Archive

Category Archives for "Networking"

SGI tech lives on in the form of a French AI-focused supercomputer

France's GENCI supercomputing center announced it will deploy a new HPE SGI 8600 supercomputer in June that is capable of reaching 14 petaflops at peak performance, which would put the system in the top 15 of supercomputers in the world, going off the November 2018 list.Named Jean Zay, after a French politician, the system will be designed specifically for artificial intelligence (AI) workloads. French President Emmanuel Macron has called for a national AI strategy. The system will sport 1,528 Intel Xeon Scalable nodes and 261 GPU nodes, each with four Nvidia Tesla V100 GPUs.To read this article in full, please click here

SGI lives on in the form of a French AI-focused supercomputer

France's IDRIS supercomputing center announced it will deploy a new HPE SGI 8600 supercomputer in June that is capable of reaching 14 petaflops at peak performance, which would put the system in the top 15 of supercomputers in the world, going off the November 2018 list.Named Jean Zay, after a French politician, the system will be designed specifically for artificial intelligence (AI) workloads. French President Emmanuel Macron has called for a national AI strategy. The system will sport 1,528 Intel Xeon Scalable nodes and 261 GPU nodes, each with four Nvidia Tesla V100 GPUs.To read this article in full, please click here

SGI tech lives on in the form of a French AI-focused supercomputer

France's IDRIS supercomputing center announced it will deploy a new HPE SGI 8600 supercomputer in June that is capable of reaching 14 petaflops at peak performance, which would put the system in the top 15 of supercomputers in the world, going off the November 2018 list.Named Jean Zay, after a French politician, the system will be designed specifically for artificial intelligence (AI) workloads. French President Emmanuel Macron has called for a national AI strategy. The system will sport 1,528 Intel Xeon Scalable nodes and 261 GPU nodes, each with four Nvidia Tesla V100 GPUs.To read this article in full, please click here

Cisco goes after industrial IoT

Cisco has rolled out a new family of switches, software, developer tools and blueprints to meld IoT and industrial networking with intent-based networking and classic IT security, monitoring and application-development support.To take on the daunting task the company unveiled a new family of industrial-networking Catalyst switches, IoT developer tools and support for Cisco’s DevNet developer program, and it validated IoT network design blueprints customers can work with to build solid IoT environments.  To read this article in full, please click here

Cisco goes after industrial IoT

Cisco has rolled out a new family of switches, software, developer tools and blueprints to meld IoT and industrial networking with intent-based networking and classic IT security, monitoring and application-development support.To take on the daunting task the company unveiled a new family of industrial-networking Catalyst switches, IoT developer tools and support for Cisco’s DevNet developer program, and it validated IoT network design blueprints customers can work with to build solid IoT environments.  To read this article in full, please click here

History Of Networking – ILNP and IP Mobility – Saleem Bhatti

Using a single IP address to provide both identity and location information can create challenges and inefficiencies in network design. In this History of Networking episode, we sit down with Saleem Bhatti to talk about the history of ILNP and IP mobility to see how this tech aims to resolve this challenge.

Saleem Bhatti
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – ILNP and IP Mobility – Saleem Bhatti appeared first on Network Collective.

Risking It All

When’s the last time you thought about risk? It’s something we have to deal with every day but hardly ever try to quantify unless we work in finance or a high-stakes job. When it comes to IT work, we take risks all the time. Some are little, like deleting files or emails thinking we won’t need them again. Or maybe they’re bigger risks, like deploying software to production or making a change that could take a site down. But risk is a part of our lives. Even when we can’t see it.

Mitigation Revelations

Mitigating risk is the most common thing we have to do when we analyze situations where risk is involved. Think about all the times you’ve had to create a backout plan for a change that you’re checking in. Even having a maintenance window is a form of risk mitigation. I was once involved in a cutover for a metro fiber deployment that had to happen between midnight and 2 am. When I asked why, the tech said, “Well, we don’t usually have any problems, but sometimes there’s a hiccup that takes the whole network down until we fix it. This way, there isn’t as much traffic Continue reading

International Approach to Internet Policy Declining, Some Experts Say

A long-time multistakeholder and international approach toward creating Internet policy is breaking down, with individual nations and some large companies increasingly deciding to go their own way and create their own rules, some Internet governance experts say.

The multistakeholder decision-making model that created the Internet’s policy standards over the last two decades has largely fallen apart, with countries pushing their own agendas related to privacy, censorship, encryption, Internet shutdowns and other issues, some of the experts said Tuesday at the State of the Net tech policy conference in Washington, D.C.

Recent efforts to keep the Internet safe for free expression and free enterprise are “mission impossible,” said Steve DelBianco, president and CEO of Internet-focused trade group NetChoice.

Back in the early 2000s, the Internet was enabling the disruption of governments and powerful businesses by providing users ways to work around those organizations, DelBianco added. “Fifteen years later, I’d have to say that governments and big businesses have regained their footing and are reasserting control,” he said.

Many nations are looking for new ways to control Internet content and users, added Laura DeNardis, a communications professor at American University and a scholar focused on Internet architecture and governance.

For many Continue reading