[TALK]@Telematika
Telematika.ORG
Resources
Group
Search
About
network
Managing Network Device Properties as Code
February 25, 2020
Device configuration templates have simplified a lot of things for the network industry but many networks are still managing their device properties (aka variable …
Open Networking (white box) in the Enterprise
February 25, 2020
White box switches and open networking are no longer only for the hyper scale companies with giant IT organizations. White box in the enterprise is possible, given …
Peeling Layers: A Deep Dive into Kubernetes Networking
February 25, 2020
Kubernetes is a platform that offers great extensibility and flexibility to its users. However, like most distributed systems, managing Kubernetes comes with its own set of challenges. Ensuring resili …
Peering Coordination Forum
February 25, 2020
The forum provides time for attendees to meet and network with others in the peering community present at NANOG. Peering Representatives, who completed and submitt …
Service Mesh in a Nutshell
February 25, 2020
Software applications have evolved from monoliths to microservices in a move towards becoming Cloud Native. The Cloud provides numerous benefits over traditional platforms. However, transitioning towa …
Streaming Telemetry, 3+ year Journey
February 25, 2020
Streaming Telemetry is a shift in paradigm to network monitoring & operations. End users decide to which models to subscribe, the common interface, such as OpenCon …
The deputy shot the sheriff: Privilege escalation in build pipelines
February 25, 2020
Build pipelines are commonly used in the industry to build and roll out changes to cloud accounts. Typically, wide permissions are granted to those systems, making them an interesting attack vector. Take a look with Andreas Sieferlinger at typical vulnerabilities and examine the case of the confused deputya trusted third-party partyand how these vulnerabilities can be mitigated in real-life.
Uncovering Remote Peering Interconnections at IXPs
February 25, 2020
Internet eXchange Points (IXPs) are Internet hubs that provide the switching infrastructure to interconnect networks and exchange traffic. While the initial goal o …
Understanding Kubernetes
February 25, 2020
Jonathan Johnson introduces you to Kubernetes for software engineers through concepts and a hands-on tutorials using KataCoda.com/javajon.
Using open source tools to validate network configuration
February 25, 2020
Bugs in network configuration can lead to security breaches and significant downtime, which in turn leads to monetary losses and damages the organizations reputat …
Demystifying SONET/OTN Service SLAs and how to Guarantee them over MPLS
February 24, 2020
For many years optical transport networks have been deployed using TDM technologies such as PDH, SONET and OTN providing highly performant and resilient services t …
Dont beat the market; beat the bots: Adversarial networks in finance
February 24, 2020
Automated investing has brought an immense amount of stability to the market, but it has also brought predictability. Garrett Lander and Al Kari examine if an adversarial network can game the behavior of automated investors by learning the patterns in market activity to which they are most vulnerable.
Lightning Talk: Dropping RPKI invalid routes in a service provider network
February 24, 2020
A summary of AT&T's experience deploying ROV. …
Lightning Talk: OpenConfig in reality
February 24, 2020
Monday had a talk on streaming telemetry where OpenConfig models and protocols featured and several of the microphone questions/comments related to a demand for st …
Lightning Talk: RIS LIVE!
February 24, 2020
RIPE announced a trial service called RIS Live which lets you monitor BGP data in realtime. Monitoring BGP updates in realtime can provide important insights to yo …
P4 Tutorial
February 24, 2020
This tutorial includes hands-on exercises; instructions for downloading the software is at https://p4.org/events/2019-02-19-nanog/ Download all software prior to t …
Welcome Back to Dependency Hell - OSS Compliance in the Age of Software Reuse
February 24, 2020
This talk is about meeting Open Source Software Compliance in our current state of SoftwareDevelopment. It is also a reckoning on our current state of Software Development with regards to Software Reu …
5G: An IP Engineer Perspective
February 23, 2020
Mobile networks typically go through a transformation every 10 years, with the new generation always bringing additional capacity and enhanced capabilities. This i …
Generative malware outbreak detection
February 23, 2020
Practical defense systems require precise detection during malware outbreaks with only a handful of available samples. Sean Park demonstrates how to detect in-the-wild malware samples with a single training sample of a kind, with the help of TensorFlow's flexible architecture in implementing a novel variable-length generative adversarial autoencoder.
Getting Started with LXD and System Containers
February 23, 2020
Want a simple, easy to deploy way to run just about any standard Linux distribution on any system without any overhead? Have you considered system containers?System containers run an entire Linux dist …
HARP: An efficient and elastic GPU-sharing system
February 23, 2020
Pengfei Fan and Lingling Jin offer an overview of an efficient and elastic GPU-sharing system for users who do research and development with TensorFlow.
How Criteo optimized and sped up its TensorFlow models by 10x and served them under 5 ms
February 23, 2020
Criteo's real-time bidding of ad spaces requires its TensorFlow (TF) models to make online predictions in less than 5 ms. Nicolas Kowalski and Axel Antoniotti explain why Criteo moved away from high-level APIs and rewrote its models from scratch, reimplementing cross-features and hashing functions using low-level TF operations in order to factorize as much as possible all TF nodes in its model.
Lossless Data Center Networks: Opportunities for NANOG Engagement with IEEE 802 Nendica
February 23, 2020
New standards in support of improved data center efficiencies are emerging. In the IEEE 802 Standards Committee, the IEEE 802 "Network Enhancements for the Next De …
Natural language processing using transformer architectures
February 23, 2020
Transformer architectures have taken the field of natural language processing (NLP) by storm and pushed recurrent neural networks to the sidelines. Aurlien Gron examines transformers and the amazing language models based on them (e.g., BERT and GPT 2) and shows how you can use them in your projects.
Re-Defining Core and Access: A New, Two-Tier Network Model
February 23, 2020
In the past, when we designed, built, and operated networks as a collection of devices (routers, switches, and firewalls) we defined our network architecture in te …
Unleashing SR Traffic Engineering capabilities with SR Flexible Algorithms
February 23, 2020
Have you ever wished you could tailor IGP computation to fit your own traffic engineering needs? Such as by computing: Paths considering a subset of the routers in …
About Space Invaders and automated scaling
February 22, 2020
Michael Friedrich and Stefanie Grunwald explore how an algorithm capable of playing Space Invaders can also improve your cloud service's automated scaling mechanism.
Adversarial network for natural language synthesis
February 22, 2020
Rajib Biswas outlines the application of AI algorithms like generative adversarial networks (GANs) to solve natural language synthesis tasks. Join in to learn how AI can accomplish complex tasks like machine translation, write poetry with style, read a novel, and answer your questions.
Next
# 3 of 13
Prev