Baidu takes a major leap as an AI player with new chip, Intel alliance

China’s Baidu made two big moves that are going to make it a major player in the artificial intelligence (AI) space: an extremely powerful new chip designed to compete with Google’s Tensor Processing Unit (TPU) and a wide-spanning alliance with Intel.First, the company introduced the Kunlun, a cloud-to-edge range of AI chips built to accommodate high-performance requirements of a wide variety of AI scenarios. The announcement was made at Baidu Create, a developer show that is starting to look an awful lot like Google I/O in terms of content and sessions.Kunlun leverages Baidu’s AI ecosystem, which includes AI scenarios such as search ranking and deep learning frameworks, including its open source deep learning framework called PaddlePaddle. Kunlun can be used in everything from autonomous vehicles to data centers.To read this article in full, please click here

Baidu takes a major leap as an AI player with new chip, Intel alliance

China’s Baidu made two big moves that are going to make it a major player in the artificial intelligence (AI) space: an extremely powerful new chip designed to compete with Google’s Tensor Processing Unit (TPU) and a wide-spanning alliance with Intel.First, the company introduced the Kunlun, a cloud-to-edge range of AI chips built to accommodate high-performance requirements of a wide variety of AI scenarios. The announcement was made at Baidu Create, a developer show that is starting to look an awful lot like Google I/O in terms of content and sessions.Kunlun leverages Baidu’s AI ecosystem, which includes AI scenarios such as search ranking and deep learning frameworks, including its open source deep learning framework called PaddlePaddle. Kunlun can be used in everything from autonomous vehicles to data centers.To read this article in full, please click here

Episode 30 – Privacy In Networking

In this episode of the Network Collective Community Roundtable, Tom Hollingsworth and Nick Buraglio join us again to expound on the topic of privacy in networking.


 

We would like to thank Core BTS for sponsoring this episode of Network Collective. Core BTS focuses on partnering with your company to deliver technical solutions that enhance and drive your business. If you’re looking for a partner to help your technology teams take the next step, you can reach out to Core BTS by emailing them here.

 

We also would also like to thank Cumulus Networks for sponsoring this episode of Network Collective. Cumulus is bringing S.O.U.L. back to the network. Simple. Open. Untethered. Linux. For more information about how you can bring S.O.U.L. to your network, head on over to https://cumulusnetworks.com/networkcollectivehassoul. There you can find out how Cumulus Networks can help you build a datacenter as efficient and as flexible as the worlds largest data centers and try Cumulus technology absolutely free.

 


Nick Buraglio
Guest
Tom Hollingsworth
Guest

Jordan Martin
Host
Eyvonne Sharp
Host
Russ White
Host


Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 30 – Privacy In Networking appeared first on Network Collective.

The VMware NSX® Roadshow is Coming to a City Near You

VMware NSX enterprise-grade solutions support your path toward network virtualization, micro-segmentation, application availability, IT automation, and cross-cloud architecture. And while we mostly live in the cloud, we’re coming back to Earth and taking our proverbial show on the road with the VMware NSX® Roadshow. It all goes down this summer, in a city near you!

 

VMware NSX® Roadshow workshops are designed specifically for networking and security professionals and delivered in a casual, interactive setting. Each participant gets the chance to engage one-on-one with VMware NSX product experts to ask questions, get hands-on help, and network with other people interested in, well, networks!

 

When you sign up, you’ll learn how agile organizations are using a Virtual Cloud Network as a north star to guide them toward creating a network built on best practice pillars like consistent connectivity, branch optimization, and security across all infrastructure.

 

Upcoming Events

Join us to talk shop, meet and greet, get deep drives on hot topics, product demos, and guided one-on-ones with product experts in one of the following cities:

 

Detroit – 7/17

When: July 17, 2018, from 1:00 P.M. to 4:30 P.M.

Where: Westin Southfield Detroit

1500 Town Center

Southfield, Continue reading

Musing: The Short Life of Influencers

We have a seen a number of people in the influencer recently taking jobs at vendors. Keith Townsend is the latest and I wish him the very best. I'm not saying if you participate in @TechFieldDay you'll find a new job. But the correlation between the number of TFD delegates starting new jobs in the […]

Softening chip market hit harder by trade wars

Seasonal softness and a looming tariff dispute between China and the U.S. put a dampener on the chip market, and it only looks to be getting worse with China interfering in the business of a U.S. company.Last week, Micron Technology, the number four chip vendor, according to IHS Markit, said China is blocking sales of some of its memory products. While based in Boise, Idaho, and having a large fabrication plant there, Micron also makes a lot of products in China for the Chinese market. And Micron is currently in a legal battle with Taiwanese chip maker United Microelectronics over alleged patent violations in China.Last week, a Chinese court granted a preliminary injunction banning Micron subsidiaries in China from manufacturing or selling DRAM modules and NAND flash chips used in solid-state drives. The good news, according to Micron, is that the injunction covers only 1 percent of its revenue.To read this article in full, please click here

Softening chip market hit harder by trade wars

Seasonal softness and a looming tariff dispute between China and the U.S. put a dampener on the chip market, and it only looks to be getting worse with China interfering in the business of a U.S. company.Last week, Micron Technology, the number four chip vendor, according to IHS Markit, said China is blocking sales of some of its memory products. While based in Boise, Idaho, and having a large fabrication plant there, Micron also makes a lot of products in China for the Chinese market. And Micron is currently in a legal battle with Taiwanese chip maker United Microelectronics over alleged patent violations in China.Last week, a Chinese court granted a preliminary injunction banning Micron subsidiaries in China from manufacturing or selling DRAM modules and NAND flash chips used in solid-state drives. The good news, according to Micron, is that the injunction covers only 1 percent of its revenue.To read this article in full, please click here

sFlow available on Juniper PTX series routers


sFlow functionality introduced on the PTX1000 and PTX10000 platforms—Starting in Junos OS Release 18.2R1, the PTX1000 and PTX10000 routers support sFlow, a network monitoring protocol for high-speed networks. With sFlow, you can continuously monitor tens of thousands of ports simultaneously. The mechanism used by sFlow is simple, not resource intensive, and accurate.  - New and Changed Features

The recent article, sFlow available on Juniper MX series routers, describes how Juniper is extending sFlow support to include routers to provide visibility across their entire range of switching and routing products.

Universal support for industry standard sFlow as a base Junos feature reduces the operational complexity and cost of network visibility for enterprises and service providers. Real-time streaming telemetry from campus switches, routers, and data center switches, provides centralized, real-time, end-to-end visibility needed to troubleshoot, optimize, and account for network usage.

Analytics software is a critical factor in realizing the full benefits of sFlow monitoring. Choosing an sFlow analyzer discusses important factors to consider when selecting from the range of open source and commercial sFlow analysis tools.

IDG Contributor Network: The rise of artificial intelligence DDoS attacks

What keeps me awake at night is the thought of artificial intelligence lying in wait in the hands of bad actors. Artificial intelligence combined with the powers of IoT-based attacks will create an environment tapped for mayhem. It is easy to write about, but it is hard for security professionals to combat. AI has more force, severity, and fatality which can change the face of a network and application in seconds.When I think of the capabilities artificial intelligence has in the world of cybersecurity I know that unless we prepare well we will be like Bambi walking in the woods. The time is now to prepare for the unknown. Security professionals must examine the classical defense mechanisms in place to determine if they can withstand an attack based on artificial intelligence.To read this article in full, please click here

IDG Contributor Network: The rise of artificial intelligence DDoS attacks

What keeps me awake at night is the thought of artificial intelligence lying in wait in the hands of bad actors. Artificial intelligence combined with the powers of IoT-based attacks will create an environment tapped for mayhem. It is easy to write about, but it is hard for security professionals to combat. AI has more force, severity, and fatality which can change the face of a network and application in seconds.When I think of the capabilities artificial intelligence has in the world of cybersecurity I know that unless we prepare well we will be like Bambi walking in the woods. The time is now to prepare for the unknown. Security professionals must examine the classical defense mechanisms in place to determine if they can withstand an attack based on artificial intelligence.To read this article in full, please click here

Datanauts 141: Managing Cloud-Native Applications

Cloud native applications are designed to be managed by software in all stages. This includes ongoing health checks as well as initial deployments. Human bottlenecks should be eliminated as much as possible in the technology, processes, and policies.

That quote is from the O Reilly book Cloud Native Infrastructure. On today s Datanauts episode, we talk to Justin Garrison, one of the authors and a senior systems engineer.

We dive into the chapter about managing cloud native applications, including a general conversation about the definition of a cloud-native app–that is, an application managed by software rather than humans.

Then we discuss the challenges of managing a microservices architecture, explore the concept of sidecar proxies, and walk through the process of deploying a new cloud application into production.

We also look at troubleshooting tools and techniques, and examine the necessity of service discovery and resource scheduling.

Sponsor: Linux Academy

Linux Academy offers the most hands-on training content in AWS, Azure, OpenStack, Linux, DevOps, Containers, security, and Google Cloud. Beginners and advanced learners alike will find up-to-date courses in skills development and certification prep. Hands-on labs let you work in actual cloud environments. Find out about the newest courses available online–including Continue reading

Manage Scaleway Resources with Ansible Native Support

Ansible and Scaleway

Hello! My name is Rémy Léone and I am a Cloud Developer Evangelist at Scaleway. I’ve written this post to let you know that support for Scaleway services are now available natively in the Ansible Project with the release of Ansible version 2.6.

Scaleway’s goal is to help developers get cloud resources as easily as possible. Developing support for our services using well-known tools such as Ansible is one of our top priorities for user engagement. In this article, I’ll discuss the different Scaleway modules and demonstrate how to natively manage your Scaleway resources in your Ansible Playbooks.

---

How to Configure an SSH Key on Scaleway

Connection to Scaleway Compute nodes use Secure Shell. SSH keys are stored at the account level, which means that you can re-use the same SSH key in multiple nodes. The first step to configure Scaleway compute resources is to have at least one SSH key configured.

scaleway_sshkeys is an Ansible module that manages SSH keys on your Scaleway account. You can add an SSH key to your account by including the following task in a playbook:

- name: "Add SSH key"
  scaleway_sshkey:
     ssh_pub_key: "ssh-rsa AAAA..."
     state: "present"

The ssh_pub_key parameter contains Continue reading