5 things containers need to win the enterprise

5 things containers need to win the enterpriseImage by PexelsContainer technology like Docker and CoreOS is growing in popularity as companies to realize the benefits of the flexible service and application delivery platform they offer. But the technology is not without its challenges in the enterprise.To read this article in full or to leave a comment, please click here

Nvidia GPU-powered autonomous car teaches itself to see and steer

During the past nine months, an Nvidia engineering team built a self-driving car with one camera, one Drive-PX embedded computer and only 72 hours of training data. Nvidia published an academic preprint of the results of the DAVE2 project entitled End to End Learning for Self-Driving Cars on arXiv.org hosted by the Cornell Research Library.The Nvidia project called DAVE2 is named after a 10-year-old Defense Advanced Research Projects Agency (DARPA) project known as DARPA Autonomous Vehicle (DAVE). Although neural networks and autonomous vehicles seem like a just-invented-now technology, researchers such as Google’s Geoffrey Hinton, Facebook’s Yann Lecune and the University of Montreal’s Yoshua Bengio have collaboratively researched this branch of artificial intelligence for more than two decades. And the DARPA DAVE project application of neural network-based autonomous vehicles was preceded by the ALVINN project developed at Carnegie Mellon in 1989. What has changed is GPUs have made building on their research economically feasible.To read this article in full or to leave a comment, please click here

Thumb PC uses Google software to give computer vision to robots and drones

A new USB stick computer uses Google's machine-learning software to give drones and robots the equivalent of a human eye, and add new smarts to cameras.Movidius’ Fathom Neural Compute Stick isn't your conventional PC. It is instead designed to analyze pixels and provide the right context for images.Fathom provides the much-needed horsepower for devices like drones, robots and cameras to run computer vision applications like image recognition. These devices alone typically don't have the ability to run computer vision applications.Fathom uses an embedded version of Google's TensorFlow machine learning software for vision processing. The device can be plugged into the USB port of a device or a developer board like Raspberry Pi, which in turn can power a drone or robot. It needs a 64-bit Linux OS and 50MB of hard drive space.To read this article in full or to leave a comment, please click here

Cisco SF250, SG250, SF350, SG350, SG350XG, and SG550XG series switches

Software version 2.1.0 adds sFlow support to Cisco 250 Series Smart Switches, 350 Series Smart Switches and 550X Series Stackable Managed Switches.
Cisco network engineers might not be familiar with the multi-vendor sFlow technology since it is a relatively new addition to Cisco products. The article, Cisco adds sFlow support, describes some of the key features of sFlow and contrasts them to Cisco NetFlow.
Configuring sFlow on the switches is straightforward. For example, The following commands configure a switch to sample packets at 1-in-1024, poll counters every 30 seconds and send sFlow to an analyzer (10.0.0.50) over UDP using the default sFlow port (6343):
sflow receiver 1 10.0.0.50
For each interface:
sflow flow-sampling 1024 1
sflow counter-sampling 30 1
A previous posting discussed the selection of sampling rates. Additional information can be found on the Cisco web site.

Trying out sFlow offers suggestions for getting started with sFlow monitoring and reporting. The article recommends the sFlowTrend analyzer as a way to get started since it is a free, purpose built sFlow analyzer that delivers the full capabilities of sFlow instrumentation in the Cisco switches.

How Walmart Canada’s responsive redesign boosted conversions by 20%: a case Study

With conversion optimization on the rise, it is a great idea to look into case studies which help you learn and adopt them to your personal needs positively. To find the material on conversion optimization you need from case studies, here are some few pointers:

  • Find out which case studies reflect your situation currently in business and your future aspirations.
  • Find out why a certain aspect of a case study worked and how to adopt it to specifically address your website’s needs.
  • Ensure you keep the references of your case study in order to go back to them when you need them.
Find out which case studies reflect your situation currently in business and your future aspirations.
Find out why a certain aspect of a case study worked and how to adopt it to specifically address your website’s needs.
Ensure you keep the references of your case study in order to go back to them when you need them.

Find out which case studies reflect your situation currently in business and your future aspirations.Find out why a certain aspect of a case study worked and how to adopt it to specifically address your website’s needs.Ensure you keep the Continue reading

Meet the man behind Ubuntu MATE

Thus far, in my journey to interview the leaders of every major Linux distribution, I’ve talked with the people behind Ubuntu, elementary, Fedora and openSUSE. This time around, I talk with Martin Wimpress—the man behind Ubuntu MATE.To read this article in full or to leave a comment, please click here

Meet the man behind Ubunto MATE

Thus far, in my journey to interview the leaders of every major Linux distribution, I’ve talked with the people behind Ubuntu, elementary, Fedora and openSUSE. This time around, I talk with Martin Wimpress—the man behind Ubuntu MATE.To read this article in full or to leave a comment, please click here

Quantifying Benefits of Network Virtualization in the Data Center

vmware-nv-in-the-data-center-business-insights Network virtualization for the data center promises to improve service agility, simplify network operations, and reduce capital expenditures. One of the biggest challenges for IT professionals is to quantify the return-on-investment required to justify the costs of network virtualization and the changes it requires in their data center network operations.

OSI Model…moving up-and-down the stack

Hello everyone!
I recently received an email from a learner who is studying for his CCNA Routing-and-Switching Certification and he had a few excellent questions about the OSI model and how, exactly data moves from one-layer to the next. I figured my response might prove valuable to others studying for their CCNA so…here it is!
…..

  1. Learner-Question: In video of the osi model, you said that the session layer should provide the source and destination port number but the fields of those ports are at the transport header- my question is how does the session layer put this number on field which does not exist in that time (when i send the date the encapsulation process goes down from the app layer)?

    In order to thoroughly answer all of your questions below, one really needs to know about computer programming, APIs, etc…which frankly, I know very little about. But what I do know, I’ll try to explain. From my understanding, there are some kind of software “links” or “hooks” which are used to allow a program at one layer of the OSI model to communicate with a program at another layer. Many applications have software built-in that provide multi-layer functionality. Continue reading

Oracle sets its sights on engineering and construction with Textura buy

Oracle is spending $663 million to buy Textura, a company that offers cloud services for the engineering and construction industry.Textura's products will be combined with Oracle's existing Primavera project-management suite -- the result of a 2008 acquisition by the database giant -- in the Oracle Engineering and Construction Global Business Unit, Oracle announced on Thursday. The focus of that unit will be offering a comprehensive cloud-based project control and execution platform that manages all phases of engineering and construction projects."The increasingly global engineering and construction industry requires digital modernization in a way that automates manual processes and embraces the power of cloud computing to easily connect the construction job site, reduce cost overruns and improve productivity," said Mike Sicilia, a senior vice president at Oracle who will lead the newly expanded business unit.To read this article in full or to leave a comment, please click here

ISIS cyberattack capabilities are unorganized, underfunded — for now

The U.S. and its allies should be concerned about cyberattacks from ISIS-affiliated groups, but the hackers are poorly organized and likely underfunded, at least in the short term, according to a new report.Several pro-ISIS hacking groups announced this month they are joining together to form the United Cyber Caliphate, but the groups seem to have limited abilities, according to a report from security intelligence research group Flashpoint. Still, with new coordination, "even limited success could inflate their notoriety and enable  them to continue to grow their capabilities and attract talent," Flashpoint said.To read this article in full or to leave a comment, please click here

ISIS cyberattack capabilities are unorganized, underfunded — for now

The U.S. and its allies should be concerned about cyberattacks from ISIS-affiliated groups, but the hackers are poorly organized and likely underfunded, at least in the short term, according to a new report.Several pro-ISIS hacking groups announced this month they are joining together to form the United Cyber Caliphate, but the groups seem to have limited abilities, according to a report from security intelligence research group Flashpoint. Still, with new coordination, "even limited success could inflate their notoriety and enable  them to continue to grow their capabilities and attract talent," Flashpoint said.To read this article in full or to leave a comment, please click here

Estonian man gets over 7 years in prison for role in global DNS hijacking botnet

An Estonian man has been sentenced to seven years and three months in prison in the U.S. for his role in a cybercriminal operation that infected over 4 million computers with DNS hijacking malware.Vladimir Tsastsin, 35, from Tartu, Estonia, was one of the key players in a US$14 million click fraud scheme. He is the sixth individual to be sentenced in the case and has received the longest prison sentence. The sentence was handed down Tuesday in U.S. District Court for the Southern District of New York.According to the Department of Justice, between 2007 and 2011, Tsastsin and his co-conspirators set up companies that masqueraded as publisher networks and entered into agreements with advertising brokers to display ads on their properties.To read this article in full or to leave a comment, please click here

Estonian man gets over 7 years in prison for role in global DNS hijacking botnet

An Estonian man has been sentenced to seven years and three months in prison in the U.S. for his role in a cybercriminal operation that infected over 4 million computers with DNS hijacking malware.Vladimir Tsastsin, 35, from Tartu, Estonia, was one of the key players in a US$14 million click fraud scheme. He is the sixth individual to be sentenced in the case and has received the longest prison sentence. The sentence was handed down Tuesday in U.S. District Court for the Southern District of New York.According to the Department of Justice, between 2007 and 2011, Tsastsin and his co-conspirators set up companies that masqueraded as publisher networks and entered into agreements with advertising brokers to display ads on their properties.To read this article in full or to leave a comment, please click here