Does your smartphone embarrass you?

Modern computer and internet technology is amazing, allowing us to do an incredible number of things that simple weren’t possible before, both individually and as part of larger organizations.But anyone who works with computer and mobile devices knows that everything isn’t perfect. Too often, computer systems are frustratingly hard to use. And now, the Nielsen Norman Group has identified a new problem stemming from sub-optimal user interfaces: computer-assisted embarrassment.Earlier this month, Susan Farrell described the phenomenon this way: “Smart devices have invaded our world and inserted themselves in almost every context of our existence. Their flaws and faulty interactions are no longer only theirs—they reflect badly on their users and embarrass them in front of others.”To read this article in full or to leave a comment, please click here

Intel Knights Landing Yields Big Bang For The Buck Jump

The long wait for volume shipments of Intel’s “Knights Landing” parallel X86 processors is over, and at the International Supercomputing Conference in Frankfurt, Germany is unveiling the official lineup of the Xeon Phi chips that are aimed at high performance computing and machine learning workloads alike.

The lineup is uncharacteristically simple for a Xeon product line, which tends to have a lot of different options turned on and off to meet the myriad requirements of features and price points that a diverse customer base usually compels Intel to support. Over time, the Xeon Phi lineup will become more complex, with

Intel Knights Landing Yields Big Bang For The Buck Jump was written by Timothy Prickett Morgan at The Next Platform.

How big data is changing the game for backup and recovery

It's a well-known fact in the IT world: Change one part of the software stack, and there's a good chance you'll have to change another. For a shining example, look no further than big data.First, big data shook up the database arena, ushering in a new class of "scale out" technologies. That's the model exemplified by products like Hadoop, MongoDB, and Cassandra, where data is distributed across multiple commodity servers rather than packed into one massive one. The beauty there, of course, is the flexibility: To accommodate more petabytes, you just add another inexpensive machine or two rather than "scaling up" and paying big bucks for a bigger mammoth.To read this article in full or to leave a comment, please click here

How big data is changing the game for backup and recovery

It's a well-known fact in the IT world: Change one part of the software stack, and there's a good chance you'll have to change another. For a shining example, look no further than big data.First, big data shook up the database arena, ushering in a new class of "scale out" technologies. That's the model exemplified by products like Hadoop, MongoDB, and Cassandra, where data is distributed across multiple commodity servers rather than packed into one massive one. The beauty there, of course, is the flexibility: To accommodate more petabytes, you just add another inexpensive machine or two rather than "scaling up" and paying big bucks for a bigger mammoth.To read this article in full or to leave a comment, please click here

Montreal wins Intelligent Community of the Year

COLUMBUS, Ohio -- Montreal, Quebec, was named “Intelligent Community of the Year” this week at the annual Intelligent Community Forum (ICF) Summit. In the face of economic decline and political scandals, Canada’s largest French-speaking city began its turnaround with a Smart City plan starting in 2011.The city, home to a 10th of Canada’s population, had endured trade losses, an eclipse of manufacturing, and years of separatist nostalgia. The new Montreal staked its future on a broader economic base of Information and Communications Technologies (ICT), aerospace, health sciences, and clean technologies. These sectors now field 6,250 companies with 10% of the region’s workforce.To read this article in full or to leave a comment, please click here

Montreal wins Intelligent Community of the Year

COLUMBUS, Ohio -- Montreal, Quebec, was named “Intelligent Community of the Year” this week at the annual Intelligent Community Forum (ICF) Summit. In the face of economic decline and political scandals, Canada’s largest French-speaking city began its turnaround with a Smart City plan starting in 2011.The city, home to a 10th of Canada’s population, had endured trade losses, an eclipse of manufacturing, and years of separatist nostalgia. The new Montreal staked its future on a broader economic base of Information and Communications Technologies (ICT), aerospace, health sciences, and clean technologies. These sectors now field 6,250 companies with 10% of the region’s workforce.To read this article in full or to leave a comment, please click here

Docker 1.12: Now with Built-in Orchestration!

Three years ago, Docker made an esoteric Linux kernel technology called containerization simple and accessible to everyone.  Today, we are doing the same for container orchestration. 

Container orchestration is what is needed to transition from deploying containers individually on a single host, to deploying complex multi-container apps on many machines. It requires a distributed platform, independent from infrastructure, that stays online through the entire lifetime of your application, surviving hardware failure and software updates. Orchestration is at the same stage today as containerization was 3 years ago.  There are two options: either you need an army of technology experts to cobble together a complex ad hoc system, or you have to rely on a company with a lot of experts to take care of everything for you as long as you buy all hardware, services, support, software from them. There is a word for that, it’s called lock-in.

Docker users have been sharing with us that neither option is acceptable. Instead, you need a platform that makes orchestration usable by everyone, without locking you in. Container orchestration would be easier to implement, more portable, secure, resilient, and faster if it was built into the platform.

Starting with Docker 1.12, Continue reading

Announcing the Docker for Mac and Windows Public Beta

Back in March, we launched a private beta for a new ambitious project called Docker for Mac and Docker for Windows. Our major goal was to bring a native Docker experience to Mac and Windows, making it easier for developers to work with Docker in their own environments. And thousands agreed. Over thirty thousand applied in the first 24 hours. And by last week, we let in over seventy thousand.

And now all you need to get started developing is Docker and a text editor. No more installing dependencies and runtimes just to debug applications.

Continue reading

Introducing the Docker for AWS and Azure Beta

Today, we’re excited to announce Docker for AWS and Docker for Azure: the best ways to install, configure and maintain Docker deployments on AWS and Azure.

Our goals for Docker for AWS and Azure are the same as for Docker for Mac and Windows:

  • Deploy a standard Docker platform to ensure teams can seamlessly move apps from developer laptops to Docker staging and production environments, without risk of incompatibilities or lock-in.
  • Integrate deeply with underlying infrastructure to make sure Docker takes advantage of the host environment’s native capabilities and exposes a familiar interface to administrators.   
  • Deploy the Docker platform to all the places where you want to run containerized apps, simply and efficiently and at no extra cost.
  • Make sure the latest and greatest Docker versions are available for the hardware, OSs, and infrastructure you love, and provide solid upgrade paths from one Docker version to the next.

Continue reading

Introducing Experimental Distributed Application Bundles

The built-in orchestration features announced today with Docker 1.12 will revolutionize how IT teams build, ship and run containerized apps. With Docker 1.12, developers and ops now share a set of simple and powerful APIs, tools, and formats for building agile delivery pipelines that ship software from development through CI to production in the cloud with Docker for AWS and Azure.

To facilitate that revolution, we’re introducing Distributed Application Bundles—an experimental open file format for bundling up all the artifacts required to ship and deploy multi-container apps: a DAB contains a description of all the services required to run the application and details images to use, ports to expose, and the networks used to link services.

Continue reading

The Technology Behind Apple Photos and the Future of Deep Learning and Privacy

There’s a war between two visions of how the ubiquitous AI assisted future will be rendered: on the cloud or on the device. And as with any great drama it helps the story along if we have two archetypal antagonists. On the cloud side we have Google. On the device side we have Apple. Who will win? Both? Neither? Or do we all win?

If you would have asked me a week ago I would have said the cloud would win. Definitely. If you read an article like Jeff Dean On Large-Scale Deep Learning At Google you can’t help but be amazed at what Google is accomplishing. Impressive. Wide ranging. Smart. Systematic. Dominant.

Apple has been largely absent from the trend of sprinkling deep learning fairy dust on their products. This should not be all that surprising. Apple moves at their own pace. Apple doesn’t reach for early adopters, they release a technology when it’s a win for the mass consumer market.

There’s an idea because Apple is so secretive they might have hidden away vast deep learning chops we don’t even know about yet. We, of course, have no way of knowing.

What may prove more true is that Continue reading

IDG Contributor Network: Dude, where’s my phone? BYOD means enterprise security exposure

Sally called the security desk. She can’t find her personal smartphone. Maybe she lost it. Perhaps it fell behind her sofa. Maybe she left it at a restaurant last night. Perhaps someone stole it. Or maybe she put it down somewhere this morning.Whatever the case may be, it's not good—especially since Sally is a well-regarded and trusted mid-level manager with mobile access to many corporate applications and intranet sites that have a lot of sensitive and proprietary information.Now what?There are several types of dangers presented by a lost Bring Your Own Device (BYOD) smartphone or tablet, and many IT professionals and security specialists think only about some of them. They are all problematic. We’ll run through some of the scenarios in a moment, but first: Does your company have policies about lost personal devices?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Dude, where’s my phone? BYOD means enterprise security exposure

Sally called the security desk. She can’t find her personal smartphone. Maybe she lost it. Perhaps it fell behind her sofa. Maybe she left it at a restaurant last night. Perhaps someone stole it. Or maybe she put it down somewhere this morning.Whatever the case may be, it's not good—especially since Sally is a well-regarded and trusted mid-level manager with mobile access to many corporate applications and intranet sites that have a lot of sensitive and proprietary information.Now what?There are several types of dangers presented by a lost Bring Your Own Device (BYOD) smartphone or tablet, and many IT professionals and security specialists think only about some of them. They are all problematic. We’ll run through some of the scenarios in a moment, but first: Does your company have policies about lost personal devices?To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT decision making improved with impact-sourced human experts

Drowning in data is a real hazard with the Internet of Things (IoT). How should decisions be made with this flood of sensor data? A hybrid approach combining human intelligence and computing power works well. People are good at making decisions that require nuance and judgement, such as identifying hate speech in online postings. Computerized analytics is better at quickly processing large volumes of data. How do you combine the human thought-making process with the scalability of computing power? In machine learning, this is called supervised learning, where a computer program is taught to "mimic" the thought making-process of a human expert. To read this article in full or to leave a comment, please click here

The 10 most powerful supercomputers in the world

Looking like the world’s most important and uncomfortable furniture…It’s the six-month anniversary of the last list, which means it’s time for a new one. Terrible shelf-life, these supercomputer lists, but that means there’s a whole new hierarchy of unfathomably powerful computing machines ranked by Top500.org for our ooh-ing and aah-ing pleasure. Here’s a look at the top 10.To read this article in full or to leave a comment, please click here

The 10 most powerful supercomputers in the world

Looking like the world’s most important and uncomfortable furniture…It’s the six-month anniversary of the last list, which means it’s time for a new one. Terrible shelf-life, these supercomputer lists, but that means there’s a whole new hierarchy of unfathomably powerful computing machines ranked by Top500.org for our ooh-ing and aah-ing pleasure. Here’s a look at the top 10.To read this article in full or to leave a comment, please click here

Windows 10 Anniversary Update: A guide to the builds

This summer, one year after the initial launch of Windows 10, Microsoft will release its first major update: the Windows 10 Anniversary Update. It will be delivered in the usual way -- via Windows Update -- and will install automatically on its own.However, if you're curious (or apprehensive) about the upcoming update, you don't have to wait until the final release date to check it out. Microsoft has been releasing public preview builds, each one a little bit closer to the final version. Anyone can get and install those builds by first becoming part of Microsoft's Windows Insider Program, then joining what's called the Fast Ring.To read this article in full or to leave a comment, please click here