AfPIF 2018 Day Three: Cloud Infrastructure, Local Content, and More

The growth of cloud infrastructure in Africa has been credited with the growth of local content in many regions, and it holds the key for Africa’s ability to attract content carriers and distribution networks.

The first panel of day three at the Africa Peering and Interconnection Forum (AfPIF) was dedicated to discussing the current scenario of cloud infrastructure and what it will take to grow the sector further, get the market interested, and eventually grow the level of content hosted locally.

South Africa has the most extensive cloud market, compared to other African countries, and it took concerted efforts from the different players, under the ISP Association, for the market to be deregulated and the laws to be put in place. The laws can take time, but industry players agree the laws are vital to investments in the market.

Although the industry may be small in Africa, cybersecurity is key, as businesses are susceptible to cybercrime, just like other global operators. That means the enactment of cyber security laws in the different countries, and continued training and awareness by industry players.

Power and cooling is another vital part, with many countries enjoying monopoly of power distribution. Liquid Telecom said Continue reading

Updated: Networking Modules in Building Next-Generation Data Centers Online Course

We migrated the self-study materials for the network infrastructure and services module of the Building Next-Generation Data Centers online course into the new format, and split the largest module of the course into manageable chunks: data center fabrics 101, designing leaf-and-spine fabrics, overlay virtual networking, IPv6 and network services.

Feedback on the new format is obviously highly welcome. Thank you!

Training classifiers with natural language explanations

Training classifiers with natural language explanations Hancock et al., ACL’18

We looked at Snorkel earlier this week, which demonstrates that maybe AI isn’t going to take over all of our programming jobs. Instead, we’ll be writing labelling functions to feed the machine! Perhaps we could call this task label engineering. To me, it feels a bit like programming a quick-and-dirty expert system, where the downstream generative model deals with all the inaccuracies and inconsistencies so that we don’t have to be perfect, just useful. Given the success of the approach, a natural question to ask is how we can enable end users to more easily create useful labelling functions in their domain. This is where BabbleLabble comes in!

In this work, we propose BabbleLabble, a framework for training classifiers in which an annotator provides a natural language explanation for each labeling decision. A semantic parser converts these explanations into programmatic labeling functions that generate noisy labels for an arbitrary amount of unlabeled data, which is used to train a classifier.

So much for those programming jobs ! ?

Working with BabbleLabble, it takes users about twice as long per example to provide a label plus an explanation as it does just Continue reading

Junos Kafka & InfluxDB Exporters

This post acts as the introduction for two other posts, which cover Junos data collection tools for Kafka and InfluxDB. The code is open-sourced and licensed under MIT. Both applications are ready for release and I’ve spent considerable spare time building and testing both pieces of software.

To Go or not to Go

Back in yesteryear, I used to be a C developer and enthusiast. Thanks to the infamous K&R C book, it made perfect sense when I needed a language that provided syntax what I thought of at the time as one level higher than assembly.
Roll the clock forwards a decade and Go has become my ‘go to’ (multi-pun intended) language. It’s powerful from its simplicity, easy to debug and super easy to observe when things aren’t going as you planned. The concurrency capabilities seem to make perfect sense and development cycles are short thanks to the powerful “batteries included” tool-chain. Building binaries couldn’t be easier and building containers for the likes of Docker is a piece of cake. Thanks also to the language’s popularity, tools like Travis-CI are easy to work with. Powerful enough to do almost anything, easy enough to learn in days and offers Continue reading

NSX Cloud at VMworld US 2018

We have done a series of blogs on NSX Cloud in the last couple of weeks and the response has been great! We have customers who have purchased licenses already and are on-route to deployment, customers with whom we have completed POCs successfully, and a pipeline that looks promising. Meanwhile, recognitions continue to flow from all sides, CRN rated NSX Cloud as one of the 10 best SDN solutions for 2018 and NSX Cloud was judged as Best of Show runners-up in the cloud computing category at Interop Tokyo. With all this excitement and VMworld around the corner, we couldn’t help but write again to provide more updates. So, here we go!

 

Before reading on, if you would like to quickly go over past blogs, here is your single pane of glass to past blogs *wink*. You can find a high-level overview of VMware’s vision for Virtual Cloud Network and how NSX Cloud fits into the broader vision over here. If you are like, duh! I know that, can you just give me an overview about NSX Cloud… we hear you and this is where you could go to refresh your memory on NSX Cloud.  If you are Continue reading

IDG Contributor Network: Does your network have a trade imbalance?

Network traffic, by nature, is often unbalanced. For example, a client that requests a video on demand may receive ten times more bandwidth than it sends for that service. Likewise, most web applications are very one-sided, with the bulk of the traffic being from server to client. The opposite is true for many backup applications, where the bulk of the traffic originates at the client and terminates at the server.The United States is like your network – suffering from a trade imbalance. For every packet we ship to a foreign network, we are receiving four or five in return. Just as there are barriers to trade, we apply barriers to our inbound traffic. The barrier for most of us is the actual size of our Internet service interface. Packets queue up and drop at our carrier’s equipment prior to even being seen by our equipment. If you purchase a 50Meg download speed, any packets that arrive at a faster rate (even for a sub-second of time) will be dropped without prejudice. This is a barrier, restriction and tariff on your services that limit your business. The only solution – buy more bandwidth!To read this article in full, please Continue reading

IDG Contributor Network: Does your network have a trade imbalance?

Network traffic, by nature, is often unbalanced. For example, a client that requests a video on demand may receive ten times more bandwidth than it sends for that service. Likewise, most web applications are very one-sided, with the bulk of the traffic being from server to client. The opposite is true for many backup applications, where the bulk of the traffic originates at the client and terminates at the server.The United States is like your network – suffering from a trade imbalance. For every packet we ship to a foreign network, we are receiving four or five in return. Just as there are barriers to trade, we apply barriers to our inbound traffic. The barrier for most of us is the actual size of our Internet service interface. Packets queue up and drop at our carrier’s equipment prior to even being seen by our equipment. If you purchase a 50Meg download speed, any packets that arrive at a faster rate (even for a sub-second of time) will be dropped without prejudice. This is a barrier, restriction and tariff on your services that limit your business. The only solution – buy more bandwidth!To read this article in full, please Continue reading

At VMworld, Get An Inside Look at a Modern Bank. Learn How Wells Fargo and Other Top Brands Reduce Risk While Fostering Innovation.

This blog was co-authored by Jared Ruckle and Jonathan Morin.

 

VMworld is one of the seminal weeks in enterprise IT. You gather with your peers to learn and discuss the challenges of the day. And what are those challenges? Three stand out:

  1. Rising consumer expectations. Your customers expect to interact with your brand on their terms. Self-service, mobility, and speed are table stakes. If you don’t deliver a responsive and engaging user experience, you’re irrelevant.
  2. Increased competition from startups and incumbents. Your competitors aren’t only your peers in the FORTUNE 500. Startups all over the world are looking to take your market share.
  3. Constantly evolving security threats from every direction. Speaking of table stakes: security. In an era where attacks can be launched for pennies – by anyone, from anywhere – you have take a different approach to InfoSec. You need to move faster. Speed and velocity aren’t just for development teams. It’s a crucial for a modern InfoSec mindset too.

 

Sound familiar? It should if you’re an IT leader. No matter where you are on your journey to get better at software, it’s always fun to learn from others. We want to highlight a few sessions Continue reading

Research: Facebook’s Edge Fabric

The Internet has changed dramatically over the last ten years; more than 70% of the traffic over the Internet is now served by ten Autonomous Systems (AS’), causing the physical topology of the Internet to be reshaped into more of a hub-and-spoke design, rather than the more familiar scale-free design (I discussed this in a post over at CircleID in the recent past, and others have discussed this as well). While this reshaping might be seen as a success in delivering video content to most Internet users by shortening the delivery route between the server and the user, the authors of the paper in review today argue this is not enough.

Brandon Schlinker, Hyojeong Kim, Timothy Cui, Ethan Katz-Bassett, Harsha V. Madhyastha, Italo Cunha, James Quinn, Saif Hasan, Petr Lapukhov, and Hongyi Zeng. 2017. Engineering Egress with Edge Fabric: Steering Oceans of Content to the World. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (SIGCOMM ’17). ACM, New York, NY, USA, 418-431. DOI: https://doi.org/10.1145/3098822.3098853

Why is this not enough? The authors point to two problems in the routing protocol tying the Internet together: BGP. First, they state that BGP is not Continue reading