Thanks to all who joined us for The Modern Telco is Open, Part 3 – Intelligent Virtualized Operations and Automation for Telco sponsored by Red Hat and Intel.
In the long run, provided there are enough API pipes into the code, software as a service might be the most popular way to consume applications and systems software for all but the largest organizations that are running at such a scale that they can command almost as good prices for components as the public cloud intermediaries. The hassle of setting up and managing complex code is in a lot of cases larger than the volume pricing benefits of do it yourself. The difference can be a profit margin for both cloud builders and the software companies that peddle their …
MapD Fires Up GPU Cloud Service was written by Timothy Prickett Morgan at The Next Platform.

This is a guest Post by Jake Lumetta, Founder and CEO, ButterCMS, an API-first CMS. For more content like this, follow @ButterCMS on Twitter and subscribe to our blog.
Are your microservices too small or too tightly coupled? Are you confident in your decision-making about service boundaries? In interviews with dozens of experienced CTOs, they offered design attributes that they consider when creating a set of microservices. This article distills that wisdom into five key principles to help you better design microservices.
The design attributes discussed below matter because reaping the benefits of microservices requires designing thoughtful microservice boundaries.
One of the major challenges when it comes to creating a new system with a microservice architecture. It came about when I mentioned that one of the core benefits of developing new systems with microservices is that the architecture allows developers to build and modify individual components independently — but problems can arise when it comes to minimizing the number of callbacks between each API. The solution according to McFadden, is to apply the appropriate service boundaries.
But in contrast to the sometimes difficult-to-grasp and abstract concept of domain driven design (DDD) — a framework for Continue reading
var user = 'onos';
var password = 'rocks';
var onos = '192.168.123.1';
var controls = {};
setFlow('udp_reflection',
{keys:'ipdestination,udpsourceport',value:'frames'});
setThreshold('udp_reflection_attack',
{metric:'udp_reflection',value:100,byFlow:true,timeout:2});
setEventHandler(function(evt) {
// don't consider inter-switch links
var link = topologyInterfaceToLink(evt.agent,evt.dataSource);
if(link) return;
// get port information
var port = topologyInterfaceToPort(evt.agent,evt.dataSource);
if(!port) return;
// need OpenFlow info to create ONOS filtering rule
if(!port.dpid || !port.ofport) return;
// we already have Continue reading
At a recent 5G panel discussion the audience was asked to raise their hand if they were looking forward to buying a 5G access point this year. Not a single hand went up.

The ACE (African Coast to Europe) submarine cable runs along the west coast of Africa between France and South Africa, connecting 22 countries. It extends over 17,000 km, and has a potential capacity of 5.12 Tbps. The cable system is managed by a consortium of 19 telecommunications operators & administrations, and the first phase entered service in December 2012. While it may not have been completely problem-free over the last 5+ years, online searches do not return any published reports of significant outages caused by damage to the cable.
However, on March 30, damage to the cable disrupted Internet connectivity to a number of connected countries, with reported problems posted to social media over the next several days. These posts indicated that the ACE submarine cable was cut near Noukachott, Mauritania, but did not provide any specific information about what severed the cable.
The Sierra Leone Cable Limited (SALCAB) says the data connection to #SierraLeone is partly down due to the ACE Submarine cable cut in Nouakchott, Mauritania. #SierraLeoneDecides
— Leanne de Bassompierre (@leannedb01) April 1, 2018
Of the 22 countries listed as having landing points for the ACE Submarine Cable, 10 had significant disruptions evident in Oracle’s Continue reading
Thanks to all who joined us for The Modern Telco is Open, Part 2 – Virtual Central Office (VCO) in an Open Telco World. After the webinar, we took questions from the audience but unfortunately ran out of time before we could get to all their questions. Below is the full The Modern Telco is Open, Part 2 Q&A.
Hi, The last post link below, I got introduced to a CI System and basics of it. https://r2079.wordpress.com/2018/04/03/using-travis-ci-continuous- integration-with-github/ This post goes further in actually using the CI system. All the code is hosted here https://github.com/yukthr/auts.git -> Requirement is very simple This is a very basic program which introduces anyone to Jinja2 and yaml syntaxing Problem - Have two interfaces ge-0/0/0 and ge-0/0/1, we have to use Yaml / Jinja2 and Pyez to develop the configurational syntax for this and later on a CI system need to validate the build. The code hosted in Github above. intf.yml - will have all the interfaces template.j2 - will have the appropriate Jinja2 template.py - will have the python program combining these two So, we write the codeFinally build the CI file, but here we also buld the dependencies because when CI starts to validate it needs to have all the appropriate software installed. It amuses me to the point, it spins up the VM and then install the dependencies and then it validates our code. I have come a long way from manual verificaitons / lab testing / CI testing now This is how Continue reading
It’s notable because the Hyperledger code is running in a production environment with three competing institutions all running on the same blockchain network.

Working from Home works.
Today on the Priority Queue we have a roundtable show. We’ve gathered a few engineers around the microphone to talk about their experiences and what’s on their minds.
We often hear this format is an audience favorite, so we plan to record more of these in the Priority Queue and Weekly channels, so keep an eye out.
Today we welcome Alex Clipper, Eric Gullickson, Matt Elliott, and Stafford Rau to the podcast. We discuss encryption, code styles to ensure that code written by networkers is up to snuff, and what it’s like to work in technology after a certain age.
Paessler AG is the maker of PRTG Network Monitor. PRTG monitors your entire IT infrastructure 24/7 and alerts you to problems before users notice. Find out more about the monitoring software that helps system administrators work smarter, faster, better by visiting paessler.com today.
Understanding Media Access Control Security (MACsec) – Technical Documentation – Support – Juniper Networks
Layer 2-Encryptors For Metro And Carrier Ethernet WANs And MANs – Inside-IT (PDF)
Thales L2 Encryption – Thales
Senetas – Senetas.com
What Is Optical Encryption? – Ciena
Google Style Guides – GitHub
Workflow automation has been born of necessity and has evolved an increasingly sophisticated set of tools to manage the growing complexity of the automation itself.
The same theme keeps emerging across the broader spectrum of enterprise and research IT. For instance, we spoke recently about the need to profile software and algorithms when billions of events per iteration are generated from modern GPU systems. This is a similar challenge and fortunately, not all traditional or physical business processes fall into this scale bucket. Many are much less data intensive, but can have a such a critical impact in “time to …
New Approaches to Optimizing Workflow Automation was written by James Cuff at The Next Platform.