Off the Cuff – Disaggregation

In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.

 

Russ White
Guest
Pete Lumbis
Guest
Jeff Tantsura
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – Disaggregation appeared first on Network Collective.

Off the Cuff – Disaggregation

In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.

 

Russ White
Guest
Pete Lumbis
Guest
Jeff Tantsura
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – Disaggregation appeared first on Network Collective.

Europe Elbows For A Place At Exascale Table

When talking about the ongoing international race to exascale computing, it might be easy to overlook the European Union. A lot of the attention over the past several years has focused on the efforts by the United States and China, the world’s economic powerhouses and the centers of technology development.

Through its Exascale Computing Project, the United States is putting money and resources behind its plans to roll out the first of its exascale systems in 2021. For its part, China is planning at least three pre-exascale systems using mostly home-grown technologies, backed by significant investments by the Chinese

Europe Elbows For A Place At Exascale Table was written by Jeffrey Burt at The Next Platform.

Mitigating Cybersecurity Threats With Advanced Datacenter Tech

In this fast-paced global economy, enterprises must innovate to evolve and succeed. Today’s industry experts are seeking transformative technologies – like high performance computing and artificial intelligence ­– to help them accelerate data analytics, support increasingly complex workloads, and facilitate business growth to meet the challenges of tomorrow. However, data security remains a chief concern as enterprises race to implement these cutting-edge innovations.

The digital age is marked by several key trends – in cluding IT modernization, business transformation, and digital disruptions such as proliferating mobility, the Internet of Things, cloud computing, and much more. Many businesses are investing heavily

Mitigating Cybersecurity Threats With Advanced Datacenter Tech was written by Timothy Prickett Morgan at The Next Platform.

11% off August Smart Lock Pro With Connect Bundle – Deal Alert

With August Smart Lock Pro, you can lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone. The 24/7 activity log means you’re always in the know. With your phone in your pocket, simply open the door and you’re in your home. Heading out? August Smart Lock Pro will also automatically lock the door behind you after you leave. The smart lock currently averages 4 out of 5 stars on Amazon, where the list price on the Lock and Connect Bundle has been reduced 11% to $249.99. See this deal on Amazon.To read this article in full, please click here

11% off August Smart Lock Pro With Connect Bundle – Deal Alert

With August Smart Lock Pro, you can lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone. The 24/7 activity log means you’re always in the know. With your phone in your pocket, simply open the door and you’re in your home. Heading out? August Smart Lock Pro will also automatically lock the door behind you after you leave. The smart lock currently averages 4 out of 5 stars on Amazon, where the list price on the Lock and Connect Bundle has been reduced 11% to $249.99. See this deal on Amazon.To read this article in full, please click here

IDG Contributor Network: How manufacturers are benefitting from the IoT revolution

Few industries have benefited as much from the Internet of Things revolution than manufacturers. Whether it’s harnessing the power of data and metadata to make wiser decisions, or developing new and more efficient technologies capable of saving energy cost, the IoT is fundamentally reshaping how manufacturers produce the goods we use in our everyday lives.So how exactly is the IoT making business leaders rethink the way they manufacture, and how likely is it that these changes endure in the long-term? A quick review of how manufacturers can exploit the IoT phenomenon that’s quickly coming to shape our lives shows that it’s anything but temporary, and should serve as a warning to those manufacturers who have yet to adopt a 21st century outlook.To read this article in full, please click here

Deploy360 at IETF 100, Day 4: Woohoo for DOH!

This week is IETF 100 in Singapore, and we’re bringing you daily blog posts highlighting some of the topics that Deploy360 is interested in. Thursday is another busy day, with the second sessions of the V6OPS and DNSOPS Working Groups, along with the first meeting of the DOH Working Group and other encryption-related activities.

V6OPS continues at 09.30 SGT/UTC+8 from where it left off. On the agenda are drafts relating to 464XLAT Deployment Guidelines for Operator Networks, transition requirements for IPv6 customer edge routers, and IPv6 prefix delegation for hosts. There’s other drafts on DHCPv6 Prefix Delegation and Neighbour Discovery on a cellular connected IoT router, and on using a /64 from a customer prefix for numbering an IPv6 point-to-point link. Finally, there’s an initiative to clarify about what functionalities should determine whether a network is ‘IPv6-only’.

Running at the same time is TLS, which will be primarily focusing on the two big issues of TLS 1.3 and DTLS 1.3. However, it will also be discussing drafts on connection ID, exported authenticators, protecting against denial of service attacks, and application layer TLS.


NOTE: If you are unable to attend IETF 100 Continue reading

The story of kc claffy and measuring the Internet – 2017 Jonathan B. Postel Service Award winner

Appreciated by some, taken for granted by many, the Internet is understood by few who use it. Underneath the ability to communicate instantaneously with people across the globe, conduct major business transactions with a click of a button and have the latest news and entertainment at our fingertips lies a vast landscape of data, unfettered by regulation, and spurred by competitive growth.

kc claffy, this year’s Jonathan B. Postel Service Award winner, has been with the Internet from nearly its very beginnings. She’s watched its evolution from military project to government-funded point-to-point communication to its current iteration as a private sector behemoth.

claffy is one of the few brave scientists who measure the Internet. She’s leading the way to the future by opening our eyes to the layers of data beneath the surface along with the Center for Applied Internet Data Analysis (CAIDA), a group she founded in 1996.

“The work that we do isn’t easy to get funded because the Internet itself isn’t yet its own subject,” claffy said. “It’s even a struggle for the agencies to get funding, since infrastructure isn’t very sexy.”

Sexy or not, claffy has been measuring the Internet since the early Continue reading

Run Well-Designed Experiments to Learn Faster

I know that everyone learns in a slightly different way. Let me share the approach that usually works well for me when a tough topic I’m trying to master includes a practical (hands-on) component: running controlled experiments.

Sounds arcane and purely academic? How about a simple example?

A week ago I talked about this same concept in the Building Network Automation Solutions online course. The video is already online and you get immediate access to it (and the rest of the course) when you register for the next live session.

Read more ...

Comparison between Cisco Catalyst 2950 Series Switches vs HP Pro-curve 2500/4000M

Today I am going to talk about the fair comparison between the two vendors access switches which are widely used in the various campus networks or you can use there in various enterprises. Both Switches are excellent with their features and in this article i will talk about the comparison with features.

Before we start with this article I would like to announce that we started our Youtube Channel and want your support to subscribe that channel. We are going to add many videos based on the networking basics, designs, configurations and pre-sales part. We are going to add the featured posts and the videos of the different vendors on the different technologies. You can subscribe us on the below mentioned link.

Subscribe us on Youtube: http://y2u.be/0c4lMYVp9go

I Knew a huge support from your side operate us to make many more videos and articles for you. Thanks for supporting us in huge number. Now lets talk about the topic which i started from the beginning. Earlier i wrote an article regarding the comparison of Cisco 2960X vs Cisco 3650 vs Cisco 3850. The link for that article is shown as below.

Looking Ahead to Intel’s Secret Exascale Architecture

There has been a lot of talk this week about what architectural direction Intel will be taking for its forthcoming exascale efforts. As we learned when the Aurora system (expected to be the first U.S. exascale system) at Argonne National Lab shifted from the planned Knights Hill course, Intel was seeking a replacement architecture—one that we understand will not be part of the Knights family at all but something entirely different.

Just how different that will be is up for debate. Some have posited that the exascale architecture will feature fully integrated hardware acceleration (no offload model needed for

Looking Ahead to Intel’s Secret Exascale Architecture was written by Nicole Hemsoth at The Next Platform.

Watch Live – IETF 100 Plenary Panel on the Future of the Internet

What is this future of the Internet? What will the Internet look like in 30 years? On Wednesday, November 15, three prominent strategists will gaze into the future and share their unique perspectives.  This panel on “The Internet, a look forward: Social, political, and technical perspectives” is part of the IETF 100 plenary session streaming live out of Singapore. The plenary session will also include the presentation of the Jonathan B. Postel Service award.

You can watch live at:    https://www.ietf.org/live

The entire IETF 100 plenary session is from 17:10 – 19:40 Singapore time. This is UTC+8, which translates into:

  • 10:10 – 12:40 Central European Time
  • 9:10 – 11:40 UTC
  • 4:10 – 6:40 US Eastern time

IMPORTANT NOTE – The panel and the Postel Award presentation are just two sections of the IETF 100 plenary session – and happen somewhere in the middle of the session. The full agenda can be found at:  https://datatracker.ietf.org/meeting/100/materials/agenda-100-ietf-sessa/

The live video stream will be recorded if you want to watch later.

Moderated by Brian Trammell, member of the Internet Architecture Board, panelists include:

  • Monique Morrow, President and Co-Founder of the Humanized Internet, a non-profit Continue reading

7 Cloudflare Apps Which Increase User Engagement on Your Site

7 Cloudflare Apps Which Increase User Engagement on Your Site

7 Cloudflare Apps Which Increase User Engagement on Your Site

Cloudflare Apps now lists 95 apps from apps which grow email lists to apps which acquire new customers to apps which help site owners make more money. The great thing about these apps is that users don't have to have any coding or development skills. They can just sign up for the app and start using it on their sites.

Let’s take a moment to highlight some apps which increase a site’s user engagement. Check out more Cloudflare Apps which grow your email list, make money on your site, and get more customers.

I hope you enjoy them and I hope you build (or use) great apps like these too.

Check out other Cloudflare Apps »

Build an app on Cloudflare Apps »

1. Privy

7 Cloudflare Apps Which Increase User Engagement on Your Site

Over 100,000 businesses use Privy to capture and convert website visitors. Privy offers a free suite of email capture tools, including exit-intent driven website popups & banners, email list sign-up, an online store, social media channels, mobile capability, and in-store traffic.

7 Cloudflare Apps Which Increase User Engagement on Your Site

In the left preview pane, you can view the different packages and their features users may sign up for from free to "growth" ($199/month) options.

In the right pane, you can preview Continue reading