In addition to the new unstructured data storage systems, Dell unveiled intelligent data software...
The networking vendor is set to begin offering unlimited data to its cloud customers for the...
Deal includes multiple Nokia Software, ION products, including Unified Data Management, User Plane...
AT&T’s 5G network is now live for consumers in 137 additional markets across the country and...
Wipro Limited, a leading global information technology, consulting, and business process services...
IBM bought cloud security startup Spanugo; Nokia added Broadcom 5G chips to its ReefShark...
Hello my friend,
Traditionally in the beginning of June (5th of June to be accurate), we celebrate the anniversary of our blogging. And in this year it is already 4 years, since we started in 2016!
In terms of the absolute numbers, we have crossed the mark in 100 posted blogs! Hurray! And we were marked as Cisco Champion 2020 one more time! Also Hurray!
Let’s reflect what has happened global as well…
The biggest new introduction is the live online network automation training. Years of real practical experience of implementing and automating network solutions for service provider and data centres across Europe and North America are now available for you. Just join our network automation training in this run or in any next and learn:

There were multiple mini-series of the blogposts supported by the code at the GitHub:
This last week I was a guest on the TechSequences podcast with Leslie and Alexa discussing the centralization of the routed infrastructure in the ‘net. When that episode posts, I’ll cross post it here (but, of course, you should really just subscribe to their podcast, as they always have interesting guests—I’ll have Leslie and Alexa on the Hedge at some point, as well). The topic is related to this post on CircleID about the death of transit, which was a reaction to Geoff Huston’s article on the death of transit some time before.
All that to say… while reading through some research papers this week, I ran into a recent (2018) paper where Carisimo et al. try out different ways of measuring which autonomous systems belong to the “core” of the ‘net. They went about this by taking a set of AS’ “everyone” acknowledges to be “part of the core,” and then trying to find some measurement that successfully describes something all of them have in common.
The result is the k-metric, which measures the connectivity of an AS’ peers. If an AS has peers who are just as connected as they are, then k-metric is high. Otherwise, the k-metric Continue reading
The trade group was forced to nix this year’s MWC Barcelona event just as the pandemic was...
Earlier this year Nokia announced plans to use Intel and Marvell's base station chips in its...
Big Blue plans to integrate Spanugo’s software into its public cloud to help meet the security...
Today's Tech Bytes Podcast, sponsored by Aruba, discusses the AI capabilities in Aruba’s new Edge Services Platform or ESP; in particular, we explore Aruba's AIOps offering, and how artificial intelligence can improve day-to-day IT operations. Our guest is Jose Tellado, Chief Technologist of AIOps and an HPE Fellow.
The post Tech Bytes: Improving IT Operations With Aruba’s AIOps (Sponsored) appeared first on Packet Pushers.
Take a Network Break! Aruba targets the enterprise edge with Aruba ESP and AI, Intel grapples with new attacks against secure enclaves in its chips, and MIT walks away from negotiations with an academic publisher over open access to journals. Three tech companies rethink the sale of facial recognition technology to U.S. police forces, the Wi-Fi Alliance praises the FCC Chair, and more tech news and commentary.
The post Network Break 288: Aruba ESP Senses Opportunity At The Edge; Intel Wrestles With New Chip Attacks appeared first on Packet Pushers.
SD-WAN and security alone may not be going anywhere soon, but you can bet on SASE becoming a much...
No more tweets for you: Twitter has removed 170,000 accounts it says are tied to a coordinated pro-China campaign, BBC.com reports. A core network of nearly 24,000 accounts along with 150,000 “amplifier” accounts were among those removed, the company said. The accounts were pushing pro-communist messages while criticizing protestors in Hong Hong.
No more Zoom for you: Meanwhile, video conferencing giant Zoom has shut down the account of a pro-democracy activist on the request of the Chinese government, The Independent writes. The account was closed after Zhou Fengsuo and other activists held a digital event commemorating the 1989 Tienanmen Square Massacre. After criticism, Zoom reactivated the account.
Closing the gap: Sub-Saharan Africa is the Internet’s next frontier, writes Forbes contributor Miriam Tuerk. “Expanding network connectivity across sub-Saharan Africa will open up digital services that many of us now take for granted,” she says. “Mobile Banking, WhatsApp chatting and video, e-health, e-education are key services only possible with reliable internet connectivity.”
Where’s the WiFi? The state of Michigan has launched a map of free WiFi hotspots in an effort to aid residents without Internet access during the COVID-19 pandemic, WKZO.com reports. “While public Wi-Fi hot spots are not a Continue reading
Why do we need another routing protocol in the datacenter? And why not use optimised BPG or ISIS?
Tony Przygienda introduced and explains a new routing protocol written with current DC needs in mind; Routing in Fat Trees or in short RIFT.


In this blog post we’ll explore three tricks that can be used for data science that helped us solve real problems for our customer support group and our customers. Two for natural language processing in a customer support context and one for identifying attack Internet attack traffic.
Through these examples, we hope to demonstrate how invaluable data processing tricks, visualisations and tools can be before putting data into a machine learning algorithm. By refining data prior to processing, we are able to achieve dramatically improved results without needing to change the underlying machine learning strategies which are used.
When browsing a social media site, you may find the site prompts you to translate a post even though it is in your language.
We recently came across a similar problem at Cloudflare when we were looking into language classification for chat support messages. Using an off-the-shelf classification algorithm, users with short messages often had their chats classified incorrectly and our analysis found there’s a correlation between the length of a message and the accuracy of the classification (based on the browser Accept-Language header and the languages of the country where the request was submitted):

On a Continue reading