Accelerating Deep Learning Insights With GPU-Based Systems

Explosive data growth and a rising demand for real-time analytics are making high performance computing (HPC) technologies increasingly vital to success. Organizations across all industries are seeking the next generation of IT solutions to facilitate scientific research, enhance national security, ensure economic stability, and empower innovation to face the challenges of today and tomorrow.

HPC solutions are key to quickly answering some of the world’s most daunting questions. From Tesla’s self-driving car to quantum computing, artificial intelligence (AI) is enabling unparalleled compute capabilities and outmatching humans at many cognitive tasks. Deep learning, an advanced AI technique, is growing in popularity

Accelerating Deep Learning Insights With GPU-Based Systems was written by Timothy Prickett Morgan at The Next Platform.

EVPN-VXLAN lab – RT assignment methods

This post continues the EVPN-VXLAN lab from the previous one.

For now I configured the simplest possible variant of RT assignment – one vrf-target for all ES and VNI routes (vrf-target target:65000:1):

alex@vQFX1# show switch-options
service-id 1;
vtep-source-interface lo0.0;
route-distinguisher 11.11.11.11:1;
vrf-target target:65000:1;    ### This RT applies to ALL EVPN routes


alex@vMX1# show routing-instances
evpn {
    vtep-source-interface lo0.0;
    instance-type virtual-switch;
    interface ge-0/0/4.0;
    interface ae0.0;
    route-distinguisher 1.1.1.1:1;
    vrf-target target:65000:1;   ### This RT applies to ALL EVPN routes
    protocols {
        evpn {
            encapsulation vxlan;
            extended-vni-list [ 100 200 ];
            multicast-mode ingress-replication;
            default-gateway no-gateway-community;
        }
    }
    bridge-domains {
        v100 Continue reading

22% off Aukey Dash Cam, Full HD Wide Angle With Night Vision – Deal Alert

This 1080p Dash Camera captures video or stills, and is equipped with a motion detector and continuous loop recording. An emergency recording mode can be activated by sharp turns or sudden stops, and automatically captures unexpected driving incidents. The Dash Camera can also record whenever it sees motion in front or create a time-lapse video of your trip. Features Full HD 1080P, 170° Wide Angle Lens, 2“ LCD and Night Vision. Its typical list price has been reduced 22% to just $69.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

22% off Aukey Dash Cam, Full HD Wide Angle With Night Vision – Deal Alert

This 1080p Dash Camera captures video or stills, and is equipped with a motion detector and continuous loop recording. An emergency recording mode can be activated by sharp turns or sudden stops, and automatically captures unexpected driving incidents. The Dash Camera can also record whenever it sees motion in front or create a time-lapse video of your trip. Features Full HD 1080P, 170° Wide Angle Lens, 2“ LCD and Night Vision. Its typical list price has been reduced 22% to just $69.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

44% off Aukey Dash Cam, Full HD Wide Angle With Night Vision – Deal Alert

This 1080p Dash Camera captures video or stills, and is equipped with a motion detector and continuous loop recording. An emergency recording mode can be activated by sharp turns or sudden stops, and automatically captures unexpected driving incidents. The Dash Camera can also record whenever it sees motion in front or create a time-lapse video of your trip. Features Full HD 1080P, 170° Wide Angle Lens, 2“ LCD and Night Vision. Its typical list price has been reduced 44% to just $58.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

44% off Aukey Dash Cam, Full HD Wide Angle With Night Vision – Deal Alert

This 1080p Dash Camera captures video or stills, and is equipped with a motion detector and continuous loop recording. An emergency recording mode can be activated by sharp turns or sudden stops, and automatically captures unexpected driving incidents. The Dash Camera can also record whenever it sees motion in front or create a time-lapse video of your trip. Features Full HD 1080P, 170° Wide Angle Lens, 2“ LCD and Night Vision. Its typical list price has been reduced 44% to just $58.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

67% off Amir 3 in 1 Cell Phone Camera Lens Kit – Deal Alert

With this smartphone lens kit from Amir you can take high clarity, professional photos wish fisheye, macro and super wide angle format from virtually any cell phone. These professional HD lenses reduce glass flare & ghosting caused by reflections. A universal clip design makes it easy to attach to most cell phones, iPads and PC's as well.  The fisheye lens capture images at 180-degrees, wide angle lens at 140-degrees and the macro lens magnifies 10x with a minimum object distance of 10-15mm. The lens kit receives an average of 4 out of 5 stars on Amazon (read reviews). Regular price is listed at $29.99 on Amazon, but with the current 67% discount you can gift this kit to yourself or an aspiring photographer for just $9.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

.NE Body Out There?

Protecting end users starts with understanding their use and integration of services. For authoritative DNS, this includes human error when copying and pasting information between interfaces. After purchasing a new domain, such as “containercult.com,” the end user configures authoritative nameservers. Delegation is a “set it and forget it” operation; it is often made outside of scope of continuous integration pipelines and automated deployment systems. To quantify this risk and reconcile it with reality, we started to look at the existence of nameserver record typos in the .COM zone file.

There are typos in nameserver records for a number of authoritative DNS providers made across a number of zones, making it clear that end users make delegation typos. The existence of the typo is one thing, it’s another when the typo has been registered and another provider is serving responses. One of the typos of interest was dynect.ne, which was registered some time in February of 2016. At that time, it was delegated to a pair of authoritative nameservers operated by myhostadmin.net, a name related to a Chinese hosting provider. Sometime around January 2017, the authoritative nameservers changed over to Yandex, the Russian internet services provider, and Continue reading

GRE Tunnels – Generic Routing Encapsulation – Use Cases

GRE Tunnels  GRE tunnels are by far most common tunnelling technology. Very easy to setup, troubleshoot and operate. But in large scale deployment, configuring GRE tunnels become cumbersome, because GRE tunnel is a point to point tunnel.   GRE Tunnel Characteristics    • GRE tunnels are manual point to point tunnels. Tunnel end points are not automatically […]

The post GRE Tunnels – Generic Routing Encapsulation – Use Cases appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Net Neutrality (Again and Again and Again)

Net neutrality is one of those topics that should never have existed, but of course it inevitably erupts every so often, so here we go…

Not so long ago Robert Graham published his anti-net-neutrality arguments which are (no surprise) not much different from what I wrote when I still cared about this argument (here, here, here and here). While I agree with his overall perspective, I completely disagree with his view of Comcast’s initial response to network congestion.

Read more ...

IDG Contributor Network: SunPower technology powers solar plants using Krypton Cloud

The installed capacity of solar power in the U.S. now exceeds all other forms of power generation.Generating solar power at scale with thousands of panels requires new approaches to monitoring and management. Since 2004, SunPower has designed, constructed, managed and supplied high performance solar power plants around the world. More than 3 gigawatts of solar plants rely on SunPower technology today. How does SunPower monitor thousands of solar panels across hundreds of power plants? How are performance issues remotely diagnosed and troubleshot in real-time? How are false alerts distinguished from real ones? To read this article in full or to leave a comment, please click here

An OS for Neuromorphic Computing on Von Neumann Devices

Ziyang Xu from Peking University in Beijing sees several similarities between the human brain and Von Neumann computing devices.

While he believes there is value in neuromorphic, or brain-inspired, chips, with the right operating system, standard processors can mimic some of the efficiencies of the brain and achieve similar performance for certain tasks.

In short, even though our brains do not have the same high-speed, high-frequency capacity of modern chips, the way information is routed and addressed is the key. At the core of this efficiency is a concept similar to a policy engine governing information compression, storage, and retrieval.

An OS for Neuromorphic Computing on Von Neumann Devices was written by Nicole Hemsoth at The Next Platform.

On the ‘web: Getting Involved with the IETF

I sat with Greg, Kathleen, and Alia to talk about “ordinary engineers” getting involved in the IETF while we were in Prague. Believe it or not, this time I didn’t get out into the city at all other than walking between the hotel I was staying at and the venue hotel. I try to always take “one day off” and do something around the city we are in, but the schedule didn’t allow it this time. Anyway, here is the link—

Greg Ferro attended the IETF 99 meeting in Prauge in July 2017. In this Priority Queue show, he sits down with Kathleen Moriarty, an IETF Security Area Director; Alia Atlas, a Routing Area Director; and Russ White, a co-chair of a variety of working groups and all-around community leader; to discuss opportunities for IT professionals to get directly involved with the IETF in networking, security, and other areas. —Packet Pushers

The post On the ‘web: Getting Involved with the IETF appeared first on rule 11 reader.