If you are passionate about ICT policy, Peering, and Interconnection, then the Africa Peering and Interconnection Forum (AfPIF) is the place to be. The 7th annual AfPIF takes place in Dar es Salaam, Tanzania from 30 August – 1 September 2016. AfPIF is a multistakeholder forum organized by the Internet Society that brings together a diverse range of business leaders, infrastructure providers, Internet service providers (ISPs), Internet Exchange Points (IXPs), international financial institutions, policy-makers, and regulators from all over the world.
It's a familiar story by now: on the 8th of August, 2016, Delta lost power to its Atlanta data center, causing the entire data center to fail. Thousands of flights were cancelled, many more delayed, and tens of thousands of travellers stranded. What's so unusual about this event is in the larger scheme of network engineering, it's not that unusual. If I think back to my time on the Escalation Team at a large vendor, I can think of hundreds of situations like this. And among all those events, there is one point in common: it takes longer to boot the system than it does to fix the initial problem.
The world of networking tends to be bistable: we either centralize everything, or we decentralize everything. We started with mainframes, passed through Lotus 123 hidden in corners, then to mini's and middleware, then to laptops, and now to the cloud, to be followed by fog. This particular cycle of centralization/decentralization, however, has produced a series of overlapping changes that are difficult to decipher. You can somehow hear someone arguing about disaggregation and hyperconvergence through the fog -- but just barely.
One of the oft-made claims about Bitcoin and its blockchain transaction ledger is that they make transactions really cheap, so you can pay someone anywhere in the world for free, or close to it. But when you look closer, is that really true? Not by a long shot. Bitcoin transactions are stored in a large shared database called the blockchain.
Software-defined networking (SDN) itself represents a deconstructed view of current switching and routing architectures providing the abstractions of control from dataplane. With this newfound control, the industry is leveraging multiple virtualization strategies to build out public, private, and hybrid cloud architectures, delivering multiple new application services to the market.
Data generation is all the rage these days. But are you utilizing it to maximize your outcomes? You know that data is indispensable for your business to keep up and outpace the competition. And most leading corporations agree, since statistically, the speed that companies are producing and collecting data is only increasing with 40 zettabytes expected to be created by 2020. The majority of these organizations are then tossing all of this data into data lakes without any real structured methods of extracting some value from it.
Think your organization is exempt from in-house network abuse? Think again. A CFCA Global Fraud Survey of communication service providers found that dealer fraud was one of the top five methods of fraud, costing $US 3.35 billion annually. In this scenario, customer service representatives (CSRs) or administrators with access to account information may upgrade friends or family to a premium service package or even provide free access to services.
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) have been picking up the pace as of late. A high percentage of communication service providers and large data centers have either added these technologies on their roadmaps, or are already doing small-scale Proof-of-Concepts (PoC) in their testbed environments.
Databases are the infrastructure of the modern administrative state and data is its lifeblood. When the data is contaminated with errors, federal agencies have difficulty performing even the most basic administrative functions such as managing its inventory of office space and protecting the personally identifiable information (PII) of social security number holders. The federal dissemination of unreliable data doesn't just waste money; it undermines public trust in government and leaves it unmanageable.
Service providers have traditionally organised their operations around different technology domains. The responsible teams have been staffed with specialists looking after routing, network services, security and various other functional areas. Over time, organizations like this have had the tendency to transform into loosely tied silos with limited interaction between the different teams.