IDG Contributor Network: 5 reasons why IT can’t tame the user experience for the network manager

Every vendor today is spewing about the importance of managing the user experience. What this actually means, however, remains a mystery to most, and there are precious few approaches available to help you get a handle on the issue.Good and predictable user experience is no longer negotiable in this age of constant online business communications. Computer networks have effectively become the single most important tool driving corporate productivity.But user experience is one of the most difficult problems to address, especially on enterprise access networks, because each experience is influenced by a long list of moving parts, many of which are increasingly outside the control of IT. To read this article in full, please click here

IDG Contributor Network: 5 reasons why IT can’t tame the user experience for the network manager

Every vendor today is spewing about the importance of managing the user experience. What this actually means, however, remains a mystery to most, and there are precious few approaches available to help you get a handle on the issue.Good and predictable user experience is no longer negotiable in this age of constant online business communications. Computer networks have effectively become the single most important tool driving corporate productivity.But user experience is one of the most difficult problems to address, especially on enterprise access networks, because each experience is influenced by a long list of moving parts, many of which are increasingly outside the control of IT. To read this article in full, please click here

NANOG 75 Overview

Click through to the full list of NANOG 75 meeting information.

NANOG 75 Hackathon will take place February 17, 2019 and the NANOG 75 conference is February 18-20, 2019. Both will offer a great opportunity to network with colleagues, freshen-up skills, learn advanced networking techniques, and discover new network applications.  

We will be gathering at the Hyatt Regency San Francisco.   A crimson bridge, cable cars, a sparkling bay, and streets lined with elegant Victorian homes—San Francisco is undeniably one of the world’s great cities. Located along the Northern California at the state’s distinctive bend in the coast, the region has an alluring magic that stretches beyond the bay to diverse cities with nightlife and trend-setting cuisine. 

NANOG 75 host sponsor is

DigitalRealty_JPG_1.30

 

Join NANOG today and receive a $25 discount on standard registration fees for any NANOG conference.

 

 

MEETING REGISTRATION

Meeting Registration is now open.

Off the Cuff – Disaggregation

In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.

 

Russ White
Guest
Pete Lumbis
Guest
Jeff Tantsura
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – Disaggregation appeared first on Network Collective.

Off the Cuff – Disaggregation

In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.

 

Russ White
Guest
Pete Lumbis
Guest
Jeff Tantsura
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – Disaggregation appeared first on Network Collective.

Europe Elbows For A Place At Exascale Table

When talking about the ongoing international race to exascale computing, it might be easy to overlook the European Union. A lot of the attention over the past several years has focused on the efforts by the United States and China, the world’s economic powerhouses and the centers of technology development.

Through its Exascale Computing Project, the United States is putting money and resources behind its plans to roll out the first of its exascale systems in 2021. For its part, China is planning at least three pre-exascale systems using mostly home-grown technologies, backed by significant investments by the Chinese

Europe Elbows For A Place At Exascale Table was written by Jeffrey Burt at The Next Platform.

Mitigating Cybersecurity Threats With Advanced Datacenter Tech

In this fast-paced global economy, enterprises must innovate to evolve and succeed. Today’s industry experts are seeking transformative technologies – like high performance computing and artificial intelligence ­– to help them accelerate data analytics, support increasingly complex workloads, and facilitate business growth to meet the challenges of tomorrow. However, data security remains a chief concern as enterprises race to implement these cutting-edge innovations.

The digital age is marked by several key trends – in cluding IT modernization, business transformation, and digital disruptions such as proliferating mobility, the Internet of Things, cloud computing, and much more. Many businesses are investing heavily

Mitigating Cybersecurity Threats With Advanced Datacenter Tech was written by Timothy Prickett Morgan at The Next Platform.

11% off August Smart Lock Pro With Connect Bundle – Deal Alert

With August Smart Lock Pro, you can lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone. The 24/7 activity log means you’re always in the know. With your phone in your pocket, simply open the door and you’re in your home. Heading out? August Smart Lock Pro will also automatically lock the door behind you after you leave. The smart lock currently averages 4 out of 5 stars on Amazon, where the list price on the Lock and Connect Bundle has been reduced 11% to $249.99. See this deal on Amazon.To read this article in full, please click here

11% off August Smart Lock Pro With Connect Bundle – Deal Alert

With August Smart Lock Pro, you can lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone. The 24/7 activity log means you’re always in the know. With your phone in your pocket, simply open the door and you’re in your home. Heading out? August Smart Lock Pro will also automatically lock the door behind you after you leave. The smart lock currently averages 4 out of 5 stars on Amazon, where the list price on the Lock and Connect Bundle has been reduced 11% to $249.99. See this deal on Amazon.To read this article in full, please click here

IDG Contributor Network: How manufacturers are benefitting from the IoT revolution

Few industries have benefited as much from the Internet of Things revolution than manufacturers. Whether it’s harnessing the power of data and metadata to make wiser decisions, or developing new and more efficient technologies capable of saving energy cost, the IoT is fundamentally reshaping how manufacturers produce the goods we use in our everyday lives.So how exactly is the IoT making business leaders rethink the way they manufacture, and how likely is it that these changes endure in the long-term? A quick review of how manufacturers can exploit the IoT phenomenon that’s quickly coming to shape our lives shows that it’s anything but temporary, and should serve as a warning to those manufacturers who have yet to adopt a 21st century outlook.To read this article in full, please click here

Deploy360 at IETF 100, Day 4: Woohoo for DOH!

This week is IETF 100 in Singapore, and we’re bringing you daily blog posts highlighting some of the topics that Deploy360 is interested in. Thursday is another busy day, with the second sessions of the V6OPS and DNSOPS Working Groups, along with the first meeting of the DOH Working Group and other encryption-related activities.

V6OPS continues at 09.30 SGT/UTC+8 from where it left off. On the agenda are drafts relating to 464XLAT Deployment Guidelines for Operator Networks, transition requirements for IPv6 customer edge routers, and IPv6 prefix delegation for hosts. There’s other drafts on DHCPv6 Prefix Delegation and Neighbour Discovery on a cellular connected IoT router, and on using a /64 from a customer prefix for numbering an IPv6 point-to-point link. Finally, there’s an initiative to clarify about what functionalities should determine whether a network is ‘IPv6-only’.

Running at the same time is TLS, which will be primarily focusing on the two big issues of TLS 1.3 and DTLS 1.3. However, it will also be discussing drafts on connection ID, exported authenticators, protecting against denial of service attacks, and application layer TLS.


NOTE: If you are unable to attend IETF 100 Continue reading

The story of kc claffy and measuring the Internet – 2017 Jonathan B. Postel Service Award winner

Appreciated by some, taken for granted by many, the Internet is understood by few who use it. Underneath the ability to communicate instantaneously with people across the globe, conduct major business transactions with a click of a button and have the latest news and entertainment at our fingertips lies a vast landscape of data, unfettered by regulation, and spurred by competitive growth.

kc claffy, this year’s Jonathan B. Postel Service Award winner, has been with the Internet from nearly its very beginnings. She’s watched its evolution from military project to government-funded point-to-point communication to its current iteration as a private sector behemoth.

claffy is one of the few brave scientists who measure the Internet. She’s leading the way to the future by opening our eyes to the layers of data beneath the surface along with the Center for Applied Internet Data Analysis (CAIDA), a group she founded in 1996.

“The work that we do isn’t easy to get funded because the Internet itself isn’t yet its own subject,” claffy said. “It’s even a struggle for the agencies to get funding, since infrastructure isn’t very sexy.”

Sexy or not, claffy has been measuring the Internet since the early Continue reading