Nt1310 Unit 1 Personal Statement Example

Improved Essays
With over 8 years of experience in the telecommunications and networking industry, I had the opportunity to work on challenging assignments and build innovative products. Consequently, I gained valuable skills in networking domain. During the last couple of years, the landscape of the networking industry has changed profoundly. In my current work on Software Defined Networking(SDN) and Network Function Virtualization(NFV), we are in the early stages of exploring technologies like Big data, Machine Learning(ML) to improve analytics, telemetry, orchestration, operation management, security etc. The use of ML in the field of networking can be transformational, in fact, we might see ML in all facets of networking. With my background in networking, if I could learn new technologies like ML, the combined skill set will provide me a unique skill set to solve new problems and create positive impact.

At Juniper Networks, I am working on a vision to create networks that can configure, monitor and maintain themselves. The idea is to harness the power of data, automation, and ML to reduce human intervention in the management of the network, thereby preventing human errors and improve reliability. Security is central to
…show more content…
Therefore, I need to continue my focus on acquiring broad knowledge on various aspects of CS so that I can be flexible enough to work right from the kernel stack till the high-level applications and adapt to the changing technology trends. I find it exciting and intellectually stimulating to learn and work on the combination of ML and data; collect data from different places of the network and to use it in an effective way to overcome security problems, prevent cyber attacks and improve manageability of

Related Documents

  • Decent Essays

    Nt1310 Unit 2 Essay

    • 368 Words
    • 2 Pages

    1. Rack and wall mountable connector housings shall accept an interchangeable connector panel. An adapter panel is defined as a modular removable plate containing optical fiber connector adapters. 2.…

    • 368 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 5 Paper

    • 415 Words
    • 2 Pages

    " This information security challenge is why Gartner predicted that micro-segmentation technologies will be one of the must-haves for enterprise security in 2016. The research firm explained that by cryptographically isolating workloads and encrypting network traffic end-to-end, organizations can prevent lateral "east/west" hacker movement, contain breaches and better secure…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Essay

    • 807 Words
    • 4 Pages

    1. Compare and contrast Radiological dispersal devices (RDD), Radiological exposure device (RED), and Radiological incendiary device (RID). Out of the three devices, Radiological Dispersal Devices are the most common. For one thing, these devices “…require limited technical knowledge…” that is why terrorists are more likely to make these bombs (Radiological Dispersion Device, n.d.).…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1 Paragraph

    • 632 Words
    • 3 Pages

    We’ve used a lot of devices and storages so far in our life, but one thing that might be weird to people is the RAID. RAID stand for redundant array of independent disks and is a place for people to store their information. It is stored on CDs, instead of the normal flash drives and hard drives. RAIDS are different from the normal CDs, because they have to divide the data and spread the blocks into several megabytes for RAID to work. This is to make RAID efficient and fast.…

    • 632 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Greetings, The exercise for this learning guide unit was really useful. There are many case in which one could need to look for a file, or just directory information, and this assignment gave us the opportunity to play a little with this. I had to write something similar some time ago to consolidate thousands of .csv files into one single file. The files were generated by a test system in which only 32 units can be tested simultaneously.…

    • 402 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Through my courses, I have learned about research being done that involves generating and processing large sets of data, which require the assistance of outside facilities such INBRE, and have noticed a growing demand for people who understand the techniques necessary to process such data. However, there is limited resource available at university to learn such techniques, which is why I’m excited to learn more about the techniques at the internship. I am currently working in Dr.Cripps lab where I screen for transcriptional regulators of adult myogenesis in Drosophila by RNAi, and determine transcriptional factors of extradentin; my research has led me to dabble in the use of position weight matrices in the prediction of such factors, and I…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Asb Personal Statement

    • 645 Words
    • 3 Pages

    I want to be in Leadership because I want to improve my skills and help others to do the right thing. Set direction, build an inspiring vision, and create something new. Become like an explorer, cutting a path through the jungle for the rest of his group to follow. Though, it’s mostly about mapping out where you need to go to “win” as a team; becoming dynamic and inspiring. I want to bring compelling visions to the group and help motivate and inspire them to help deliver that vision.…

    • 645 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It does not matter the classification nor whether it is an actual or simulation network. This makes it particularly difficult to introduce a system that models adversarial cyber attacks. Workarounds and a Way Ahead. The challenges addressed make it problematic to add cyber requirements, but not impossible.…

    • 641 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Mcleod: Student Analysis

    • 923 Words
    • 4 Pages

    To effectively implement data-driven decision making, focusing on a few areas will ultimate gain the most…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Gigamon Security Survey

    • 531 Words
    • 3 Pages

    Survey Landing Page State of Security Survey Gigamon wants to hear from you. Gigamon is changing how networks become more resilient, responsive, and secure. We invite you to participate in a short 5- question survey so that we can better serve the market. For your feedback, we will send you a $10 Amazon gift card. 1.…

    • 531 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    My BSN Personal Statement

    • 676 Words
    • 3 Pages

    When I first came to Washburn University as a freshman, my major was Biochemistry/Pre-Med. Towards the end of my first semester I decided that I didn’t want to be a Pre-Med major anymore. However, I still wanted to stay in the medical field so I chose to go into nursing. I have always loved the sciences and liked to help people so it seemed like a perfect fit!…

    • 676 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    PC Security Issues

    • 560 Words
    • 3 Pages

    We should talk about all the more inside and out how each of the things above can be utilized for a troublesome/strict/astounding use of information science methods for doing things to take care of today's PC security issues. Having a lot of information is of most essential significance in building (identified with cautious mulling over or profound thought) models that distinguish PC assaults. For either an (experience-based considering) or superb model in view of machine adapting, vast quantities of information tests need to be precisely mulled over to distinguish the (obviously joined or related) arrangement of (highlights/ qualities/ characteristics) and perspectives that will be a piece of the model - this is typically alluded to as "highlight building". At that point information needs to be utilized to cross check and (make sense of the value, sum, or nature of) the execution of the model - this ought to be considered as a methodology of preparing, cross approval and testing a…

    • 560 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Polanyi's Paradox Essay

    • 2988 Words
    • 12 Pages

    Modern technology has advanced at an exponential rate since the turn of the millennium, and similar to how the epoch of the steam engine brought upon the Industrial Age, the epoch of the personal computer has brought upon the dawn of the Information Age. At the continuously compounding rate of innovation and invention, modern technology was prognosticated to hit a wall where advancements become rare. This prediction has been dubbed as Polanyi’s Paradox. As all theoretical barriers in the modern age, Polanyi’s Paradox has been seemingly overcome by the top computer scientists and software engineers with the advent of complex machine learning in artificial intelligence. These advancements, at the current rate, will change almost everything about…

    • 2988 Words
    • 12 Pages
    Great Essays
  • Improved Essays

    Summary Software-defined Networking (SDN) is a new networking paradigm also referred to as a “radical new idea in networking” [1]. The SDN enables network operators to make changes to the network infrastructure without sacrificing network availability and at the same time reduces network maintenance costs by providing a centralized point of control and one unified user configuration interface for switches, routers and middle-boxes1 from diverse vendors [2]. According to Sarah Sorensen, the author of the book of “The Sustainable Network”, “SDN tackles the barriers that constrain scale, automation, and agility by decoupling the forwarding layer from the control layer, which provides a central view and control over the network.” The basic idea behind SDN is to decouple forwarding plane from control plane, therefore SDN- capable switches are merely responsible for forwarding traffic whereas software controllers are middlemen between network applications and SDN-capable switches.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Finally, a number of disconnected projects in machine learning [Armstrong et al., 1995], data mining, knowledge representation, plan recognition [Kautz, 1987; Pollack, 1990], and user modeling [Fink et al., 1996] have begun to explore aspects of the problem. Framing…

    • 766 Words
    • 4 Pages
    Improved Essays