BrandPost: Successful AI Implementations Hinge on Trust

Business spending on artificial intelligence (AI) technologies is growing by leaps and bounds as organizations strive to improve efficiency, simplify, and automate processes, and build more proactive capabilities. Global spending on AI-centric systems is on track to surpass $300 billion in 2026, with the U.S. accounting for more than 50% of the total, according to IDC forecasts. But the success of these investments may ultimately hinge on trust.A National Institute of Standards and Technology (NIST) study points out that “determining that the AI system is trustworthy because it meets its system requirements won’t ensure widespread adoption of AI. It is the user, the human affected by the AI, who ultimately places their trust in the system.”To read this article in full, please click here

AWS suffers outage at its US East 2 cloud region

Amazon Web Services (AWS) on Monday suffered an outage at one of its four regions in the US, just days after the close of its annual re:Invent conference where it announced a multitude of new and updated services.The outage, which according to the company lasted for about 75 minutes between 11:34 AM and 12:51 PM Pacific Time, resulted in internet connectivity issues to and from the US-East 2 region.The loss in connectivity for certain instances at the Ohio region, which was identified by AWS around 12:26, also saw several people taking to Twitter to complain about it.To read this article in full, please click here

Running Routing Protocols over MLAG Links

It took vendors like Cisco years to start supporting routing protocols between MLAG-attached routers and a pair of switches in the MLAG cluster. That seems like a no-brainer scenario, so there must be some hidden complexities. Let’s figure out what they are.

We’ll use the familiar MLAG diagram, replacing one of the attached hosts with a router running a routing protocol with both members of the MLAG cluster (for example, R, S1, and S2 are OSPF neighbors).

Running Routing Protocols over MLAG Links

It took vendors like Cisco years to start supporting routing protocols between MLAG-attached routers and a pair of switches in the MLAG cluster. That seems like a no-brainer scenario, so there must be some hidden complexities. Let’s figure out what they are.

We’ll use the familiar MLAG diagram, replacing one of the attached hosts with a router running a routing protocol with both members of the MLAG cluster (for example, R, S1, and S2 are OSPF neighbors).

The DNS at the IGF

I was invited to participate in a session at IGF 2022 that was devoted to the workings of the DNS. I’d like to share my contribution to this session with my thoughts on where the DNS is headed.

Troubleshooting Live Training

My next live training course is coming up on the 16th of December: Troubleshooting. This is one of those classes where I’m taking formal training from a former life (electronic engineering) and applying it to the networking world. From the description—

Troubleshooting is a fundamental skill for all network engineers, from the least to most experienced. However, there is little material on correct and efficient troubleshooting techniques in a network engineering context, and no (apparent) live training in this area. Some chapters in books exist (such as the Computer Networking Problems and Solutions, published in December 2017), and some presentations in Cisco Live, but the level of coverage for this critical skill is far below what engineers working in the field to develop solid troubleshooting skills.

This training focuses on the half-split system of troubleshooting, which is widely used in the electronic and civil engineering domains. The importance of tracing the path of the signal, using models to put the system in context, and the use of a simple troubleshooting “loop” to focus on asking how, what, and why are added to the half-split method to create a complete theory of troubleshooting. Other concepts covered in this course are the Continue reading

Converting numbers on Linux among decimal, hexadecimal, octal, and binary

You might not be challenged very often to convert numbers from one numbering system to another but, when you are, you can do it with either of two fairly easy commands on the Linux command line.Converting in your head can be taxing, especially for longer numbers. While the decimal numbering system allows any digit in a number to have any of ten values (0-9), digits in hexadecimal numbers can have 16 (0-F), digits in octal numbers only eight (0-7) and digits in binary numbers only two (0-1).And, whether you like it or not, from time to time you are likely to run into numbers displayed in hex or octal, and knowing how to convert them from one number base to another can come in handy.To read this article in full, please click here

Converting numbers on Linux among decimal, hexadecimal, octal, and binary

You might not be challenged very often to convert numbers from one numbering system to another but, when you are, you can do it with either of two fairly easy commands on the Linux command line.Converting in your head can be taxing, especially for longer numbers. While the decimal numbering system allows any digit in a number to have any of ten values (0-9), digits in hexadecimal numbers can have 16 (0-F), digits in octal numbers only eight (0-7) and digits in binary numbers only two (0-1).And, whether you like it or not, from time to time you are likely to run into numbers displayed in hex or octal, and knowing how to convert them from one number base to another can come in handy.To read this article in full, please click here

Tech Bytes: Diagnosing SaaS Outages When It’s Not The Network (Sponsored)

Today on the Tech Bytes podcast we explore two outages of big-time cloud applications with sponsor ThousandEyes, a Cisco company. These outages share a common thread, in that the network was up and the applications were reachable, but problems on the backend meant the applications weren’t available. We discuss what happened and offer takeaways to minimize business disruptions.

Tech Bytes: Diagnosing SaaS Outages When It’s Not The Network (Sponsored)

Today on the Tech Bytes podcast we explore two outages of big-time cloud applications with sponsor ThousandEyes, a Cisco company. These outages share a common thread, in that the network was up and the applications were reachable, but problems on the backend meant the applications weren’t available. We discuss what happened and offer takeaways to minimize business disruptions.

The post Tech Bytes: Diagnosing SaaS Outages When It’s Not The Network (Sponsored) appeared first on Packet Pushers.

Keep the learning pace! A Holiday recap about network automation sessions

Keep the learning pace blog

AnsibleFest in October was an amazing experience; the best part was meeting and chatting about multiple network automation use cases with our customers and partners.

In case you want to review the most relevant sessions, here is a summary on the abridged network automation related sessions that you can check on-demand for the next 5 months:

 

Why unified network automation and why now? 

Bob Laliberte, Principal Analyst, ESG covers the complexity of modern networks which span across multi-domain teams including campus, branches, data centers, WAN networks and now edge across distributed locations. 

Network automation, when implemented as an end to end solution, can unify teams and make it faster and more efficient to deliver network services.

IT decision makers and managers will be able to have a better insight on network automation challenges and KPIs.

 

Noor Shadid, Wells Fargo | theCUBE at Red Hat AnsibleFest 2022

In this interview, Wells Fargo Senior Vice President, Noor Shadid, describes their cultural change with automation and how Wells Fargo positioned itself as a technology company.

 

Journey to Automated NetOps in Financial Services 

John Teixido from Truist and Tony Dubiel from Red Hat cover this amazing session. You Continue reading

Intel Chip Research Pushes Power Efficiency And Performance

Since Pat Gelsinger’s return to Intel as chief executive officer in early 2021, the company has bet big on bolstering its manufacturing processes and foundry business, expanded its fab footprint in the United States, and advocated for expanding the country’s chip making capabilities.

Intel Chip Research Pushes Power Efficiency And Performance was written by Jeffrey Burt at The Next Platform.

Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices

On today's Network Break we discuss new AWS previews for secure remote access and for connecting applications and services across VPCs. We also discuss a serious outage at Hive Social, Open RAN 5G coming to fighter jets, a promise from Broadcom not to raise prices if the VMware acquisition goes through, and more IT news.

The post Network Break 410: AWS Previews Secure Remote Access; Broadcom Promises Not To Raise VMware Prices appeared first on Packet Pushers.

Review: S5648X-2Q4Z Switch – Part 1: VxLAN/GENEVE/NvGRE

After receiving an e-mail from a newer [China based switch OEM], I had a chat with their founder and learned that the combination of switch silicon and software may be a good match for IPng Networks. You may recall my previous endeavors in the Fiberstore lineup, notably an in-depth review of the [S5860-20SQ] which sports 20x10G, 4x25G and 2x40G optics, and its larger sibling the S5860-48SC which comes with 48x10G and 8x100G cages. I use them in production at IPng Networks and their featureset versus price point is pretty good. In that article, I made one critical note reviewing those FS switches, in that they’e be a better fit if they allowed for MPLS or IP based L2VPN services in hardware.

S5624X Front

S5648X Front



I got cautiously enthusiastic (albeit suitably skeptical) when this new vendor claimed VxLAN, GENEVE, MPLS and GRE at 56 ports and line rate, on a really affordable budget (sub-$4K for the 56 port; and sub-$2K for the 26 port switch). This reseller is using a less known silicon vendor called [Centec], who have a lineup of ethernet silicon. In this device, the CTC8096 (GoldenGate) is used for cost effective high density 10GbE/40GbE applications Continue reading