Verizon Launches (Yet Another) 5G Forum
These groups can also muddy the waters by creating competing approaches that reflexively insulate...
These groups can also muddy the waters by creating competing approaches that reflexively insulate...
Telstra’s new API integration with Equinix means its enterprise customers can directly connect to...
The updates tap into Red Hat's NooBaa acquisition in 2018.
Intel has spent more than three decades evolving from the dominant provider of CPUs for personal computers to the dominant supplier of processors for servers in the datacenter. …
Covering All The Compute Bases In A Heterogeneous Datacenter was written by Timothy Prickett Morgan at The Next Platform.
Today's Day Two Cloud episode explores network automation through the lenses of infrastructure as code and CI/CD pipelines. As network automation permeates organizations, does it make sense for network engineers to adopt more developer-like processes, methods, and tools? Can you successfully automate without them? Our guests for this conversation, sponsored by Cisco, are Carl Moberg, Senior Director of Product Management at Cisco; and Kristian Larsson, who has dual roles at Cisco and Deutsche Telekom.
The post Day Two Cloud 031: Melding Network Automation With CI/CD Pipelines And Infrastructure As Code (Sponsored) appeared first on Packet Pushers.
The startup plays heavily in the telecom sector — 80% of its existing customers are in the space,...
During the past year, we saw nearly 2 billion global citizens go to the polls to vote in democratic elections. There were major elections in more than 50 countries, including India, Nigeria, and the United Kingdom, as well as elections for the European Parliament. In 2020, we will see a similar number of elections in countries from Peru to Myanmar. In November, U.S citizens will cast their votes for the 46th President, 435 seats in the U.S House of Representatives, 35 of the 100 seats in the U.S. Senate, and many state and local elections.
Recognizing the importance of maintaining public access to election information, Cloudflare launched the Athenian Project in 2017, providing U.S. state and local government entities with the tools needed to secure their election websites for free. As we’ve seen, however, political parties and candidates for office all over the world are also frequent targets for cyberattack. Cybersecurity needs for campaign websites and internal tools are at an all time high.
Although Cloudflare has helped improve the security and performance of political parties and candidates for office all over the world for years, we’ve long felt that we could do more. So today, Continue reading
Not really. They were forced to by Mozilla and Apple.
The post Google Chrome towards making third party cookies obsolete appeared first on EtherealMind.
Another EVPN reader question, this time focusing on auto-RD functionality and how it works with duplicate MAC addresses:
If set to Auto, RD generated will be different for the same VNI across the EVPN switches. If the same route (MAC and/or IP) is present under different leaves of the same L2VNI, since the RD is different there is no best path selection and both will be considered. It’s a misconfiguration and shouldn’t be allowed. How will the BGP deal with this?
Programmatically interpretable reinforcement learning, Verma et al., ICML 2018
Being able to trust (interpret, verify) a controller learned through reinforcement learning (RL) is one of the key challenges for real-world deployments of RL that we looked at earlier this week. It’s also an essential requirement for agents in human-machine collaborations (i.e, all deployments at some level) as we saw last week. Since reading some of Cynthia Rudin’s work last year I’ve been fascinated with the notion of interpretable models. I believe there are a large set of use cases where an interpretable model should be the default choice. There are so many deployment benefits, even putting aside any ethical or safety concerns.
So how do you make an interpretable model? Today’s paper choice is the third paper we’ve looked at along these lines (following CORELS and RiskSlim), enough for a recognisable pattern to start to emerge. The first step is to define a language — grammar and associated semantics — in which the ultimate model to be deployed will be expressed. For CORRELS this consists of simple rule based expressions, and for RiskSlim it is scoring sheets. For Programmatically Interpretable Reinforcement Learning (PIRL) as we shall Continue reading
You don’t have to be a chip designer to program an FPGA, just like you don’t have to be a C++ programmer to code in Java, but it probably helps in both cases if you want to do them well. …
The Inevitability Of FPGAs In The Datacenter was written by Timothy Prickett Morgan at The Next Platform.
The deal will support enterprises in developing richer applications at scale that can leverage...