Single-Image Systems or Automated Fabrics

In the Network Automation 101 webinar and Building Network Automation Solutions online course I described one of the biggest challenges the networking engineers are facing today: moving from thinking about boxes and configuring individual devices to thinking about infrastructure and services, and changing data models which result in changed device configurations.

The $1B question is obviously: and how do we get from here to there?

Read more ...

CI/CD For Networking Part 5

Ansible AWX is the upstream open source project to Ansible Tower. For this part of the series AWX will be installed on a Centos 7 minimal host with the firewall service disabled and SELinux set to permissive. Nginx will be utilized as a reverse proxy for HTTP/S traffic to the AWX...

The Future of Cognitive Cloud Networking

Artificial Intelligence, machine and deep learning have to be among the most popular tech-words of the past few years, and I was hoping that I wouldn’t get swept away by it. But when I heard a panel on this topic at our customer event this month on the state of AI networks, I found it incredibly fascinating and it piqued my curiosity! Let me start with a note of disclaimer for readers who are expecting a deep tutorial from me. There is a vast amount of research behind models and algorithms on this topic that I will not even attempt to cover. Instead I will try to share some thoughts on the practical relevance of this promising field.

The Future of Cognitive Cloud Networking

Artificial Intelligence, machine and deep learning have to be among the most popular tech-words of the past few years, and I was hoping that I wouldn’t get swept away by it. But when I heard a panel on this topic at our customer event this month on the state of AI networks, I found it incredibly fascinating and it piqued my curiosity! Let me start with a note of disclaimer for readers who are expecting a deep tutorial from me. There is a vast amount of research behind models and algorithms on this topic that I will not even attempt to cover. Instead I will try to share some thoughts on the practical relevance of this promising field.

Deep Learning on HPC Systems for Astronomy

On today’s episode of “The Interview” with The Next Platform we talk about the use of petascale supercomputers for training deep learning algorithms. More specifically, how this happening in Astronomy to enable real-time analysis of LIGO detector data.

We are joined by Daniel George, a researcher in the Gravity Group at the National Center for Supercomputing Applications, or NCSA. His team garnered a great deal of attention at the annual supercomputing conference in November with work blending traditional HPC simulation data and deep learning.

George and his team have shown that deep learning with convolutional neural networks can provide many

Deep Learning on HPC Systems for Astronomy was written by Nicole Hemsoth at The Next Platform.

First Look at the DockerCon San Francisco 2018 Agenda

From June 12th – 15th, San Francisco will welcome 6,000+ developers, sysadmins, architects, VP of Apps and other IT leaders to get hands-on with the latest innovations in the container ecosystem at DockerCon 2018. Today, we are excited to share a first look at the DockerCon Agenda. We’ve brought back some of your favorite from past DockerCons and are also thrilled to welcome many first time DockerCon speakers to the stage. Here is a first look at some of our favorites sessions:

 

DockerCon

Customers in Production  

Use case sessions highlight how companies are using Docker to modernize their infrastructure and build, manage and secure  distributed applications. These sessions are heavy on business value, ROI and production implementation advice, and learnings.

  • Building your NoSQL ship: How an Enterprise transitioned from a RDBMS to NoSQL DB using Agile and Docker by Jonell Taylor, Metlife
  • Black Friday and 100K Deployments Per Year by Srikanth Bulusu & Sanjoy Mukherjee, JCPenney
  • Packaging Software for Distribution on the Edge with Docker and Windows Server
    Peter Ngai, GE Digital

Using Docker

Using Docker sessions are introductory sessions for Docker users, dev and ops alike. Filled with practical advice, learnings, and insight, these sessions will Continue reading

What is 802.11ax Wi-Fi, and what will it mean for 802.11ac

Each new Wi-Fi standard has brought significant improvements in performance, with the most recent, 802.11ac, offering an impressive theoretical maximum rate of 1.3Gbps.  Unfortunately, these gains have not been enough to keep pace with demand, leading to that exasperated cry heard across airports, malls, hotels, stadiums, homes and offices: “Why is the wireless so slow?”The IEEE is taking another crack at boosting Wi-Fi performance with a new standard called 802.11ax or High-Efficiency Wireless, which promises a fourfold increase in average throughput per user.RELATED: Can MU-MIMO really boost wireless capacity? 802.11: Wi-Fi standards and speeds explained Wi-Fi 2018: What does the future look like? 802.11ax is designed specifically for high-density public environments, like trains, stadiums and airports. But it also will be beneficial in Internet of Things (IoT) deployments, in heavy-usage homes, in apartment buildings and in offices that use bandwidth-hogging applications like videoconferencing.To read this article in full, please click here

What is 802.11ax Wi-Fi, and what will it mean for 802.11ac

Each new Wi-Fi standard has brought significant improvements in performance, with the most recent, 802.11ac, offering an impressive theoretical maximum rate of 1.3Gbps.  Unfortunately, these gains have not been enough to keep pace with demand, leading to that exasperated cry heard across airports, malls, hotels, stadiums, homes and offices: “Why is the wireless so slow?”The IEEE is taking another crack at boosting Wi-Fi performance with a new standard called 802.11ax or High-Efficiency Wireless, which promises a fourfold increase in average throughput per user.RELATED: Can MU-MIMO really boost wireless capacity? 802.11: Wi-Fi standards and speeds explained Wi-Fi 2018: What does the future look like? 802.11ax is designed specifically for high-density public environments, like trains, stadiums and airports. But it also will be beneficial in Internet of Things (IoT) deployments, in heavy-usage homes, in apartment buildings and in offices that use bandwidth-hogging applications like videoconferencing.To read this article in full, please click here

EVPN’s 4 critical benefits for digital transformation

Digital transformation demands more of everything: speed, throughput, agility and scalability. That’s why organizations are rethinking traditional layer 2 switched data center architectures and moving towards intelligent layer 3 routed network designs. With a layer 3 architecture, your data center can use proven routing protocols to simplify troubleshooting, facilitate upgrades, scale efficiently and converge traffic.

But what about the applications, storage appliances and multi-tenant environments that still require traditional layer 2 connectivity? Legacy protocols that enable layer 2 traffic to run over a layer 3 routed infrastructure have significant limitations that become serious obstacles when the data center must scale, accommodate multiple vendors’ systems or support multi-tenancy. Fortunately, there’s a scalable, simple, non-proprietary solution. Enter EVPN.

Cumulus’ unique Virtual eXtensible Local Area Network (VXLAN) Ethernet Virtual Private Network (EVPN) solution offers unmatched interoperability and efficiency. By adding VXLAN distributed routing, Cumulus EVPN undoes all of the complications of layer 2 connectivity and frees you from reliance on proprietary controllers. Looking for proof that EVPN delivers on that promise? We’ve got plenty of evidence, so here’s four major advantages of utilizing EVPN to meet the demands of digital transformation.

1) Accommodate growth without disruption

With Cumulus EVPN, you can quickly and Continue reading

memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations

ASERT Threat Summary: memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations Date/Time: 27022018 2325UTC Title/Number: memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations – February 2018 – v1.4. Severity: Critical Distribution: TLP WHITE (see <https://www.us-cert.gov/tlp>) Categories: Availability Authors: Roland Dobbins & Steinthor Bjarnason Contributors: Keshav […]