AT&T moves service assurance to the cloud.
For me and for most of Mobile broadband professionals, we are used to meeting the Telco Vendors such as Ericsson, Huawei, Cisco, Nokia, etc. It was a mind-shift for me personally when I started to meet RedHat, Mirantis, & Vmware as a part of the NFV talks and I was really surprised that a company like RedHat […]
The post Mobile Broadband – Trending Technologies appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.
IHS says operators will use a variety of suppliers to avoid being locked in by a vendor.
Learn how to make Cisco voice or video interoperate with Microsoft Skype for Business.
Odds are the company will pick another Swede.
Black Duck's technology scans a software repository, checking for license-compliance issues and known vulnerabilities.
It all comes back to people. People are the users of the system. They are the source of great imagination and great innovation. They are also the reason why security professionals pull their hair out day in and day out. Because computer systems don’t have the capability to bypass, invalidated, and otherwise screw up security quite like a living, breathing human being.
Security is designed to make us feel safe. Door locks keep out casual prowlers. Alarm systems alert us when our home or business is violated. That warm fuzzy feeling we get when we know the locks are engaged and we are truly secure is one of bliss.
But when security gets in our way, it’s annoying. Think of all the things in your life that would be easier if people just stopped trying to make you secure. Airport security is the first that comes to mind. Or the annoying habit of needing to show your ID when you make a credit card purchase. How about systems that scan your email for data loss prevention (DLP) purposes and kick back emails with sensitive data that you absolutely need to share?
Security only benefits us when it’s Continue reading
There's a meme out there that hardware is dead. Maybe not. Hardware is becoming more specialized as the general purpose CPU can't keep up. The tick-tock cycle created by Moore's law meant designers had a choice: build or buy. Make your own hardware to deep inspect 1gps of network traffic (for example) and release later or use an off-the-shelf CPU and release sooner.
Now in the anarchy of a Moore's lawless it looks like build is back. Jeff Dean is giving a talk at #scaledmlconf where he talks about this trend at Google.
CPU@jackclarkSF: Jeff Dean says Google can run its full Inception' v3 image model on a phone at about 6fps. And specialized ASICs are coming.
And Mo Patel captured this slide from the talk:
The post Worth Reading: One second warning appeared first on 'net work.