5G Discussions at MWC 2018 Will Focus on the Cs: Cloud, Core, and Network Control
The key message from the industry is that 5G is about more than just the 5G New Radio (NR).
The key message from the industry is that 5G is about more than just the 5G New Radio (NR).
Nutanix is already gunning for VMware's customers.
On today’s episode of “The Interview” with The Next Platform, we talk about quantum computing performance and functionality with Rigetti Computing quantum hardware engineer, Matt Raegor.
We talked with Rigetti not long ago about the challenges of having an end-to-end quantum computing startup (developing the full stack—from hardware to software to the fabs that make the quantum processing units). This conversation takes that one step further by looking at how performance can be considered via an analogy of wine glasses and their various resonances. Before we get to that, however, we talk more generally about Reagor’s early work …
Quantum Computing Performance By the Glass was written by Nicole Hemsoth at The Next Platform.
Note: < 5 minutes read
When running a virtualization workload on oVirt, a VM disk is 'natively' a disk somewhere on your network-storage.
Entering containers world, on Kubernetes(k8s) or OpenShift, there are many options specifically because the workload can be totally stateless, i.e
they are stored on a host supplied disk and can be removed when the container is terminated. The more interesting case is stateful workloads i.e apps that persist data (think DBs, web servers/services, etc). k8s/OpenShift designed an API to dynamically provision the container storage (volume in k8s terminology).
See the resources section for more details.
In this post I want to cover how oVirt can provide volumes for containers running on k8s/OpenShift cluster.
Consider this: you want to deploy wikimedia as a container, with all its content served from /opt
.
For that you will create a persistent volume for the container - when we have state to keep and server
creating a volume makes sense. It is persistent, it exists regardless the container state,
and you can choose which directory exactly you serve that volume, and that is the most important
part, k8s/OpenShift gives you an API to determine who will provide the volume Continue reading
Note: < 5 minutes read
When running a virtualization workload on oVirt, a VM disk is 'natively' a disk somewhere on your network-storage.
Entering containers world, on Kubernetes(k8s) or OpenShift, there are many options specifically because the workload can be totally stateless, i.e
they are stored on a host supplied disk and can be removed when the container is terminated. The more interesting case is stateful workloads i.e apps that persist data (think DBs, web servers/services, etc). k8s/OpenShift designed an API to dynamically provision the container storage (volume in k8s terminology).
See the resources section for more details.
In this post I want to cover how oVirt can provide volumes for containers running on k8s/OpenShift cluster.
Consider this: you want to deploy wikimedia as a container, with all its content served from /opt
.
For that you will create a persistent volume for the container - when we have state to keep and server
creating a volume makes sense. It is persistent, it exists regardless the container state,
and you can choose which directory exactly you serve that volume, and that is the most important
part, k8s/OpenShift gives you an API to determine who will provide the volume Continue reading
APRICOT 2018 is underway in in Kathmandu, Nepal, and as usual the Internet Society is an active participant in many areas of Asia Pacific’s largest international Internet conference. The workshops are taking place this week, with the conference happening next week. Here are some of the conference activities where we’ll be.
On Sunday, 25 February, from 18:00 to 19:00 (UTC +05:45), Aftab Siddiqui and Andrei Robachevsky will moderate a Birds of a Feather (BoF) session on routing security. From the abstract, the session will provide a space where “…operators can share their approach in securing their own infrastructure and keeping the internet routing table clean as well. Also, this will provide a platform to review and highlight various BCOP documents to address routing security.” The Mutually Agreed Norms for Routing Security (MANRS) initiative is a key piece of the routing security puzzle.
On Monday, 26 February, from 13:00 to 14:00 (UTC +05:45), Salam Yamout will be speaking at the Tech Girls Social. This session provides a space for APRICOT participants to talk and network in an open, friendly environment. The event is open to ANYONE who is interested and is not restricted to Continue reading
Computing, which always includes storage and networking, evolves. Just like everything else on Earth. Anything with a benefit in efficiency will always find its niche, and it will change to plug into new niches as they arise and make use of ever-cheaper technologies as they advance from the edges.
It is with this in mind that we ponder the datacenter. As in the center of data, which has been expanding and thinning for a very long time now, and which is pushing itself – and us – to the edge. What, we wonder, is a datacenter that doesn’t have …
Pushed To The Edge was written by Timothy Prickett Morgan at The Next Platform.
“What the heck?” Yup, that pretty much summed up my confusion the first time I saw it. A sniffer trace full of threes.
The first thing it reminded me of was my days with Token Ring and locally administered addresses (LAAs). This was for two reasons:
Help from Wireshark
I hope you are familiar with Wireshark; I use it all the time. It shows “reality” on the wire, which is crucial if you are a network detective trying to solve a whodunit.
If you are familiar with Wireshark then you might know that I can configure how the MAC addresses are displayed in the columns via the Wireshark preferences. As you can see below, I have set the preferences to not resolve the MAC addresses for me, Continue reading
“What the heck?” Yup, that pretty much summed up my confusion the first time I saw it. A sniffer trace full of threes.
The first thing it reminded me of was my days with Token Ring and locally administered addresses (LAAs). This was for two reasons:
Help from Wireshark
I hope you are familiar with Wireshark; I use it all the time. It shows “reality” on the wire, which is crucial if you are a network detective trying to solve a whodunit.
If you are familiar with Wireshark then you might know that I can configure how the MAC addresses are displayed in the columns via the Wireshark preferences. As you can see below, I have set the preferences to not resolve the MAC addresses for me, Continue reading
This is a Korean translation of a prior post by Ignat Korchagin.
Cloudflare에서는 Go를 좋아합니다. Go는 많은 내부 소프트웨어 프로젝트와 거대한 파이프라인 시스템의 일부로도 사용되고 있습니다. 하지만 Go를 한단계 더 끌어 올려서 우리가 선호하는 운영체제인 리눅스의 스크립트 언어로 사용할 수 있을까요?
gopher image CC BY 3.0 Renee French | Tux image CC0 BY OpenClipart-Vectors
간단한 답은: 왜 안되나요? Go는 비교적 쉽게 배울 수 있고 아주 복잡하지도 않고, 코드를 처음부터 작성해야 하는 일을 피하기 위해 재사용 가능한 라이브러리의 거대한 에코시스템이 있습니다. 추가로 다음과 같은 잠재적인 장점이 있습니다:
go build
명령은 대부분의 소규모이며 독립적인 프로젝트에 적합합니다. 더 복잡한 프로젝트는 대부분 별도의 빌드 시스템/스크립트 세트를 채용하고 있습니다. 이런 스크립트도 Go로 작성 가능하지 않을까요?go get
을 사용하면 됩니다. 그리고 이 코드가 여러분의 GOPATH
에 설치되므로, 서드파티 라이브러리를 받는 것은 시스템의 별도 운영 권한을 필요로 하지 않습니다(다른 일부 스크립트 언어와 달리). 이것은 대규모의 기업 환경에서 특히 유용합니다.Last week we added a new Azure course to our video library. This is the first course of it’s kind and can be found on the INE streaming site and also for sale on ine.com
Why Study Azure:
Azure is Microsoft’s version of web services management. Azure is a great option for DevOps professionals due to it’s diversity. Azure allows you to create intelligent apps using the language of your choice, including Node.js, Java and .NET, and works for both PC and Mac users. With 100+ services and tools to manage apps, Azure Design has become a favorite among many large companies and should be considered an essential study topic for DevOps professionals.
About the course:
Length- 1 hour 23 minutes
Instructor- Gary Bushey
In this Series we will take a look at what Azure is, including what IaaS, PaaS, and SaaS mean. We will thoroughly discuss Azure PaaS and some of the specific technologies used with PaaS, namely containers and artificial intelligence.
In the second section, we will discuss how to move your applications to Azure. The first video will provide an introduction to the Architectural decisions to make when moving your application, including which style Continue reading
Two ideas that are widespread, and need to be addressed—
First, there is no enterprise, there are no service providers. There are problems, and there are solutions.
When I was young (and even more foolish than I am now) I worked for a big vendor. When this big vendor split the enterprise and service provider teams, I thought this kindof made sense. After all, providers have completely different requirements, and should therefore run with completely different technologies, equipment, and software. When I thought of providers in those days, I thought of big transit network operators, like AT&T, and Verizon, and Orange, and Level3, and Worldcom, and… The world has changed since then, but our desire to split the world into two neat halves has not.
If you want to split the world into two halves, split it this way: There are companies who consider the network an asset, and companies that consider the network a Continue reading
The digital transformation driving the adoption of multi-cloud networks requires an equivalent security transformation.
On today’s podcast episode of “The Interview” with The Next Platform, we talk with computer architecture researcher Roman Kaplan about the role memristors might play in accelerating common machine learning algorithms including K-means. Kaplan and team have been looking at performance and efficiency gains by letting ReRAM pick up some of the data movement tab on traditional architectures.
Kaplan, a researcher at the Viterbi faculty of Electrical Engineering in Israel, along with his team, have produced some interesting benchmarks comparing K-means and K-nearest neighbor computations on CPU, GPU, FPGA, and most notably, the Automata Processor from Micron to their …
Machine Learning with a Memristor Boost was written by Nicole Hemsoth at The Next Platform.
High performance computing (HPC) enables organizations to work more quickly and effectively than traditional compute platforms—but that might not be enough to succeed in today’s evolving digital marketplace.
Mainstream HPC usage is transforming the modern workplace as organizations utilize individually deployed HPC clusters and composable infrastructures to increase IT speed and performance and help employees achieve higher levels of productivity. However, maintaining disparate and isolated systems can pose a significant challenge—such as preventing workloads from reaching optimal efficiency. By converging the muscle of HPC and virtualized environments, organizations can deliver a superior virtual graphics experience to any device in order …
Add Firepower to Your Data with HPC-Virtual GPU Convergence was written by Nicole Hemsoth at The Next Platform.