The deal, which closed in Q4 fiscal 2018, is the largest deal in the company’s history.
Deep learning requires software tools to make sense of the data. To that end Cisco is working with software providers and other technology companies to validate machine learning tools on top of the new server.
For Samsung, winning AT&T’s business is another feather in its cap. The vendor has been gaining more business with U.S. operators.
The company says it's in discussions with unnamed technology suppliers for equipment to deliver internet over power lines.
The operator will use Samsung and CommScope gear in the 3.5 GHz CBRS spectrum band to deliver fixed wireless. It will start with LTE and migrate to 5G.
When you see a chart like this—

—you probably think if I were staking my career on technologies, I would want to jump from the older technology to the new just at the point where that adoption curve starts to really drive upward.
Going back many years, I recognize this s-curve. It was used for FDDI, ATM, Banyan Vines, Novell Netware, and just about every new technology that has ever entered the market.
The problem with this curve, Continue reading
DevOps teams face a steep learning curve with best practices related to deploying, running, and managing the lifecycle of a containerized application.
Jack Ma is retiring to focus on philanthropic efforts in education. Current CEO Daniel Zhang will take over Ma’s role as chairman of the board.
Kurian, who reports directly to CTO Larry Ellison, didn’t say when he’ll return or why he’s taking time off.
In this course, you’ll learn the technologies behind Docker, while following the requirements for the Docker Certified Associate exam. This Course is taught by Andrew Crouthamel and is 3hours and 17 minutes long.
In this training series, you will learn how Docker works, and how it compares to existing virtualization technologies. You will learn how to install and configure Docker, retrieve and create containers, as well as their required pieces, such as virtual networks, data volumes, and repositories. Lastly, you will learn how to orchestrate numerous dockers in clusters, and create your own container registries.
Interested in watching? You can view this course by logging into your members account. You can also purchase this course for download at ine.com.

Prying eyes: The so-called Five Eyes – the surveillance alliance of Australia, Canada, New Zealand, the U.K. and the U.S. – pledged not to weaken encryption, at the same time as the countries are pushing tech companies to give them access to encrypted evidence, notes SearchSecurity. Representatives of the five countries released a new “Statement of Principles on Access to Evidence and Encryption,” after a recent meeting in Australia. Encryption can help “child sex offenders, terrorists and organized crime groups … frustrate investigations and avoid detection and prosecution,” the statement suggests. More at ZDNet.
AI as public enemy No. 1? Artificial Intelligence is a bigger concern than climate change or terrorism, says the incoming president of the British Science Association, The Telegraph says. Really? AI progress is “happening too fast” without enough scrutiny or regulation, according to physics professor Jim Al-Khalili. It certainly wouldn’t be the first time technology has outpaced regulation.
AI vs. democracy: Meanwhile, AI is transforming social media, with major implications for democracy, worries Clint Watts, a distinguished research fellow at the Foreign Policy Research Institute, in an opinion piece at the Washington Post. “Over the long term, AI-driven campaigns may well be the undoing Continue reading
Evolving network architectures and the demands of new application areas like IoT are bringing the network’s edge into greater focus.
Back in June, we blogged about the draft EU copyright proposal which is currently making its way through the legislative process in Brussels. We outlined how under one of the more controversial provisions within the draft Directive, Article 13, certain Internet platforms could be held legally responsible for any copyright content that their users upload and would effectively have to turn to automated filtering solutions to remove infringing content at the point of user upload. Moreover, in order to avoid potential legal liability, it is widely expected that content sharing providers would err on the side of caution and remove excessive amounts of content, resulting in a form of online censorship.
Since that blogpost, the European Parliament Plenary narrowly voted on 5th July to reject the proposal tabled by the Legal Affairs (JURI) Committee and a mandate to negotiate, and now the proposed Directive will undergo a full discussion and rescheduled vote in the next Plenary meeting on 12th September. This was a fantastic outcome, thanks in large part to a groundswell of support from those who value the fundamental right of freedom of expression online. It has presented a window of opportunity to correct the deeply flawed approach to Continue reading