BHGE is the world’s leading full stream Oil & Gas company on a mission to find better ways to deliver energy to the world. BHGE Digital develops enterprise grade cloud-first SaaS solutions to improve efficiency and reduce non-productive time for the Oil & Gas industry.
In our group, we have developed an analytics-driven product portfolio to enable company-wide digital transformation for our customers. Challenges ranging from predicting the failures of mission-critical industrial assets such as gas turbines to optimizing the conditions of an Electric Submersible Pump (ESP) to increase production, which require building and maintaining sophisticated analytics at scale.
The past few years have taught us this: where there is a whale, there is a way!
We were happy to share our story at DockerCon recently, and wanted to share it here on the Docker blog as well. You can watch the session here:
We face two major challenges in delivering advanced analytics:
The Online Trust Alliance (OTA) is an Internet Society initiative that aims to enhance online trust, user empowerment, and innovation through convening multistakeholder initiatives and developing and promoting best practices, ethical privacy practices, and data stewardship. One of OTA’s major activities is the Online Trust Audit & Honor Roll, which promotes responsible online privacy and data security practices and recognizes leaders in the public and private sectors who have embraced them. This morning, we released the methodology we’ll use for this year’s audit.
The report will analyze more than 1,000 websites on consumer protection, site security, and responsible privacy practices. Based on a composite weighted analysis, sites that score 80 percent or better overall, without failing in any one category, will be recognized in the Honor Roll.
Building largely on past criteria, this year’s updates include GDPR compliance and other security and privacy standards and practices, as well as adding a healthcare sector. From the press release:
Key changes to this year’s Audit include:
The problems created by old hub-and-spoke network architectures are happening again with the advent of the cloud. Following these strategies can avoid building a new set of siloes.
Africa’s dream of Cape Town to Cairo fiber connectivity has moved closer, with Liquid Telecom announcing that it has made considerable progress is signing agreements with regulatory authorities and partners within the route.
Liquid Telecom has an ambitious plan of reducing latencies in connectivity between Cape Town and Cairo. Currently, traffic is routed through Europe, with latencies of 209ms, and it will be reduced to 97ms.
In his keynote speech at the Africa Peering and Interconnection Forum (AfPIF), Ben Roberts, Liquid CTO, said that the project will be implemented through existing Liquid infrastructure within different countries, partnership with existing infrastructure providers, and regulators. The project is expected to be done by 2020 and to eventually connect East and West Africa.
Liquid is expecting the African Continental Free Trade Area (AfCFTA) agreement, signed and ratified recently, to drive city-to-city interconnectivity, as more countries look for ways to trade with each other and eventually exchange Internet traffic. The goal to increase intra-Africa broadband traffic.
Roberts projects the infrastructure currently being set up will be highly used by the youth, who have grown up online – through education, social media, and gaming applications. The Internet of Things is expected to grow; currently most Continue reading
The Internet is at risk. Once thought of as the global equalizer, opening doors for communication, work opportunities, commerce and more – the Internet is now increasingly viewed with skepticism and wariness. We are witnessing a trend where people fare feeling let down by the technology they use. Fueled by unease and uncertainty about the growing scope of threats to security and privacy that come with an always-on, tech-driven world, people are now looking for ways to disconnect and are placing greater emphasis on values and human interaction.
The way we live our lives is now inextricably linked to the Internet – which is estimated to contribute US$6.6 trillion a year, or 7.1 percent of total GDP in the G20 countries by 2020. In developing nations, that digital economy is growing steadily by 15 to 25 percent a year. Yet the Internet essentially is under attack. Large scale data breaches, uncertainties about how our data is being used and monetized, cybercrime, surveillance and other online threats are impacting Internet users’ trust. We are at an important crossroads for the Internet and its healthy development is at stake.
It is our collective duty to find a response to the Continue reading
Christoph Jaggi, the author of Transport and Network Security Primer and Ethernet Encryption webinars published a high-level introductory article in Inside-IT online magazine describing security deficiencies of SD-WAN solutions based on the work he did analyzing them for a large multinational corporation.
As the topic might be interesting to a wider audience, I asked him to translate the article into English. Here it is…
Read more ...Are you like me? Are you a network engineer, or other professional, transitioning their skill set to include programming and automation? Does your programming experience experience come from a few programming courses you attended in college a long time ago? Then please read on because I created this Python guide for people like you and me.
In this guide, I explain the absolute minimum amount you need to learn about Python required to create useful programs. Follow this guide to get a very short, but functional, overview of Python programming in less than one hour.
When you begin using Python, there are a lot of topics you do not need to know so I omit them from this guide. However, I don’t want you to have to unlearn misconceptions later, when you become more experienced, so I include some Python concepts that other beginner guides might skip, such as the Python object model. This guide is “simple” but it is also “correct”.
In this guide, I will explore the seven fundamental topics you need to know to create useful programs almost immediately. These topics are:
The changes to the Xeon server chip architecture and the consequent server platforms are going to be a bit thin here in 2018 after a pretty big jump with the “Skylake” Xeon SP processors and the related “Purley” platforms that launched back in July 2017. …
The Skinny On Future Cascade Lake Xeons was written by Timothy Prickett Morgan at .
There have been several chip startups over the last few years that have sought to new ways to train and execute neural networks efficiently, but why reinvent the wheel when each idea has yielded at least one small piece of a much bigger performance picture? …
Arm Stands on Shoulders of Giants with First Generation AI Processor was written by Nicole Hemsoth at .
While MEC is set to address the data demand of 5G networks, adding network programmability to MEC ameliorates the overall MEC solution.