It already has a built-in customer base for this offering.
I have one remaining copy of my latest book from the initial ten Addison-Wesley sent me on publication… What I’ve decided to do is sign it and give it away to one of my readers. What’s the catch? There are actually two.
First, you have to go to the contact form and leave me feedback with three design concepts (or other interesting things) you’d like to see me write about on this blog. I won’t do “how to configure” type articles, as I think there’s enough of that around on the ‘web. It’s useful stuff, but it’s not my “thing.”
Second, I can’t ship this thing out of the US.
I’ll ship the book, after I’ve signed it, to the person with the three best questions.
The post Giveaway: Navigating Network Complexity appeared first on 'net work.
SDxCentral recently interviewed Red Hat's General Manager of OpenStack, Radhesh Balakrishnan, and discussed the meaning of carrier grade in the NFV world and the importance of working with the open source communities.
This page is just a place to collect different resources I’ve found as I explore Machine Learning and it’s application specially to networking analytics, infrastructure, control/management plane feedback loops and generally just geeking out on technology and math. It’s pretty amazing stuff if you haven’t gotten into it.
This is an incomplete list and I’ll continue adding to it as I get time. Feel free to share links if you’ve got any you found useful!
Primer
Youtube video – low on math youtu.be/b99UVkWzYTQ < thanks to Jon Hudson for this!
Dave Meyer’s Presentation from the DevOps4Networking forum March 2016
Coursera Machine Learning Specialization using R programming language from John Hopkins Univeristy
Coursera Machine Learning Specialization using Python programming language from University of Washington
Khan Academy has been a great source to fill in some of the gaps around Calculus, Regression, Statistics, etc…
This quote is from Jeff Dean, currently a Wizard, er, Fellow in Google’s Systems Infrastructure Group. It’s taken from his recent talk: Large-Scale Deep Learning for Intelligent Computer Systems.
Since AlphaGo vs Lee Se-dol, the modern version of John Henry’s fatal race against a steam hammer, has captivated the world, as has the generalized fear of an AI apocalypse, it seems like an excellent time to gloss Jeff’s talk. And if you think AlphaGo is good now, just wait until it reaches beta.
Jeff is referring, of course, to Google’s infamous motto: organize the world’s information and make it universally accessible and useful.
Historically we might associate ‘organizing’ with gathering, cleaning, storing, indexing, reporting, and searching data. All the stuff early Google mastered. With that mission accomplished Google has moved on to the next challenge.
Now organizing means understanding.
Some highlights from the talk for me:
Real neural networks are composed of hundreds of millions of parameters. The skill that Google has is in how to build and rapidly train these huge models on large interesting datasets, Continue reading
DPDK is now the open source framework for high-performance packet processing.
What does it mean for an application to be “cloud-native”? The Datanauts and guest Tony Bourke dive into the fundamentals of applications designed to live in the cloud.
The post Datanauts 027: What Is A Cloud-Native Application? appeared first on Packet Pushers.
What does it mean for an application to be “cloud-native”? The Datanauts and guest Tony Bourke dive into the fundamentals of applications designed to live in the cloud.
The post Datanauts 027: What Is A Cloud-Native Application? appeared first on Packet Pushers.
The debate on encryption has heated up significantly in the last couple of months. Most of the recent discussion has revolved around a particular device in a specific case but encryption is older than that. Modern encryption systems represent the culmination of centuries of development of making sure things aren’t seen.
Did you know that twenty years ago the U.S. Government classified encryption as a munition? Data encryption was classified as a military asset and placed on the U.S. Munitions List as an auxiliary asset. The control of encryption as a military asset meant that exporting strong encryption to foreign countries was against the law. For a number of years the only thing that could be exported without fear of legal impact was regular old Data Encryption Standard (DES) methods. Even 3DES, which is theoretically much stronger but practically not much better than it’s older counterpart, was restricted for export to foreign countries.
While the rules around encryption export have been relaxed since the early 2000s, there are still some restrictions in place. Those rules are for countries that are on U.S. Government watch lists for terror states or governments deemed “rogue” states. Continue reading
Tom Hollingsworth delves into puzzling aspects of the initial rulings in Cisco’s lawsuit against rival Arista.