Oak Ridge Lab’s Quantum Simulator Pulls HPC Future Closer

Oak Ridge National Laboratory has been investing heavily in quantum computing across the board. From testing new devices, programming models, and figuring out workflows that combine classical bits with qubits, this is where the DoE quantum investment seems to be centered.

Teams at Oak Ridge have access to the range of available quantum hardware devices—something that is now possible without having to own the difficult-to-manage quantum computer on sight. IBM’s Q processor is available through a web interface, as is D-Wave’s technology, which means researchers at ORNL can test their quantum applications on actual hardware. As we just

Oak Ridge Lab’s Quantum Simulator Pulls HPC Future Closer was written by Nicole Hemsoth at The Next Platform.

How to gauge your network’s openness

So, you’ve done your research, learned about the many benefits of open networking, and decided you’re interested in building an open network. Congratulations, and welcome to the future of networking! You’ve made a great first step, but maybe you’re concerned about where to begin when it comes to vendors. A lot of network providers will claim that they have open solutions…but how can you be sure you’re choosing the best one? Or how can you determine if your vendor is truly an open solution? Fortunately, there are ways to gauge if your solution is as open as you need it to be. If you don’t want to get duped by phony open vendors, make sure to keep these three things in mind:

The definition of “open networking” is not set in stone

While there are common criteria and ideologies that tend to be associated with open networks, the definition of open networking is still very fluid and can mean different things to different vendors. So, when you’re trying to decide which vendor to go with, don’t let them off easy with simple answers. Ask specific questions about what exactly “open” means to them. Simplicity, flexibility, and modularity are Continue reading

Security with Fish: My First Couple Months

In late June I wrote Security Here I Come!  The transition wasn’t quite as fast as I thought it would be.  ?   But for the past couple months I’ve been able to really start digging in.

My initial response after watching just 2 CiscoLive VoDs?  FEAR!

I really enjoyed these sessions a great deal!!  They were the absolute perfect eye-opener to me!

Neil Lovering had the “Verizon Data Breach Report” in his slides (below).

Its funny because I have seen it before.  To be completely honest I have seen it quite a number of times.  But it was just something about how he presented it.  He got past my not wanting to really “hear” about the risk and the danger and the reality of the security landscape in the world around us.  I paused the VoD on this slide…. paused it and just really took the time to take it all in.

My reaction to this slide?  Lol. This is when the fear began.  Two simple facts on the Continue reading

Security with Fish: My First Couple Months

In late June I wrote Security Here I Come!  The transition wasn’t quite as fast as I thought it would be.  🙂   But for the past couple months I’ve been able to really start digging in.

My initial response after watching just 2 CiscoLive VoDs?  FEAR!

I really enjoyed these sessions a great deal!!  They were the absolute perfect eye-opener to me!

Neil Lovering had the “Verizon Data Breach Report” in his slides (below).

Its funny because I have seen it before.  To be completely honest I have seen it quite a number of times.  But it was just something about how he presented it.  He got past my not wanting to really “hear” about the risk and the danger and the reality of the security landscape in the world around us.  I paused the VoD on this slide…. paused it and just really took the time to take it all in.

My reaction to this slide?  Lol. This is when the fear began.  Two simple facts on the Continue reading

IDG Contributor Network: 5 reasons why IT can’t tame the user experience for the network manager

Every vendor today is spewing about the importance of managing the user experience. What this actually means, however, remains a mystery to most, and there are precious few approaches available to help you get a handle on the issue.Good and predictable user experience is no longer negotiable in this age of constant online business communications. Computer networks have effectively become the single most important tool driving corporate productivity.But user experience is one of the most difficult problems to address, especially on enterprise access networks, because each experience is influenced by a long list of moving parts, many of which are increasingly outside the control of IT. To read this article in full, please click here

IDG Contributor Network: 5 reasons why IT can’t tame the user experience for the network manager

Every vendor today is spewing about the importance of managing the user experience. What this actually means, however, remains a mystery to most, and there are precious few approaches available to help you get a handle on the issue.Good and predictable user experience is no longer negotiable in this age of constant online business communications. Computer networks have effectively become the single most important tool driving corporate productivity.But user experience is one of the most difficult problems to address, especially on enterprise access networks, because each experience is influenced by a long list of moving parts, many of which are increasingly outside the control of IT. To read this article in full, please click here

NANOG 75 Overview

Click through to the full list of NANOG 75 meeting information.

NANOG 75 Hackathon will take place February 17, 2019 and the NANOG 75 conference is February 18-20, 2019. Both will offer a great opportunity to network with colleagues, freshen-up skills, learn advanced networking techniques, and discover new network applications.  

We will be gathering at the Hyatt Regency San Francisco.   A crimson bridge, cable cars, a sparkling bay, and streets lined with elegant Victorian homes—San Francisco is undeniably one of the world’s great cities. Located along the Northern California at the state’s distinctive bend in the coast, the region has an alluring magic that stretches beyond the bay to diverse cities with nightlife and trend-setting cuisine. 

NANOG 75 host sponsor is

DigitalRealty_JPG_1.30

 

Join NANOG today and receive a $25 discount on standard registration fees for any NANOG conference.

 

 

MEETING REGISTRATION

Meeting Registration is now open.

Off the Cuff – Disaggregation

In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.

 

Russ White
Guest
Pete Lumbis
Guest
Jeff Tantsura
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – Disaggregation appeared first on Network Collective.

Off the Cuff – Disaggregation

In this Off The Cuff episode of Network Collective, recorded live at the SDxE conference in Austin, TX, the panel discusses the current state of network disaggregation, whitebox switching, and where the disaggregated model makes sense in your network.

 

Russ White
Guest
Pete Lumbis
Guest
Jeff Tantsura
Guest

Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Off the Cuff – Disaggregation appeared first on Network Collective.

Europe Elbows For A Place At Exascale Table

When talking about the ongoing international race to exascale computing, it might be easy to overlook the European Union. A lot of the attention over the past several years has focused on the efforts by the United States and China, the world’s economic powerhouses and the centers of technology development.

Through its Exascale Computing Project, the United States is putting money and resources behind its plans to roll out the first of its exascale systems in 2021. For its part, China is planning at least three pre-exascale systems using mostly home-grown technologies, backed by significant investments by the Chinese

Europe Elbows For A Place At Exascale Table was written by Jeffrey Burt at The Next Platform.

Mitigating Cybersecurity Threats With Advanced Datacenter Tech

In this fast-paced global economy, enterprises must innovate to evolve and succeed. Today’s industry experts are seeking transformative technologies – like high performance computing and artificial intelligence ­– to help them accelerate data analytics, support increasingly complex workloads, and facilitate business growth to meet the challenges of tomorrow. However, data security remains a chief concern as enterprises race to implement these cutting-edge innovations.

The digital age is marked by several key trends – in cluding IT modernization, business transformation, and digital disruptions such as proliferating mobility, the Internet of Things, cloud computing, and much more. Many businesses are investing heavily

Mitigating Cybersecurity Threats With Advanced Datacenter Tech was written by Timothy Prickett Morgan at The Next Platform.

11% off August Smart Lock Pro With Connect Bundle – Deal Alert

With August Smart Lock Pro, you can lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone. The 24/7 activity log means you’re always in the know. With your phone in your pocket, simply open the door and you’re in your home. Heading out? August Smart Lock Pro will also automatically lock the door behind you after you leave. The smart lock currently averages 4 out of 5 stars on Amazon, where the list price on the Lock and Connect Bundle has been reduced 11% to $249.99. See this deal on Amazon.To read this article in full, please click here

11% off August Smart Lock Pro With Connect Bundle – Deal Alert

With August Smart Lock Pro, you can lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone. The 24/7 activity log means you’re always in the know. With your phone in your pocket, simply open the door and you’re in your home. Heading out? August Smart Lock Pro will also automatically lock the door behind you after you leave. The smart lock currently averages 4 out of 5 stars on Amazon, where the list price on the Lock and Connect Bundle has been reduced 11% to $249.99. See this deal on Amazon.To read this article in full, please click here