Oracle Beefs Up Its Machine Learning With DataScience.com Acquisition
Oracle will integrate the DataScience.com cloud workspace platform for data science into its Oracle Cloud infrastructure.
Oracle will integrate the DataScience.com cloud workspace platform for data science into its Oracle Cloud infrastructure.
Despite what some people say, automation is not for the lazy. This opinion probably comes from the fact that the whole point of automation is to reduce repetitive tasks and make your life easier. Indeed automation can do just that, as well as giving you back hours each week for other tasks.
But getting your automation off the ground to begin with can be a challenge. It’s not as if you just decide, “Hey, we’re going to automate our network now!” and then you follow a foolproof, well-defined process to implement network automation across the board. You have to make many decisions that require long discussions, and necessitate ambitious and careful thinking about how you’re going to automate.
Just as with anything else in the IT world, there are no one-size-fits-all solutions, and no “best practices” that apply to every situation. But there are some common principles and crucial decision points that do apply to all automation endeavors.
In this post, I’ll give you five network automation tips and tricks to get clarity around your automation decisions and reduce any friction that may be inhibiting (further) adoption of network automation.
Automating Continue reading
The Internet can provide access to healthcare, education, and economic opportunity, but many indigenous communities face challenges to Internet access and inclusion. Brian Tagaban, Director of Government Policy at Sacred Wind Communications and former executive director of the Navajo Nation Telecommunication Regulatory Commission, is at RightsCon this week – the world’s leading conference on human rights in the digital age – to discuss the digital divide in indigenous communities in North America. He’s there as an Internet Society fellow and joined by other fellows Bill Murdoch, an IT specialist at the Manitoba First Nation School System and the First Nations Health & Social Secretariat of Manitoba, and Madeleine Redfern, the mayor of Iqaluit in Nunavut, Canada.
We spoke to Tagaban at the first Indigenous Connectivity Summit. The event was the start of a critical conversation about how indigenous communities can connect themselves to the Internet on their own terms. He detailed the time, diligence, and effort required to build a regulatory framework, and hoped that other Summit participants could “see how things are possible, celebrate success stories, share those success stories so that they can be built upon, and gain exposure to the political circumstances, social circumstances, geographic Continue reading
For years, enterprises have wanted to pool and then carve up the myriad resources of the datacenter to enable them to more efficiently run their workloads, reduce power consumption, and improve utilization rates. It takes what seems like an endless series of technologies advances to move towards this goal. But, ever so slowly, we are getting there.
Virtualization that started in the servers flowed into the storage realm and eventually into the network, and converged systems mashing up virtual compute and virtual networking soon begat hyperconverged infrastructure, which added in virtual storage – one of the fastest growing segments …
Forging Composable Infrastructure For Memory-Centric Systems was written by Jeffrey Burt at The Next Platform.

This year Red Hat Ansible Automation was featured in more talks than ever before at Red Hat Summit, as there was an emphasis on automation and management content throughout the conference. Below you’ll find links to the recorded sessions that included Ansible and our Red Hat Management friends from Red Hat CloudForms, Red Hat Insights and Red Hat Satellite. We hope you enjoy these sessions and share with your colleagues.
Want even more? Mark your calendar for AnsibleFest! We’ll be in Austin, TX this year for two days of conference on Oct 2-3.
Operations risk remediation in highly secure infrastructures
If you have data concerns about using Red Hat’s operations analytics service, Red Hat Insights, this session is for you. Insights speeds up discovery and automates remediation of potential problems in your Red Hat infrastructure quickly and simply. In this session, William Nix and Bill Hirsch of Red Hat show you how to configure Red Hat Insights to obfuscate and remove sensitive data from Red Hat Insights analytics. You'll learn how Red Hat Insights securely transfers, stores, and protects the data it does use while you're taking advantage of the service.
Hopefully there’s enough good will built up in open source groups to survive the actions of governments during these times.
The RIPE 76 meeting is happening this week in Marseille, France, held at the fantastic location of the Palais du Pharo overlooking Marseille’s Old Port. And it’s also another record attendance with over 850 people registered.
The first couple of days have primarily been devoted to plenary sessions, and there’s been a big focus on routing security. Erik Bais (A2B Internet) kicked off the discussion with a presentation on ‘Why are we still seeing DDoS traffic?‘, which highlighted that DDoS attacks are still originating from the same networks. Looking at the list of the worst offenders, there’s even one amongst the regular RIPE attendees, and he called for networks to clean up their acts. This was also a good opportunity to highlight the MANRS initiative, which of course includes measures to mitigate amplification attacks, and encourages networks to make good routing practices the norm.
Alexander Azimov (Qrator Labs) reinforced this message by outlining the current problems with BGP, including the ongoing route leaks and hijacks affecting the Internet. There are currently only moral obligations to not use other providers’ address space or to support anti-spoofing policies, yet major providers (including Tier 1 providers) continue to both originate Continue reading
In this video, Tony Fortunato demonstrates software utilities to test the performance of your DNS servers.
An attendee of my Building Next-Generation Data Center online course asked me what the best learning path might be for a total (data center) beginner that has to design and install a small leaf-and-spine fabric in a near future.
This blog post was written for ipSpace.net subscribers who want to get the most out of ipSpace.net content. If you’re only interested in free stuff, you might feel it’s a waste of your time. You’ve been warned ;)
Read more ...This is part IV of our tour through the papers from the Re-coding Black Mirror workshop exploring future technology scenarios and their social and ethical implications.
(If you don’t have ACM Digital Library access, all of the papers in this workshop can be accessed either by following the links above directly from The Morning Paper blog site, or from the WWW 2018 proceedings page).
In 2016, the world witnessed the storming of social media by social bots spreading fake news during the US Presidential elections… researchers collected Twitter data over four weeks preceding the final ballot to estimate the magnitude of this phenomenon. Their results showed that social bots were behind 15% of all accounts and produced roughly 19% of all tweets… What would happen if social media were to get so contaminated by fake news that trustworthy information hardly reaches us anymore?
Fake news and hoaxes have been Continue reading
Verizon’s annual data breach report found web applications had the most breaches in 2017.