Archive

Category Archives for "Networking"

[Sponsored] Short Take – Cumulus Networks

In this sponsored Network Collective Short Take, Pete Lumbis joins us to talk about how Cumulus Networks is offering a new disaggregated approach to network operations. There are some common concerns when it comes to a disaggregated model and in this conversation we focus on how Cumulus is making support, operations, and procurement fit within the models and experiences you are used to. All of this while still empowering engineers to take advantage of the power and flexibility that Cumulus Linux has to offer. For more information about Cumulus Linux, visit https://cumulusnetworks.com

 

Pete Lumbus
Guest
Eyvonne Sharp
Host

The post [Sponsored] Short Take – Cumulus Networks appeared first on Network Collective.

IDG Contributor Network: Machine learning takes a load off in network management

As networks become more software-driven, they generate vastly greater amounts of data, which provides some challenges: adhering to compliance and customer privacy guidelines, while harvesting the massive amounts of data—it is physically impossible for humans to tackle the sheer volume that is created. But the vast amounts of data also provide an opportunity for businesses: leveraging analytics and machine learning to gather insights that can help network management move from reactive to proactive to assurance. This doesn’t just mean a massive shift in technology because the human element won’t simply go away. Instead, by combining human intellect and creativity with the computing power AI offers, innovative design and management techniques will be developed to build self-improving intelligent algorithms. The algorithms allow networks to operate in a way that far outweighs networks of the past.To read this article in full, please click here

IDG Contributor Network: Machine learning takes a load off in network management

As networks become more software-driven, they generate vastly greater amounts of data, which provides some challenges: adhering to compliance and customer privacy guidelines, while harvesting the massive amounts of data—it is physically impossible for humans to tackle the sheer volume that is created. But the vast amounts of data also provide an opportunity for businesses: leveraging analytics and machine learning to gather insights that can help network management move from reactive to proactive to assurance. This doesn’t just mean a massive shift in technology because the human element won’t simply go away. Instead, by combining human intellect and creativity with the computing power AI offers, innovative design and management techniques will be developed to build self-improving intelligent algorithms. The algorithms allow networks to operate in a way that far outweighs networks of the past.To read this article in full, please click here

Independence, Impartiality, and Perspective

In case you haven’t noticed recently, there are a lot of people that have been going to work for vendors and manufacturers of computer equipment. Microsoft has scored more than a few of them, along with Cohesity, Rubrik, and many others. This is something that I see frequently from my position at Tech Field Day. We typically hear the rumblings of a person looking to move on to a different position early on because we talk to a great number of companies. We also hear about it because it represents a big shift for those who are potential delegates for our events. Because going to a vendor means loss of their independence. But what does that really mean?

Undeclaring Independence

When people go to work for a manufacturer of a computing product, the necessarily lose their independence. But that’s not the only case where that happens. You can also not be truly independent if you work for reseller. If your company specializes in Cisco and EMC, are you truly independent when discussion Juniper and NetApp? If you make your money by selling one group of products you’re going to be unconsciously biased toward them. If you’ve been burned or had Continue reading

IDG Contributor Network: 4 ways data science services is helping businesses reach IoT goals, faster

Data scientists are an essential part of an IoT deployment. They fill a critical need to interpret data and provide valuable context around machine learning. However, as IoT initiatives expand and mature in a business, in-house data science resources can become thinly stretched. This creates a data pile-up that is a surefire way to set your deployment back.Hiring more data scientists is typically not an option either as there is a significant shortage in the market. Demand is only going up too: Gartner predicts that a shortage of data scientists will hinder 75% of organizations from reaching their full potential with IoT through 2020. Because hiring is difficult, time consuming and expensive, many organizations are turning to data science services to fill in resource gaps. Outsourcing data scientists has the dual benefit of helping keep IoT initiatives moving forward while freeing up internal resources to focus on other areas of the business.To read this article in full, please click here

PQ 151: Cisco And The Art Of Disaggregation With IOS-XR (Sponsored)

Today on the Packet Pushers Priority Queue, we get nerdy about disaggregation, where you mix and match software from one vendor and hardware from another.

Our sponsor today is Cisco, and if you just did a double-take, that s right, Cisco wants to talk to you about disaggregation, but there’s more to it than just hardware/software separation.

Joining us are Bhavna Prasad, Product Manager at Cisco; and Akshat Sharma, Technical Marketing Engineer for Cisco s Service Provider BU.

We discuss the different kinds or degrees of disaggregation, and then drill into specifics around IOS-XR.

We also look at the programmatic capabilities and interfaces of IOS-XR, what hardware it’s available on, use cases, and more.

Show Links:

@XRDOCS – Cisco Systems

XRDOCS on Twitter

Akshat Sharma on Twitter

The post PQ 151: Cisco And The Art Of Disaggregation With IOS-XR (Sponsored) appeared first on Packet Pushers.

IDG Contributor Network: How hybrid cloud file services solve AEC’s file problems

AEC companies (architecture, engineering, construction) often deal with large design files that need to be shared across multiple offices or job sites. During collaboration among remote teams, files may need to be locked for exclusive write permission to prevent inadvertent overwriting. When remotely accessing large number of files, the old method of VPN is deemed inefficient due to WAN bandwidth and latency challenges.Cloud storage solutions such as Dropbox are also inadequate to handle the amount of changed files and file locking requirements. A new category of storage solution has emerged to address this type of application and it’s called Hybrid Cloud File Services. The name implies that it uses a file system that spans across cloud and on premises. This is different from the Dropbox-like cloud-only file system.To read this article in full, please click here

Introducing Proudflare, Cloudflare’s LGBTQIA+ Group

Introducing Proudflare, Cloudflare's LGBTQIA+ Group

Introducing Proudflare, Cloudflare's LGBTQIA+ Group

With Pride month now in our collective rearview mirror for 2018, I wanted to share what some of us have been up to at Cloudflare. We're so proud that, in the last 8 months, we've formed a LGBTQIA+ Employee Resource Group (ERG) called Proudflare. We've launched chapters and monthly activities in each of our primary locations: San Francisco, London, Singapore, and Austin. This month, we came out in force! We transformed our company's social profiles, wrapped our HQ building in rainbow window decals, highlighted several non-profits we support, and threw a heck of an inaugural Pride Celebration.

We’re a very young group — just 8 months old — but we have big plans. Check out some of our activities and future plans, follow us on social media, and consider starting an ERG at your company too.

The History of Proudflare

On my first day at Cloudflare in October, 2017, I logged into Hipchat and searched LGBTQ. Fortunately for me, there was a "LGBT at Cloudflare" chat room already created, and I started establishing connections right away. I found that there had been a couple of informal group outings, but there was no regular activity, sharing of resources, nor an official Continue reading

2018 State of the CIO Report Reveals the 10 Most Difficult IT Jobs for Employers to Fill

According to the 2018 CIO Survey many organizations are having trouble finding and retaining talent with the necessary skillset to fill positions related to some of today’s most popular and cutting edge technologies. Organizations point to education program’s inability to keep up with rapid changes in modern technology, as well as a general high demand for certain positions as the culprit (Florentine).

Luckily, at INE we add new courses every week on a variety of topics, including those that are considered among the newest and most cutting-edge. Continue Reading to see which IT jobs the CIO report has dubbed the highest in-demand.

This blog post is based off of an original CIO article by Sharon Florentine. To read the original article click here.

Quantum-secured network ‘virtually un-hackable’

A 75-mile, quantum-secured, high-speed fiber link has been built in the United Kingdom, the largest internet supplier there has said.Particles of light, known as photons, carry encryption keys over the same connection as data. Hijacking those photons within the link immediately notifies the system that the keys have become bad — the thief interfering with those keys alters them and then they can’t be used by the interceptor — and the traffic becomes garbled instantly.It’s “virtually un-hackable,” said Gavin Patterson, outgoing BT chief executive, announcing the link at Internet of Things World Europe that I attended in London last month.To read this article in full, please click here

Quantum-secured network ‘virtually un-hackable’

A 75-mile, quantum-secured, high-speed fiber link has been built in the United Kingdom, the largest internet supplier there has said.Particles of light, known as photons, carry encryption keys over the same connection as data. Hijacking those photons within the link immediately notifies the system that the keys have become bad — the thief interfering with those keys alters them and then they can’t be used by the interceptor — and the traffic becomes garbled instantly.It’s “virtually un-hackable,” said Gavin Patterson, outgoing BT chief executive, announcing the link at Internet of Things World Europe that I attended in London last month.To read this article in full, please click here