Microsoft, Daimler to use fuel cells to power data centers

In separate announcements, Microsoft Corp. and Daimler indicated that hydrogen fuel cells could provide significantly better energy solutions for data centers than existing electrical grid and backup power technology.Daimler, best known for its Mercedes-Benz automobile brand, presented this week its latest-generation fuel cell technology, which is 30 percent smaller, has 40 percent more power and is small enough to fit into the engine compartment of Mercedes-Benz passenger vehicles. The company plans to expand the use of that technology in a hydrogen-powered data center power plant, collaborating with HPE, Power Innovations (PI) and the National Renewable Energy Laboratory (NREL).To read this article in full, please click here

Pluribus Networks… 2 Years Later

I first met Pluribus Networks 2.5 years ago during their Networking Field Day 9 presentation, which turned controversial enough that I was advised not to wear the same sweater during NFD16 to avoid jinxing another presentation (I also admit to be a bit biased in those days based on marketing deja-moo from a Pluribus sales guy I’d been exposed to during a customer engagement).

Pluribus NFD16 presentations were better; here’s what I got from them:

Read more ...

One Week to IPv6, Routing Security, and More at ION Belgrade

One week from today, we’ll be at ION Belgrade! Our last event of the year take place on Thursday, 23 November 2017, alongside the 3rd Republic of Serbia Network Operators’ Group (RSNOG).

As always, ION Conferences bring network engineers and leading industry experts together to discuss emerging technologies and hot technology topics. Early adopters provide valuable insight into their own deployment experiences and bring participants up to speed on new standards emerging from the IETF.

Agenda

The half-day agenda and all our great speakers for ION Belgrade will make this a great event. Here’s a quick look at the day:

  • Opening Remarks
  • Welcome from the ISOC Serbia Chapter
  • MANRS, Routing Security, and Collaboration
  • NAT64check
  • What’s Happening at the IETF? Internet Standards and How to Get Involved
  • Panel Discussion: IPv6 Success Stories
  • Closing Remarks

Registration

ION Belgrade registration is open! Learn more about our co-host on the RSNOG main page.

Webcast

RSNOG will be live streaming the ION in the morning and RSNOG in the afternoon. The stream will be embedded on the conference main page, right above the agenda, here (Serbian) and here (English).

IPv6 Tutorial

Jordi Palet Martinez will conduct an IPv6 training session the day before the ION. Continue reading

Basics of VRF(Virtual Routing forwarding)

Today I am going to talk about one of the most important concept on which MPLS works. I understand many of you already knew about the MPLS but some of you guys are still want me to explain the concept of MPLS and the MPLS starts from the concept of VRF. 
Before we will start with the concept of the VRF, Please subscribe our Youtube Channel, as we are going to upload many networking videos there soon.
Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go
What is VRF- Virtual Routing forwarding ?
As you already knew that VRF stands for Virtual Routing Forwarding and is a separate routing table within a router. VRFs are to a router what VLANs are to a switch. Using VRFs, it is possible to virtualize a single router into several instances, each of them being (relatively) independent of each other, allowing for overlapping subnets, separate instances of routing protocols, separate set of interfaces assigned to each VRF. 
In other words you can say that VRF stands for virtual routing and forwarding. When you create a vrf, you tell it what routes to import/export. Then you assign that vrf to an interface. Once the vrf is attached to Continue reading

IO-500 Goes Where No HPC Storage Metric Has Gone Before

The landscape of HPC storage performance measurement is littered with unrealistic expectations. While there are seemingly endless strings of benchmarks aimed at providing balanced metrics, these far too often come from the vendors themselves.

What is needed is an independent set of measurements for supercomputing storage environments that takes into account all of the many nuances of HPC (versus enterprise) setups. Of course, building such a benchmark suite is no simple task—and ranking the results is not an easy exercise either because there are a great many dependencies; differences between individual machines, networks, memory and I/O tricks in software, and

IO-500 Goes Where No HPC Storage Metric Has Gone Before was written by Nicole Hemsoth at The Next Platform.

Oak Ridge Lab’s Quantum Simulator Pulls HPC Future Closer

Oak Ridge National Laboratory has been investing heavily in quantum computing across the board. From testing new devices, programming models, and figuring out workflows that combine classical bits with qubits, this is where the DoE quantum investment seems to be centered.

Teams at Oak Ridge have access to the range of available quantum hardware devices—something that is now possible without having to own the difficult-to-manage quantum computer on sight. IBM’s Q processor is available through a web interface, as is D-Wave’s technology, which means researchers at ORNL can test their quantum applications on actual hardware. As we just

Oak Ridge Lab’s Quantum Simulator Pulls HPC Future Closer was written by Nicole Hemsoth at The Next Platform.

How to gauge your network’s openness

So, you’ve done your research, learned about the many benefits of open networking, and decided you’re interested in building an open network. Congratulations, and welcome to the future of networking! You’ve made a great first step, but maybe you’re concerned about where to begin when it comes to vendors. A lot of network providers will claim that they have open solutions…but how can you be sure you’re choosing the best one? Or how can you determine if your vendor is truly an open solution? Fortunately, there are ways to gauge if your solution is as open as you need it to be. If you don’t want to get duped by phony open vendors, make sure to keep these three things in mind:

The definition of “open networking” is not set in stone

While there are common criteria and ideologies that tend to be associated with open networks, the definition of open networking is still very fluid and can mean different things to different vendors. So, when you’re trying to decide which vendor to go with, don’t let them off easy with simple answers. Ask specific questions about what exactly “open” means to them. Simplicity, flexibility, and modularity are Continue reading

Security with Fish: My First Couple Months

In late June I wrote Security Here I Come!  The transition wasn’t quite as fast as I thought it would be.  ?   But for the past couple months I’ve been able to really start digging in.

My initial response after watching just 2 CiscoLive VoDs?  FEAR!

I really enjoyed these sessions a great deal!!  They were the absolute perfect eye-opener to me!

Neil Lovering had the “Verizon Data Breach Report” in his slides (below).

Its funny because I have seen it before.  To be completely honest I have seen it quite a number of times.  But it was just something about how he presented it.  He got past my not wanting to really “hear” about the risk and the danger and the reality of the security landscape in the world around us.  I paused the VoD on this slide…. paused it and just really took the time to take it all in.

My reaction to this slide?  Lol. This is when the fear began.  Two simple facts on the Continue reading

Security with Fish: My First Couple Months

In late June I wrote Security Here I Come!  The transition wasn’t quite as fast as I thought it would be.  🙂   But for the past couple months I’ve been able to really start digging in.

My initial response after watching just 2 CiscoLive VoDs?  FEAR!

I really enjoyed these sessions a great deal!!  They were the absolute perfect eye-opener to me!

Neil Lovering had the “Verizon Data Breach Report” in his slides (below).

Its funny because I have seen it before.  To be completely honest I have seen it quite a number of times.  But it was just something about how he presented it.  He got past my not wanting to really “hear” about the risk and the danger and the reality of the security landscape in the world around us.  I paused the VoD on this slide…. paused it and just really took the time to take it all in.

My reaction to this slide?  Lol. This is when the fear began.  Two simple facts on the Continue reading

IDG Contributor Network: 5 reasons why IT can’t tame the user experience for the network manager

Every vendor today is spewing about the importance of managing the user experience. What this actually means, however, remains a mystery to most, and there are precious few approaches available to help you get a handle on the issue.Good and predictable user experience is no longer negotiable in this age of constant online business communications. Computer networks have effectively become the single most important tool driving corporate productivity.But user experience is one of the most difficult problems to address, especially on enterprise access networks, because each experience is influenced by a long list of moving parts, many of which are increasingly outside the control of IT. To read this article in full, please click here

IDG Contributor Network: 5 reasons why IT can’t tame the user experience for the network manager

Every vendor today is spewing about the importance of managing the user experience. What this actually means, however, remains a mystery to most, and there are precious few approaches available to help you get a handle on the issue.Good and predictable user experience is no longer negotiable in this age of constant online business communications. Computer networks have effectively become the single most important tool driving corporate productivity.But user experience is one of the most difficult problems to address, especially on enterprise access networks, because each experience is influenced by a long list of moving parts, many of which are increasingly outside the control of IT. To read this article in full, please click here

NANOG 75 Overview

Click through to the full list of NANOG 75 meeting information.

NANOG 75 Hackathon will take place February 17, 2019 and the NANOG 75 conference is February 18-20, 2019. Both will offer a great opportunity to network with colleagues, freshen-up skills, learn advanced networking techniques, and discover new network applications.  

We will be gathering at the Hyatt Regency San Francisco.   A crimson bridge, cable cars, a sparkling bay, and streets lined with elegant Victorian homes—San Francisco is undeniably one of the world’s great cities. Located along the Northern California at the state’s distinctive bend in the coast, the region has an alluring magic that stretches beyond the bay to diverse cities with nightlife and trend-setting cuisine. 

NANOG 75 host sponsor is

DigitalRealty_JPG_1.30

 

Join NANOG today and receive a $25 discount on standard registration fees for any NANOG conference.

 

 

MEETING REGISTRATION

Meeting Registration is now open.