Ericsson’s 1Q Revenue Plummets 11%, Company Faces More Cuts
The company's cost reduction plan didn't go far enough.
The company's cost reduction plan didn't go far enough.
Data center fabrics are built today using spine and leaf fabrics, lots of fiber, and a lot of routers. There has been a lot of research in all-optical solutions to replace current designs with something different; MegaSwitch is a recent paper that illustrates the research, and potentially a future trend, in data center design. The basic idea is this: give every host its own fiber in a ring that reaches to every other host. Then use optical multiplexers to pull off the signal from each ring any particular host needs in order to provide a switchable set of connections in near real time. The figure below will be used to explain.

In the illustration, there are four hosts, each of which is connected to an electrical switch (EWS). The EWS, in turn, connects to an optical switch (OWS). The OWS channels the outbound (transmitted) traffic from each host onto a single ring, where it is carried to every other OWS in the network. The optical signal is terminated at the hop before the transmitter to prevent any loops from forming (so A’s optical signal is terminated at D, for instance, assuming the ring runs clockwise in the diagram).
The receive Continue reading
In our previous Getting Started blog post, we discussed how to install Ansible Tower in your environment.
Now we’ll discuss how you can equip your Tower host with users and credentials.
To begin, let’s cover the essentials: setting up your user base and creating credentials for appropriate delegation of tasks.
Building your user base will be the first thing you’ll need to do to get started with Tower. The user base can be broken into three easily-defined parts:
1. User: Someone who has access to Tower with associated permissions and credentials.
2. Organization: The top level of the user base - a logical collection of users, teams, projects and inventories.
3. Team: A subdivision of an organization - provides the means to set up and implement role-based access schemes as well as to delegate work across organizations.
There are three types of users that can be defined within Tower:
Following the general session highlights from DockerCon Day 1, we’re happy to share with you the video recording from general session day 2. All the slides will soon be published on our slideshare account and all the breakout session video recordings available on our DockerCon 2017 youtube playlist.

Here’s what we covered during the day 2 general session:
Ben started off his DockerCon Day 2 keynote with key facts and figures around Docker Commercial Adoption. To illustrate his points Ben invited on stage Swamy Kochelakota, Global Head of Infrastructure and Operations at Visa to talk about their journey adopting Docker Enterprise Edition to run their critical applications at scale in a very diverse environment.
During the day 2 keynote, Lily and Vivek reprise their 2016 roles of dedicated burners, finally returning from Burning Man to get back to their jobs of enterprise dev and ops. Ben returns as clueless business guy, and decides to add value by hiring a contractor, who Continue reading
Pluribus' Adaptive Cloud Fabric operates without a controller.
Everyone’s guessing the mystery bidder is Verizon.
This blog post / write-up is long overdue. I’m the guy that’s gone from electronics and hardware person, to embedded software, software, networking and now back to software with a keen interest in programmable hardware. Whilst I haven’t had to quite start from scratch in software again, it’s been a long journey to get proficient. Therefore, perusing Twitter, Facebook, Reddit, conference notes and videos, occasionally something comes up which is interesting. Psychologically, coding is interesting (note how no-one says programmer any more? Who writes programs?). It gives away something about your personality, current learned/learning state and your happiness levels. It gives away how you view the world and how you handle danger. Seriously. I can hear those thoughts that say “Whatever dude”. Look at how some developers handle failure prone code. Do they check for errors in a shotgun style approach, or with the accuracy of a sniper?
What caught my eye back in January was a Tweet from one of my coding heroes, William Kennedy. The top one started a thought process off that I’ve been chewing on for months.
@goinggodotnet
Thinking about the diff between ignorance vs carelessness as it relates to writing software. These two words Continue reading

The post Worth Reading: AI driven networks appeared first on rule 11 reader.