Monday, December 22, 2014
Earlier this month, Verizon provisioned 200G technology using the same Ciena gear on an ultra-long-haul production network between Boston and New York without impacting live customer traffic on the same network and without making any modifications to the existing fiber or network infrastructure equipment. The new Ciena gear was only added on each end of the communications channel.
Significant? You bet. More information on a single wavelength over long distance without any loss of signal quality. All this without having to upgrade fiber and infrastructure equipment in the field. It opens the door for the possibilities of much higher bit rates over existing fiber-based networks. We'll see 400 Gbps soon and yes even Tera-bit-per-second (Tbps) rates over existing optical fiber infrastructure soon.
Thursday, December 18, 2014
I've spent the last 17 years focused on Internet Protocol (IP) over various transport systems - wired (copper), wireless and optical. With the explosion of video, social media and other bandwidth hungry applications we've seen fiber moving closer and closer to the end user. Wireless is the perfect example with towers back-hauled into the network by fiber. It's really just the last mile/final connection that is typically not optical fiber based for most of us.
We're seeing IP/optical integration today really ramping with these things called software defined networks (SDNs). I wrote a post defining and describing SDN's last month titled SDN: When The Hardware Becomes A Little More Soft
With the move to all-IP, SDN and cloud services, many service providers are now integrating IP routing and transport. In this short 4 minute and 50 audio clip, Arnold Jansen discusses how IP/optical control integration can help operators simplify and streamline their operations and drive better cost synergies.
Smart, fast, efficient. Good stuff.
Monday, November 10, 2014
In the book, Sutton lays out a dirty dozen list of common everyday actions that a**holes use and how some companies - including JetBlue, Men's Wearhouse, and Google - have created work environments where positive self-esteem is used to build a more productive, motivated, and satisfied workforce.
Here's Sutton's dirty dozen list:
- Personal insults.
- Invading one's personal territory.
- Uninvited personal contact.
- Threats and intimidation, both verbal and non-verbal.
- Sarcastic jokes and teasing used as insult delivery systems.
- Withering email flames.
- Status slaps intended to humiliate their victims.
- Public shaming or status degradation rituals.
- Rude interruptions.
- Two-faced attacks.
- Dirty looks.
- Treating people as if they are invisible.
Thursday, November 6, 2014
Software Defined Networking (SDN) is a new approach to designing, building and managing networks. The basic concept is that SDN separates the network’s control (brains) and forwarding (muscle) planes to make it easier to optimize each.
In this environment, a Controller acts as the “brains,” providing an abstract, centralized view of the overall network. Through the Controller, network administrators can quickly and easily make and push out decisions on how the underlying systems (switches, routers) of the forwarding plane will handle the traffic.
Monday, November 3, 2014
As some of you know I've gone through a few career-related changes over the past year. After seventeen years the ICT Center was sunset by the National Science Foundation. Seventeen years is a long time for anything to be funded by the NSF and I'd like to thank everyone involved - there are so many - from all over the United States. It was so much fun to do the work we did at the historical time we did it. We positively influenced tens-of-thousands of lives in our country - our legacy - and that is pretty cool.
Monday, July 7, 2014
- Delete any texts asking you to confirm or provide personal information. Legitimate companies don’t ask for information like account numbers or passwords by text or email.
- Don’t reply, and don’t click on links provided in the message. Links can install malware and take you to spoof sites that look real but whose purpose is to steal your information.
- Don’t give out any personal information in response to a text. A spammer wants access to your Social Security number, credit card numbers, and bank and utility account numbers to open new accounts in your name.
- Report spam texts to your carrier. AT&T, T-Mobile, Verizon, Sprint or Bell subscribers can copy the original text and forward it to 7726 (SPAM), free of charge.
- Review your cell phone bill for unauthorized charges.Report them to your carrier.
Monday, March 24, 2014
- SSD’s look like a mechanical hard drive and the server operating system uses standard BIOS calls to access.
- SSA’s are a little different and use a PCI Express (PCIe) interface. The operating system must use a unique set of software drivers specific to the SSA device being used.
Saturday, March 15, 2014
Monday, March 10, 2014
- Automation of administrative tasks.
- Dynamic scaling.
- Desktop virtualization.
- Policy-based services.
- Internet connectivity.