Synopsis: A tutorial on the NETCONF protocol. The operations of the core NETCONF protocol are taught. This is followed by examination of traces of NETCONF sessions.
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
A 30-minute Introduction to NETCONF and YANGTail-f Systems
This is a live document that I use to present the state of NETCONF and YANG in various contexts. I use it to inform and get conversation going, not to provide complete and final documentation of NETCONF and YANG. I update this document almost monthly, mostly with regards to industry support and working group timelines, check back!
This document provides a tutorial on NETCONF and YANG, which are standards for network configuration and management. NETCONF was designed to address operators' requirements for easier network-wide configuration, validation of changes, and transactional management across multiple devices. It uses SSH for secure transport and XML encoding. YANG provides data models to define the configuration and state data. The tutorial covers the background and motivation for these standards, an overview of NETCONF operations and examples, and a demonstration of YANG data modeling. It explains how NETCONF enables network-wide atomic transactions, fulfilling a key operator need and improving the cost and complexity of network management.
Synopsis: Part 1 of a tutorial on the YANG data modeling language. The basics of YANG are taught in this module. More advanced YANG statements are taught in Part 2.
Synopsis: A high-level technical introduction to ConfD. Introduction to ConfD architecture, data model driven paradigm, core engine features and northbound interfaces.
Tail-f Systems ConfD is a data-model driven network configuration and management system. It provides a core engine that supports multiple protocols like NETCONF, SNMP, REST, and CLIs. ConfD uses YANG data models to automatically render management interfaces and data stores. It also provides transactional configuration, validation, rollback management, and monitoring of operational data. ConfD aims to make network devices more manageable, programmable, and standards-compliant using model-driven development.
The document discusses several network configuration protocols:
- NETCONF uses XML and RPC to install, manipulate, and delete configurations on network devices. It operates over SSH.
- YANG is a data modeling language used to define configuration and state data for NETCONF in XML format.
- RESTCONF provides RESTful operations on NETCONF datastores containing YANG data, using HTTP.
Synopsis: A discussion of the requirements for next generation network management identified in RFC 3535 which lead to the development of NETCONF and YANG.
A 30-minute Introduction to NETCONF and YANGTail-f Systems
This is a live document that I use to present the state of NETCONF and YANG in various contexts. I use it to inform and get conversation going, not to provide complete and final documentation of NETCONF and YANG. I update this document almost monthly, mostly with regards to industry support and working group timelines, check back!
This document provides a tutorial on NETCONF and YANG, which are standards for network configuration and management. NETCONF was designed to address operators' requirements for easier network-wide configuration, validation of changes, and transactional management across multiple devices. It uses SSH for secure transport and XML encoding. YANG provides data models to define the configuration and state data. The tutorial covers the background and motivation for these standards, an overview of NETCONF operations and examples, and a demonstration of YANG data modeling. It explains how NETCONF enables network-wide atomic transactions, fulfilling a key operator need and improving the cost and complexity of network management.
Synopsis: Part 1 of a tutorial on the YANG data modeling language. The basics of YANG are taught in this module. More advanced YANG statements are taught in Part 2.
Synopsis: A high-level technical introduction to ConfD. Introduction to ConfD architecture, data model driven paradigm, core engine features and northbound interfaces.
Tail-f Systems ConfD is a data-model driven network configuration and management system. It provides a core engine that supports multiple protocols like NETCONF, SNMP, REST, and CLIs. ConfD uses YANG data models to automatically render management interfaces and data stores. It also provides transactional configuration, validation, rollback management, and monitoring of operational data. ConfD aims to make network devices more manageable, programmable, and standards-compliant using model-driven development.
The document discusses several network configuration protocols:
- NETCONF uses XML and RPC to install, manipulate, and delete configurations on network devices. It operates over SSH.
- YANG is a data modeling language used to define configuration and state data for NETCONF in XML format.
- RESTCONF provides RESTful operations on NETCONF datastores containing YANG data, using HTTP.
Call Home is an innovative system that enables network functions virtualization (NFV) and software-defined networking (SDN) in situations where virtual customer premises equipment (vCPE) is protected by a cable modem or a firewall. In this presentation, ADVA Optical Networking’s engineers outlined this new technique and explained how it makes secure NFV/SDN deployment possible when a NETCONF client is otherwise unable to initiate an SSH connection directly to the NETCONF server.
Rajendra Nagabhushan and Vikram Darsi discussed how the IETF draft for NETCONF Call Home Using SSH can be implemented as an OpenDaylight feature. They demonstrated how the technology can be applied in a real-world use-case and outlined how an ADVA Optical Networking product is being developed ahead of its 2017 release.
» Read more at http://www.tail-f.com/education/what-is-netconf/
» Watch the Tail-f Why NETCONF video at
http://www.youtube.com/watch?v=H-BvpHd49-o&list=PLGSa_0wjZ-GgoReC1SNmgSHi2k4KUGPgo&index=1
NETCONF is a protocol defined by the IETF to "install, manipulate, and delete the configuration of network devices". NETCONF operations are realized on top of a Remote Procedure Call (RPC) layer using an XML encoding and provides a basic set of operations to edit and query configuration on a network device.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
VRF (Virtual Routing and Forwarding) is a technology that allows multiple instances of a routing table to
co-exist within the same router at the same time. This increases functionality by allowing network paths
to be segmented without using multiple devices. Because traffic is automatically segregated, VRF also
increases network security and can eliminate the need for encryption and authentication. Internet
service providers (ISPs) often take advantage of VRF to create separate virtual private networks (VPNs)
for customers; thus the technology is also referred to as VPN routing and forwarding. Because the
routing instances are independent, the same or overlapping IP addresses can be used without
conflicting with each other.
Introduction to YANG data models and their use in OpenDaylight: an overviewCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. YANG is a data modeling language defining device and service configuration and operations. This session will describe what YANG is (with examples), and its relationship to and how it is used in OpenDaylight. Several tools making it easier for the application developer to work with YANG will be discussed. It will conclude with a demonstration of YANGUI and YANG Visualizer, two new OpenDaylight applications that auto-generate a user interface and directed graph respectively, both based on selected YANG models.
This document provides instructions and configuration examples for setting up DHCP relay using Cisco Application Centric Infrastructure (ACI) and on Linux and Windows DHCP servers. It discusses creating DHCP relay policies and providers in ACI, as well as configuring DHCP scopes, pools, and options on Linux and Windows servers. Packet captures are shown to analyze DHCP option 82 for link selection. The document also lists useful ACI commands for verifying the DHCP configuration and troubleshooting.
This document provides an overview and design guide for implementing VXLAN and vCNS networks. It begins with an introduction to VXLAN including competing solutions, why it was created, and current adoption status. It then discusses the key components needed for a VXLAN deployment including vCNS Edge, vSphere Distributed Switch, and VTEPs. The document reviews multicast configuration options and considerations, as well as high-level logical and physical deployment diagrams. It concludes with a discussion of VXLAN performance overhead and using VXLAN with HP Virtual Connect.
The Juniper EX series switches can simplify enterprise network architectures and reduce costs through consolidation. The EX series delivers high performance switching with carrier-grade reliability for the campus network. Features include virtual chassis technology, which allows multiple EX switches to be interconnected and managed as a single logical switch. This provides improved scalability and availability over traditional tiered designs. The EX series is suitable for access, aggregation, and branch office deployments.
Mikrotik IP Settings For Performance and SecurityGLC Networks
Webinar topic: Mikrotik IP Settings For Performance and Security
Presenter: Achmad Mardiansyah
In this webinar series, we discussed about Mikrotik IP Settings For Performance and Security
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/9ldLm969rxo
Replacing iptables with eBPF in Kubernetes with CiliumMichal Rostecki
Cilium is an open source project which provides networking, security and load balancing for application services that are deployed using Linux container technologies by using the native eBPF technology in the Linux kernel. In this presentation we talked about:
- The evolution of the BPF filters and explained the advantages of eBPF Filters and its use cases today in Linux especially on how Cilium networking utilizes the eBPF Filters to secure the Kubernetes workload with increased performance when compared to legacy iptables.
- How Cilium uses SOCKMAP for layer 7 policy enforcement - How Cilium integrates with Istio and handles L7 Network Policies with Envoy Proxies.
- The new features since the last release such as running Kubernetes cluster without kube-proxy, providing clusterwide NetworkPolicies, providing fully distributed networking and security observability platform for cloud native workloads etc.
The document provides instructions for configuring a Mikrotik router, including setting up interfaces and network cards, assigning IP addresses, creating NAT and DHCP rules, configuring DNS and gateway settings, and setting up a basic hotspot with user authentication. It also describes how to change the ISP connection and switch between Radius and local authentication for the hotspot.
The document provides an introduction to the ConfD Database (CDB), which is a hierarchical, ACID-compliant database used by ConfD to store configuration and operational data modeled with YANG. CDB stores data both in-memory and persistently on disk, supports transactions, replication, and automatic schema upgrades. Managed objects use CDB APIs to read configuration data at startup and subscribe to relevant configuration changes via a subscription socket.
Call Home is an innovative system that enables network functions virtualization (NFV) and software-defined networking (SDN) in situations where virtual customer premises equipment (vCPE) is protected by a cable modem or a firewall. In this presentation, ADVA Optical Networking’s engineers outlined this new technique and explained how it makes secure NFV/SDN deployment possible when a NETCONF client is otherwise unable to initiate an SSH connection directly to the NETCONF server.
Rajendra Nagabhushan and Vikram Darsi discussed how the IETF draft for NETCONF Call Home Using SSH can be implemented as an OpenDaylight feature. They demonstrated how the technology can be applied in a real-world use-case and outlined how an ADVA Optical Networking product is being developed ahead of its 2017 release.
» Read more at http://www.tail-f.com/education/what-is-netconf/
» Watch the Tail-f Why NETCONF video at
http://www.youtube.com/watch?v=H-BvpHd49-o&list=PLGSa_0wjZ-GgoReC1SNmgSHi2k4KUGPgo&index=1
NETCONF is a protocol defined by the IETF to "install, manipulate, and delete the configuration of network devices". NETCONF operations are realized on top of a Remote Procedure Call (RPC) layer using an XML encoding and provides a basic set of operations to edit and query configuration on a network device.
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
- Show you how GoBGP can be used as a software router in conjunction with quagga
- (Tutorial) Walk through the setup of IXP connecting router using GoBGP
VRF (Virtual Routing and Forwarding) is a technology that allows multiple instances of a routing table to
co-exist within the same router at the same time. This increases functionality by allowing network paths
to be segmented without using multiple devices. Because traffic is automatically segregated, VRF also
increases network security and can eliminate the need for encryption and authentication. Internet
service providers (ISPs) often take advantage of VRF to create separate virtual private networks (VPNs)
for customers; thus the technology is also referred to as VPN routing and forwarding. Because the
routing instances are independent, the same or overlapping IP addresses can be used without
conflicting with each other.
Introduction to YANG data models and their use in OpenDaylight: an overviewCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. YANG is a data modeling language defining device and service configuration and operations. This session will describe what YANG is (with examples), and its relationship to and how it is used in OpenDaylight. Several tools making it easier for the application developer to work with YANG will be discussed. It will conclude with a demonstration of YANGUI and YANG Visualizer, two new OpenDaylight applications that auto-generate a user interface and directed graph respectively, both based on selected YANG models.
This document provides instructions and configuration examples for setting up DHCP relay using Cisco Application Centric Infrastructure (ACI) and on Linux and Windows DHCP servers. It discusses creating DHCP relay policies and providers in ACI, as well as configuring DHCP scopes, pools, and options on Linux and Windows servers. Packet captures are shown to analyze DHCP option 82 for link selection. The document also lists useful ACI commands for verifying the DHCP configuration and troubleshooting.
This document provides an overview and design guide for implementing VXLAN and vCNS networks. It begins with an introduction to VXLAN including competing solutions, why it was created, and current adoption status. It then discusses the key components needed for a VXLAN deployment including vCNS Edge, vSphere Distributed Switch, and VTEPs. The document reviews multicast configuration options and considerations, as well as high-level logical and physical deployment diagrams. It concludes with a discussion of VXLAN performance overhead and using VXLAN with HP Virtual Connect.
The Juniper EX series switches can simplify enterprise network architectures and reduce costs through consolidation. The EX series delivers high performance switching with carrier-grade reliability for the campus network. Features include virtual chassis technology, which allows multiple EX switches to be interconnected and managed as a single logical switch. This provides improved scalability and availability over traditional tiered designs. The EX series is suitable for access, aggregation, and branch office deployments.
Mikrotik IP Settings For Performance and SecurityGLC Networks
Webinar topic: Mikrotik IP Settings For Performance and Security
Presenter: Achmad Mardiansyah
In this webinar series, we discussed about Mikrotik IP Settings For Performance and Security
Please share your feedback or webinar ideas here: http://bit.ly/glcfeedback
Check our schedule for future events: https://www.glcnetworks.com/en/schedule/
Follow our social media for updates: Facebook, Instagram, YouTube Channel, and telegram also discord
Recording available on Youtube
https://youtu.be/9ldLm969rxo
Replacing iptables with eBPF in Kubernetes with CiliumMichal Rostecki
Cilium is an open source project which provides networking, security and load balancing for application services that are deployed using Linux container technologies by using the native eBPF technology in the Linux kernel. In this presentation we talked about:
- The evolution of the BPF filters and explained the advantages of eBPF Filters and its use cases today in Linux especially on how Cilium networking utilizes the eBPF Filters to secure the Kubernetes workload with increased performance when compared to legacy iptables.
- How Cilium uses SOCKMAP for layer 7 policy enforcement - How Cilium integrates with Istio and handles L7 Network Policies with Envoy Proxies.
- The new features since the last release such as running Kubernetes cluster without kube-proxy, providing clusterwide NetworkPolicies, providing fully distributed networking and security observability platform for cloud native workloads etc.
The document provides instructions for configuring a Mikrotik router, including setting up interfaces and network cards, assigning IP addresses, creating NAT and DHCP rules, configuring DNS and gateway settings, and setting up a basic hotspot with user authentication. It also describes how to change the ISP connection and switch between Radius and local authentication for the hotspot.
The document provides an introduction to the ConfD Database (CDB), which is a hierarchical, ACID-compliant database used by ConfD to store configuration and operational data modeled with YANG. CDB stores data both in-memory and persistently on disk, supports transactions, replication, and automatic schema upgrades. Managed objects use CDB APIs to read configuration data at startup and subscribe to relevant configuration changes via a subscription socket.
This document provides a summary of a YANG tutorial presentation on advanced YANG statements, including must statements, augment statements, when statements, choice statements, identity statements, feature statements, deviations, and YANG modeling strategies. It discusses topics like restricting valid values with XPath expressions in must statements, adding new data with augment statements, making data conditional with when statements, modeling related enumerations with identity statements, and marking data as optional with feature statements. The presentation aims to help people understand and properly apply these important YANG modeling constructs.
This document discusses C data types. C provides a variety of basic data types to store different types of data including integers, floating-point numbers, characters, and pointers. These data types allow programmers to declare variables that can hold specific types of values.
Webinar: Applying REST to Network Management – An Implementor’s View Tail-f Systems
This webinar gives an introduction to the principles of REST, shows how it can be used to expose programmable APIs on network elements and provides some real world examples from our implementation.
The principles of Representational State Transfer (REST) have gained a strong following since they were described by Roy Fielding in his doctoral dissertation written in 2000. REST’s strength lies in its scalability and generality, allowing it to be used for many types of applications.
The industry has already seen a number of implementations of network management applications that use REST interfaces on the infrastructure management layer, notably OpenStack Quantum and the Sun Cloud API. As a vendor to the vendors, we’ve seen a significant increase in interest around having REST interfaces exposed directly on the network element, be they hardware based or virtual.
http://www.tail-f.com
Synopsis: Introduction to working with the NETCONF northbound interface in ConfD. Configuration of NETCONF using the confd.conf configuration file. NETCONF log and NETCONF trace log. Use of netconf-console for basic NETCONF testing.
Summary slides of current Network OS status overview as of 16, Oct. 2015.
Comparison of two major Open Network OS: "OpenSwitch (ops)" and "Open Network Linux (ONL)".
Tail-f Webinar OpenFlow Switch Management Using NETCONF and YANGTail-f Systems
This Webinar is on the OF-CONFIG specification and how it applies to large scale OpenFlow switch management.
If you are interested in the management of OpenFlow switches and want to find out more about available specifications and tools to build and deploy such solutions, this webinar provides a useful overview.
Webinar Agenda:
-Step-by-step walkthrough of the OpenFlow Management and Configuration Protocol
-Demonstration of how to use of the YANG language to define the structure and semantics of OpenFlow switch configurations
-The role of NETCONF in implementing OF-CONFIG
Advantages of this approach to network device manufacturers and network operations teams needing to quickly develop and deploy state-of-the-art management solutions
-Short overview of Tail-f Systems’ applicable products and tools
http://www.tail-f.com
Tail-f Systems owns the copyright to this document from February 13, 2015. The document discusses operational data providers. It provides copyright information but no other contextual details in the content provided.
Jan Lindblad's presentation at Layer123 SDN and OpenFlow World Congress in Bad Homburg, Germany. Focusing on a multi-vendor SDN deployment at a Tier 1 Service Provider in Asia.
Tail-f Network Control System (NCS) use case:
• Dynamic control of L3-L7 devices using service- oriented network API
• Service chaining using OpenFlow
• Virtualized appliances
Module 7: Installation and Getting StartedTail-f Systems
Synopsis: This module introduces the basics of working with ConfD hands-on. Topics covered include installation of ConfD, a tour of what is where in the installation (docs, examples, etc.), setting environment variables for working with ConfD, a high-level tour of ConfD documentation, where to get started in the examples set, and building and running a first example.
NETCONF & YANG Enablement of Network DevicesCisco DevNet
A technical discussion and a demo showing how Tail-f's ConfD management agent can be used to implement NETCONF and YANG, the industry-leading solution for providing a programmable management interface in a network element. ConfD is recognized as the best-in-breed embedded software for implementing management functions in network elements, including physical devices and virtualized network functions (VNF) for NFV.
This Workshop is a best fit for engineers who are involved in the design and development of embedded software for network devices. Attendees will gain a basic understanding of what NETCONF and YANG are and how ConfD provides a solution for embedding this technology in the network devices. More information about ConfD can be found at: https://developer.cisco.com/site/confD/
Watch the DevNet 1216 replay from the Cisco Live On-Demand Library at: https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=92703&backBtn=true
Check out more and register for Cisco DevNet: http://ow.ly/jCNV3030OfS
Mobicents Summit 2012 - Jean Deruelle - Mobicents SIP Servletstelestax
Mobicents SIP Servlets is an open source project that provides a SIP servlet container. The document summarizes achievements of the project including support for more RFCs, congestion control features, JAIN SIP NIO support, and testing frameworks. It outlines the community around the project and releases of Mobicents SIP Servlets 2.0. Roadmaps discussed include features for high availability, WebRTC support, SNMP, auto scaling, and rolling upgrades.
Software Defined Networking/Openflow: A path to Programmable NetworksMyNOG
(1) The document discusses software defined networking (SDN) and OpenFlow, introducing key concepts like separating the control plane from the data plane, using OpenFlow to program the flow table of OpenFlow-enabled switches from a central controller. (2) It explores SDN use cases like network virtualization for multi-tenancy in hyper-scale data centers and flow management in metro/WAN networks using OpenFlow. (3) The SDN architecture abstracts the physical network through the controller to support network programmability and flexibility through virtualization and services.
This document discusses distributed and highly available server applications built in Java and Scala. It describes an architecture using lightweight microservices called Talkbits that communicate over the Finagle distributed RPC framework. Key principles for Talkbits include stateless services, service discovery with Zookeeper, and functional composition of RPC calls. The document also covers configuration, deployment, logging, metrics collection and monitoring of the distributed system using tools like Loggly, CodaHale, Jolokia, Datadog, and Fabric.
The Cisco Open SDN Controller is a commercial distribution of OpenDaylight that delivers business agility through automation of standards-based network infrastructure.
Built as a highly scalable software-defined networking (SDN) platform, the Open SDN Controller abstracts away the complexity of managing heterogeneous networks to improve service delivery and reduce operating costs.
The controller exposes REST APIs to allow other applications to take advantage capabilities of the controller and unlock the power of the underlying network infrastructure, and JAVA APIs to allow for the creation of new network services.
This session will present the basic constructs of the controller and the capabilities of the REST and JAVA APIs to demonstrate how the Open SDN Controller abstracts away the complexity of managing heterogeneous networks to improve service delivery and reduce operating costs.
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław BorekPROIDEA
Przemysław Borek - Cisco Systems
Language: English
Service orchestration in provider network, Tail-f
Register to the next PLNOG edition today: krakow.plnog.pl
Lenovo provides a family of networking products including top-of-rack switches, embedded switches for blade servers, and converged switches that support both Ethernet and Fibre Channel. Their switches are designed to offer lower costs, lower power usage, and higher performance than competitors. Lenovo aims to provide a full portfolio of scalable switching solutions for data center networking needs.
How to Configure NetFlow v5 & v9 on Cisco RoutersSolarWinds
This document provides instructions for configuring NetFlow versions 5 and 9 on Cisco routers to monitor network traffic. It explains that NetFlow collects IP traffic data, what versions 5 and 9 are, and how to configure each version on a router by specifying the collector server, export port, and interfaces. It also describes how to verify the NetFlow export and how tools like SolarWinds NetFlow Traffic Analyzer analyze exported data to provide network usage insights.
026 Neo4j Data Loading (ETL_ELT) Best Practices - NODES2022 AMERICAS Advanced...Neo4j
What patterns are most appropriate for building ETLs using Neo4j? In this session, we share how we built the Google Cloud DataFlow flex template using the Neo4j Java API. You can then apply the same approach to building read and write operators in any framework, including AWS Lambda and Google Cloud Functions.
This document discusses YANG data models and automation. It provides background on the speaker and their focus on manageability. It describes how automation is required for today's large, dynamic networks. YANG is introduced as the standard data modeling language that can be used to define management information for protocols like NETCONF and RESTCONF. Examples of organizations developing YANG models are provided. The document emphasizes that data model-driven APIs are key to enabling automation.
This document discusses SDN and metrics from various standards development organizations (SDOs). It notes that many SDOs are developing YANG data models for network automation using model-driven APIs. There is growth in YANG models at the IETF and other SDOs like BBF, IEEE, MEF, and OpenConfig. However, coordination is needed between SDOs to reduce costs as the data models need to work together to create network services. A YANG catalog is proposed to help organize the industry and provide a common inventory of all YANG modules across SDOs and vendors.
This document describes the design of a physical SDN switch using Open vSwitch (OVS) software and the Soekris net4801 hardware platform. OVS allows the hardware device to act as an OpenFlow-controlled Ethernet switch. Performance tests showed the device could achieve up to 50Mbps bandwidth but was CPU-limited. While an OVS software solution enables SDN functionality, more powerful hardware would be needed for high-performance switching. The study demonstrated a way to implement SDN in physical networks using commodity hardware and open source software.
This document provides recommendations for configuring switches in campus networks. It covers physical requirements, software, naming conventions, switch administration settings, VLAN configuration, spanning tree protocol, traffic properties, and security functions. The goal is to provide a generic best practice for switch configuration to ensure standardization, security, management and performance.
DPDK Integration: A Product's Journey - Roger B. Meltonharryvanhaaren
The document discusses Cisco's experience integrating their data plane product with DPDK. Key observations from implementing DPDK include: adapting multi-threaded applications was difficult in early DPDK versions; UIO eliminates traditional device management; per-core packet buffer caches may be underutilized if RX and TX are on different cores; altering packet buffer pool sizes can impact performance; and PMDs have varying levels of maturity and may not implement all APIs. The solutions involved updating to newer DPDK versions, adapting the application, and being aware of PMD limitations.
Migrating from oracle soa suite to microservices on kubernetesKonveyor Community
Watch presentation recording: https://youtu.be/cxH6WjDZc2c
In this session, we’ll explore how Randoli helped a Postal Technology company migrate their payment gateway applications off Oracle SOA Suite to Camel/Springboot on Kubernetes.
The primary drivers for the migration were: move to cloud-native technologies in keeping with the organizational digital transformation mandate; move away from an outdated centralized platform to a decentralized architecture for efficiency, scalability, and manageability; and very high licensing costs of the existing platform.
We’ll discuss:
- The high-level approach we took during the migration including architecture and design decisions.
- How we used Camel/Springboot to implement the services.
- Why and how we used Drools for implementing business rules.
- The test-driven approach using Camel testing framework and how it helped reduce issues.
- CI/CD and build process on Kubernetes.
- How we tackled logging, monitoring, and tracing challenges.
Presenter: Rajith Attapattu, Managing Partner & CTO @ Randoli Inc.
The document provides an overview of SDN and related technologies demonstrated in a Dell lab, including:
1. SDN allows separation of the control plane and data plane in networking devices using an abstraction layer and OpenFlow protocol for communication between controllers and switches.
2. The lab topology included VLT and MLAG for redundancy between switches, as well as a Big Monitoring Fabric using Dell switches and a controller to provide network packet brokering without dedicated devices.
3. Configuration snippets were provided for the Dell switches used in the VLT topology, including the S4810 VLT peers and the S4820T server access switch with port mirroring.
Le SDN et NFV sont très à la mode en ce moment car en passant des appliance physiques aux équipement réseau massivement logiciel, celà devrait offrir une grande flexibilité et agilité aux entreprises (et telco en particulier). Néanmoins chainer des services réseau est un exercice encore très complexe et ce document vous explique ce qu'il est déjà possible de faire sur OpenStack en couplant par exemple : un load balancer (BigIP), un Firewall (BigIP), un réseau virtuel WAN (RiverBed) ou encore un routeur virtuel (Brocade).
OIF experts presented project updates, discussed overcoming implementation challenges through interoperability and open optical networking and disaggregation at NGON & DCI World 2022 held in Barcelona, Spain June 21–23, 2022.
Speakers gave an overview of OIF’s 400ZR work, including results from a recent interoperability demonstration, co-packaging, Common Management Interface Specification (CMIS), common electrical interfaces (112G and 224G) and Transport Software Defined Networking (SDN) Application Program Interface (API).
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.