Inside Intel’s Strategy to Integrate Nervana Deep Learning Assets

There is little doubt that 2017 will be a dense year for deep learning. With a sudden new wave of applications that integrate neural networks into existing workflows (not to mention entirely new uses) and a fresh array of hardware architectures to meet them, we expect the space to start shaking out its early winners and losers and show a clearer path ahead.

As we described earlier this week, Intel has big plans to integrate the Nervana ASIC and software stack with its Knights family of processors in the next several years. This effort, codenamed Knights Crest, is a long-term

Inside Intel’s Strategy to Integrate Nervana Deep Learning Assets was written by Nicole Hemsoth at The Next Platform.

T-Mobile offers users a free iPhone 7 with qualifying trade-in

T-Mobile CEO John Legere has a penchant for making a big splash, and with Black Friday just a few days away, Legere on Tuesday announced an intriguing new promotion that prospective iPhone 7 buyers might want to keep on their radar.As part of the company's Black Friday push, T-Mobile is offering users either a free iPhone 7 or iPhone 7 Plus with a qualifying trade-in. In order to get a free 32GB iPhone 7, users can trade in the following devices: an iPhone 6s, an iPhone 6s Plus, Samsung's Galaxy S6, the S6 Edge, the S7, the S7 Edge and the Note 5. Other qualifying devices include the LG V20 and the LG G5.If you have an older device, there are still good deals to be had. Case in point: users can get $100 off a 32GB iPhone 7 if they trade-in any of the following devices: iPhone 6, iPhone 6 Plus, iPhone SE, Samsung Note 4, Samsung Galaxy S5, the LG G4 and the LG V10.To read this article in full or to leave a comment, please click here

How to make home IoT more secure: Assume the worst

Sometimes the truth hurts but you just have to face it. The internet advisory group BITAG lays it on the line for the IoT industry in a new report: No, consumers aren’t going to update the software on their devices.“It is safe to assume that most end users will never take action on their own to update software,” the Broadband Internet Technology Advisory Group said. Its recommendation: Build in mechanisms for automatic, secure updates.That bit of human nature is just one of the harsh realities BITAG acknowledges in the report, which came out on Tuesday. It also points out that some consumer IoT devices ship with weak built-in usernames and passwords like “admin” and “password,” can’t do authentication or encryption, or can easily be taken over by malware that turns them into bots.To read this article in full or to leave a comment, please click here

How to make home IoT more secure: Assume the worst

Sometimes the truth hurts but you just have to face it. The internet advisory group BITAG lays it on the line for the IoT industry in a new report: No, consumers aren’t going to update the software on their devices.“It is safe to assume that most end users will never take action on their own to update software,” the Broadband Internet Technology Advisory Group said. Its recommendation: Build in mechanisms for automatic, secure updates.That bit of human nature is just one of the harsh realities BITAG acknowledges in the report, which came out on Tuesday. It also points out that some consumer IoT devices ship with weak built-in usernames and passwords like “admin” and “password,” can’t do authentication or encryption, or can easily be taken over by malware that turns them into bots.To read this article in full or to leave a comment, please click here

Using GNOME Keyring for Git Credentials on Fedora 25

In this post, I’m going to show you how to use the GNOME Keyring on Fedora 25 as a credential helper for Git. This post is very closely related to my earlier post on using GNOME Keyring as a Git credential helper on Ubuntu 16.04. As with the earlier Ubuntu-related post, what I’m including here isn’t new or ground-breaking information; I’m posting it primarily to make the information easier to find for others.

Like Ubuntu 16.04, Fedora 25 already has the basis for integrating GNOME Keyring into Git as a credential helper already installed into the /usr/share/doc/git-core-doc/contrib/credential/gnome-keyring directory.

Unlike Ubuntu 16.04, though, Fedora already has a compiled credential helper installed. This Git credential helper is found at /usr/libexec/git-core/git-credential-gnome-keyring. This credential helper is ready to use.

To get GNOME Keyring support for storing Git credentials, then, all one has to do is simply configure Git appropriately (no need to install additional packages or compile anything). You can configure Git via a couple of different ways:

  1. You can use the git config command, like this:

     git config --global credential.helper /usr/libexec/git-core/git-credential-gnome-keyring
    
  2. You can edit ~/.gitconfig directly, using the text editor of your choice. Add this text:

     [credential]
     helper  Continue reading

AWS is cutting and simplifying its storage prices

Amazon Web Services made a series of price cuts on Tuesday and simplified what customers pay for its storage products. The company's popular Simple Storage Service (S3) has had its six pricing tiers cut down to three, along with a corresponding price cut of roughly 16 percent to 25 percent.Glacier, AWS's storage service for data that doesn't need to be accessed frequently, now has a trio of retrieval options. Companies can have quicker access to their data if they pay more or get cheaper access if they're willing to wait. Glacier users also get a 43 percent price cut.To read this article in full or to leave a comment, please click here

12 tips for safer Black Friday and Cyber Monday shopping

During Black Friday and Cyber Monday 2016, consumers should watch out for scams that come through spam, insecure public networks and apps that might seem legitimate but could be taking over your phones and computers, experts say.+ RELATED: How to dodge Black Friday schemes +Here are a dozen steps you can take to avoid becoming a victim. Only download or buy apps from legitimate app stores. Suspect apps that ask for too many permissions. Check out the reputation of apps and particularly the app publisher. Only enter credit card info on secure shopping portals. Avoid using simple passwords, and use two-factor authentication if you can. Be alert for poisoned search results when using search engines to find products. Don’t install software that sites require before you can shop. Don’t use free pubic Wi-Fi to make purchases. Be suspicious of great deals you learn about via social media or emails and don’t click the links. Turn off location services while shopping to minimize the potential personal data that could be compromised. Make sure the connection to e-commerce sites is secured (HTTPS). Double check the validity of the SSL certificate for the site. To read this article in full or Continue reading

12 tips for safer Black Friday and Cyber Monday shopping

During Black Friday and Cyber Monday 2016, consumers should watch out for scams that come through spam, insecure public networks and apps that might seem legitimate but could be taking over your phones and computers, experts say.+ RELATED: How to dodge Black Friday schemes +Here are a dozen steps you can take to avoid becoming a victim. Only download or buy apps from legitimate app stores. Suspect apps that ask for too many permissions. Check out the reputation of apps and particularly the app publisher. Only enter credit card info on secure shopping portals. Avoid using simple passwords, and use two-factor authentication if you can. Be alert for poisoned search results when using search engines to find products. Don’t install software that sites require before you can shop. Don’t use free pubic Wi-Fi to make purchases. Be suspicious of great deals you learn about via social media or emails and don’t click the links. Turn off location services while shopping to minimize the potential personal data that could be compromised. Make sure the connection to e-commerce sites is secured (HTTPS). Double check the validity of the SSL certificate for the site. To read this article in full or Continue reading

How to dodge Black Friday and Cyber Monday shopping hackers

Hackers are writing apps, setting up phony Wi-Fi networks and unleashing malware in attempts to turn legitimate Black Friday 2016 and Cyber Monday retailing into profits for themselves, according to security experts.Bad actors are stealing personal information like passwords and credit card numbers, compromising computers and phones, and blackmailing retailers with hopes of lining their pockets, researchers say.For example, researchers at RiskIQ found frequent cases of criminals linking the names of legitimate brands to sketchy applications and Web sites in order to lure unsuspecting shoppers.They looked at five popular e-commerce brands to see how often their names appeared along with the term Black Friday in the titles or descriptions of black-listed applications. The research didn’t reveal the names of the retailers, but found that they lined up with bogus apps from 8.4% to 16% of the time.To read this article in full or to leave a comment, please click here

Micro services: Breaking down software monoliths

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Amazon was the first company to take a large monolithic system and deconstruct it into micro services. Netflix was next, deconstructing its behemoth software stack, seeking a more agile model that could keep up with 2 million daily API requests from more than 800 different device types. Forward-thinking companies like Google, eBay, Uber and Groupon soon followed. Today, enterprises are abandoning monolithic software architectures to usher in the latest era in systems architecture: micro services.

To read this article in full or to leave a comment, please click here

Micro services: Breaking down software monoliths

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Amazon was the first company to take a large monolithic system and deconstruct it into micro services. Netflix was next, deconstructing its behemoth software stack, seeking a more agile model that could keep up with 2 million daily API requests from more than 800 different device types. Forward-thinking companies like Google, eBay, Uber and Groupon soon followed. Today, enterprises are abandoning monolithic software architectures to usher in the latest era in systems architecture: micro services.To read this article in full or to leave a comment, please click here

How to dodge Black Friday and Cyber Monday shopping hackers

Hackers are writing apps, setting up phony Wi-Fi networks and unleashing malware in attempts to turn legitimate Black Friday 2016 and Cyber Monday retailing into profits for themselves, according to security experts.Bad actors are stealing personal information like passwords and credit card numbers, compromising computers and phones, and blackmailing retailers with hopes of lining their pockets, researchers say.For example, researchers at RiskIQ found frequent cases of criminals linking the names of legitimate brands to sketchy applications and Web sites in order to lure unsuspecting shoppers.They looked at five popular e-commerce brands to see how often their names appeared along with the term Black Friday in the titles or descriptions of black-listed applications. The research didn’t reveal the names of the retailers, but found that they lined up with bogus apps from 8.4% to 16% of the time.To read this article in full or to leave a comment, please click here

Virtually trampling over Black Friday 2016

We've done more than our fair share of Black Friday, Black November, pre-Black Friday, Cyber Monday and other tech bargain roundups, including looks at virtual reality systems such as HTC Vive and Samsung Gear VR that can be had for less this holiday shopping season.MORE: 50+ Black Friday 2016 tech dealsNow a comedy website dubbed Above Average, which has SNL and 30 Rock blood in its veins, brings us a beautiful (and only slightly NSFW) mashup of Black Friday deals and virtual reality systems that's just a little too real.To read this article in full or to leave a comment, please click here

Open-source hardware makers unite to start certifying products

Four years ago, Alicia Gibb was trying to unite a fragmented open-source hardware community to join together to create innovative products.So was born the Open Source Hardware Association, which Gibb hoped would foster a community of hardware "hackers" sharing, tweaking, and updating hardware designs. It shared the ethics and ethos of open-source software and encouraged the release of hardware designs -- be it for it processors, machines, or devices -- for public reuse.Since then, OSHWA has gained strength, with Intel, Raspberry Pi, and Sparkfun endorsing the organization. Its growth has coincided with the skyrocketing popularity of Arduino and Raspberry Pi-like developer boards -- many of them open source -- to create gadgets and IoT devices.To read this article in full or to leave a comment, please click here

10 considerations for running WebRTC services on AWS

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

You want to embed real-time communications features into your website or mobile application for direct peer-to-peer communication and you’ve landed on WebRTC. That’s a great start.

Now you realize that backend services are critical for building a robust solution. You are thinking about hosting your solution in the cloud, using an Infrastructure-as-a-Service (IaaS) environment built on top of Amazon Web Services (AWS). Again, good choice. AWS is an obvious first place to look as they’re a leader in the cloud services space.

To read this article in full or to leave a comment, please click here

10 considerations for running WebRTC services on AWS

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.You want to embed real-time communications features into your website or mobile application for direct peer-to-peer communication and you’ve landed on WebRTC. That’s a great start.Now you realize that backend services are critical for building a robust solution. You are thinking about hosting your solution in the cloud, using an Infrastructure-as-a-Service (IaaS) environment built on top of Amazon Web Services (AWS). Again, good choice. AWS is an obvious first place to look as they’re a leader in the cloud services space.To read this article in full or to leave a comment, please click here

The end of net neutrality may begin in June of 2017

Yesterday, President-elect Donald Trump announced the appointment of Jeff Eisenach and Mark Jamison to the agency landing team responsible for the Federal Communication Commission (FCC). Fortune called Eisenbach and Jamison staunch opponents of net neutrality, and Re/Code said these appointments may end net neutrality. In addition, Jamison asked, “Do we need the FCC?” in an October 2016 blog post.To read this article in full or to leave a comment, please click here