Machine Learning Gets An InfiniBand Boost With Caffe2

Scaling the performance of machine learning frameworks so they can train larger neural networks – or so the same training a lot faster – has meant that the hyperscalers of the world who are essentially creating this technology have had to rely on increasingly beefy compute nodes, these days almost universally augmented with GPUs.

There is a healthy rivalry between the hyperscalers over who has the best machine learning framework and the co-designed iron to take the best advantage of its capabilities. At its F8 developer conference, Facebook not only rolled out a significantly tweaked variant of the open source

Machine Learning Gets An InfiniBand Boost With Caffe2 was written by Timothy Prickett Morgan at The Next Platform.

5 ways to keep virtual assistants from sharing your company’s secrets

Virtual assistants like Apple’s Siri, Microsoft’s Cortana and Google Now have the potential to make enterprise workers more productive. But do “always listening” assistants pose a serious threat to security and privacy, too?Nineteen percent of organizations are already using intelligent digital assistants, such as Siri and Cortana, for work-related tasks, according to Spiceworks’ October 2016 survey of 566 IT professionals in North America, Europe, the Middle East and Africa. The survey also found that 46 percent of organizations plan to adopt intelligent assistants within five years.To read this article in full or to leave a comment, please click here

5 ways to keep virtual assistants from sharing your company’s secrets

Virtual assistants like Apple’s Siri, Microsoft’s Cortana and Google Now have the potential to make enterprise workers more productive. But do “always listening” assistants pose a serious threat to security and privacy, too?Nineteen percent of organizations are already using intelligent digital assistants, such as Siri and Cortana, for work-related tasks, according to Spiceworks’ October 2016 survey of 566 IT professionals in North America, Europe, the Middle East and Africa. The survey also found that 46 percent of organizations plan to adopt intelligent assistants within five years.To read this article in full or to leave a comment, please click here

SnapLogic’s AI simplifies enterprise software connections

SnapLogic wants to make it easier for users of its enterprise software integration platform to connect components of their business systems. The company has unveiled a new feature that uses machine learning to suggest what users may want to do.The idea behind the new feature, announced this week, is to make it easier to connect and move data between enterprise software systems. SnapLogic's service lets companies take a data source like a Concur instance, and synchronize that with information an ERP system like Microsoft Dynamics. To read this article in full or to leave a comment, please click here

ICSA Labs Certifies NSX Micro-segmentation Capabilities

ICSA_Cert_Firewall-Corp_2C_300DPI_975x563

VMware NSX  has achieved ICSA labs Corporate Firewall Certification.

With the release of NSX for vSphere® 6.3, VMware has not only introduced several key security features such as Application Rule Manager and Endpoint Monitoring, which provide deep visibility into the application, and enable a rapid zero-trust deployment, but has also achieved Corporate Firewall Certification in independent testing performed by ICSA labs, a leading third-party testing and certification body and independent division of Verizon.

VMware NSX for vSphere 6.3 has been tested against an industry-accepted standard to which a consortium of firewall vendors, end users and ICSA labs contributed, and met all the requirements in the Baseline and Corporate module of the ICSA Module Firewall Certification Criteria version 4.2.
NSX is the only true micro-segmentation platform to achieve ICSA Firewall certification — with the NSX Distributed Firewall providing kernel-based, distributed stateful firewalling, and the Edge Services Gateway providing services such as North-South firewalling, NAT, DHCP, VPN, load balancing and high availability. VMware NSX provides security controls aligned to the application and enables a Zero-Trust model, independent of network topology.

The ICSA Firewall Certification criteria focus on several key firewall aspects, including stateful services, logging and persistence. ICSA also validates Continue reading

Docker wants to help put old enterprise apps into containers

Docker is offering enterprises an easier on-ramp to using containers with a new consulting program aimed at taking a legacy application and migrating it to a container in five days.The idea behind the program is to show companies the concrete benefits of moving older applications over to containers, without asking them to undergo a massive transformation effort. Docker is working with Cisco, Avanade, Microsoft, and Hewlett Packard Enterprise on the Modernize Traditional Applications program, which will focus on migrating an application to modern infrastructure and getting it set up inside a containerized environment.To read this article in full or to leave a comment, please click here

DHS warns on immigration spoofing scam

You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Today the U.S. Department of Homeland Security issued a fraud alert saying criminals have been using the agency’s Hotline as part of a spoofing scam to steal personal information.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here

DHS warns on immigration spoofing scam

You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Today the U.S. Department of Homeland Security issued a fraud alert saying criminals have been using the agency’s Hotline as part of a spoofing scam to steal personal information.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here

Riverbed absorbs WIFi vendor Xirrus, reaches for the edge of the network

Network management company Riverbed Technology today announced its intent to acquire enterprise Wi-Fi equipment vendor Xirrus for an undisclosed fee.Riverbed touted that the acquisition, which it expects to close by the end of the month, will expand its software-defined WAN solution, and integrate Xirrus’ robust Wi-Fi products into the broader Riverbed ecosystem.+ALSO ON NETWORK WORLD: New FCC web portal opens for 5G experimenters + Trump's cybersecurity mystery: 90 days in, where's the plan?To read this article in full or to leave a comment, please click here

39% off Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux, Paperback – Deal Alert

The Raspberry Pi's most famous feature is its adaptability. It can be used for thousands of electronic applications (See: "How to build a Raspberry Pi retrogaming emulation console"). This book, Exploring Raspberry Pi, is the innovators guide to bringing Raspberry Pi to life. The book favors engineering principles over a 'recipe' approach to give you the skills you need to design and build your own projects. You'll understand the fundamental principles in a way that transfers to any type of electronics, electronic modules, or external peripherals, using a "learning by doing" approach that caters to both beginners and experts. The book begins with basic Linux and programming skills, and helps you stock your inventory with common parts and supplies. Next, you'll learn how to make parts work together to achieve the goals of your project, no matter what type of components you use. The companion website provides a full repository that structures all of the code and scripts, along with links to video tutorials and supplementary content that takes you deeper into your project. The list price has been reduced 39% on Amazon, from $35 to $21.40. See this deal now on Amazon. A complete Raspberry Pi Continue reading

IPv6 Extensions Are Already Dead

In this wiki entry disguised as a RFC 7872, “Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World” highlights IPv6 Extension Headers are effectively unusable since internet providers are dropping IPv6 fragment and failing to support Extension Headers.  In IPv6, an extension header is any header that follows the initial 40 […]

The post IPv6 Extensions Are Already Dead appeared first on EtherealMind.

Twitter’s porn problem is ‘trending’

News this morning that former New England Patriots player Aaron Hernandez reportedly had committed suicide sent the murderer’s name to the top of Twitter’s “trending” list. Clicking on it brought back a string of tweets that was positively littered with graphic pornography. Twitter How much porn? I reported and blocked at least a half-dozen tweets and my rough estimate would be that about 1 in 50 were obscene (the flow has since receded to a trickle). I have been a daily, heavy user of Twitter since 2008 and this is by no means the first time I have encountered porn there. And, yes, it has previously been noticeable in instances where fast-breaking news makes the trending list. However, today’s deluge was by far the most concentrated and, well, offensive.   To read this article in full or to leave a comment, please click here

Twitter’s porn problem is ‘trending’

News this morning that former New England Patriots player Aaron Hernandez reportedly had committed suicide sent the murderer’s name to the top of Twitter’s “trending” list. Clicking on it brought back a string of tweets that was positively littered with graphic pornography. Twitter How much porn? I reported and blocked at least a half-dozen tweets and my rough estimate would be that about 1 in 50 were obscene (the flow has since receded to a trickle). I have been a daily, heavy user of Twitter since 2008 and this is by no means the first time I have encountered porn there. And, yes, it has previously been noticeable in instances where fast-breaking news makes the trending list. However, today’s deluge was by far the most concentrated and, well, offensive.   To read this article in full or to leave a comment, please click here

Surveys show high hopes, deep concerns about IoT

Industrial IoT's big future is starting to become a reality, but many companies still don't think they're ready for it.Those are some of the findings in surveys released on Tuesday by the Business Performance Innovation Network and the Eclipse IoT Working Group. They reflect the views of hundreds of executives and developers from a range of industries.More than half of the executives think their industries are already adopting IoT through either pilots or large-scale deployments, and 57 percent are at least in the planning stages themselves, BPI Network said. About 350 executives from around the world responded to the survey by BPI Network, an organization of business leaders.To read this article in full or to leave a comment, please click here