Is Kubernetes Key to Democratizing Enterprise Big Data?
While thought to be possible, no organizations have yet attempted the move in a production environment.
While thought to be possible, no organizations have yet attempted the move in a production environment.
Education is the basis for individual empowerment, employability, and gender equity. Unfortunately, it is not available to everyone.
In 2015, the international community agreed to the 2030 Agenda for Sustainable Development, which commits countries to addressing these challenges. Such commitments require innovative approaches that go beyond simply building more educational institutions. At the Internet Society we believe the Internet is a key piece of that puzzle, which is why we are pleased to release a new paper, “Internet Access and education: Key considerations for policy makers”, to help navigate some of the opportunities and challenges.
The Internet has great potential to not only expand access to, but also improve the quality of education. It opens doorways to a wealth of information, knowledge, and educational resources to students and teachers. It also promotes opportunities for learning beyond the classroom – a critical feature to promote the lifelong learning that the future demands. A skilled workforce that utilizes ICTs effectively is a key factor in the global digital economy and for harnessing its natural resources for sustainable growth. Education is where it starts.
This Internet Society briefing describes ways in which policymakers can unlock that potential through an enabling framework Continue reading

Next Monday, the US Supreme Court will hear oral arguments in Oil States Energy Services, LLC vs. Greene’s Energy Group, LLC, which is a case to determine whether the Inter Partes Review (IPR) administrative process at the US Patent and Trademark Office (USPTO) used to determine the validity of patents is constitutional.
The constitutionality of the IPR process is one of the biggest legal issues facing innovative technology companies, as the availability of this process has greatly reduced the anticipated costs, and thereby lessened the threat, of patent troll litigation. As we discuss in this blog post, it is ironic that the outcome of a case that is of such great importance to the technology community today may hinge on what courts in Britain were and were not doing more than 200 years ago.
Thomas Rowlandson [Public domain], via Wikimedia Commons
As we have discussed in prior blog posts, the stakes are high: if the Supreme Court finds IPR unconstitutional, then the entire system of administrative review by the USPTO — including IPR and ex parte processes — will be shuttered. This would be a mistake, as administrative recourse at the USPTO is one of the few ways Continue reading
ONAP’s second code release will take on enterprise data centers.
If you are a hacker or a security company, 2017 was a very good year.
Download the HPE MEC Research Report, . Telecommunications (telco) providers are excited about Multi-Access Edge Computing (MEC) because it promises to make compute and storage capabilities available to customers at the edge of communications networks. Workloads and applications will be closer to customers, potentially enhancing experiences and enabling new services and offers. MEC is being... Read more →
[This post was written by Phil Estes and Michael Friis.]
True multi-platform workload portability has long been the holy grail of enterprise computing. All kinds of virtualization strategies have been used over the years to approximate this dream to varying levels of acceptable performance or usability. On the one hand, virtual machines and hardware virtualization are flexible enough that you can mix and match operating systems (and even CPU architectures) on the same host—but they come with a lot of overhead. However, language-based virtual runtimes don’t have packaging formats that encapsulate all system-level app dependencies, and that makes them unsuitable for general-purpose deployment and configuration management.
Docker came along as a unique type of virtualization that only virtualizes the operating system for container processes. Docker uses existing Linux kernel features to offer isolation characteristics that are similar to what is available with virtual machines. The analogy of a “standard shipping container,” combined with these isolation primitives, caught developer interest immediately. With this new shipping metaphor came speed and agility that blew the doors off virtual machine size and speed constraints that impacted developer workflow, not to mention developer happiness! The containerization craze has grown like wildfire since then, but Continue reading
Academic centers and government agencies often design and write their own applications, but some of them and the vast majority of enterprise customers with HPC applications usually depend on third parties for their software. They also depend upon those software developers to continually enhance and scale those applications, and that means adding support for GPU accelerators. Two important ones, Gaussian and ANSYS, depend not only on GPUs, but the OpenACC programming model, to extend across more cores and therefore do more work faster.
Let’s start with Gaussian.
The way that chemicals react can be the difference between a product success …
Key Software Firms Reengineer Their Code With OpenACC was written by Timothy Prickett Morgan at The Next Platform.
In this video, learn how this free tool can help you spot what ports a device is connected to for network analysis.
![]() |
| Fig 1.1- OSPF Network Connected to other Campus Via NBMA Networks- Frame Relay |
One of my readers sent me a question about his favorite annoyance:
During my long practice, I’ve never seen an Enterprise successfully managing the network device software upgrade/patching cycles. It seems like nothing changed in the last 20 years - despite technical progress, in still takes years (not months) to refresh software in your network.
There are two aspects to this:
Read more ...