Hi [[ session.user.profile.firstName ]]

The Realities of Testing High Speed Fiber “Engineered Links” in the Field

This webinar will focus on the pitfalls associated with tight field test specification of pre-terminated fiber systems for high speed channels in the context of the real capability of portable testers.
Best practices are discussed (proper test limit specification) such that field test costs will be minimized.

Attendees will earn one BICSI CEC
Recorded Dec 15 2016 66 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Robert Reid, Panduit
Presentation preview: The Realities of Testing High Speed Fiber “Engineered Links” in the Field

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What’s New in FC-NVMe-2? Oct 15 2020 6:00 pm UTC 75 mins
    Marcus Thordal, Broadcom; Craig Carlson, Marvell; Mark Jones, Broadcom
    Why do we need enhanced error recovery? And, how does it work? In this webcast we explore the fact that “bit errors happen” and how that occurs. We also do a deep dive into the mechanism of the enhanced error recovery added to FC-NVMe-2. Join FCIA experts as they guide you through the intricacies of error detection and recovery to provide the most reliable NVMe over Fibre Channel deployment possible.
  • Technology Implications of Internet of Payments Oct 14 2020 5:00 pm UTC 75 mins
    Glyn Bowden, HPE; Richard George, Health Life Prosperity Shared Ltd; Jim Fister, The Decision Place
    Electronic payments, once the purview of a few companies, have expanded to include a variety of financial and technology companies. Internet of Payment (IoP) enables payment processing over many kinds of IoT devices and has also led to the emergence of the micro-transaction. The growth of independent payment services offering e-commerce solutions, such as Square, and the entry of new ways to pay, such as Apple Pay mean that a variety of devices and technologies also have come into wide use.

    Along with the rise and dispersal of the payment eco-system, more of our assets that we exchange for payment are becoming digitized as well. When digital ownership is equivalent to physical ownership, security and scrutiny of those digital platforms and methods takes a leap forward in significance.

    Assets and funds are now widely distributed across multiple organizations. Physical asset ownership is even being shared between many stakeholders resulting in more ownership opportunities for less investment but in a distributed way.

    In this talk we look at the impact of all of these new principles across multiple use cases and how it impacts not only on the consumers driving this behavior but on the underlying infrastructure that supports and enables it. We will look particularly at:

    •The cloud network, applications and storage implications of Internet of Payments
    •Use of emerging blockchain capabilities for payment histories and smart contracts
    •Identity and security challenges at the device in addition to point of payment
    •Considerations on architecting IoP solutions for future scale
  • Using Data Literacy to Drive Insight Recorded: Sep 17 2020 48 mins
    Glyn Bowden, HPE; Jim Fister, The Decision Place
    The pandemic has taught data professionals one essential thing. Data is like water when it escapes; it reaches every aspect of the community it inhabits. This fact becomes apparent when the general public has access to statistics, assessments, analysis and even medical journals related to the pandemic, at a scale never seen before.
    Insight understands information in context to the degree that you can gain an understanding beyond just the facts presented and instead make reasonable predictions and suppositions about new instances of that data.
    Having access to data does not automatically grant the reader knowledge of how to interpret that data or the ability to derive insight. It is even challenging to judge the accuracy or value in that data.
    The skill required is known as data literacy, and in this presentation, we will look at how access to one data source will inevitably drive the need to access more. We will examine:
    •How data literacy is defined by the ability to interpret and apply context
    •What supporting information is needed
    •How a data scientist approaches new data sources and the questions they ask of it
    •How to seek out supporting or challenging data to validate its accuracy and value for providing insight
    •How this impacts underlying information systems and how data platforms need to adjust to this purpose+ data eco-system where data sources are no longer single use
  • RAID on CPU: RAID for NVMe SSDs without a RAID Controller Card Recorded: Sep 9 2020 60 mins
    Fausto Vaninetti, Cisco Systems and SNIA EMEA Board Advisor; Igor Konopko, Intel; Paul Talbut, SNIA EMEA
    RAID on CPU is an enterprise RAID solution specifically designed for NVMe-based solid state drives (SSDs). This innovative technology provides the ability to directly connect NVMe-based SSD’s to PCIe lanes and make RAID arrays using those SSD’s without the need for a RAID Host Bus Adapter (HBA). As a result, customers gain NVMe SSD performance and data availability without the need of a traditional RAID HBA.

    This webcast will recall key concepts for NVMe SSDs and RAID levels and will take a deep dive into RAID on the CPU technology and the way it compares to traditional Software and Hardware RAID solutions. Learn more about this new technology and how it is implemented, and gain a clear insight into the advantages of RAID on the CPU.
  • Data Center Scalability Made Easy with Fibre Channel Services Recorded: Aug 26 2020 62 mins
    David Peterson, Broadcom; Barry Maskas, HPE; Kiran Ranabhor, Cisco
    Fibre Channel Services such as the Fabric Login Server, Fabric Controller, and Name Server are used to support management and operation of a Fibre Channel Fabric by providing a method of registering and maintaining devices connected in the network. As the need for additional Fabric Services, such as traffic flow analysis and congestion management have surfaced, Fibre Channel continues to evolve to ensure easy data center scalability.

    In this webcast, FCIA experts will provide context to the terminology and dive into Fibre Channel Services, including device and topology discovery, zoning, security, clock synchronization and management. It will also decode some common acronyms like, FC-CT, FC-GS-9, and FC-SW-8.

    Join us to learn:

    •What are Fabric Services?
    •Overview of long-standing Fabric Services and what the newer Fabric Services provide
    •What is FC-CT? And how does it relate to Fibre Channel Fabric Services?
    •Fibre Channel Generic Services and Switch Fabric functionality
  • Navigating the New Zero Touch Network Recorded: Aug 13 2020 59 mins
    Steve Brumer (BH IoT Group), Brandon Heller (Forward Networks), Rama Darbha (Cumulus), Nathan McMahon (Avi Networks)
    With the need to deliver exceptional customer experience, the concept of the zero touch network has been gaining ground. While not a new idea, in 2020 the zero touch network is defined by most as being a network that ensures high availability, reliability and efficiency - automatically. Behind this is a management system that relies on many of the principles of software-defined networking and virtualization.

    As 5G begins to be deployed around the globe, the requirements for network transformation has ramped up quickly and is having a significant impact on network operations.

    Join this panel of networking experts as they share insights and lessons on how to navigate the new zero touch network and its demands on operations around capacity, latency, reliability and scalability.

    Speakers:
    Steve Brumer, Partner, BH IoT Group (Moderator)
    Brandon Heller, CTO & Co-Founder, Forward Networks
    Rama Darbha, Director, Consulting Services, Culumus
    Nathan McMahon, Solutions Architect, Avi Networks
  • 2020 Cloud Pivots in Secure Data Center Smarter Networks Recorded: Jul 16 2020 57 mins
    Dr. John Johnson | Aaron Turner, Highside.io | Jason Pryce, DATTO | Jerry Young, CATO Networks
    Join this panel session with industry experts as they discuss:

    - Intelligent Network Components – Cyber, Policy Automation, and Cost
    - Zero Trust “NoOne” Vital Signs in Ai and ML
    - Preserving Brand in Post Covid environments

    About the speakers:

    John D. Johnson, Senior Manager, Information Security, F500 Manufacturing Company (Moderator)
    Dr. John Johnson has been a cybersecurity leader at organizations from very large to
    startups, across regulated industries and manufacturers. He has developed and taught
    cybersecurity university courses and serves on advisory boards for technology
    companies, nonprofits and major security conferences (RSA, BlackHat). John's focus is
    on industrial cybersecurity, enterprise security and risk management.

    Aaron Turner – CSO/Co-Founder, HighSide Encrypted Collaboration
    Aaron Turner is the President & Chief Security Officer of HighSide, a distributed identity and secure collaboration technology company. He is also President and CEO of Integricell, an information security consulting firm which focuses on helping customers better manage the risks associated with global-scale business.

    Jerry Young – Architect, CATO Networks Mobile SDN/VPN
    Jerry serves as the Sales Engineer for Midwest team at Cato Networks, supporting and designing customer solutions. Prior to Cato he was the Principle Solution Architect for a Midwest MSP/CLEC designing a wide variety of network and security solutions. Over the last 6 years he has focused specifically on the SD-WAN/SASE marketplace helping develop managed service offering around majority of the market leaders.

    Jason Pryce – Architect, DATTO Network Restoral
    Jason comes to Datto after ten years of managing IT services and sales teams. Beginning his journey at Datto as part of Datto’s industry renowned Tech Support Department, he soon moved to a role where he could use his expertise to help partners not only with technical support, but also with sales generation.
  • Scaling the Intelligent Lossless Data Center with PFC Deadlock Prevention Recorded: Jul 16 2020 38 mins
    Paul Congdon, CTO, Tallac Networks
    Intelligent digital transformation is driving change in both our personal and professional lives and the intelligence behind digital transformation is Artificial Intelligence (AI). Data centers running AI applications with massive amounts of data are recasting that data into pertinent timely information, automated human interactions, and refined decision making.

    Intelligent lossless data center networks are the fabric that support AI applications using Remote Direct Memory Access (RDMA) for optimized communication. RDMA thrives on a lossless Ethernet fabric which in turn depends on Priority Based Flow Control (PFC) to ensure there is no packet loss. PFC is widely available but has known issues that prevent lossless data center networks from scaling and meeting performance objectives of today’s hyperscale cloud fabrics. One important issue with PFC is the possibility of creating deadlocks within the data center network.

    In this session, learn about new industry standards that are being developed to automatically avoid PFC deadlocks and allow the Intelligent Data Center Network to scale beyond the bounds of current hand tuned high-performance computing (HPC) network fabrics.

    The need to interact with the data center in real-time is more important than ever in today’s world where augmented reality, voice recognition, and contextual searching demand immediate results. Lossless data center networks must achieve cloud scale and deliver unprecedented levels of performance and reliability to meet these real-time demands. There is simply no occasion by which deadlocks can be allowed to occur in data center networks.
  • GPS for the Network Recorded: Jul 16 2020 35 mins
    Ritesh Mukherjee, Vice President of Product Management, 128 Technology
    Our dependence on networks finding faster routes and services on-demand has increased with the emergence of IoT, cloud, and 5G. The network is a necessary utility to deliver services, creating a requirement for a navigation system similar to the navigation apps that guide us to our destinations.

    In this talk we will discuss how a navigation system for the network can find the best routes and predict traffic profiles. We will discuss how machine learning and artificial intelligence can allow us to predict network faults before they happen!

    About the speaker:

    Ritesh Mukherjee leads routing technology strategy at 128 Technology who are on a mission to fix the Internet. His expertise includes routing/switching, data center, cloud, SDN/NFV, and IoT. Prior to 128 Technology, Ritesh was Director, Network Solutions at Huawei leading the technical solutions team and Manager, Product Management at Cisco leading the software operating systems group. Ritesh holds a PhD in Computer Science from Concordia University, Montreal.
  • [Panel] The New Intelligent Network: AI, Edge and Beyond Recorded: Jul 16 2020 49 mins
    Jeanne Morain, iSpeak Cloud | Dobias van Ingen, HPE Aruba | Pete Lumbis, NVIDIA / Cumulus | Nitish Shrivastava, Samsung
    As the data era continues to bring significant opportunities and challenges, it’s crucial that businesses are set up to be successful at the edge. As such, network infrastructure is evolving fast to protect, optimize and scale businesses opportunities.

    Join this expert panel as network leaders come together to share insights and advice on how to build a future-ready network infrastructure that ensures success. Points of discussion will include:

    - Best practices for managing and converting data generated at the edge
    - How to utilise AIOps to automate network tasks such as shifting traffic
    - How to use intelligent networks to seek out and address issues before they impact the business
    - Essentials for moving security to the network edge

    Panel:
    Jeanne Morain, Founder, iSpeak Cloud (Moderator)
    Dobias van Ingen, EMEA CTO and Systems Engineer Director, HPE Aruba
    Pete Lumbis, Director of Technical Marketing and Documentation, NVIDIA Mellanox Ethernet Business Unit
    Nitish Shrivastava, Senior Director and Head of Product Management, Samsung
  • Notable Updates in NVMe-oF 1.1 Recorded: Jun 30 2020 53 mins
    Phil Cayton, Intel; John Kim; NVIDIA; David Peterson, Broadcom; Ilker Cebeli; Samsung; Tim Lustig, NVIDIA
    In the past couple of years since its introduction, NVMe™ over Fabrics (NVMe-oF™) has not been resting on any laurels. Work has been ongoing, and there are several updates that are worth talking about.

    There is more to a technology than its core standard, of course, and many different groups have been hard at work at improving upon, and fleshing out, many of the capabilities that are related to NVMe-oF.

    This webcast will explore a few of these projects and how they relate to implementing the technology. In particular, we’ll be looking at:

    •A summary of new items in NVMe-oF 1.1
    •Updates about what is happening in FC-NVMe-2
    •How SNIA’s provisioning model helps NVMe-oF Ethernet Bunch of Flash (EBOF) devices
    •Managing and provisioning NVMe-oF devices with SNIA Swordfish™

    After you watch the webcast, check out the Q&A log at https://bit.ly/2Wi2KwR
  • Storage Networking Security Series – Key Management 101 Recorded: Jun 10 2020 61 mins
    Judy Furlong, Dell Technologies; J Metz, Rockport Networks
    In order to effectively use cryptography to protect information, one has to ensure that the associated cryptographic keys are also protected. Attention must be paid to how cryptographic keys are generated, distributed, used, stored, replaced and destroyed in order to ensure that the security of cryptographic implementations are not compromised.

    This webinar will introduce the fundamentals of cryptographic key management including key lifecycles, key generation, key distribution, symmetric vs asymmetric key management and integrated vs centralized key management models. Relevant standards, protocols and industry best practices will also be presented.

    After you watch the webcast, check-out the Q&A blog at: https://bit.ly/3dcnpId
  • Is FC-NVMe Ready for Prime Time? Recorded: Jun 9 2020 61 mins
    Mark Jones, Broadcom; Nishant Lodha, Marvell; Marcus Thordal, Broadcom, Joe Kimpler, Independent Expert
    The T11 specification for NVMe over Fibre Channel (FC-NVMe) was completed in 2018, since that time, the FCIA has held numerous plugfest events and products have been shipping for a few years. So where are we today with NVMe over Fibre Channel solutions?

    This webcast will take an early 2020 point-in-time snapshot of where the industry is, discuss products available today, and address common questions around:

    •Which host environments can use FC-NVMe
    •What is required from the fabric
    •Breadth of supporting storage solutions
    •Application benefits we have seen so far
    •FC-NVMe strengths and differentiators

    And most importantly, is FC-NVMe ready for prime time?

    After you watch the webcast, check out the Q&A blog at: https://bit.ly/2DB1TRa
  • Lessons Learned: Moving from Net Express to Visual COBOL Recorded: May 28 2020 42 mins
    Jerome Rose
    Your infrastructure may need to be upgraded at some point in time. While doing so, you may encounter some rather perplexing obstacles that you have never come across. Learn how to overcome some of these pitfalls to help move your Micro Focus COBOL into the modern age.

    •See how scripting can impact your code
    •Get some ideas on how to manage the performance of your system/code
  • Model-Based Testing for ALM Octane: Better Tests, Built Faster - UK LUG Recorded: May 27 2020 58 mins
    James Walker
    For many organizations today, ALM Octane provides the single source of truth for distributed teams. Its scalable test management keeps testers and developers synchronized with granular analysis of testing progress and results, all integrated into CI/CD pipelines and agile methodologies. However, the quality of this testing remains dependent on the quality of the tests fed in and assigned to testers. Testing speed furthermore remains limited by the efficiency of that test creation. Manual, unsystematic test design and a reliance on low-coverage production data will still lead to low coverage tests. Those tests will also remain impossible to maintain in tight iterations, leaving new releases further exposed to damaging bugs. Impeccable test management instead deserves impeccable test design.

    This webinar will demonstrate how model-based test generation seamlessly maintains optimized test cases and data in ALM Octane, all linked to system requirements and automation frameworks for in-sprint maintenance and test execution. You will discover a requirements-driven approach to test maintenance, in which test cases, scripts and data are maintained as quick-to-build flowcharts are updated. Powerful mathematical algorithms generate the smallest set of tests needed to “cover” the latest system logic, with “just in time” data allocation to ensure that every test has valid test data. Pushing the tests to integrated automation frameworks enables truly “Continuous Testing”, with granular run results synchronized automatically in ALM Octane.

    Sound too good to be true? Come and join the live demo and discussion!
  • Storage Networking Security Series – Encryption 101 Recorded: May 20 2020 60 mins
    Judy Furlong, Dell Technologies; Ed Pullin, Intel; Alex McDonald, NetApp
    Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots.

    But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”

    It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography.

    Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover:

    •A brief history of Encryption
    •Cryptography basics
    •Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc.
    •Introduction to Key Management

    After you watch the webcast, check out the Encryption 101 Q&A blog at https://bit.ly/2ZGMisl
  • [Panel] Digital Transformation and the Need for SD-WAN Recorded: May 20 2020 59 mins
    Moderator: Steve Brumer, BH IoT Group | Yishay Yovel, Cato Networks | Brenden Rawle, Equinix | Patrick Grillo, Fortinet
    To compete in today's digital economy, it's essential that businesses make branch offices an integral part of the network. Cloud-based applications - including global collaboration ones whose use has skyrocketed due to COVID-19 - require bandwidth that is robust and highly scalable, and with data centers becoming more virtualized and distributed than ever, MPLS can no longer cut it.

    With SD-WAN a key part of the puzzle piece of successful Digital Transformation, it’s crucial that business looking to adopt SD-WAN as part of their DX strategy have all bases covered, namely:

    - Ensuring they have a dynamic SD-WAN that recognizes and supports business-critical applications
    - Making sure the have the ability to modify WAN policies to cater for application criticality, performance needs and security requirements
    - Establishing an SD-WAN strategy in the age of the Edge that understands the need for centralized visibility spans the distributed network

    But how do businesses ensure that their SD-WAN strategy and toolkit address the above? Join this panel of experts as they explore the key points of a winning SD network, and help drive your business to Digital Transformation success.
  • NGN [Ep.5] The New WAN Economics Recorded: May 19 2020 56 mins
    John Burke, CIO and Principal Research Analyst, Nemertes Research
    Next-Generation Networking [Ep.5]: The New WAN Economics

    Enterprise WAN traffic patterns are shifting. The application mix is changing. And the WAN is becoming core to digital transformation (and to resilience in the post-COVID-19 era).

    The two fundamental questions that network and telecom managers must answer right now are these: How much should I be spending on my WAN to achieve measurable success, and what services and solutions deliver the greatest bang for the buck (in terms of quantitative success per dollars invested)?

    This webinar shares the findings of the 2020-2021 Next Generation Networks research study and compares a cost analysis of solutions such as:
    *WAN Cloud Exchanges (WAN-CX)
    * Direct Cloud Connect (DCC)
    * MPLS
    * Carrier Ethernet
    * SD-WAN
    * Business and Broadband Internet
    * Fiber and wavelength services

    We compare the network spend by users of solutions and services from providers such as AT&T, Centurylink, Cisco, Citrix, Comcast, Juniper, Oracle/Talari, VMWare Velocloud, Verizon and others. And we correlate the spend and provider with success overall.
  • The Influence of IoT on Data Strategy Recorded: May 14 2020 61 mins
    Glyn Bowden, HPE, Eric Hibbard, Co-Chair, ABA, IoT Committee; Alex McDonald, NetApp
    More and more we are seeing compute and inference move to the edge. This is driven by the growth in capability to not only generate data from sensors, devices and by people operating in the field, but also by the interaction between those devices.

    This new source of data and information brings with it unique challenges to the way we store and transmit data as well as the way we need to curate it. In this webcast we will look at:
    •New patterns generated by the explosion of the Internet of Things
    •How IoT is impacting storage and data strategies
    •Security and privacy issues and considerations
    •How to think about the lifecycle of our information in this new environment

    After you watch the webcast, check out the Q&A blog: https://bit.ly/2XUvFIp
  • NGN [Ep.4] UnWired: How 5G and WiFi 6 are Transforming Network Architectures Recorded: Apr 30 2020 58 mins
    Johna Till Johnson, CEO and Founder, Nemertes Research
    Next-Generation Networks [Ep.4]

    New wireless standards like 5G and Wifi 6 aren't just "more of the same". They're dramatically transforming how networks are designed, architected, and delivered.

    Whether you're an equipment provider, a carrier, or an enterprise user, you'll want to get the insight from Nemertes' hot-off-the-presses research into success strategies and best practices for those early adopters rolling out these technologies.

    You'll learn the use cases and vertical industries that are seeing the greatest success, and find out the hiccups and stumbling blocks that organizations are experiencing. And you'll walk away with a blueprint for success when it comes to deploying these next-generation technologies.
Updating the network infrastructure for the 21st century
With virtualization and cloud computing revolutionizing the data center, it's time that the network has its own revolution. Join the Network Infrastructure channel on all the hottest topics for network and storage professionals such as software-defined networking, WAN optimization and more to maintain performance and service in your infrastructure

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Realities of Testing High Speed Fiber “Engineered Links” in the Field
  • Live at: Dec 15 2016 4:00 pm
  • Presented by: Robert Reid, Panduit
  • From:
Your email has been sent.
or close