AI use by telcos and providers potentially can improve customer service, speed onboarding, and reduce outages by pro-actively identifying problems. Is this hype or can AI deliver benefits to the enterprise?
Here’s a bit of good news for those of you scared of network automation replacing your jobs: even Elon Musk didn’t manage to pull it off, so I don’t think a networking vendor dabbling in intent will manage to do it (particularly considering the track record of networking vendors’ network management and orchestration systems).
Read more ...Continuing on with the theme of previous cheat sheet articles, this article will help decode the format for Amazon Web Services’ Elastic Compute Cloud (EC2) instance types.
When asked about Kurian, who heads the company’s cloud business, Co-CEO Mark Hurd said “we expect him back.” But Hurd refused to say when that will happen.
Startups share their path to market with their global telecommunications providers at TC3 Summit 2018.
When I joined Arista ten years ago, we were in the midst of developing a novel purpose-built software architecture from a clean sheet of paper for networking. The financial services industry was in crisis, with the collapse of major banks like Lehman Brothers. In parallel, emerging slowly but surely, was a new breed of hyper-scale cloud operators. Amazon AWS, Microsoft Azure and Google GCP were in the early stages of shaping what was to become the public cloud. The requirements of these new titans provided a source of inspiration for the Arista founders and me. We couldn’t have predicted the pace nor the impact of this cloud fury; it came strongly and rapidly. As I reminisce over the past decade, it is clear that the cloud inflection has forever changed the face of enterprise IT for the better. Yet it is just the beginning, and there is much ahead.
Distributed computing with Red Hat OpenStack Platform allows the Contrail Edge Cloud to remotely manage the lifecycle of compute nodes and virtual machines (VMs) from a centralized data center without requiring co-located OpenStack control plane functions in each of these remote edge sites.
I lived through the 3G and 4G hype but I don’t remember the breadth of hype being quite as insane as it is for 5G.
Carpenters always remember one simple piece of advice when they are working on a job: Measure twice, cut once. It’s a little different in networking, though. In our industry, my advice is the following: Measure many times, but never cut. @Search Networking
Both vendors have scored significant 5G deals with all of the major U.S. operators but are not afraid to throw shade at each other.
South Korean operator SK Telecom picked these three equipment vendors for its 5G deployment. The company plans to launch 5G in the first half of 2019.
The hyperconverged infrastructure system is designed for edge deployments. It includes automated virtualization, compute, storage, and power management resources, along with built-in redundancy.
This post describes how to use Cloudflare's IPFS gateway to set up a website which is end-to-end secure, while maintaining the performance and reliability benefits of being served from Cloudflare’s edge network. If you'd rather read an introduction to the concepts behind IPFS first, you can find that in our announcement. Alternatively, you could skip straight to the developer docs to learn how to set up your own website.
By 'end-to-end security', I mean that neither the site owner nor users have to trust Cloudflare to serve the correct documents, like they do now. This is similar to how using HTTPS means you don't have to trust your ISP to not modify or inspect traffic.
The first step is to choose a domain name for your website. Websites should be given their own domain name, rather than served directly from the gateway by root hash, so that they are considered a distinct origin by the browser. This is primarily to prevent cache poisoning, but there are several functional advantages as well. It gives websites their own instance of localStorage and their own cookie jar which are sandboxed from inspection and manipulation by malicious third-party documents. Continue reading