Steven Max Patterson

Author Archives: Steven Max Patterson

Intel takes aim at NVIDIA with Mobileye acquisition

Platform shifts kill companies. Mainframe companies missed the shift to minicomputers, minicomputers to desktops, and desktops to mobile. Machine learning is the next platform shift. Hardware platforms for machine learning have yet to be defined.Creating the machine learning models that power the next generation of self-driving cars, home assistants and language translation will require novel new hardware architectures that are significantly faster and address much larger memory spaces.+ Also on Network World: 5G will help autonomous cars cruise streets safely + To ensure it doesn’t miss out on this platform shift, Intel spent $15.3 billion to acquire Mobileye. Its goal is to gain early entry into the self-driving car market that will consume even more silicon than cars do today for self-driving, safety and convenience.To read this article in full or to leave a comment, please click here

4 ways Google Cloud will bring AI, machine learning to the enterprise

Last November, when Google announced that machine learning research luminary Fei-Fei Li, Ph.D. would join Google’s Cloud Group Platform group, a lot was known about her academic work. But Google revealed little about why she was joining the company except she would lead machine learning for the Google Cloud business.After five months of suspense, yesterday Li revealed the focus of her new role during her keynote address at Google’s cloud developer conference, Cloud Next 2017. She will apply her experience to democratize machine learning to the enterprise. Her task: Study the problems that machine learning could solve in a wide variety of industries and enable enterprises to adopt machine learning.To read this article in full or to leave a comment, please click here

5 reasons why YouTube beat Apple to a skinny TV bundle deal with the networks

Yesterday, Google debuted YouTube TV, giving wannabe cord-cutters a reason to finally do so.The obstacle for over-the-top television (OTT) has been the lack of news, sports and live TV.  Now, with YouTube TV, subscribers get live TV streaming of 44 channels, including ABC, CBS, FOX, NBC, ESPN, plus two add-on channels.YouTube beat Apple to the streaming TV punch, delivering a cable TV-like skinny bundle at a lower price of  $35 per month. Apple has long been rumored to be interested in the disrupting the TV market, though it was reported that Apple walked away from negations about a year ago.To read this article in full or to leave a comment, please click here

Moto G5 Plus will make you rethink buying an iPhone 7

Motorola’s designers are always poised to strike when component prices drop, creating an opportunity to deliver more smartphone for the same money. This time they struck with the Moto G5 Plus with a better camera and faster processor, improving on the G4 Plus. The G5 Plus’ camera and price are the top two reasons to choose it as an alternative to the iPhone 7—or almost any phone.Moto G5 Plus' camera The Moto G5 Plus predecessor, the Moto G4 Plus, scored an 84 with DxOMark, equivalent to the iPhone 6s that consumers are still buying for $550. The specifications of the G5 Plus’ camera sensor top the iPhone 7’s. The 12 megapixels sensor with 1.4μm-sized pixels exceeds the iPhone 7’s at 12 megapixels with 1.22μm pixels. A subtle difference, but pixel size in most situations matters more than the number of pixels because larger pixels capture more light, producing better photos.To read this article in full or to leave a comment, please click here

VR-controlled robot demonstrates 5G ultra-low latency at Mobile World Congress

At Mobile World Congress this morning, Deutsche Telecom, SK Telecom and Ericsson showed a telepresence-controlled robot prototype to demonstrate the capabilities of 5G wireless networks, software-defined networks (SDN) and Network Functions Virtualization (NFV).The point made is 5G’s ultra-low latency delivered end to end with SDN and NFV will enable new real-time use cases for industrial services, autonomous cars and the Internet of Things (IoT). Within a 5G radio access network (RAN), 5G can deliver sub-1ms latency. But a loaded RAN or traversing a network between RANs can add tens of milliseconds—too much for control applications that require synchronization over distances.To read this article in full or to leave a comment, please click here

VR-controlled robot demonstrates 5G ultra-low latency at Mobile World Congress

At Mobile World Congress this morning, Deutsche Telecom, SK Telecom and Ericsson showed a telepresence-controlled robot prototype to demonstrate the capabilities of 5G wireless networks, software-defined networks (SDN) and Network Functions Virtualization (NFV).The point made is 5G’s ultra-low latency delivered end to end with SDN and NFV will enable new real-time use cases for industrial services, autonomous cars and the Internet of Things (IoT). Within a 5G radio access network (RAN), 5G can deliver sub-1ms latency. But a loaded RAN or traversing a network between RANs can add tens of milliseconds—too much for control applications that require synchronization over distances.To read this article in full or to leave a comment, please click here

I come to bury SHA1, not to praise it

Most cryptography is theoretical research. When it is no longer theoretical, in practice it can become a harmful exploit.Google and Dutch research institute CWI proved that the SHA1 hash method, first introduced 20 years ago, could produce a duplicate hash from different documents using a technique that consumed significant computational resources: 6,500 years of CPU computation to complete the attack first phase and 110 years of GPU computation to complete the second phase. The exercise was computationally intensive but proved it is within the realm of possibility, especially compared to a brute force attack that would require 12 million GPU compute years.To read this article in full or to leave a comment, please click here

I come to bury SHA1, not to praise it

Most cryptography is theoretical research. When it is no longer theoretical, in practice it can become a harmful exploit.Google and Dutch research institute CWI proved that the SHA1 hash method, first introduced 20 years ago, could produce a duplicate hash from different documents using a technique that consumed significant computational resources: 6,500 years of CPU computation to complete the attack first phase and 110 years of GPU computation to complete the second phase. The exercise was computationally intensive but proved it is within the realm of possibility, especially compared to a brute force attack that would require 12 million GPU compute years.To read this article in full or to leave a comment, please click here

Google opens source TensorFlow 1.0 debuts – vies for platform status

Google Brain announced release 1.0 of its machine learning (ML) library yesterday at the TensorFlow Developer Summit in Mountain View. ML is a method of programing computers with data to make highly reliable predictions, instead of creating a program in a language like Java, C# or Python.ML is a more efficient method of solving problems such as image recognition, language translation and ranking things like comments and recommendations. Google, along with Facebook, IBM and Microsoft has used ML internally to solve problems like ranking search results.A little over a year ago Google released TensorFlow based on its experience with its proprietary ML library, DistBelief. TensorFlow is in use within Google with about 4,000 source code directories including TensorFlow model description files. It is used in many applications including Google Search, Maps and Gmail’s spam filter.To read this article in full or to leave a comment, please click here

Google open source TensorFlow 1.0 debuts – vies for platform status

Google Brain announced release 1.0 of its machine learning (ML) library yesterday at the TensorFlow Developer Summit in Mountain View. ML is a method of programing computers with data to make highly reliable predictions, instead of creating a program in a language like Java, C# or Python.ML is a more efficient method of solving problems such as image recognition, language translation and ranking things like comments and recommendations. Google, along with Facebook, IBM and Microsoft has used ML internally to solve problems like ranking search results.A little over a year ago Google released TensorFlow based on its experience with its proprietary ML library, DistBelief. TensorFlow is in use within Google with about 4,000 source code directories including TensorFlow model description files. It is used in many applications including Google Search, Maps and Gmail’s spam filter.To read this article in full or to leave a comment, please click here

The 5 things I hate about CRM systems

This article was inspired by a post on Facebook by Ben Parr, former co-editor of Mashable. What he wrote hit a nerve with me—a nerve as raw as any of Lewis Black’s—evoking my tirade. Parr posted:  “Favorite CRM software and why?” I replied, “They all pretty much suck and have since Siebel Systems invented it.”Let’s start with platform companies like Google and Square Payments that do not generally use CRM systems and rarely use call centers. These companies understand that any CRM system will collapse at scale, so they build well-designed web-facing responsive self-service systems as part of the product design. To read this article in full or to leave a comment, please click here

What the FCC chair’s actions tell us about net neutrality

With the elevation of Ajit Pai to chairman of the FCC, everyone is waiting for Pai to tip his hand on net neutrality. Looking at his first few actions, though, we can get a sense of what’s to come.Since becoming chairman, Pai has used his authority to rescind much of the work implemented by his predecessor, Tom Wheeler, in the past 30 days. Pai’s orders are similar to President Trump’s executive orders. They are exercises of his discretion as chairman that do not need sign-off by the other commissioners.+ Also on Network World: The end of net neutrality is nigh—here’s what’s likely to happen + Steve Augustino, a partner at law firm Kelley Drye who specializes in telecommunications, expects to see a lot of disruption until we get a better understanding of what Pai considers importantTo read this article in full or to leave a comment, please click here

AT&T will prove 5G using open-source SDN technology

The blazing fast speed and low latency of 5G could suffer from the same obstacle that Gig-internet access does: a scarcity of apps that demonstrate its capabilities. Case in point: The Chattanooga municipal power company EPB slashed the price of Gig-internet to $69.95 per month because many customers opted for slower 100MB service at $59.95 because typical mobile and PC apps do not showcase the benefits of the top speed offering.It is a chicken and egg problem, or more aptly the chicken and the app problem. Without high-speed infrastructure, apps cannot be built that demonstrate the capabilities of 5G. And without apps, infrastructure will not reach cost effectiveness and be deployed at scale. 5G will not scale without distributing the cloud platforms into the network infrastructure running on software-defined networking (SDN) commodity hardware.To read this article in full or to leave a comment, please click here

iPhone sales get one-time windfall from Samsung Note 7 woes

During Apple’s earnings report last night, CEO Tim Cook did not mention why Apple squeaked by with 3 percent revenue growth. Almost every product category he spoke about was predicated with the words “record setting.” But a closer look reveals, Cook’s praise might be overstated, and Apple’s quest to produce another iPhone-scale new product to reignite growth continues.Radio Free Mobile’s Richard Windsor explained in an early-morning report from London what Cook did not. iPhone shipments at higher prices were driven by the defection of Samsung Galaxy Note customers due to the recall of the Note 7.To read this article in full or to leave a comment, please click here

Samsung Galaxy S8: Leaks, rumors and fake news

Samsung will not be launch its new Galaxy flagship phone, the S8, next month at Mobile World Congress like it usually announces new Galaxy flagships. The launch is delayed until March 29.The delay did not slow the January leaks, rumors and fake news about the new device, though, including leaked images showing the Galaxy S8 will have a USB C port, an almost bezel-less display and, OMG, a 3.5-inch jack that we may hear about every day in the news during the post-launch week because of the attention the iPhone 7 received for not having one.To read this article in full or to leave a comment, please click here

Android Instant Apps testing begins, gives developers 2 bites at the SEO apple

“Software companies are the medium through which investors give money to PR and advertising companies,” said Marv Goldschmidt, vice president of marketing at Lotus Development, a long time ago.His advice holds true today. The biggest problem mobile software developers have is getting their apps found, downloaded and installed. It isn’t creating great apps.Marketing campaigns boosting new-user download of an app are very expensive—so expensive that the leadership team at bookmarking app maker Pocket spent a week sequestered with designer impresario Jake Knapp focusing on the user experience to decrease early uninstalls, thus retaining more users per install without increasing marketing spend.To read this article in full or to leave a comment, please click here

Unhappy developers lead to bad code and bad processes

Since Epicurus wrote in the third century BC about pain and pleasure, happiness and unhappiness has been a constant subject of conversation. Recently researchers from the University of Stuttgart studied the effects of software developers’ state of happiness on performance and found unhappy developers negatively affect the development process and software products.This might explain why some software companies treat their development teams to pingpong tables, foosball, cappuccino machines and other perks.A clearer understanding could lead to successful intervention, more effective than those perks, and (depending upon the costs) astonishing productivity benefits.Though not mentioned by the researchers, it sounds very similar to the work of author and TED Talk speaker Mihaly Csikszentmihalyi and his ideas about creating conditions that lead to a flow state, also called the zone of deep concentration, and undistracted, peak performance.To read this article in full or to leave a comment, please click here

Augmented reality is more than just holograms

Holographic headsets are a central theme to augmented reality (AR) today, but the recent AR in Action Conference demonstrated the diversity of the field and the potential to include many more technologies to augment humans. The AR in Action Conference, held at the MIT Media Lab, expanded the definition of AR through a TED conference-like lens, delivering 70 diverse curated talks and 32 panels over two days to over 1,000 experts and practitioners in the field. As Chris Croteau, general manager of Intel’s Wearable Device Group, said: “A liberal definition of AR focuses on the way data is presented to users and how they interact with it. The popular definition of the AR platform as a holographic projection system like the Hololens, Meta and ODG headsets limits what AR can be.”To read this article in full or to leave a comment, please click here

Google Cloud Key Management Service could help more enterprises encrypt data

Attackers are increasingly able to penetrate perimeter defenses, compromise accounts and mine data without targets even being aware of the attack, as the Democratic National Committee breach proved. Encrypting data is the best defense.Strong encryption of complex data structures requires a Key Management System (KMS). But implementing a KMS can be challenging, especially for enterprises below the security poverty line that don’t have the budget to hire a multidisciplinary security team. Google may have a solution with its Cloud Key Management Service (CKMS) now in beta in select countries.  To read this article in full or to leave a comment, please click here

Google Cloud Key Management Service could help more enterprises encrypt data

Attackers are increasingly able to penetrate perimeter defenses, compromise accounts and mine data without targets even being aware of the attack, as the Democratic National Committee breach proved. Encrypting data is the best defense.Strong encryption of complex data structures requires a Key Management System (KMS). But implementing a KMS can be challenging, especially for enterprises below the security poverty line that don’t have the budget to hire a multidisciplinary security team. Google may have a solution with its Cloud Key Management Service (CKMS) now in beta in select countries.  To read this article in full or to leave a comment, please click here