I’m happy to be given the opportunity to speak once more at Interop Vegas in 2016. No workshop for me this year, but I will be putting on three individual talks, all focusing on topics that have been very near and dear to me over the past year.
Last year I was very focused on putting the theory behind network automation into practical terms, and making it “real”. Over the past year I’ve seen rapid growth in adoption of these ideas, and I was happy to be just one very small part of helping to make that happen.
Since the last Interop, my career has steered me towards a more direct approach to network automation, specifically through software development. So I’d like to spend some time providing an overview of my sessions at the upcoming Interop Vegas 2016, which are all inspired by the last year of my career.
I am obviously very passionate about network automation, and have been very vocal about my belief that network automation only has a chance if it is done properly, which includes proper testing. I strongly believe that network automation can and should take place within the context of a Continue reading
Brocade's stock drops 14% on the announcement.
Take survey and enter to win one of two $200 Amazon Gift Cards.
In my last post on securing BGP, I said—
The CAP theorem post referenced above is here.
Before I dive into the technical issues, I want to return to the business issues for a moment. In a call this week on the topic of BGP security, someone pointed out that there is no difference between an advertisement in BGP asserting some piece of information (reachability or connectivity, take your pick), and an advertisements outside BGP asserting this same bit of information. The point of the question is this: if I can’t trust you to advertise the right thing in one setting, then why should I trust you to advertise the right thing in another? More specifically, if you’re using Continue reading
Take a Network Break and sample our delicious assortment of tech news, including a new product from Arista, financial results from Huawei, & stories on Dell, HPE, Plumgrid, Intel & more.
The post Network Break 81: Arista’s Universal Spine, Huawei’s Big Profits appeared first on Packet Pushers.
Take a Network Break and sample our delicious assortment of tech news, including a new product from Arista, financial results from Huawei, & stories on Dell, HPE, Plumgrid, Intel & more.
The post Network Break 81: Arista’s Universal Spine, Huawei’s Big Profits appeared first on Packet Pushers.
WLAN market continues on a rapid path of consolidation with latest deal.
This is a guest repost by Suresh Kondamudi from CleverTap.
Dealing with large datasets is often daunting. With limited computing resources, particularly memory, it can be challenging to perform even basic tasks like counting distinct elements, membership check, filtering duplicate elements, finding minimum, maximum, top-n elements, or set operations like union, intersection, similarity and so on
Probabilistic data structures can come in pretty handy in these cases, in that they dramatically reduce memory requirements, while still providing acceptable accuracy. Moreover, you get time efficiencies, as lookups (and adds) rely on multiple independent hash functions, which can be parallelized. We use structures like Bloom filters, MinHash, Count-min sketch, HyperLogLog extensively to solve a variety of problems. One fairly straightforward example is presented below.
We at CleverTap manage mobile push notifications for our customers, and one of the things we need to guard against is sending multiple notifications to the same user for the same campaign. Push notifications are routed to individual devices/users based on push notification tokens generated by the mobile platforms. Because of their size (anywhere from 32b to 4kb), it’s non-performant for us to index Continue reading
NFV needs a high-performance infrastructure to reap the benefits the technology offers. Learn how how to create an NFVI that achieves maximizes NFV performance, industry openness, and services automation.