SDxCentral’s Top 10 Articles — January 2019
Nutanix CEO calls VMware a bully; AT&T touts successes while it plots layoffs; demand for Kubernetes surges.
Nutanix CEO calls VMware a bully; AT&T touts successes while it plots layoffs; demand for Kubernetes surges.
Every and any decision is a form of lock-in. The decision to buy on-brand or off-brand, open or closed source, vendor A or vendor B has consequences that follow.
The post Don’t Focus on Lock-in, Focus On The Undo appeared first on EtherealMind.
The report, which was sourced by ZTE, does admit that its findings aren’t likely to change the minds of many operators.
TensorFlow, probably the most popular of the dozen or so deep learning frameworks, is typically used to develop neural networks on small or medium-sized clusters, and sometimes on just a single GPU-accelerated node. …
Running TensorFlow at Petascale and Beyond was written by Michael Feldman at .
The initial botnet actor sold the proxy botnet as a service to other attackers who then used it for credential brute forcing, video advertisement fraud, and general traffic obfuscation.
Today's Network Break analyzes a slew of Cisco Live announcements including ACI Anywhere and HyperFlex for edge deployments, Huawei's run-ins with U.S. prosecutors, financial results from Juniper Networks and Mellanox, and more tech news.
The post Network Break 220: Cisco Announces ACI Anywhere; U.S. Prosecutors Target Huawei appeared first on Packet Pushers.
Government hacking: Japanese government workers will be able to hack into residents’ Internet of Things devices in an attempted survey of IoT insecurity, ZDNet reports. The Japanese government recently approved an amendment that allows the survey by employees of the National Institute of Information and Communications Technology. The government hacking effort is part of Japan’s preparation for the Tokyo 2020 Summer Olympics. Government officials are worried that other hackers might use compromised IoT devices to launch attacks against the games.
Evolving encryption: A story at TechTarget looks at the evolution of the Let’s Encrypt certificate authority, established in 2016. The free and automated certificate authority is “changing the industry in interesting ways” by making the certificate process less cumbersome, the story says. Meanwhile, a story at CSO Online looks at the Electronic Frontier Foundation’s efforts to encrypt the entire Internet and says that Let’s Encrypt is an important piece of that campaign.
Lagging encryption: Less than 30 percent of enterprise businesses encrypt their data across their on-premises environments, within their cloud services or on their mobile devices, according to a survey from French aerospace and security vendor Thales Group. A Computer Business Review story notes that encryption still isn’t widespread, Continue reading
Getting concerned about scummy and scummy approaches by market and financial research companies for advisory services.
The post Possible Analyst Scam: Your Experience for a Sample Report appeared first on EtherealMind.
The center of gravity for data is continuing to shift from core datacenters to other parts well beyond the walls of those facilities. …
Staking A Claim In The Cloud And At The Edge was written by Jeffrey Burt at .
This is part 4 of a six part series based on a talk I gave in Trento, Italy. To start from the beginning go here.
We don’t believe that any of our software, not a single line of code, provides us with a long-term advantage. We could, today, open source every single line of code at Cloudflare and we don’t believe we’d be hurt by it.
Why don’t we? We actually do open source a lot of code, but we try to be thoughtful about it. Firstly, a lot of our code is so Cloudflare-specific, full of logic about how our service works, that it’s not generic enough for someone else to pick up and use for their service. So, for example, open sourcing the code that runs our web front end would be largely useless.
But other bits of software are generic. There’s currently a debate going on internally about a piece of software called Quicksilver. I mentioned before that Cloudflare used a distributed key-value store to send configuration to machines across the world. We used to use an open source project called Kyoto Tycoon. It was pretty cool.
But Continue reading
I spent most of last week with a great team of fellow networking and security engineers in a windowless room listening to good, bad and plain boring presentations from (mostly) Cisco presenters describing new technologies and solutions – the yearly Tech Field Day Extra @ Cisco Live Europe event.
This year’s hit rate (the percentage of good presentations) was about 50% and these are the ones I found worth watching (in chronological order):
Read more ...TensorFlow.js: machine learning for the web and beyond Smilkov et al., SysML’19
If machine learning and ML models are to pervade all of our applications and systems, then they’d better go to where the applications are rather than the other way round. Increasingly, that means JavaScript – both in the browser and on the server.
TensorFlow.js brings TensorFlow and Keras to the the JavaScript ecosystem, supporting both Node.js and browser-based applications. As well as programmer accessibility and ease of integration, running on-device means that in many cases user data never has to leave the device.
On-device computation has a number of benefits, including data privacy, accessibility, and low-latency interactive applications.
TensorFlow.js isn’t just for model serving, you can run training with it as well. Since it’s launch in March 2018, people have done lots of creative things with it. And since it runs in the browser, these are all accessible to you with just one click! Some examples:
3 steps to configure Syslog. Define a logging policy Define remote logging servers Define a logging source address (optional) Configuration Log to a local file. Logs are stored in the /var/log directory. Define a logging policy. cmd set system syslog user * any...continue reading
Not that it helps that much but keep in mind: you're not the only one. Here's a wonderful blog post by Al Rasheed.
Oh, and if you still feel like a fraud after being in the industry for years (check out the Impostor Syndrome), you're not alone either.