We’re excited to announce our second annual Juniper Lab Madness Championship, a great display of network creativity and innovation. Last year we showcased eleven Juniper gear lab images submitted by our community members ranging from home lab to enterprise lab setups. This year we are expanding the championship to invite both individuals and companies to submit their Juniper equipment lab images.
Now is the time to get your Juniper lab gear ready for a photo-shoot! Have your cameras out and game faces on.
Lab Madness is a championship for network engineers. Featuring lab images of Juniper equipment submitted by you and your peers, the championship’s outcome is determined by our social communities who vote on which image will make its way through the championship bracket to become the final winner. Here is how it works:
February 18th – March 14th: Individuals and companies submit their lab images
March 18th: Final participants and championship bracket are announced
March 19th – April 3rd: Game Day Matchups*
April 7th: Championship Matchup
April 8th: Champion Declared
* Every Monday, Tuesday, Wednesday and Thursday we will share a Game Day Matchup that features two submitted lab images for the community to vote on a daily winner. The matchups will be shared on Twitter, Facebook and LinkedIn at 10AM PT and the daily winner will be announced at 9AM PT the following day.
HOW TO PARTICIPATE AND SUBMIT YOUR LAB
It’s easy! Submit your best Juniper equipment setup, from immaculate fiber cord connections to your definition of organized chaos; we want to see it all! The submission process is easy just send an email to email@example.com with the following information:
1200x900 high quality image of your setup (horizontal photo from an iPhone)
Douglas Richard Hanks Jr. is a Director of Product Management with Juniper Networks and focuses on solution architecture. He is certified with Juniper Networks as JNCIE-ENT #213 and JNCIE-SP #875.
Douglas’ interests are network engineering and architecture for enterprise and service provider technologies. He is the author of the Juniper MX Series book by O'Reilly Media and several Day One books published by Juniper Networks Books. Douglas is also the co-founder of the Bay Area Juniper Users Group (BAJUG).
Douglas can be reached on Twitter @douglashanksjr.
Hiroaki Kato is a Senior Director of Systems Engineering at Juniper Networks and is responsible for managing the Systems Engineering organization in Japan.
Before he joined Juniper Networks, Kato served as Japan Country Manager for Red Bend Software. Kato was responsible for overall business operation of Red Bend Software Japan K.K and grew the business in Japan further in mobile and into other industries. Prior to Red Bend, he was with Avaya Japan Ltd. During his time at Avaya Japan, the roles he took include overall operation of Avaya Japan as its Representative Director, Director of Solutions and Engineering and number of other leadership roles in strategy creation and business development. He also spent time at Avaya’s headquarters in New Jersey, USA, working as strategy and operations prime for one of the Avaya’s business units as well as some leadership role for global sales operations organization. Prior to Avaya, he served as the Unit Manager of Telecommunication Infrastructure Business Unit of Mitsubishi Corporation’s Information Systems and Services Group, providing carrier grade telephony systems and associated support to major telecom carriers in Japan. He also served as a board member of MC Techno-Serve Ltd, a 100% subsidiary of Mitsubishi Corporation which provided post sales maintenance of the carrier grade telephony systems Mitsubishi Corporation sold.
He holds a bachelor’s degree in Electrical Engineering from Tokyo University and EMOT at Massachusetts Institute of Technology.
Lisa Lorenzin is a Principal Solutions Architect with Juniper Networks, specializing in security and mobility solutions, and a contributing member of Trusted Network Connect, a work group of the Trusted Computing Group that defines an open architecture and standards for endpoint integrity and network security. She has worked in a variety of Internet-related roles since 1994, with more than a decade of that focused on network and information security, and is currently concentrating on enterprise security including network segmentation, end-to-end identity-based access control, and integration of mobile security.