Archive

Category Archives for "Networking"

Nest Thermostat Currently Discounted 6% – Deal Alert

A thinner, sleeker design. A bigger, sharper display. The 3rd generation Nest Learning Thermostat is more beautiful than ever. With Farsight, it lights up when it sees you coming and shows you the time or temperature from across the room. And the Nest Thermostat is proven to save energy. Independent studies have proven that the Nest Learning Thermostat saved an average of 10-12% on heating bills and 15% on cooling bills. That means that in two years, it can pay for itself. Or maybe a bit less, since its currently discounted 6% off its typical list price. See the Nest Thermostat deal on Amazon now, while you can.To read this article in full or to leave a comment, please click here

Google’s machine-learning cloud pipeline explained

When Google first told the world about its Tensor Processing Unit, the strategy behind it seemed clear enough: Speed machine learning at scale by throwing custom hardware at the problem. Use commodity GPUs to train machine-learning models; use custom TPUs to deploy those trained models.The new generation of Google’s TPUs is designed to handle both of those duties, training and deploying, on the same chip. That new generation is also faster, both on its own and when scaled out with others in what’s called a “TPU pod.”To read this article in full or to leave a comment, please click here

Microsoft takes the Build show on the road

Microsoft’s annual Build developers conference is becoming a must-see for developers, given the huge amounts of information and technical deep dives available over the three days of the show. However, the show has been biased toward American developers, since it’s been held in only U.S. west coast cities: Seattle, before that San Francisco, and originally in Anaheim, California. So, recognizing some folks can’t make the trip, Microsoft is bringing the show to them on a global tour this June. It’s rather short notice for some folks. To read this article in full or to leave a comment, please click here

BrandPost: Leverage the Agility of the Overlay WAN to Design the Right Network

When it comes to WAN architecture, there has been a debate that has raged on for decades.  Hub-and-spoke or fully distributed mesh, which is better?Hub-and-spoke networks are certainly simpler to design and manage, but the downside is that all branch traffic needs to be backhauled through a central location. Consider a U.S.-based company with a branch office in Japan where a user is trying to access a local website. The traffic would need to go from the branch, back to the United States, back to Japan, and then back to the United States, only to be sent off to Japan yet again. This clearly represents an enormous waste of bandwidth and resource, not to mention impaired user productivity.To read this article in full or to leave a comment, please click here

Write apps with zero code using Microsoft Windows Template Studio

For some reason, Microsoft has unleashed a flood of developer news after its Build developers conference. One of them is the announcement of the new Windows Template Studio, an evolution of Windows App Studio it launched a few years back for building Windows Universal Apps without actually writing code. Universal Windows Platform (UWP), or universal apps, is an ongoing project from Microsoft to develop software once that can run on a variety of devices running Windows, from PCs to tablets and phones and the Xbox console. To read this article in full or to leave a comment, please click here

How to maintain data oversight to avoid ‘shadow data’

Data at riskImage by George HodanBefore his retirement, an employee of the Office of the Comptroller of the Currency (OCC) uploaded more than 10,000 OCC records onto two removable thumb drives. He retired in November 2015; the agency didn’t discover the breach until the following September. That left almost a year between breach and detection. The OCC was not able to recover the thumb drives.To read this article in full or to leave a comment, please click here

How to maintain data oversight to avoid ‘shadow data’

Data at riskImage by George HodanBefore his retirement, an employee of the Office of the Comptroller of the Currency (OCC) uploaded more than 10,000 OCC records onto two removable thumb drives. He retired in November 2015; the agency didn’t discover the breach until the following September. That left almost a year between breach and detection. The OCC was not able to recover the thumb drives.To read this article in full or to leave a comment, please click here

Yes, you still need endpoint malware protection

There has been a steady stream of reports and claims lately that many of us no longer need endpoint security, that antivirus (AV) programs on our PCs are worthless.Gizmodo flat out said that you really don't need an antivirus app anymore, arguing that Windows 10 and the browsers have tightened up security to the point that they adequately protect end users. Windows Central asked the same question, but determined that more protection is better than less.To read this article in full or to leave a comment, please click here

Yes, you still need endpoint malware protection

There has been a steady stream of reports and claims lately that many of us no longer need endpoint security, that antivirus (AV) programs on our PCs are worthless.Gizmodo flat out said that you really don't need an antivirus app anymore, arguing that Windows 10 and the browsers have tightened up security to the point that they adequately protect end users. Windows Central asked the same question, but determined that more protection is better than less.To read this article in full or to leave a comment, please click here

PQ Show 116: Practical YANG For Network Automation

Todays Priority Queue explores network modeling and programmability. Our guest Michael Kashin has been working with YANG models, python, and a variety of supporting tools. We discuss how to work with network models and how they tie to the future of network configuration. The post PQ Show 116: Practical YANG For Network Automation appeared first on Packet Pushers.

How the Internet changed the Nyirarukobwa Primary School

Sarah is 11 years old and goes to school in the Nyirarukobwa Primary School, together with about 1400 other kids.

She tells me that she joined this school this year because it has a very high success rate for the National Exam. Sarah said to me: 'I want to go to boarding School', which is what will happen when she passes the exam and go to Secondary school. 

She is one of the 700 plus children who joined the Nyirarukobwa School over the last 3 years (yes the number of kids just doubled!!) because of its high exam success rate. 
Ms. Joyce Dogniez