Nvidia Sees Massive Potential in Data Center AI
Deep learning isn't just for supercomputers any more.
Deep learning isn't just for supercomputers any more.
Docker will be presenting at Tech Field Day 12, and you can sit in on the sessions – at least virtually.
Tech Field Day is an opportunity for IT practitioners to hear from some of the leading technology companies, and Docker is excited to be participating again. Many thanks to Stephen Foskett and Tom Hollingsworth for cultivating a vibrant community of technical leaders and evangelists and inviting us to participate. Looking forward to meeting more of the delegates.
Our session will be Wednesday, November 16th, from 4:30 to 6:30pm Pacific. We have a full slate of topics including:
Today on Packet Pushers, we talk to our sponsor ThousandEyes about their new product, Endpoint Agent, which resides on employee desktops and laptops and provides detailed insight into network and application performance, including SaaS apps. The post Show 314: ThousandEyes Endpoint Agent & Network Intelligence (Sponsored) appeared first on Packet Pushers.
We collect the top expert content in the infrastructure community and fire it along the priority queue.
IT organizations can regain control and help lead corporate digital transformation efforts by focusing on business assurance.
During our summer team-building podcast we agreed it would be fun to record a few episodes along the “how do I become a programmer” theme and figured out that Elisa Jasinska would be a perfect first candidate.
A few weeks ago we finally got together and started our chat with campfire stories remembering how we got started with networking and programming.
Read more ...How Does Internet Work - We know what is networking
Quantum cryptography is a new technique of securing computer network communication channel. Existing standard crypto systems are using advanced algorithms to create key pairs which are extremely hard to inverse engineer. Quantum cryptography avoids any mathematical algorithm and uses principles of quantum physics. Quantum crypto implements a new technique of generating and exchanging crypto keys which makes it impossible for third party entities to get those keys by snooping or to create man in the middle by snooping and sending copies of original key. Keys generated in this way will automatically destroy themselves if read by third-party interferer. When generated between two sides, using quantum key distribution, secret keys will
Report shows that for the first time in five years, enterprise networks are getting younger.
These facilities will account for 53 percent of traffic by 2020.