Key Software Firms Reengineer Their Code With OpenACC

Academic centers and government agencies often design and write their own applications, but some of them and the vast majority of enterprise customers with HPC applications usually depend on third parties for their software. They also depend upon those software developers to continually enhance and scale those applications, and that means adding support for GPU accelerators. Two important ones, Gaussian and ANSYS, depend not only on GPUs, but the OpenACC programming model, to extend across more cores and therefore do more work faster.

Let’s start with Gaussian.

The way that chemicals react can be the difference between a product success

Key Software Firms Reengineer Their Code With OpenACC was written by Timothy Prickett Morgan at The Next Platform.

Basic Configuration of OSPF Over non-Broadcast Networks ( NBMA)

Today I will talk about the basic set of configurations of OSPF NBMA network type over the non Broadcast networks. Many of you guys already aware of the NBMA network type in the OSPF network. 

Before we start with the OSFP NBMA configuration part, I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos


Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

Lets have a Basic OSPF Network diagram for you guys, then we will come up with the diagram showing the routers connected in the OSPF via Frame-Relay network which will act as a NBMA OSPF network type.


Fig 1.1- OSPF Network Connected to other Campus Via NBMA Networks- Frame Relay

NBMA stands for Non-Broadcast Multiple Access where the network types X.25 and Frame Relay has no capability to support Broadcast traffic. Here in our example we will take Frame-Relay as a NBMA network which is connected via two routers 1 and 2. I defined these routers as Continue reading

BrandPost: MPLS, SD-WAN Not an Either/Or Scenario

Software-defined Wide Area Network (SD-WAN) technology is providing enterprises with greater flexibility and agility over WAN connectivity, but is being used to supplement rather than replace existing implementations of Multiprotocol Label Switching (MPLS) WAN circuits.That may be a surprise to many who are wowed by the fast pace of SD-WAN adoption. “In the classic engineer’s formulation, ‘You can have it cheaper, faster, or better…pick two,’” writes John Burke, CIO and Principal Research Analyst - Nemertes Research. “From time to time new technology comes along and, by changing the basic assumptions underlying existing solutions, manages to be cheaper and faster and better all at once. SD-WAN promises to hit the trifecta.”To read this article in full, please click here

Why Does It Take So Long to Upgrade Network Devices?

One of my readers sent me a question about his favorite annoyance:

During my long practice, I’ve never seen an Enterprise successfully managing the network device software upgrade/patching cycles. It seems like nothing changed in the last 20 years - despite technical progress, in still takes years (not months) to refresh software in your network.

There are two aspects to this:

Read more ...

Why Linus is right (as usual)

People are debating this email from Linus Torvalds (maintainer of the Linux kernel). It has strong language, like:
Some security people have scoffed at me when I say that security
problems are primarily "just bugs".
Those security people are f*cking morons.
Because honestly, the kind of security person who doesn't accept that
security problems are primarily just bugs, I don't want to work with.
I thought I'd explain why Linus is right.

Linus has an unwritten manifesto of how the Linux kernel should be maintained. It's not written down in one place, instead we are supposed to reverse engineer it from his scathing emails, where he calls people morons for not understanding it. This is one such scathing email. The rules he's expressing here are:
  • Large changes to the kernel should happen in small iterative steps, each one thoroughly debugged.
  • Minor security concerns aren't major emergencies; they don't allow bypassing the rules more than any other bug/feature.
Last year, some security "hardening" code was added to the kernel to prevent a class of buffer-overflow/out-of-bounds issues. This code didn't address any particular 0day vulnerability, but was designed to prevent a class of future potential exploits from being exploited. This is reasonable.

Network Automation Engineer Persona: Proof-of-concepts

If you’ve chosen to do a proof-of-concept (PoC), you should already know what the challenge or requirement is, what your satisfactory results look like and what the product or tool set is that will deliver on your commitment. A proof-of-concept is a recipe that should give you a well baked set of results.

Approaching a PoC

Approaching a PoC is a conscious decision to trial an idea that if successful, your business will put in to daily production to satisfy one or more business requirements.

So why aren’t the results more apparent in our day to day lives? Why do we not see these decision points more transparently?

Some people approach PoCs as a tyre kicking exercise, or a means to get a vendor to commit to them and then use as leverage against cost. If you’re just playing, you’re wasting time. If you’re tyre kicking then be prepared for lack of commitment or interest in the future from individuals or organisations. Genuine PoCs and evaluations are a normal and acceptable part of business, so the responses are different from those assisting with PoCs.

Approach a PoC with clear intent and understanding of the challenge that faces you. You must Continue reading

5 ways to design your container network

There’s been a lot of talk about container networking in the industry lately (heck, we can’t even stop talking about it). And it’s for a good reason. Containers offer a fantastic way to develop and manage microservices and distributed applications easily and efficiently. In fact, that’s one of the reasons we launched Host Pack — to make container networking even simpler. Between Host Pack and NetQ, you can get fabric-wide connectivity and visibility from server to switch.

There are a variety of ways you can deploy a container network using Host Pack and Cumulus Linux, and we have documented some of them in several Validated Design Guides discussed below. Wondering which deployment method is right for your business? This blog post is for you.

Docker Swarm with Host Pack

Overview: The Docker Swarm with Host pack solution uses the connectivity module within Host Pack, Free Range Routing (FRR) in a container. The FRR container runs on the servers and uses BGP unnumbered for Layer 3 connectivity, enabling the hosts to participate in the routing fabric. We use Docker Swarm as the container orchestration tool for simplicity.

Choose this deployment if:

Cisco Wireless Solution : Local Mode Vs Flex Connect

Today I will talk about the Wireless deployment modes and will discuss which and why to use that deployment mode in the your wireless network. 


Wireless Deployment :Local Mode
In local mode, an AP creates two CAPWAP tunnels to the WLC.  One is for management, the other is data traffic.  This behaviour is known as "centrally switched" because the data traffic is switched(bridged) from the AP to the controller where it is then routed by some routing device.
Locally switched means the traffic is terminated at the local switch adjacent to the access point. 

Fig 1.1- Local Mode behind Mesh Network

Its a good idea if you have traffic that the client is sending to the local site rather than it going via the controller and travelling over the WAN link twice say for file or print services

Wireless Deployment : Flex Mode
Flex Connect also known as HREAP by the old timers, allows data traffic to be switched locally and not go back to the controller.  It basically causes the AP to behave like an autonomous AP, but be managed by the WLC.  In this mode, the AP can still function even Continue reading

Software Defined Networking : Introduction to VeloCloud SD-WAN Solution

Today I am going to talk about the another article on the Software defined networking and that is SD-WAN. SD-WAN stands for the software defined WAN. Earlier i talk about the SD-WAN solution from the Viptela which is now acquired by Cisco systems.

As I earlier talked about the SD-WAN architecture and the main focus on the control, Data and management plane. The intent is to separate the Data and control plane from the devices. Data plane as usual will be there at the box level (Routers, switches) while separated the control plane to centralised management systems where all decisions will be taken care.

For Viptela SD-WAN solution, please go through the below link for further study

Viptela SD-WAN Solution - Cisco Systems Company

I would like to tell you guys that we have our own youtube channel for various network videos that can further help you guys to study further. I will going to add many more videos soon on the channel, Please subscribe to the channel for the study network related videos

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

VeloCloud SD-WAN Solution
Let's talk about the VeloCloud SD-WAN solution, as similar to the other vendors, Velocloud uses the same Continue reading

How to read newspapers

News articles don't contain the information you think. Instead, they are written according to a formula, and that formula is as much about distorting/hiding information as it is about revealing it.

A good example is the following. I claimed hate-crimes aren't increasing. The tweet below tries to disprove me, by citing a news article that claims the opposite:




But the data behind this article tells a very different story than the words.

Every November, the FBI releases its hate-crime statistics for the previous year. They've been doing this every year for a long time. When they do so, various news organizations grab the data and write a quick story around it.

By "story" I mean a story. Raw numbers don't interest people, so the writer instead has to wrap it in a narrative that does interest people. That's what the writer has done in the above story, leading with the fact that hate crimes have increased.

But is this increase meaningful? What do the numbers actually Continue reading