日13:39:00 品牌发布

By: Sue Gillespie, Senior Product Marketing Manager, HPE Aruba Networking.

Creating a secure, high-performance, always-on network that’s designed for operational efficiency and growth begins with a modern infrastructure—and depends on campus core switches to be the beating heart of enterprise connectivity. Because of this key role, campus core switch capabilities directly impact user and device experience, network security, and IT operational efficiency.

What is a campus core switch?

These are typically Ethernet switches that manage traffic coming to and from aggregation switches, the wide area network (WAN), and the internet via router or gateway. Network architectures often deploy either 2-tier collapsed core approaches with a single switch playing the role of both core switch and aggregation (distribution) switch or a 3-tier approach with separate core and aggregation switches.  Here’s an example of a 3-tier network from our ESP Campus Design Validated Solution Guide:

To read this article in full, please click here

//m.banksfrench.com/article/3699669/do-your-campus-core-switches-deserve-more.html tk.rss_all //m.banksfrench.com/article/3699669/do-your-campus-core-switches-deserve-more.html tk.rss_all BrandPost:你的校园核心交换机应该得到更多吗? 网络
欧盟议会批准AI行为,它更接近成为法律 -0700年结婚,2023年6月14日09:58:00 欧盟议员们批准了一项草案的AI行为,设置辩论之前,欧盟成员国制定成为法律。https://www.computerworld.com/article/3699311/eu-parliament-approves-ai-act-moving-it-closer-to-becoming-law.html tk.rss_all https://www.computerworld.com/article/3699311/eu-parliament-approves-ai-act-moving-it-closer-to-becoming-law.html tk.rss_all 欧盟议会批准AI行为,它更接近成为法律 监管 人工智能 生成的人工智能 AWS的客户争取小时后停机 星期二,2023年6月13日23:48:00 -0700

Amazon Web Services (AWS) on Tuesday said its North Virginia (US-East-1) region faced disruption in services for nearly four hours, affecting thousands of customers.

“Between 11:49 AM PDT and 3:37 PM PDT, we experienced increased error rates and latencies for multiple AWS Services in the US-EAST-1 region,” AWS wrote on its health status page, adding that at least 104 of its services were affected during the outage.

AWS services that were malfunctioning during these four hours included the likes of AWS Management Console, Amazon SageMaker, AWS Glue, Amazon Connect, AWS Fargate, and Amazon GuardDuty.

To read this article in full, please click here

//m.banksfrench.com/article/3699071/aws-customers-struggle-for-hours-after-a-major-outage.html tk.rss_all //m.banksfrench.com/article/3699071/aws-customers-struggle-for-hours-after-a-major-outage.html tk.rss_all AWS的客户争取小时后停机 AWSλ 云计算
在Linux上的共享,压缩和密码保护的文件 星期二,2023年6月13日10:21:00 -0700

Keeping your files private from anyone but those with superuser (root) access is easy on Linux. File permissions provide everything you need. By default, you'll have a username and primary group assigned to your account, and you can use the chmod (change mode) command to control what anyone else can view or change.

(If permissions like "750" and "rwxr-x---" don't ring any bells for you, check out these posts for insights into how file permissions work on Linux: A deeper dive into Linux permissions and Unix: beyond group and everyone else)

To read this article in full, please click here

//m.banksfrench.com/article/3699355/sharing-compressing-and-password-protecting-files-on-linux.html tk.rss_all //m.banksfrench.com/article/3699355/sharing-compressing-and-password-protecting-files-on-linux.html tk.rss_all 在Linux上的共享,压缩和密码保护的文件 Linux
卡托拥有5 gbps加密通道的吞吐量 星期二,2023年6月13日05:32:00 -0700

Cato Networks said today that it has successfully created an encrypted tunnel capable of 5Gbps of throughput, offering reassurance to network administrators worried about traffic overhead created by Secure Access Service Edge (SASE) platforms.

The company’s announcement said that increasing uptake of SASE, particularly by large enterprises, has created a need for faster encrypted connections that still support the full array of security technologies present in SASE. The speed boost, Cato said, was made possible by improved performance in the company’s Single Pass Processing Engine, which is the umbrella of services that runs in its various points of presence.

To read this article in full, please click here

//m.banksfrench.com/article/3699264/cato-boasts-5gbps-encrypted-tunnel-throughput.html tk.rss_all //m.banksfrench.com/article/3699264/cato-boasts-5gbps-encrypted-tunnel-throughput.html tk.rss_all 卡托拥有5 gbps加密通道的吞吐量 SASE
BrandPost: 4趋势塑造下一代防火墙市场 星期一,2023年6月12日13:13:00 -0700 品牌发布

Enterprise technology is evolving at a break-neck pace, and one of the areas seeing the greatest transformation is the next-generation firewall (NGFW) market. Gone are the days of a single enterprise data center protected by firewalls only capable of basic packet inspection. NGFWs are converging networking and security to offer cutting-edge features powered by machine learning (ML) and artificial intelligence (AI) that can delve deeper into network traffic than ever before.

To read this article in full, please click here

//m.banksfrench.com/article/3699394/4-trends-shaping-the-next-generation-firewall-market.html tk.rss_all //m.banksfrench.com/article/3699394/4-trends-shaping-the-next-generation-firewall-market.html tk.rss_all BrandPost: 4趋势塑造下一代防火墙市场 安全