IDG Contributor Network: IoT sensors, advanced ESRI mapping and Alexa warn residents of impending floods

Scott Pruitt, EPA Administrator’s assertion that “global warming might be beneficial” may be reassuring to some, but others living close to the coast prefer the safety of an early warning when they might be flooded from rising sea levels.Predicting floods from storm surges, rain, hurricanes and tides over miles of coastline is hard. How do your monitor water levels over such a broad area? How can floods be predicted with these data streams? How can thousands of people be alerted?  The Virginia Institute of Marine Science (VIMS) is pioneering an innovative approach that combines IoT sensors, advanced mapping and Alexa.To read this article in full, please click here

AI Redefines Performance Requirements At The Edge

In a broad sense, the history of computing is the constant search for the ideal system architecture. Over the last few decades system architects have continually shifted back and forth from centralized configurations where computational resources are located far from the user to distributed architectures where processing resources were located closer to the individual user.

Early systems used a highly centralized model to deliver increased computational power and storage capabilities to users spread across the enterprise. During the 1980s and 1990s, those centralized architectures gave way to the rise of low cost PCs and the emergence of LANs and then

AI Redefines Performance Requirements At The Edge was written by Timothy Prickett Morgan at The Next Platform.

IDG Contributor Network: 7 common cloud data management pitfalls to avoid

There are many compelling reasons to migrate applications and workloads to the cloud, from scalability to easy maintenance, but moving data is never without risk. When IT systems or applications go down it can prove incredibly costly for businesses. A single hour of downtime costs over $100,000 according to 98% of organizations surveyed by ITIC.Mistakes are easy to make in the rush to compete. There’s a lot that can go wrong, particularly if you don’t plan properly.“Through 2022, at least 95% of cloud security failures will be the customer’s fault,” says Jay Heiser, research vice president at Gartner.To read this article in full, please click here

Why Content Providers don’t like Access Service Providers

Why Content Providers (Over the Top) don’t like Access Service Providers ?   Probably title of this post could be a ‘ Power of Access Providers ‘ or better ,  should be ‘ Why Some Content Providers don’t like Some Access Service Providers’. You will understand the reasons at the end of the post I promise.   …

The post Why Content Providers don’t like Access Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Why Content Providers don’t like Access Service Providers

Why Content Providers (Over the Top) don’t like Access Service Providers ?   Probably title of this post could be a ‘ Power of Access Providers ‘ or better ,  should be ‘ Why Some Content Providers don’t like Some Access Service Providers’. You will understand the reasons at the end of the post I promise.   …

The post Why Content Providers don’t like Access Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Why Content Providers don’t like Access Service Providers

Why Content Providers (Over the Top) don’t like Access Service Providers ?   Probably title of this post could be a ‘ Power of Access Providers ‘ or better ,  should be ‘ Why Some Content Providers don’t like Some Access Service Providers’. You will understand the reasons at the end of the post I promise.   […]

The post Why Content Providers don’t like Access Service Providers appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Autumn 2018 Network Automation Course Starts on September 18th

When the Spring 2018 Building Network Automation Solutions online course started, we didn’t know whether we’d run another course in 2018, so we offered engineers who wanted to get an early start Believer price.

The wait is over: the autumn 2018 course starts on September 18th. The schedule of the live sessions is already online, and we also have the first guest speakers. We’ll announce them in early June at which time you will no longer be able to get the Enthusiast price, so register ASAP.

Photo-realistic single image super-resolution using a generative adversarial network

Photo-realistic single image super-resolution using a generative adversarial network Ledig et al., arXiv’16

Today’s paper choice also addresses an image-to-image translation problem, but here we’re interested in one specific challenge: super-resolution. In super-resolution we take as input a low resolution image like this:

And produce as output an estimation of a higher-resolution up-scaled version:

For the example above, here’s the ground truth hi-resolution image from which the low-res input was initially generated:

Especially challenging of course, is to recover / generate realistic looking finer texture details when super-resolving at large upscaling factors. (Look at the detail around the hat band and neckline in the above figures for example).

In this paper, we present SRGAN, a generative adversarial network (GAN) for image super-resolution (SR). To our knowledge, it is the first framework capable of inferring photo-realistic natural images for 4x upscaling factors.

In a mean-opinion score test, the scores obtained by SRGAN are closer to those of the original high-resolution images than those obtained by any other state-of-the-art method.

Here’s an example of the fine-detail SRGAN can create, even when upscaling by a factor of 4. Note how close it is to the original.

Your Loss is my GA(i)N

A Continue reading

The Rise of Edge Compute: The Video

The Rise of Edge Compute: The Video

The Rise of Edge Compute: The Video

At the end of March, Kenton Varda, tech lead and architect for Cloudflare Workers, traveled to London and led a talk about the Rise of Edge Compute where he laid out our vision for the future of the Internet as a platform.

Several of those who were unable to attend on-site asked for us to produce a recording. Well, we've completed the audio edits, so here it is!


Visit the Workers category on Cloudflare's community forum to learn more about Workers and share questions, answers, and ideas with other developers.

Visit the Community Forum Here »

How to manage access in a web-scale data center

One of the consistent questions that arises during the web-scale transition is the impact of managed access to networking infrastructure. How do we take traditional management techniques and adapt them to the new operational paradigm of web-scale networking, where automation drives the majority of changes and the infrastructure is treated as a holistic entity rather than node-by-node?

Local privileges

In the most basic way, we can migrate existing workflows to the new paradigm. Though inefficient, the old way of doing things still works with the new web-scale paradigm. The easiest way to do this is to restrict access to your switches using local privileges. In Linux, users are controlled using the adduser command, and the permissions for that user are controlled using the chmod commands.

A list of all users is stored in the /etc/passwd folder of Linux:

 cumulus@leaf02:~$ cat /etc/passwd
 root:x:0:0:root:/root:/bin/bash
 daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
 bin:x:2:2:bin:/bin:/usr/sbin/nologin
 sys:x:3:3:sys:/dev:/usr/sbin/nologin
 sync:x:4:65534:sync:/bin:/bin/sync
 games:x:5:60:games:/usr/games:/usr/sbin/nologin
 man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
 lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
 mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
 news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
 uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
 proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
 www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
 backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
 list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
 irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
 gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
 nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
 systemd-timesync:x:100:103:systemd Time Synchronization,,,:/run/systemd:/bin/false
 systemd-network:x:101:104:systemd Network Management,,,:/run/systemd/netif:/bin/false
 systemd-resolve:x:102:105:systemd Resolver,,,:/run/systemd/resolve:/bin/false
 systemd-bus-proxy:x:103:106:systemd Bus Proxy,,,:/run/systemd:/bin/false
 frr:x:104:109:Frr routing suite,,,:/var/run/frr/:/bin/false
 ntp:x:105:110::/home/ntp:/bin/false
 uuidd:x:106:111::/run/uuidd:/bin/false
 messagebus:x:107:112::/var/run/dbus:/bin/false
 sshd:x:108:65534::/var/run/sshd:/usr/sbin/nologin
 snmp:x:109:114::/var/lib/snmp:/usr/sbin/nologin
 dnsmasq:x:110:65534:dnsmasq,,,:/var/lib/misc:/bin/false
 _lldpd:x:111:115::/var/run/lldpd:/bin/false
 cumulus:x:1000:1000:cumulus,,,:/home/cumulus:/bin/bash

Users can be added and deleted using the adduser and deluser commands:

 cumulus@leaf02:~$ sudo  Continue reading

Arista applies cloud principles to campus networks

Arista Networks has arguably been the most disruptive data center network vendor in the past 10 years. The company built a product specifically designed for the rise of software-defined networking (SDN) and made “spline” a household word, assuming you live in a house full of network engineers. If you don’t eat, live, and breathe networking and you’re not familiar with a spline, it’s a single-tier network optimized for the era of cloud computing.The rise of east-west traffic gave birth to the concept of a two-tier leaf-spine network, but Arista further simplified that down into a single tier. By collapsing the leaf and spine into a single tier, Arista is able to scale its network out rapidly simply by adding more switches to the spline — making it theoretically infinitely scalable. Arista took this model and applied it to data center interconnect, routing, and other use cases related to data centers.To read this article in full, please click here

Arista applies cloud principles to campus networks

Arista Networks has arguably been the most disruptive data center network vendor in the past 10 years. The company built a product specifically designed for the rise of software-defined networking (SDN) and made “spline” a household word, assuming you live in a house full of network engineers. If you don’t eat, live, and breathe networking and you’re not familiar with a spline, it’s a single-tier network optimized for the era of cloud computing.The rise of east-west traffic gave birth to the concept of a two-tier leaf-spine network, but Arista further simplified that down into a single tier. By collapsing the leaf and spine into a single tier, Arista is able to scale its network out rapidly simply by adding more switches to the spline — making it theoretically infinitely scalable. Arista took this model and applied it to data center interconnect, routing, and other use cases related to data centers.To read this article in full, please click here