DT, Ericsson MmWave Backhaul Test Hits 5G Latency Targets
The test produced round-trip latency of less than 100 microseconds (0.1 milliseconds) and a data transmission speed of 40 Gb/s.
The test produced round-trip latency of less than 100 microseconds (0.1 milliseconds) and a data transmission speed of 40 Gb/s.
Today's episode introduces Heavy Networking, a rebrand of the Packet Pushers' Weekly Show. We've renamed this podcast to better reflect its deep dive into networking technology and skills, and better differentiate it from other infrastructure shows in our podcast network. We also dive into key trends that will impact your career.
The post Heavy Networking 423: Introducing Heavy Networking appeared first on Packet Pushers.
And Poland arrested a Chinese Huawei employee and charged him with spying for Beijing.
AWS purchases a disaster recovery startup; Synchronoss and TBSCASoft build blockchain for telecom operators; Red Hat releases a new version of its enterprise workflow framework.
Wake up! It's HighScalability time:
The modern day inner sanctum revealed for all to experience. Nausea no extra charge.
Do you like this sort of Stuff? Please support me on Patreon. Need cloud? Consume Explain the Cloud Like I'm 10 (35 nearly 5 star reviews).
Cisco announced it is buying Luxtera for $660M. Luxtera make SFP modules for Ethernet switches including the critical laser components. Interesting Things Just before the Christmas break when fewer people are watching. Background of US/China trade problems Cisco get control of part of the supply chain Silicon photonics is about using existing silicon manufacturing processes […]
The post Why Would Cisco Buy Luxtera ? appeared first on EtherealMind.
Sprint takes the next step on its path toward the launch of 5G services in the first half of 2019, seemingly with or without T-Mobile.
I’ve been blogging for Solarwinds recently, posting on Orange Matter, with a cross-post to the Thwack Geek Speak forum. This post examines how it’s easy to get so focused on automating the small stuff we have difficulty turning that into the more cohesive automation solution that we’d like to have.
This post appeared on Orange Matter as “Automation Paralysis: Why We Get Stuck Automating The Small Stuff“, but I’m also linking to the version posted on Thwack, mainly because that format allowed me to use more images and be slightly more irreverent. Irreverent? Moi? Of course.
I’d love it if you were to take a moment to visit and read, and maybe even comment!
If you liked this post, please do click through to the source at Orange Matter: Automation Paralysis and give me a share/like. Thank you!
It this Network Collective Short Take, Russ White discusses security considerations when deploying and operating IPv6.
The post Short Take – IPv6 Security Considerations appeared first on Network Collective.
Today’s guest post is from Bhredipta Socarana, an Intellectual Property lawyer based in Indonesia and a Youth@IGF Fellow.
As one of the most populated countries, Indonesia has grown as one of the biggest markets for technology development. From the import of various over-the-top platforms to the implementation of Artificial Intelligence, technology has changed the Indonesian livelihood, including my own. This is also the case for Internet of Things (IoT).
As an emerging country, Indonesia admittedly has not been an advance player in responding to technology improvement. Despite the heavy invasion of technology-related products, many Indonesians have homework to do, especially for IoT. The business player needs to be aware of the responsibility of manufacturing and distributing IoT, while the public must also be aware of the various risks that they may be exposed to using IoT products.
Through the rapid development of technology and the intention of the Indonesian government to push the public to enter the “Industrial Revolution 4.0,” it will be mostly impossible to prevent penetration of IoT to our life. This leaves the public with the need to get smart with IoT.
Privacy and cybersecurity are among the issues revolving around IoT, and the need to have a Continue reading
Welcome to Technology Short Take #109! This is the first Technology Short Take of 2019. It may be confirmation bias, but I’ve noticed of number of sites adding “Short Take”-type posts to their content lineup. I’ll take that as flattery, even if it wasn’t necessary intended that way. Enjoy!
Nothing this time around, but I’ll stay alert for items to include next time.
Edson Erwin invented this highly scalable and optimized way of connecting network nodes in the 1930s and Charles Clos made the telephone nodes interconnection design using that solution. It was even before we had IP networks. He invented it in order to optimize the architecture of telephony network systems back then. It was not used in IP based network for last few decades but it experienced a big comeback with new datacenter design in the last few years. It was first invented only for scalability requirements that it solved beautifully. In new datacenter design, CLOS topology of interconnecting network devices scalability
The post CLOS Topology appeared first on How Does Internet Work.
Changes are afoot in the world of monitoring. Companies will seek alternatives to APM and AI/machine learning will start to be used to deliver better insights.
One of my readers sent me a description of their automation system that manages firewall rulesets on Fortigate firewalls using NAPALM to manage device configurations.
In his own words:
We are now managing thousands of address objects, services and firewall policies using David Barroso’s FortiOS Napalm module. This works very well and with a few caveats (such as finding a way to enforce the ordering of firewall policies) we are able to manage all the configuration of our firewalls from a single Ansible playbook.
The did the right thing and implemented an abstracted data model using GitOps to manage it:
Read more ...Unsupervised learning of artistic styles with archetypal style analysis Wynen et al., NeurIPS’18
I’ve always enjoyed following work on artistic style transfer. The visual nature makes it easy to gain an appreciation for what is going on and the results are very impressive. It also something that’s been unfolding within the timespan of The Morning Paper, if we peg the beginning to the work of Gatys et al. in 2015. See for example the posts on ‘Texture Networks’ and ‘Deep photo style transfer.’
Beyond direct style transfer, the objective of the work described in today’s paper choice is to uncover representations of styles (archetypes) themselves. Given a large collection of paintings,…
… Our objective is to automatically discover, summarize, and manipulate artistic styles present in the collection.
This is achieved using an unsupervised learning technique called archetypal analysis. We can recover archetypes from a collection of paintings, and we can also go the other way; taking a painting and decomposing it into a combination of archetypes. And of course if we then manipulate the composition of archetypes, we can manipulate the style of an image.
To visualise what an archetype ‘looks like’ the authors synthesise Continue reading