Next Page: 10000

          VovSoft VoV Log Analyzer 1.4      Cache   Translate Page      
VovSoft VoV Log Analyzer 1.4
VovSoft VoV Log Analyzer 1.4 | 2.3 Mb

In computing, a log file is a file that records either events that occur in an operating system or other software runs, or messages between different users of a communication software. Logging is the act of keeping a log.


          In mobile cyberwar, attackers prefer to phish rather than send malware      Cache   Translate Page      

Cyberattackers are changing how they target victims through email scams. Rather than sending malicious emails embedded with malware, attackers are now using social engineering, like phishing campaigns, to extract information.

The post In mobile cyberwar, attackers prefer to phish rather than send malware appeared first on Digital Trends.


          How to download and install the MacOS Mojave public beta      Cache   Translate Page      

The newest version of MacOS, called Mojave won't be available until September 24th for all users, but early adopters can sign up to be a beta tester and try Mojave today through Apple's beta program. We'll show you how.

The post How to download and install the MacOS Mojave public beta appeared first on Digital Trends.


          MacOS Mojave officially launches on September 24      Cache   Translate Page      

Apple announced that users will be able to download MacOS Mojave on September 24 to take advantage of the new night mode. This is the first time that the OS will be available to users outside of Apple's beta program.

The post MacOS Mojave officially launches on September 24 appeared first on Digital Trends.


          Diagnosing Heart Diseases with Deep Neural Networks      Cache   Translate Page      

The Second National Data Science Bowl, a data science competition where the goal was to automatically determine cardiac volumes from MRI scans, has just ended. We participated with a team of 4 members from Ghent University and finished 2nd!

The team kunsthart (artificial heart in English) consisted of Ira Korshunova, Jeroen Burms, Jonas Degrave, 3 PhD students, and professor Joni Dambre. It’s also a follow-up of last year’s team ≋ Deep Sea ≋, which finished in first place for the First National Data Science Bowl.

Overview

This blog post is going to be long, here is a clickable overview of different sections.

Introduction

The problem

The goal of this year’s Data Science Bowl was to estimate minimum (end-systolic) and maximum (end-diastolic) volumes of the left ventricle from a set of MRI-images taken over one heartbeat. These volumes are used by practitioners to compute an ejection fraction: fraction of outbound blood pumped from the heart with each heartbeat. This measurement can predict a wide range of cardiac problems. For a skilled cardiologist analysis of MRI scans can take up to 20 minutes, therefore, making this process automatic is obviously useful.

Unlike the previous Data Science Bowl, which had very clean and voluminous data set, this year’s competition required a lot more focus on dealing with inconsistencies in the way the very limited number of data points were gathered. As a result, most of our efforts went to trying out different ways to preprocess and combine the different data sources.

The data

The dataset consisted of over a thousand patients. For each patient, we were given a number of 30-frame MRI videos in the DICOM format, showing the heart during a single cardiac cycle (i.e. a single heartbeat). These videos were taken in different planes including the multiple short-axis views (SAX), a 2-chamber view (2Ch), and a 4-chamber view (4Ch). The SAX views, whose planes are perpendicular to the long axis of the left ventricle, form a series of slices that (ideally) cover the entire heart. The number of SAX slices ranged from 1 to 23. Typically, the region of interest (ROI) is only a small part of the entire image. Below you can find a few of SAX slices and Ch2, Ch4 views from one of the patients. Red circles on the SAX images indicate the ROI’s center (later we will explain how to find it), for Ch2 and Ch4 they specify the location of SAX slices projected on the corresponding view.

sax_5 sax_9 sax_10 sax_11 sax_12 sax_15
2Ch 4Ch

The DICOM files also contained a bunch of metadata. Some of the metadata fields, like PixelSpacing and ImageOrientationm were absolutely invaluable to us. The metadata also specified patient’s age and sex.

For each patient in the train set, two labels were provided: the systolic volume and the diastolic volume. From what we gathered (link), these were obtained by cardiologists by manually performing a segmentation on the SAX slices, and feeding these segmentations to a program that computes the minimal and maximal heart chamber volumes. The cardiologists didn’t use the 2Ch or 4Ch images to estimate the volumes, but for us they proved to be very useful.

Combining these multiple data sources can be difficult, however for us dealing with inconsistencies in the data was more challenging. Some examples: the 4Ch slice not being provided for some patients, one patient with less than 30 frames per MRI video, couple of patients with only a handful of SAX slices, patients with SAX slices taken in weird locations and orientations.

The evaluation

Given a patient’s data, we were asked to output a cumulative distribution function over the volume, ranging from 0 to 599 mL, for both systole and diastole. The models were scored by a Continuous Ranked Probability Score (CRPS) error metric, which computes the average squared distance between the predicted CDF and a Heaviside step function representing the real volume.

An additional interesting novelty of this competition was the two stage process. In the first stage, we were given a training set of 500 patients with a public test set of 200 patients. In the final week we were required to submit our model and afterwards the organizers released the test data of 440 patients and labels for 200 patients from the public test set. We think the goal was to compensate for the small dataset and prevent people from optimizing against the test set through visual inspection of every part of their algorithm. Hand-labeling in the first stage was allowed on the training dataset only, for the second stage it was also allowed for 200 validation patients.

The solution: traditional image processing, convnets, and dealing with outliers

In our solution, we combined traditional image processing approaches, which find the region of interest (ROI) in each slice, with convolutional neural networks, which perform the mapping from the extracted image patches to the predicted volumes. Given the very limited number of training samples, we tried combat overfitting by restricting our models to combine the different data sources in predefined ways, as opposed to having them learn how to do the aggregation. Unlike many other contestants, we performed no hand-labelling .

Pre-processing and data augmentation

The provided images have varying sizes and resolutions, and do not only show the heart, but the entire torso of the patient. Our preprocessing pipeline made the images ready to be fed to a convolutional network by going through the following steps:

  • applying a zoom factor such that all images have the same resolution in millimeters
  • finding the region of interest and extracting a patch centered around it
  • data augmentation
  • contrast normalization

To find the correct zooming factor, we made use of the PixelSpacing metadata field, which specifies the image resolution. Further we will explain our approach to ROI detection and data augmentation.

Detecting the Region Of Interest through image segmentation techniques

We used classical computer vision techniques to find the left ventricle in the SAX slices. For each patient, the center and width of the ROI were determined by combining the information of all the SAX slices provided. The figure below shows an example of the result.

ROI extraction steps
ROI extraction steps

First, as was suggested in the Fourier based tutorial, we exploit the fact that each slice sequence captures one heartbeat and use Fourier analyses to extract an image that captures the maximal activity at the corresponding heartbeat frequency (same figure, second image).

From these Fourier images, we then extracted the center of the left ventricle by combining the Hough circle transform with a custom kernel-based majority voting approach across all SAX slices. First, for each fourier image (resulting from a single sax slice), the highest scoring Hough circles for a range of radii were found, and from all of those, the highest scoring ones were retained. , and the range of radii are metaparameters that severely affect the robustness of the ROI detected and were optimised manually. The third image in the figure shows an example of the best circles for one slice.

Finally, a ‘likelihood surface’ (rightmost image in figure above) was obtained by combining the centers and scores of the selected circles for all slices. Each circle center was used as the center for a Gaussian kernel, which was scaled with the circle score, and all these kernels were added. The maximum across this surface was selected as the center of the ROI. The width and height of the bounding box of all circles with centers within a maximal distance (another hyperparameter) of the ROI center were used as bounds for the ROI or to create an ellipsoidal mask as shown in the figure.

Given these ROIs in the SAX slices, we were able to find the ROIs in the 2Ch and 4Ch slices by projecting the SAX ROI centers onto the 2Ch and 4Ch planes.

Data augmentation

As always when using convnets on a problem with few training examples, we used tons of data augmentation. Some special precautions were needed, since we had to preserve the surface area. In terms of affine transformations, this means that only skewing, rotation and translation was allowed. We also added zooming, but we had to correct our volume labels when doing so! This helped to make the distirbution of labels more diverse.

Another augmentation here came in the form of shifting the images over the time axis. While systole was often found in the beginning of a sequence, this was not always the case. Augmenting this, by rolling the image tensor over the time axis, made the resulting model more robust against this noise in the dataset, while providing even more augmentation of our data.

Data augmentation was applied during the training phase to increase the number of training examples. We also applied the augmentations during the testing phase, and averaged predictions across the augmented versions of the same data sample.

Network architectures

We used convolutional neural networks to learn a mapping from the extracted image patches to systolic and diastolic volumes. During the competition, we played around a lot with both minor and major architectural changes. Our base architecture for most of our models was based on VGG-16.

As we already mentioned, we trained different models which can deal with different kinds of patients. There are roughly four different kinds of models we trained: single slice models, patient models, 2Ch models and 4Ch models.

Single slice models

Single slice models are models that take a single SAX slice as an input, and try to predict the systolic and diastolic volumes directly from it. The 30 frames were fed to the network as 30 different input channels. The systolic and diastolic networks shared the convolutional layers, but the dense layers were separated. The output of the network could be either a 600-way softmax (followed by a cumulative sum), or the mean and standard deviation of a Gaussian (followed by a layer computing the cdf of the Gaussian).

Although these models obviously have too little information to make a decent volume estimation, they benefitted hugely from test-time augmentation (TTA). During TTA, the model gets slices with different augmentations, and the outputs are averaged across augmenations and slices for each patient. Although this way of aggregating over SAX slices is suboptimal, it proved to be very robust to the relative positioning of the SAX slices, and is as such applicable to all patients.

Our single best single slice model achieved a local validation score of 0.0157 (after TTA), which was a reliable estimate for the public leaderboard score for these models. The approximate architecture of the slice models is shown on the following figure.

2Ch and 4Ch models

These models have a much more global view on the left ventricle of the heart than single SAX slice models. The 2Ch models also have the advantage of being applicable to every patient. Not every patient had a 4Ch slice. We used the same VGG-inspired architecture for these models. Individually, they achieved a similar validation score (0.0156) as was achieved by averaging over multiple sax slices. By ensembling only single slice, 2Ch and 4Ch models, we were able to achieve a score of 0.0131 on the public leaderboard.

Patient models

As opposed to single slice models, patient models try to make predictions based on the entire stack of (up to 25) SAX slices. In our first approaches to these models, we tried to process each slice separately using a VGG-like single slice network, followed by feeding the results to an overarching RNN in an ordered fashion. However, these models tended to overfit badly. Our solution to this problem consists of a clever way to merge predictions from multiple slices. Instead of having the network learn how to compute the volume based on the results of the individual slices, we designed a layer which combines the areas of consecutive cross-sections of the heart using a truncated cone approximation.

Basically, the slice models have to estimate the area (and standard deviation thereof) of the cross-section of the heart in a given slice . For each pair of consecutive slices and , we estimate the volume of the heart between them as , where is the distance between the slices. The total volume is then given by .

Ordering the SAX slices and finding the distance between them was achieved through looking at the SliceLocation metadata fields, but this field was not very reliable in finding the distance between slices, neither was the SliceThickness. We looked for the two slices that were furthest apart, drew a line between them, and projected every other slice onto this line. This way, we estimated the distance between two slices ourselves.

Our best single model achieved a local validation score of 0.0105 using this approach. This was no longer a good leaderboard estimation, since our local validation set contained relatively few outliers compared to the public leaderboard in the first round. The model had the following architecture:

Layer Type Size Output shape
Input layer   (8, 25, 30, 64, 64)*
Convolution 128 filters of 3x3 (8, 25, 128, 64, 64)
Convolution 128 filters of 3x3 (8, 25, 128, 64, 64)
Max pooling   (8, 25, 128, 32, 32)
Convolution 128 filters of 3x3 (8, 25, 128, 32, 32)
Convolution 128 filters of 3x3 (8, 25, 128, 32, 32)
Max pooling   (8, 25, 128, 16, 16)
Convolution 256 filters of 3x3 (8, 25, 256, 16, 16)
Convolution 256 filters of 3x3 (8, 25, 256, 16, 16)
Convolution 256 filters of 3x3 (8, 25, 256, 16, 16)
Max pooling   (8, 25, 256, 8, 8)
Convolution 512 filters of 3x3 (8, 25, 512, 8, 8)
Convolution 512 filters of 3x3 (8, 25, 512, 8, 8)
Convolution 512 filters of 3x3 (8, 25, 512, 8, 8)
Max pooling   (8, 25, 512, 4, 4)
Convolution 512 filters of 3x3 (8, 25, 512, 4, 4)
Convolution 512 filters of 3x3 (8, 25, 512, 4, 4)
Convolution 512 filters of 3x3 (8, 25, 512, 4, 4)
Max pooling   (8, 25, 512, 2, 2)
Fully connected (S/D) 1024 units (8, 25, 1024)
Fully connected (S/D) 1024 units (8, 25, 1024)
Fully connected (S/D) 2 units (mu and sigma) (8, 25, 2)
Volume estimation (S/D)   (8, 2)
Gaussian CDF (S/D)   (8, 600)

* The first dimension is the batch size, i.e. the number of patients, the second dimension is the number of slices. If a patient had fewer slices, we padded the input and omitted the extra slices in the volume estimation.

Oftentimes, we did not train patient models from scratch. We found that initializing patient models with single slice models helps against overfitting, and severely reduces training time of the patient model.

The architecture we described above was one of the best for us. To diversify our models, some of the good things we tried include:

  • processing each frame separately, and taking the minimum and maximum at some point in the network to compute systole and diastole
  • sharing some of the dense layers between the systole and diastole networks as well
  • using discs to approximate the volume, instead of truncated cones
  • cyclic rolling layers
  • leaky RELUs
  • maxout units

One downside of the patient model approach was that these models assume that SAX slices nicely range from one end of the heart to the other. This was trivially not true for patients with very few (< 5) slices, but it was harder to detect automatically for some other outlier cases as in figure below, where something is wrong with the images or the ROI algorithm fails.

sax_12 sax_15 sax_17 sax_36 sax_37 sax_41
2Ch 4Ch

Training and ensembling

Error function. At the start of the competition, we experimented with various error functions, but we found optimising CRPS directly to work best.

Training algorithm. To train the parameters of our models, we used the Adam update rule (Kingma and Ba).

Initialization. We initialised all filters and dense layers orthogonally (Saxe et al.). Biases were initialized to small positive values to have more gradients at the lower layer in the beginning of the optimization. At the Gaussian output layers, we initialized the biases for mu and sigma such that initial predictions of the untrained network would fall in a sensible range.

Regularization. Since we had a low number of patients, we needed considerable regularization to prevent our models from overfitting. Our main approach was to augment the data and to add a considerable amount of dropout.

Validation

Since the trainset was already quite small, we kept the validation set small as well (83 patients). Despite this, our validation score remained pretty close to the leaderboard score. Also, in cases where it didn’t, it helped us identify issues in our models, namely problematic cases in the test set which were not represented in our validation set. We noticed for instance that quite some of our patient models had problems with patients with too few SAX slices (< 5).

Selectively train and predict

By looking more closely at the validation scores, we observed that most of the accumulated error was obtained by wrongly predicting only a couple of such outlier cases. At some point, being able to handle only a handful of these meant the difference between a leaderboard score of 0.0148 and 0.0132!

To mitigate such issues, we set up our framework such that each individual model could choose not to train on or predict a certain patient. For instance, models on patients’ SAX slices could choose not to predict patients with too few SAX slices, models which use the 4Ch slice would not predict for patients who don’t have this slice. We extended this idea further by developing expert models, which only trained and predicted for patients with either a small or a big heart (as determined by the ROI detection step). Further down the pipeline, our ensembling scripts would then take these non-predictions into account.

Ensembling and dealing with outliers

We ended up creating about 250 models throughout the competition. However, we knew that some of these models were not very robust to certain outliers or patients whose ROI we could not accurately detect. We came up with two different ensembling strategies that would deal with these kind of issues.

Our first ensembling technique followed the following steps:

  1. For each patient, we select the best way to average over the test time augmentations. Slice models often preferred a geometric averaging of distributions, whereas in general arithmetic averaging worked better for patient models.
  2. We average over the models by calculating each prediction’s KL-divergence from the average distribution, and the cross entropy of each single sample of the distribution. This means that models which are further away from the average distribution get more weight (since they are more certain). It also means samples of the distribution closer to the median-value of 0.5 get more weight. Each model also receives a model-specific weight, which is determined by optimizing these weights over the validation set.
  3. Since not all models predict all patients, it is possible for a model in the ensemble to not predict a certain patient. In this case, a new ensemble without these models is optimized, especially for this single patient. The method to do this is described in step 2.
  4. This ensemble is then used on every patient on the test-set. However, when a certain model’s average prediction disagrees too much with the average prediction of all models, the model is thrown out of the ensemble, and a new ensemble is optimized for this patient, as described in step 2. This meant that about ~75% of all patients received a new, ‘personalized’ ensemble.

Our second way of ensembling involves comparing an ensemble that is suboptimal, but robust to outliers, to an ensemble that is not robust to them. This approach is especially interesting, since it does not need a validation set to predict the test patients. It follows the following steps:

  1. Again, for each patient, we select the best way to average over the test time augmentations again.
  2. We combine the models by using a weighted average on the predictions, with the weights summing to one. These weights are determined by optimising them on the validation set. In case not all models provide a prediction for a certain patient, it is dropped for that patient and the weights of the other models are rescaled such that they again sum to one. This ensemble is not robust to outliers, since it contains patient models.
  3. We combine all 2Ch, 4Ch and slice models in a similar fashion. This ensemble is robust to outliers, but only contains less accurate models.
  4. We detect outliers by finding the patients where the two ensembles disagree the most. We measure disagreement using CRPS. If the CRPS exceeds a certain threshold for a patient, we assume it to be an outlier. We chose this threshold to be 0.02.
  5. We retrain the weights for the first ensemble, but omit the outliers from the validation set. We choose this ensemble to generate predictions for most of the patients, but choose the robust ensemble for the outliers.

Following this approach, we detected three outliers in the test set during phase one of the competition. Closer inspection revealed that for all of them either our ROI detection failed, or the SAX slices were not nicely distributed across the heart. Both ways of ensembling achieved similar scores on the public leaderboard. (0.0110)

Second round submissions

For the second round of the competition, we were allowed to retrain our models on the new labels (+ 200 patients). We were also allowed to plan two submissions. Of course, it was impossible to retrain all of our models during this single week. For this reason, we chose to only train our 44 best models, according to our ensembling scripts.

For our first submission, we splitted of a new validation set. The resulting models were combined using our first ensembling strategy.

For our second submission, we trained our models on the entire training set (i.e. there was no validation split). We assembled them using the second ensembling method. Since we had no validation set to optimise the weights of the ensemble, we computed the weights by training an ensemble on the models we trained with a validation split, and transferred them over.

Software and hardware

We used Lasagne, Python, Numpy and Theano to implement our solution, in combination with the cuDNN library. We also used PyCUDA for a few custom kernels. We made use of scikit-image for pre-processing and augmentation.

We trained our models on the NVIDIA GPUs that we have in the lab, which include GTX TITAN X, GTX 980, GTX 680 and Tesla K40 cards. We would like to thank Frederick Godin and Elias Vansteenkiste for lending us a few extra GPUs in the last week of the competition.

Conclusion

In this competition, we tried out different ways to preprocess data and combine information from different data sources, and thus, we learned a lot in this aspect. However, we feel that there is still a room for improvement. For example, we observed that most of our error still hails from a select group of patients. These include the ones for which our ROI extraction fails. In hindsight, hand-labeling the training data and training a network to do the ROI extraction would be a better approach, but we wanted to sidestep doing a lot of this kind of manual effort as much as possible. In the end, labeling the data would probably have been less time intensive.

UPDATE (March 23): the code is now available on GitHub: github.com/317070/kaggle-heart


          Google's AI Cloud Star Leaves After Pentagon Deal Protests      Cache   Translate Page      
Fei-Fei Li, chief scientist at Google’s cloud-computing division, is leaving after controversy over the use of the company’s artificial intelligence technology and a deal with the Pentagon. - Source: www.itprotoday.com
          Principal Business Development Manager, High Performance Computing - Amazon.com - Seattle, WA      Cache   Translate Page      
AWS is seeking a Business Development Manager (BDM) to support our Emerging Technology and High-Performance Computing (HPC) business....
From Amazon.com - Sun, 15 Jul 2018 19:26:48 GMT - View all Seattle, WA jobs
          Accounting Clerk - Gwinnett Place Honda - Duluth, GA      Cache   Translate Page      
The Accounting Clerk is responsible for computing, classifying, recording, and verifying numerical data for use in maintaining accounting records....
From Hendrick Automotive Group - Mon, 27 Aug 2018 23:32:40 GMT - View all Duluth, GA jobs
          Account Manager      Cache   Translate Page      
3- Should have at least 4 years sales experience within hi-tech industries such as communications or computing with at least two years experience in Account Management 8- (more) p Login for more job information and to Apply
          Senior Systems Engineer - AI Services - Amazon.com - Seattle, WA      Cache   Translate Page      
The Amazon Web Services team is innovating new ways of building massively scalable distributed systems and delivering the next generation of cloud computing...
From Amazon.com - Sun, 15 Jul 2018 20:48:54 GMT - View all Seattle, WA jobs
          Solutions Architect - Amazon Web Services - Amazon.com - San Francisco, CA      Cache   Translate Page      
DevOps, Big Data, Machine Learning, Serverless computing etc. High level of comfort communicating effectively across internal and external organizations....
From Amazon.com - Sun, 02 Sep 2018 07:30:50 GMT - View all San Francisco, CA jobs
          Sr. Solutions Architect - AWS - Amazon.com - San Francisco, CA      Cache   Translate Page      
DevOps, Big Data, Machine Learning, Serverless computing etc. High level of comfort communicating effectively across internal and external organizations....
From Amazon.com - Fri, 25 May 2018 19:20:02 GMT - View all San Francisco, CA jobs
          BigPanDA Experience on LCF and HPC for the ATLAS Experiment at the LHC and data intensive science      Cache   Translate Page      
The PanDA software is used for workload management on distributed grid resources by the ATLAS experiment at the LHC. An effort was launched to extend PanDA, called BigPanDA, to access HPC resources, funded by the US Department of Energy (DOE-ASCR). Through this successful effort, ATLAS today uses over 25 million hours monthly on the Titan supercomputer at Oak Ridge National Laboratory. Many challenges were met and overcome in using HPCs for ATLAS simulations. ATLAS uses two different operational modes at Titan. The traditional mode uses allocations - which require software innovations to fit the low latency requirements of experimental science. New techniques were implemented to shape large jobs using allocations on a leadership class machine. In the second mode, high priority work is constantly sent to Titan to backfill high priority leadership class jobs. This has resulted in impressive gains in overall utilization of Titan, while benefiting the physics objectives of ATLAS. For both modes, BigPanDA has integrated traditional grid computing with HPC architecture. This talk will summarize the innovations to successfully use Titan for LHC physics goals
          A Kazhdan-Lusztig algorithm for Whittaker modules. (arXiv:1809.03622v1 [math.RT])      Cache   Translate Page      

Authors: Anna Romanov

We study a category of Whittaker modules over a complex semisimple Lie algebra by realizing it as a category of twisted D-modules on the associated flag variety using Beilinson-Bernstein localization. The main result of this paper is the development of a geometric algorithm for computing the composition multiplicities of standard Whittaker modules. This algorithm establishes that these multiplicities are determined by a collection of polynomials we refer to as Whittaker Kazhdan-Lusztig polynomials. In the case of trivial nilpotent character, this algorithm specializes to the usual algorithm for computing multiplicities of composition factors of Verma modules using Kazhdan-Lusztig polynomials.


          Determinants of Interval Matrices. (arXiv:1809.03736v1 [math.NA])      Cache   Translate Page      

Authors: Jaroslav Horáček, Milan Hladík, Josef Matějka

In this paper we shed more light on determinants of interval matrices. Computing the exact bounds on a determinant of an interval matrix is an NP-hard problem. Therefore, attention is first paid to approximations. NP-hardness of both relative and absolute approximation is proved. Next, methods computing verified enclosures of interval determinants and their possible combination with preconditioning are discussed. A new method based on Cramer's rule was designed. It returns similar results to the state-of-the-art method, however, it is less consuming regarding computational time. As a byproduct, the Gerschgorin circles were generalized for interval matrices. New results about classes of interval matrices with polynomially computable tasks related to determinant are proved (symmetric positive definite matrices, class of matrices with identity midpoint matrix, tridiagonal H-matrices). The mentioned methods were exhaustively compared for random general and symmetric matrices.


          A note on reducing the computation time for minimum distance and equivalence check of binary linear codes. (arXiv:1809.03764v1 [cs.IT])      Cache   Translate Page      

Authors: Nikolay Yankov, Krassimir Enev

In this paper we show the usability of the Gray code with constant weight words for computing linear combinations of codewords. This can lead to a big improvement of the computation time for finding the minimum distance of a code. We have also considered the usefulness of combinatorial $2$-$(t,k,1)$ designs when there are memory limitations to the number of objects (linear codes in particular) that can be tested for equivalence.


          Computing the resolvent of the sum of operators with application to best approximation problems. (arXiv:1809.03921v1 [math.OC])      Cache   Translate Page      

Authors: Minh N. Dao, Hung M. Phan

We propose a flexible approach for computing the resolvent of the sum of weakly monotone operators in real Hilbert spaces. This relies on splitting methods where strong convergence is guaranteed. We also prove linear convergence under Lipschitz continuity assumption. The approach is then applied to computing the proximity operator of the sum of weakly convex functions, and particularly to finding the best approximation to the intersection of convex sets.


          Electrical Engineer - Myant - Etobicoke, ON      Cache   Translate Page      
Proficient with software such as Altium, Eagle, etc for circuit analysis/debugging and PCB design. At Myant, we are creating the world’s first textile computing...
From Myant - Tue, 04 Sep 2018 19:47:59 GMT - View all Etobicoke, ON jobs
          GIANT: Globally Improved Approximate Newton Method for Distributed Optimization. (arXiv:1709.03528v5 [cs.LG] UPDATED)      Cache   Translate Page      

Authors: Shusen Wang, Farbod Roosta-Khorasani, Peng Xu, Michael W. Mahoney

For distributed computing environment, we consider the empirical risk minimization problem and propose a distributed and communication-efficient Newton-type optimization method. At every iteration, each worker locally finds an Approximate NewTon (ANT) direction, which is sent to the main driver. The main driver, then, averages all the ANT directions received from workers to form a {\it Globally Improved ANT} (GIANT) direction. GIANT is highly communication efficient and naturally exploits the trade-offs between local computations and global communications in that more local computations result in fewer overall rounds of communications. Theoretically, we show that GIANT enjoys an improved convergence rate as compared with first-order methods and existing distributed Newton-type methods. Further, and in sharp contrast with many existing distributed Newton-type methods, as well as popular first-order methods, a highly advantageous practical feature of GIANT is that it only involves one tuning parameter. We conduct large-scale experiments on a computer cluster and, empirically, demonstrate the superior performance of GIANT.


          ROAST: Rapid Orthogonal Approximate Slepian Transform. (arXiv:1712.04613v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Zhihui Zhu, Santhosh Karnik, Michael B. Wakin, Mark A. Davenport, Justin Romberg

In this paper, we provide a Rapid Orthogonal Approximate Slepian Transform (ROAST) for the discrete vector that one obtains when collecting a finite set of uniform samples from a baseband analog signal. The ROAST offers an orthogonal projection which is an approximation to the orthogonal projection onto the leading discrete prolate spheroidal sequence (DPSS) vectors (also known as Slepian basis vectors). As such, the ROAST is guaranteed to accurately and compactly represent not only oversampled bandlimited signals but also the leading DPSS vectors themselves. Moreover, the subspace angle between the ROAST subspace and the corresponding DPSS subspace can be made arbitrarily small. The complexity of computing the representation of a signal using the ROAST is comparable to the FFT, which is much less than the complexity of using the DPSS basis vectors. We also give non-asymptotic results to guarantee that the proposed basis not only provides a very high degree of approximation accuracy in a mean squared error sense for bandlimited sample vectors, but also that it can provide high-quality approximations of all sampled sinusoids within the band of interest.


          Correcting Bias in Eigenvectors of Financial Covariance Matrices, Sep 19      Cache   Translate Page      
There is a source of bias in the sample eigenvectors of financial covariance matrices, when unchecked, distorts weights of minimum variance portfolios and leads to risk forecasts that are severely biased downward. Recent work with Lisa Goldberg and Alex Shkolnik develops an eigenvector bias correction. Our approach is distinct from the regularization and eigenvalue shrinkage methods found in the literature. We provide theoretical guarantees on the improvement our correction provides as well as estimation methods for computing the optimal correction from data.
          Counting graded lattices of rank three that have few coatoms. (arXiv:1804.03679v3 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Jukka Kohonen

We consider the problem of computing $R(c,a)$, the number of unlabeled graded lattices of rank $3$ that contain $c$ coatoms and $a$ atoms. More specifically we do this when $c$ is fairly small, but $a$ may be large. For this task, we describe a computational method that combines constructive listing of basic cases and tools from enumerative combinatorics. With this method we compute the exact values of $R(c,a)$ for $c\le 9$ and $a\le 1000$.

We also show that, for any fixed $c$, there exists a quasipolynomial in $a$ that matches with $R(c,a)$ for all $a$ above a small value. We explicitly determine these quasipolynomials for $c \le 7$, thus finding closed form expressions of $R(c,a)$ for $c \le 7$.


          Optimum Transmission Delay for Function Computation in NFV-based Networks: the role of Network Coding and Redundant Computing. (arXiv:1807.03337v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Saeedeh Parsaeefard, Babak Hossein Khalaj

In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function. In contrast, in this work, we allow each function to be computed in more than one node, redundantly in parallel, to respond to a given request. We argue that such redundancy in computation not only improves the reliability of the network, but would also, perhaps surprisingly, reduce the overall transmission delay. In particular, we establish that by judiciously choosing the subset of nodes which compute each function, in conjunction with a linear network coding scheme to deliver the result of each computation, we can characterize and achieve the optimal end-to-end transmission delay. In addition, we show that using such technique, we can significantly reduce the transmission delay as compared to the conventional approach. In some scenarios, such reduction can even scale with the size of the network. More precisely, by increasing the number of nodes that can compute the given function in parallel by a multiplicative factor, the end-to-end delay will also decrease by the same factor. Moreover, we show that while finding the subset of nodes for each computation, in general, is a complex integer program, approximation algorithms can be proposed to reduce the computational complexity. In fact, for the case where the number of computing nodes for a given function is upper-bounded by a constant, a dynamic programming scheme can be proposed to find the optimum subsets in polynomial times. Our numerical simulations confirm the achieved gain in performance in comparison with conventional approaches.


          Dean - British Columbia Institute of Technology (BCIT) - Burnaby, BC      Cache   Translate Page      
Access to Professional Development Funds and opportunities for career development. BCIT's School of Computing and Academic Studies is seeking a regular, full...
From British Columbia Institute of Technology (BCIT) - Wed, 12 Sep 2018 09:00:28 GMT - View all Burnaby, BC jobs
          Refiners accelerate adoption of digital technologies      Cache   Translate Page      
Refiners are increasingly integrating digital tools such as sensors, artificial intelligence and cloud computing into their o -More

          Senior Reverse Engineer - Irdeto - Ottawa, ON      Cache   Translate Page      
Our Security Assurance team is an Ethical Hacking group within Irdeto bringing its considerable knowledge of the dark corners of computing to bear against...
From Irdeto - Sat, 23 Jun 2018 08:49:24 GMT - View all Ottawa, ON jobs
          Technical Architect (Salesforce experience required) Casper - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sat, 23 Jun 2018 06:15:28 GMT - View all Casper, WY jobs
          Technical Architect (Salesforce experience required) Cheyenne - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sun, 29 Jul 2018 06:18:46 GMT - View all Cheyenne, WY jobs
          VovSoft VoV Log Analyzer 1.4      Cache   Translate Page      

VovSoft VoV Log Analyzer 1.4 | 2.3 Mb

In computing, a log file is a file that records either events that occur in an operating system or other software runs, or messages between diffe...

          Cloud BPO market New Industry Research On Present State & Future Growth Prospects to 2025      Cache   Translate Page      
(EMAILWIRE.COM, September 13, 2018 ) The Cloud BPO offers various types of services for different sectors such as human resource, e-commerce, finance and accounting, customer care, sales & marketing and others. High adoption of cloud computing in different regions is providing significant opportunities...
          Technical Writer      Cache   Translate Page      
CA-Fremont, RESPONSIBILITIES: Kforce has a client in search of a Technical Writer in Fremont, California (CA). Summary: We are looking to improve the documentation for our internal AI platform. Our AI platform includes distributed computing clusters and associated software used internally by engineer at the Bosch Center for Artificial Intelligence. The platform supports a wide variety of interesting use cases
          Instrument Maintenance Technician III at Amaiden Energy Nigeria      Cache   Translate Page      
Amaiden Energy Nigeria Limited, (formerly Moody International Nigeria Limited) was established in 1996 as a partnership between Moody International Group and Nigerian investors. Since commencing operations in March 1997 the company continues to grow and exerts its presence in numerous Projects in the Nigeria Oil and Gas Industry.Job Type: Contracts Job Nature: 2 weeks on/2 weeks off Main Functions Installs and maintains instrument equipment in compliance with all rules and practices. Tests and repairs instrumentation systems utilized by production equipment to ensure adherence to established performance levels and product quality. Evaluates instruments to establish plans for repair. Documents and verifies problems and actions taken. Tasks and Responsibilities Plans, updates, and oversees all activities within his or her areas of responsibility according to the laws, regulations, standards, specifications, and procedures. Special emphasis must be placed on health, safety, and the environment Supports and encourages team effort between operations, engineering, and projects groups Provides input and reviews the control specifications and work practices Is responsible and accountable for control systems as defined in the Work Management Manual Has the knowledge to apply and follow work permits through Permit To Work System (PTWS) as discussed in the Work Management Manual Ensures the quality and timely completion of work scheduled by the Maintenance Program Develops personal and team technical skills (for example, new regulations, equipment, methods, and others) Attends and instructs (as needed) technical meetings, to keep instrument technicians informed of the latest specifications, codes, procedures, and technology Develops and maintains open communications on control issues (for example, safe work practices, training, materials, and others) with co-workers Supports work prioritization to maximize effectiveness and to complement the efforts of other work groups Provides technical support to other Technicians for maintenance and troubleshooting on company's instrument systems Is able to generate Management of Change requests (MOCs) on control-related equipment and installation and can follow up with installation inspections consistent with Operations Integrity Management System (OIMS) Element 3 Constructs, monitors, and inspects new installations for their consistency with the mission and recommend upgrades as necessary Acts as a stand-in for the Instrument Lead position as needed Job Requirements Education and Experience: Associates degree and technical certifications required A minimum of 15 years of maintaining Instruments and Controls in processing plant or offshore production plant. General Technical Skills: Is familiar with regulations applicable to the operations of oil and gas facilities OIMS systems, related manuals, and procedures Specific Technical Skills: Meets the safety, administrative, and technical training requirements associated with this position as documented in the company operations-approved training roadmap Possesses the general competencies and Operations Integrity Critical competency requirements as documented and maintained in company Operations Training roadmap Computing skills Attitudes and Behavior: Safety orientated Good communication skills Good organizational and reporting skills Attention to details Good troubleshooting and analyzing skills
          Contracts Administrator II at Amaiden Energy Nigeria      Cache   Translate Page      
Amaiden Energy Nigeria Limited, (formerly Moody International Nigeria Limited) was established in 1996 as a partnership between Moody International Group and Nigerian investors. Since commencing operations in March 1997 the company continues to grow and exerts its presence in numerous Projects in the Nigeria Oil and Gas Industry.Category: Others Job Type: Contracts Job Nature: Standard Schedule -6 days on/ 1 day off Main Functions Ensure Contractors work in accordance with contract terms and conditions. Ensure timely placement of Purchase Orders that support contract services for production work in compliance with corporate controls and best practices. Track progress, and support Supervisors with coordinating Contractor's compliance regarding company systems and controls. Oversee the administration and performance of service contracts. Ensure contract payments are executed accurately and anomalies are identified. Ensure payments are made to Contractors in accordance with requirements of Company agreements held with Contracts in a timely manner. Advise on contract risks and support the stewardship of gap closure and opportunities for improvement, assisting with prioritization where required. Key Responsibilities Create Service Entries and amend Service Requests for Production Operations contract services providers that exist on Company's SAP system. Liaise with Contractor Representatives on a daily basis to address issues that may arise from the placement and amendment of purchase orders and the payment of invoices for work executed against those purchase orders. Foster positive, constructive relations and dialogue between Contractor and Company representatives, as well as assist in facilitating resolution to issues or problem-solving. Ensure sound systems are in place by Field Supervisor: Maintain critical contractual documentation, including SOA's, Purchase Orders, Records of Meetings and decisions. Monitor the expiration dates of contracts Monitor and analyze the spend of contracts Monitor the status of Invoice receipt and payment. Ensure contract costs are allocated to correct cost centers or end users. Accurate records of Agreement Numbers, Purchase order numbers and Contract Owners/Admin. Ensure effective contract administration through records management, advice and compliance with procurement, controls, OIMS 8.1 and business requirements. Provide Production Department support to Accounts Payable as required. Help direct Contractors to in-house and external resources that can assist in achieving compliance and safe work practices (e.g.; SHE resources, training opportunities, Subject matter experts that can assist). Work with Contract Administrator to identify performance and efficiency improvement opportunities in contracts, including arranging performance reviews and meetings to identify opportunities. Perform assignments in a safe and diligent manner, timely inform the supervisor about any incidents, injuries, near misses and potential hazards at his/her working place or at others' working places if witnessed Promptly flag with Supervisors any observed or potential controls gaps or non-compliances with Company policies. Report contractor compliance with all applicable ExxonMobil OIMS & CIMS standards. Ensure ExxonMobil's Procurement and Financial processes are adhered to. Report contractor performance and status in accordance with Global Operations and EMPNG requirements. Job Requirements Microsoft Excel and other analysis tools Experience of using SAP (or other) computerized maintenance management tools. Safety leadership qualifications or certifications. Experience within a large corporation or complex organizational setting. Experience working with developing businesses, and also Landowner Companies (LANCO's). Experience in engaging with contractors, in a developing country environment. 7 -10 years' experience with Contract administration, with service-contractor environments preferred. Experience and confidence working in field or industrial environments, including remote locations. Business and ethics compliance. Understanding of company expectations relating to controls, reporting and compliance Understanding and knowledge of the host country's commercial environment, and the role of government and regulatory authorities. Ability to integrate security and community objectives into plans for Service Contracting. Good interpersonal and motivation skills, with ability to manage discipline and performance issues in the workplace. Understanding of Operations Integrity Management System (OIMS). Strong understanding of International Production Enterprise System (IPES/SAP) Knowledge of safety management tools and systems. (JSA, Risk Assessment) OIMS 8-1 system knowledge to an advanced standard. Budgetary reporting and analysis skills Solid written communication and reporting skills. Highest standard of Safety, Health, Environment aptitude and cultivates the same in others Good observation and listening skills Demonstrates high level of initiative. Good interpersonal and motivation skills. Good communications and presentation skills Good organizational and administrative skills Good communication skills (oral & written) in English Ability to interact in a multi-cultural environment Good Planning, execution and organizational skills Excellent computing skills Ability to work independently.
          Energy Seminar: Julio Friedmann      Cache   Translate Page      
Date: Monday, October 22, 2018. 4:30 PM.
Location: NVIDIA Auditorium, Jen-Hsun Huang Engineering Center

Speaker Biography:

Dr. Julio Friedmann was the Principal Deputy Assistant Secretary for the Office of Fossil Energy, at the U.S. Department of Energy. His portfolio included R&D and programs in Clean Coal and Carbon Management, Oil and Gas systems, international engagements in clean fossil energy, and inter-agency engagements within the U.S. government. His earlier appointment as Deputy Assistant Secretary for Clean Coal and Carbon Management focused on clean coal and carbon capture, utilization, and storage. 

In his prior appointment as Chief Energy Technologist for Lawrence Livermore National Laboratory, Dr. Friedmann’s research included smart grid and energy systems analysis, conventional and unconventional hydrocarbons, CCS, geothermal power, renewable power prediction and integration, and supercomputing applications to energy. Earlier, he worked for five years as a senior research scientist at ExxonMobil and as faculty at the University of Maryland. Dr. Friedmann has a Bachelor of Science and Master of Science from the Massachusetts Institute of Technology and a Ph.D. in Geology from the University of Southern California.


          Vacant Job For Secretary at Voomconnect      Cache   Translate Page      
Voomconnect is a technology service company operating a leading technology-driven transport service deploying its state-of-the-art platform for transportation service, cloud computing to deliver optimum management...

          'Cloud computing' takes on new meaning for scientists      Cache   Translate Page      
Clouds may be wispy puffs of water vapor drifting through the sky, but they're heavy lifting computationally for scientists wanting to factor them into climate simulations. Researchers have turned to ... - Source: www.sciencedaily.com
          Qa Engineer (Manual Testing with Storage Protocols)      Cache   Translate Page      
NetApp - Bangalore, Karnataka - computing to the latest web framework, NetApp software products embrace innovation to deliver compelling solutions to our customers. As a QA... testing of storage products Familiar with enterprise virtualization systems such as VMware ESX, Hyper-V or Xen Familiar with QA automation...
          Comment on Unforced Variations: Sep 2018 by Hank Roberts      Cache   Translate Page      
+---------------------------------------------------------+ | Nanoscale Objects Can Radiate Heat Much Faster Than What Would Normally be Possible | https://soylentnews.org/article.pl?sid=18/09/10/2056229 +---------------------------------------------------------+ [0]takyon writes: [1]Heat transfer surprise could lead to thermal transistors As much as 100 times more heat than predicted by the standard radiation theory can flow between two nanoscale objects, even at bigger-than-nanoscale distances, researchers at the University of Michigan and the College of William and Mary have reported in the journal Nature. The new results could have implications for better solar cells, materials that behave like one-way valves for heat flow and perhaps even a heat-based computing platform. Max Planck's theory of radiation, proposed in 1900, set the stage for quantum mechanics and has held up well over the intervening century. But five years ago, a microstructure in the lab of Pramod Reddy, U-M professor of mechanical engineering, was letting an astonishing amount of heat flow between objects that should have been insulated from one another. [...] In an object the size and shape of a credit card, heat would ordinarily radiate from each of the six sides in proportion to the surface area. But the team found that when the structures were extremely thin—at the thinnest, about half the wavelength of green light—those edges released and absorbed much more heat than anticipated. Discuss this story at: https://soylentnews.org/comments.pl?sid=18/09/10/2056229 Links: 0. https://soylentnews.org/~takyon/ 1. https://news.umich.edu/heat-transfer-surprise-could-lead-to-thermal-transistors/
          Senior Electrical Engineer - Myant - Etobicoke, ON      Cache   Translate Page      
Experience with industrial, instrumentation, and medical devices is an asset. At Myant, we are creating the world’s first textile computing platform,...
From Myant - Thu, 23 Aug 2018 23:11:08 GMT - View all Etobicoke, ON jobs
          Apa itu Cloud Computing?      Cache   Translate Page      

Jika Anda bekerja di sebuah kantor, dan semua karyawan menggunakan komputer, pernahkah Anda bayangkan berapa biaya yang dikeluarkan untuk pengadaan hardware dan software tersebut? Katakan untuk pengadaan satu unit PC biayanya sebesar 4 juta. Untuk operating system-nya, misalkan Windows 7, katakan 1 juta. Maka pengadaan satu unit komputer untuk satu karyawan perlu dana 5 juta!

The post Apa itu Cloud Computing? appeared first on INILAH CARANYA.


          Electrical Engineer - Myant - Etobicoke, ON      Cache   Translate Page      
Proficient with software such as Altium, Eagle, etc for circuit analysis/debugging and PCB design. At Myant, we are creating the world’s first textile computing...
From Myant - Tue, 04 Sep 2018 19:47:59 GMT - View all Etobicoke, ON jobs
          Plant Support - Limeplant - Pete Lien & Sons, Inc - Frannie, WY      Cache   Translate Page      
Complex Computing and Cognitive Thinking Y. An hourly employee who at the direction of a Plant Operator, Foreman or Supervisor supports production &amp; sales...
From Pete Lien & Sons, Inc - Tue, 14 Aug 2018 05:21:24 GMT - View all Frannie, WY jobs
          Senior Bios Engineer - ZT Systems - Secaucus, NJ      Cache   Translate Page      
Join us at this critical growth inflection point as we engineer the hardware infrastructure powering a world of cloud computing, cloud storage, artificial...
From ZT Systems - Wed, 05 Sep 2018 01:19:12 GMT - View all Secaucus, NJ jobs
          Santa Clara technology consulting company snaps up Folsom firm      Cache   Translate Page      
Folsom’s Infiniti Consulting Group has been acquired by InterVision, a technology consulting firm based in Santa Clara. Infiniti has 80 employees in Folsom. They will be added to the 260-person team that InterVision has in offices in Santa Clara, Denver, San Francisco, El Segundo, St. Louis and Bellevue, Washington. A specialist in cloud computing, Infiniti adds to services InterVision can offer its customers nationwide, said Scott Drossos, president with Infiniti. The merger also secures InterVision…

          Artificial Intelligence and Cognitive Computing: Market 2018 Comprehensive Information by Top Key Players and Business Growth Strategies with Segmentation by Product Types and its Application Forecast to 2025      Cache   Translate Page      
(EMAILWIRE.COM, September 11, 2018 ) Artificial Intelligence and Cognitive Computing Market Analysis to 2025 is a specialized and in-depth study of the Artificial Intelligence and Cognitive Computing industry with a focus on the global market trend. The report aims to provide an overview of global...
          UCLA's infatuation with diversity is a costly diversion from its true mission      Cache   Translate Page      

By Heather Mac Donald
http://www.latimes.com/opinion/op-ed/la-oe-mac-donald-diversity-ucla-20180902-story.html
September 2, 2018



Image result for ucla diversity protest
Students who support the passage of a new diversity requirement proposal rallied at Meyerhoff Park in 2015.

If Albert Einstein applied for a professorship at UCLA today, would he be hired? The answer is not clear. Starting this fall, all faculty applicants to UCLA must document their contributions to “equity, diversity and inclusion.” (Next year, existing UCLA faculty will also have to submit an “equity, diversity and inclusion statement” in order to be considered for promotion, following the lead of five other UC campuses.) The mandatory statements will be credited in the same manner as the rest of an applicant’s portfolio, according to UCLA’s equity, diversity and inclusion office.

A contemporary Einstein may not meet the suggested evaluation criteria. Would his “job talk” — a presentation of one’s scholarly accomplishments — reflect his contributions to equity, diversity and inclusion? Unlikely. Would his research show, in the words of the evaluation template, the “potential to understand the barriers facing women and racial/ethnic minorities?” Also unlikely. Would he have participated in “service that applies up-to-date knowledge to problems, issues and concerns of groups historically underrepresented in higher education?” Sadly, he may have been focusing on the theory of general relativity instead. What about “utilizing pedagogies addressing different learning styles” or demonstrating the ability to “effectively teach and attract students from underrepresented communities”? Again, not at all guaranteed.

As the new mandate suggests, UCLA and the rest of the University of California have been engulfed by the diversity obsession. The campuses are infatuated with group identity and difference. Science and the empirical method, however, transcend just those trivialities of identity that UC now deems so crucial: “race, ethnicity, gender, age, religion, language, abilities/disabilities, sexual orientation, gender identity and socioeconomic status,” to quote from the university’s Diversity Statement. The results of that transcendence speak for themselves: an astounding conquest of disease and an ever-increasing understanding of the physical environment. Unlocking the secrets of nature is challenge enough; scientists (and other faculty) should not also be tasked with a “social justice” mission.

But such a confusion of realms currently pervades American universities, and UC in particular. UCLA’s Intergroup Relations Office offers credit courses and “co-curricular dialogues” that encourage students to, you guessed it, “explore their own social identities (i.e. gender, race, nationality, religion/spirituality, sexual orientation, social class, etc.) and associated positions within the campus community.” Even if exploring your social identity were the purpose of a college education (which it is not), it would be more fruitful to define that identity around accomplishments and intellectual passions — “budding mathematician,” say, or “history fanatic” — rather than gender and race.

Intergroup Relations is just the tip of the bureaucratic diversity iceberg. In 2015, UCLA created a vice chancellorship for equity, diversity and inclusion, funded at $4.3 million, according to figures published by the Millennial Review in 2017. (The EDI vice chancellor’s office did not have its current budget “at the ready,” a UCLA spokesman said, nor did Intergroup Relations.) Over the last two years, according to the Sacramento Bee’s state salary database, the diversity vice chancellor’s total pay, including benefits, has averaged $414,000, more than four times many faculty salaries. Besides his own staff, the vice chancellor for equity, diversity and inclusion presides over the Discrimination Prevention Office; BruinX, the “research and development arm of EDI”; faculty “equity advisors”; UCLA’s Title IX office; and a student advisory board. Various schools at UCLA, including medicine and dentistry, have their own diversity deans, whose job includes making sure that the faculty avoid “implicit bias in the hiring process,” in the words of the engineering school’s diversity dean.

These bureaucratic sinecures are premised on the idea that UCLA is rife with discrimination, from which an ever-growing number of victim groups need protection. The Intergroup Relations Office scours the horizon for “emerging social-identity-based intergroup conflicts,” according to its website. It has been hiring undergraduates and graduate students to raise their peers’ self-awareness of their “experiences with privilege and oppression.” These “diversity peer educators,” whose internship salaries come out of mandatory student fees, will host workshops on “toxic masculinity” and “intersectional identities” this fall. If UCLA is putting a comparable effort into organizing campus-wide workshops on the evolution of constitutional government or the significance of Renaissance humanism, it is keeping the effort out of sight.

Reality check: UCLA and the University of California are among the most tolerant, welcoming environments in human history for all races, ethnicities and genders. Every classroom, library and scientific laboratory is open to all qualified students on an equal basis. Far from discriminating against underrepresented minorities in admissions, UCLA and UC have sought tirelessly to devise surrogates for the explicit racial preferences banned in 1996 by Proposition 209. UCLA’s proportion of black undergraduates — 5% in 2016 — is less than one percentage point below the black share of California’s public high school graduates.

In 2016, 4% of UCLA’s faculty were black, 6.6% were Latino, 66% were white, and 18.6% were Asian. This distribution reflects the hiring pipeline, not hiring bias.

Blacks made up 4.7% of all doctorate recipients nationwide in 2006, 4.9% in 2010, and 5.2% in 2016, according to the National Science Foundation. But black PhDs have historically been concentrated in education; in the sciences, which make up a large proportion of the UCLA faculty, less so. In 2016, for example, 1% of all PhDs in computer science went to blacks, or 17 out of 1,659 doctorates, according to the Computing Research Assn. Many fields — nuclear physics, geophysics and seismology and neuropsychology, for instance — had no black PhDs at all.

Given such numbers, it is unrealistic to assume that every academic department at UCLA will perfectly mirror the state’s demographic makeup, absent discrimination. And yet the equity, diversity and inclusion office puts every member of a faculty search committee through time-consuming implicit bias training.

The ultimate solution to any absence of proportional representation in higher education is to close the academic skills gap. In 2015, only 14% of black eighth graders in California and 13% of Latino eighth graders scored as proficient or above on the National Assessment of Educational Progress math test, compared with 57% of Asians and 43% of whites. In reading, 16% of black eighth graders and 18% of Latino eighth graders were proficient or above, compared with 50% of Asians and 44% of whites. Such gaps have been constant over many decades.

It does not do UCLA’s students any favors to teach them to see bias where there is none. UC’s diversity bureaucracy is a costly diversion from the true mission of higher education: passing on to students, with joy and gratitude, the treasures of our cultural inheritance and expanding the boundaries of knowledge.

Heather Mac Donald is the Thomas W. Smith fellow at the Manhattan Institute. Her latest book, “The Diversity Delusion,” goes on sale Tuesday.

          Comment on WEIRD: FBI closes National Solar Observatory over mysterious ‘security issue’ by sycomputing      Cache   Translate Page      
lol nice...
          Senior Network Engineer - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
McAfee experience a plus. We are seeking an individual with proven experience providing architecture and implementation expertise for our client base....
From Network Computing Architects, Inc. - Wed, 25 Jul 2018 05:32:50 GMT - View all Bellevue, WA jobs
          Cloud Computing, Once Loved For Its Simplicity, Is Now A Complex Beast      Cache   Translate Page      
The best advice one can get these days: don't operate cloud by cloud -- bring it all together.
          Apple Watch Series 4 can help keep tickers ticking      Cache   Translate Page      

Along with its refreshed iPhones, Apple debuted its latest Apple Watch today. The Apple Watch Series 4 introduces larger displays in new 40-mm and 44-mm models, a faster system-in-package for more responsive wrist computing, a case that's both thinner and better-suited to letting cellular transmissions and other radio waves through, and a sophisticated heartbeat-sensor array that can keep an eagle eye on just how well your ticker is ticking.

...

Read more...


          Senior Software Development Engineer - Distributed Computing Services (Hex) - Amazon.com - Seattle, WA      Cache   Translate Page      
Knowledge and experience with machine learning technologies. We enable Amazon’s internal developers to improve time-to-market by allowing them to simply launch...
From Amazon.com - Thu, 26 Jul 2018 19:20:25 GMT - View all Seattle, WA jobs
          5G Security Market, 2023      Cache   Translate Page      
...various technologies including Mobile Edge Computing (MEC), IoT networks, and general mobility infrastructure. The report includes detailed 5G security market forecasts for all major technologies, industry verticals, solutions and service types from 2018 - 2023. Fifth generation (5G) cellular is poised to ...


          $7.53 Bn 5G Security Market: Technologies, Solutions, and Market Outlook 2018-2023 - ResearchAndMarkets.com      Cache   Translate Page      
...including Mobile Edge ( News - Alert ) Computing (MEC), IoT networks, and general mobility infrastructure. The report includes detailed 5G security market forecasts for all major technologies, industry verticals, solutions and service types from 2018 - 2023. Fifth generation (5G) cellular is poised to ...

          Sysdig Closes $68.5 Million in Series D Funding to Enable Enterprises to Secure ...      Cache   Translate Page      
Investment fuels company leadership in delivering converged security
and monitoring solutions for enterprises adopting containers and
microservices SAN FRANCISCO (BUSINESS WIRE)

Sysdig,

, the cloud-native intelligence company, today announced it

raised $68.5 million in series D funding, led by Insight Venture

Partners, with participation from previous investors, Bain Capital

Ventures and Accel. This round of funding brings Sysdig’s total funding

to date to $121.5 million. Sysdig will use the funds to extend its

leadership in enabling enterprises to operate reliable and secure

containerized infrastructure and cloud-native applications.


Sysdig Closes .5 Million in Series D Funding to Enable Enterprises to Secure  ...
Sysdig Closes .5 Million in Series D Funding to Enable Enterprises to Secure  ...
Suresh Vasudevan, CEO at Sysdig, authored a

blog

post with more information on Sysdig’s funding

.

Sysdig offers enterprises the first unified approach to container

security, monitoring, and forensics. Unlike traditional approaches, the

Sysdig

was built with an understanding

of the modern DevSecOps workflow across Kubernetes, Docker and both

private and public clouds. Sysdig’s open source forensics technology, Sysdig ,

and its open source security project,

Sysdig

, have a community of millions of users, and provide the

foundation for a rich, commercial product set. Dozens of Global 2000

enterprises are Sysdig customers today, including many of the world’s

largest financial institutions, media companies, cable companies,

technology companies, and government agencies.

451 Research predicts the cloud-enabling technology market to grow to

$39.6B through 2020, and containers are predicted to be the fastest

growing segment of that market at 40%. Gartner predicts that “by 2020,

more than 50% of global organizations will be running containerized

applications in production, up from less than 20% today.” 1

“As enterprises accelerate their move to cloud-native applications, they

recognize the need for a new breed of solutions that will enable them to

meet performance, reliability, security, and compliance requirements,”

said Richard Wells, Managing Director at Insight Venture Partners.

“Sysdig’s novel approach of tapping an entirely new data source that

provides both security and monitoring for container-based applications

has proven more effective, more scalable, and higher ROI. That

significant technological advantage combined with an experienced

management team led by CEO Suresh Vasudevan gives Sysdig a strong

position in the marketplace and we are excited to welcome them to the

Insight portfolio.”

Sysdig launched

Sysdig

in October of 2017, cementing the Sysdig Cloud-Native

Intelligence Platform as the only solution to offer unified security,

monitoring, and forensics with native Kubernetes and Prometheus

integration for containers and microservices. Last quarter, Sysdig

expanded on the deep container visibility Sysdig provides to create

Sysdig Secure 2.0, which brings

vulnerability

to cloud-native environments and microservices for enterprise customers.

Sysdig Secure is the first container security offering to take a

data-driven approach across all aspects of the container lifecycle.

“Enterprises are adopting cloud-native technology for its speed of

development, multi-cloud scaling capabilities, and lower total cost of

ownership,” said Suresh Vasudevan, CEO at Sysdig. “But, they are hitting

roadblocks with old school security and monitoring products. To be

successful, these organizations need new solutions that are

cloud-native. Sysdig has emerged as the only solution that delivers

enterprises the complete set of capabilities needed to protect an

environment, ensure that it is running smoothly, and meet compliance

requirements. Sysdig delivers it all, both in the cloud and on-premise,

in order to grow with companies as they undertake this journey.”

This round of funding further accelerates the strong momentum and rapid

growth Sysdig has experienced over the last year. Downloads of Sysdig

Falco have roughly tripled over the last 12 months and active users of

the Sysdig SaaS offerings have grown nearly six times year over year.

Last month, Sysdig opened a second headquarters in Raleigh, North

Carolina to keep up with company growth while the company also continues

to scale its offices in San Francisco, Belgrade, and London.

In addition to its global growth, Sysdig has expanded its executive team

with the hiring of

Suresh

in April and

Larry

last month. Sysdig

continues to deliver on its commitment to leading the industry by

collaborating with the Cloud-Native Computing Foundation, the PCI

Security Council, and industry partners and by contributing to the

development of security recommendations for modern infrastructure.

About Sysdig

Sysdig is the cloud-native intelligence company.

We have created the only unified platform to deliver container security,

monitoring, and forensics in a microservices-friendly architecture. Our

open source technologies have attracted a community of over a million

developers, administrators and other IT professionals looking for deep

visibility into applications and containers. Our cloud-native

intelligence platform monitors and secures millions of containers across

hundreds of enterprises, including Fortune 500 companies and web-scale

properties. Learn more at www.sysdig.com .

About Insight Venture Partners

Insight Venture Partners is a leading global venture capital and private

equity firm investing in high-growth technology and software companies

that are driving transformative change in their industries. Founded in

1995, Insight currently has over $20 billion of assets under management

and has cumulatively invested in more than 300 companies worldwide. Our

mission is to find, fund, and work successfully with visionary

executives, providing them with practical, hands-on growth expertise to

foster long-term success. Across our people and our portfolio, we

encourage a culture around a core belief: growth equals opportunity. For

more information on Insight and all its investments, visit www.insightpartners.com

or follow us on Twitter @insightpartners .

About Bain Capital Ventures

Bain Capital Ventures partners with disruptive founders to accelerate

their ideas to market. The firm invests from seed to growth in

enterprise software, infrastructure software, crypto, and industries

being transformed by data. Bain Capital Ventures has helped launch and

commercialize more than 200 companies since 1984, including DocuSign,

Jet.com, Kiva Systems, LinkedIn, Rapid7, Redis Labs, Rent the Runway,

SendGrid, SurveyMonkey, SysDig, Taleo, and Turbonomic. Bain Capital

Ventures has approximately $3.9 billion in assets under management with

offices in San Francisco, Palo Alto, New York and Boston. Follow the

firm via LinkedIn

or Twitter .

About Accel

Accel partners with exceptional founders with unique insights, from

inception through all phases of growth. Atlassian, Braintree, Cloudera,

Crowdstrike, DJI, DocuSign, Dropbox, Etsy, Facebook, Flipkart, Jet,

Pillpack, Qualtrics, Slack, Spotify, Supercell, Tenable, Venmo and Vox

Media are among the companies the firm has backed over the past 35

years. The firm seeks to understand entrepreneurs as individuals,

appreciate their originality and play to their strengths. Because

greatness doesn’t have a stereotype. For more, visit www.accel.com ,

www.facebook.com/accel

or www.twitter.com/accel .

____________________________________

1 Gartner, Smarter with Gartner, 6 Best Practices for

Creating a Container Platform Strategy October 31, 2017, https://www.gartner.com/smarterwithgartner/6-best-practices-for-creating-a-container-platform-strategy/

Contacts

280blue, Inc.

Amanda McKinney

amanda@280blue.com
Sysdig Closes .5 Million in Series D Funding to Enable Enterprises to Secure  ...
Do you think you can beat this Sweet post? If so, you may have what it takes to become a Sweetcode contributor...Learn More.
          Sysdig raises $68.5 million for container security solutions      Cache   Translate Page      

It's not a story about containers unless there are shipping containers pictured. (Pixabay)

Share
Sysdig raises .5 million for container security solutions
Sysdig raises .5 million for container security solutions
Sysdig raises .5 million for container security solutions
Sysdig raises .5 million for container security solutions
Sysdig raises .5 million for container security solutions
Written by

Greg Otto

Sep 12, 2018 | CyberScoop

San Francisco-based Sysdig announced a $68.5 million Series D funding round Wednesday, doubling the amount of money the company has previously raised for its container monitoring and security offerings.

Launched in 2013, the company specializes in platforms that help developers handle vulnerability management, more than 200 compliance checks, and security analytics in containers and microservices used in enterprises.

Containers have been a big deal in the application development world for a while. The popular infrastructure tech gives developers a way to run applications in a consistent manner across a host of different environments, without wasting computing resources or accumulating large run costs. Among the most well known container services are Docker, rkt, and lxd.

451 Research believes application containers will be a $2.7 billion market by 2020, with an annual growth rate of 40 percent compared to other cloud-enabling technologies.

“Enterprises are adopting cloud-native technology for its speed of development, multi-cloud scaling capabilities, and lower total cost of ownership,” said Suresh Vasudevan, CEO of Sysdig. “But, they are hitting roadblocks with old school security and monitoring products. To be successful, these organizations need new solutions that are cloud-native. Sysdig has emerged as the only solution that delivers enterprises the complete set of capabilities needed to protect an environment, ensure that it is running smoothly, and meet compliance requirements.”

The company says downloads of its open source security projectSysdigFalco have tripled over the last 12 months. Additionally, it has formed partnerships with companies like Google, IBM and Red Hat.

The funding was led by Insight Venture Partners, with participation from previous investors Bain Capital Ventures and Accel.

This round of funding brings the company’s total funding to $121.5 million.

-In this Story- Containers , sysdig , venture capital


          Sysdig raises $68.5 million to boost security and performance for containers and ...      Cache   Translate Page      

San Francisco-based Sysdig announced today that it has raised $68.5 million in venture capital as the company rides a wave that is changing the way applications are built for the internet.

The funding round was led by Insight Venture Partners, and also included Bain Capital Ventures and Accel. Sysdig has now raised a total of $121.5 million.Sysdig says it will use the money to expand its products and services that target the growing adoption of cloud-native computing development.

“Enterprises are adopting cloud-native technology for its speed of development, multi-cloud scaling capabilities, and lower total cost of ownership,” said Suresh Vasudevan, CEO at Sysdig, in a statement. “But, they are hitting roadblocks with old school security and monitoring products. To be successful, these organizations need new solutions that are cloud-native.”

In recent years, developers have begun embracing a method of writing applications for cloud-based services using containers. Rather than writing one massive piece of software, features and services are broken up into self-contained units that can function on their own. The goal is make it easier to move features across different clouds, and to keep overall performance more stable.

Read more: How Kubernetes and microservices have fueled a developers’ movement to make the web faster, stable, and more open

But adopting this philosophy has also meant that new software and services must be created that are optimized for the same environment. Launched in 2013, Sysdig offers a platform to monitor containers’ performance and security. The system works with such critical cloud-native services asKubernetes and Docker.

In the press release, the company noted that downloads of one of its main services has tripled over the past year, just one example of the explosive interest in this new developer movement. Sysdig also said it opened a second headquarters in Raleigh, North Carolina, last month, and plans to continue expanding other offices in Belgrade and London.


          Understanding IoT Security Challenges An Interview with an Industry Expert      Cache   Translate Page      

The Internet of Things (IoT) is rapidly growing and expected to affect all industry verticals as well as our private lives. It is no secret that security plays a very important part in the successful deployment and management of this technology, and its applications are set to transform the way we live and do business. In this blog, we reached out to our technology partner Nexus to better understand the challenges that the industry faces to ensure safe deployment and management of IoT technologies.

1. What is the biggest security challenge facing the growing IoT?
Understanding IoT Security Challenges   An Interview with an Industry Expert

Weak authentication. For Secure IoT, all connected devices and services must have trusted identities. To get reliable security for devices and services, it is a must to provide a ”transport identity” at production stage and then when deploying solutions on the field, update the identities securely, e.g. OTA (over the air). To do this at scale, a public key infrastructure (PKI) is required. A PKI provides cryptographically secure, unforgeable, theft-safe identities, and is the best available security technology for large-scale distributed systems.

With IoT PKI, Secure IoT can be accomplished by enabling strong authentication and encryption of communication to ensure the integrity of transactions and data.

2. We often hear IoT devices (things) as being “resource constraint.” Can you elaborate on what is meant by this?

IoT devices typically have a small memory and a rudimentary operating system with no real user interface, and that presents a challenge as they have limited power, communication, and computing capabilities. These characteristics have led to the development of new concepts and standards to provide these devices with well-functioning and reliable identities, and the capability to automatically enroll when deployed. An example of some of the protocols that cover this are Enrollment over Secure Transport (EST) and Certificate Enrollment for Billions of Things (CEBOT).

3. What are the main challenges in giving things trusted identities?

This is not really a technical issue. It is more a challenge in connecting how IoT projects are started and driven. Thinking about it from the project workbench, devices are designed to manage certificates, implementing a straightforward process where an initial transport certificate is issued in the production line. But that is only the first step. When devices are deployed, that transport certificate has to be updated, managed and maintained. IoT projects need to allocate a budget for this. I actually wrote a separate blog about this here .

4. Can you differentiate between the process of factory bootstrapping and enrollment of things into a trusted ecosystem?

An important and challenging part of the product lifecycle is to maintain a device’ trusted identity. Take for example the supply chain involving the production of a piece of electronic circuitry, embedding it in an elevator, installing it in a smart building, and subsequently commissioning it to the facility operator.

Factory bootstrapping takes place in the trusted factory environment by injecting firmware, generating keys, and issuing initial “factory certificate” with a factory Certificate Authority (CA). Commissioning of devices in the trusted ecosystem may require issuing a new digital identity in the form of an operator certificate to the device, which is already “in the field,” (i.e., located in a potentially insecure environment). When requesting the operator certificate from the operator’s CA, the device in the field can authenticate with the help of the factory certificate. The authentication of the device is based on the operator CA trusting the factory CA. In this way, the trusted identity of the device can be maintained along a supply chain and in a complex ecosystem’s multiple products, services and operators.

5. How is Nexus involved in ensuring a more secure credentialing and enrollment process?

We have been in the identity and security market for a long time and have been creating products and services to meet changing and challenging market needs, as well as, respective requirements and industry standards. Solutions need to be secure but also a well-integrated part of an ecosystem. They need to protect the central system, as well as the mobile identities of individuals interacting with the system. Nexus has a unique proven experience and position within the market. Many of our customers, for example, in the automotive industry, put great demands on us when it comes to both capacity, security, and compliance. Nexus provide IoT PKI on site and as a cloud service is engaged in new standards projects like ECSEL SECREDAS, Secure IoT, and V2X to ensure that our customers and partners can get access to the latest services for IoT devices for seamless credentialing and enrollment processes.

For secure IoT, a root of trust is required to underpin the issuance and management of certificates used to establish device IDs. Cryptographic keys used to sign these certificates must be given the utmost protection. Hardware security modules (HSMs) act as trust anchors that protect the cryptographic infrastructure of some of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys inside a hardened, tamper-resistant device. To cover new protocols and new crypto algorithms for Secure IoT, and to ensure a high transaction rate, Nexus relies on Thales HSMs to empower its CM for Secure IoT. For any IoT application, it is crucial to protect data, user privacy and safety. Breaches can harm production continuity and business processes, customers’ trust, and worst of all human health and life. Nexus provides the solutions to secure your IoT.

Nexus is a leading provider of identity and access management security solutions. Its solutions focus on securing society by enabling trusted identities. Nexus offers a flexible and scalable CA software, which enables customers to register, issue and manage electronic identities for devices and services in any type of IoT use case. Combined with Thales eSecurity, Nexus delivers solutions and services to help secure IoT.

It is all about Identity of Things (IDoT); all connected devices and services must have trusted identities and a PKI with an HSM root of trust delivers the best security technology for large-scale distributed IoT systems. To learn more visit https://www.nexusgroup.com/solutions/public-key-infrastructure-pki/internet-of-things-iot-security/ and www.thalesesecurity.com , and be sure to register for our webinar “ Identity and Access Management in IoT Manufacturing .”


          Tips To Help Declutter Your Wallet In 4 Simple Steps      Cache   Translate Page      

The society seems hell-bent on making us acquire more stuff than we actually need and most of these items clutter our wallets. Items including receipts, multiple credit cards, membership cards, discount cards, coupons, and business cards create unnecessary bulk and exposes you to all kinds of security risks in the event that your wallet is stolen or lost. Thankfully, there are clever, neat and simple tips you could implement to declutter your wallet while getting rid of cards and other items you feel you could do without.


Tips To Help Declutter Your Wallet In 4 Simple Steps
Why should you resort to decluttering your wallet?

When you decide to declutter your wallet and move to a minimalist one, you get to enjoy numerous benefits. For instance, it helps you reduce potential security risks while ensuring you stay organized. With the option of a nice, slim wallet with ID window , you effectively avoid having an unnecessarily bulky pocket. The slimmer wallets also provide important health benefits (reduces common back conditions such as sciatica).

Declutter Your Wallet In Four Simple Steps:

Step 1: Separate the essential items from the nonessential ones.

Step 2: Choose your daily carry.

Step 3: Digitize the cards

Step4: Invest in a small, minimalist wallet.

Step 1: Get Rid of the Nonessential Items

It might prove a little challenging to empty your wallet, depending on the amount of clutter currently held in your billfold. You need a high level of discipline to completely get rid of items such as restaurant receipts, movie stubs, ATM receipts, and all other nonessential items. Even though it is never easy to embrace, you ought to develop the mindset of decluttering. Before you embrace the idea of having a smaller wallet, transform into an essentialist. With an essentialist attitude, you’ll essentially have the wisdom that enables you to determine what items are essentials and which ones are nonessentials. Those without the discipline to declutter remain ensnared in the powerful grip of nonessentials.

Items you can remove immediately include the following:

i. Social Security Card

Considering your social security card is one of the most important, consider leaving it at home. Note that if it gets stolen, you become vulnerable to risks such as identity theft. The U.S government also recommends that you leave your social security card at home or somewhere safe.

ii. Membership Cards

It is never a wise idea to carry around gift cards in the hope that you’ll visit your local store and use it. Remember, if your wallet ends up in the wrong hands, gift cards are often the first to be used considering they are like cash. Therefore, leave your membership or gift cards at home. Only carry them if you’re certain you’re going to shop.

iii. Business Cards and Credit Cards

If you love networking and enjoy meeting new people, a business card will always come in handy. However, if you collect business cards from others, transfer the contact details to your phonebook. You could also file away the information if you wish.

Do not carry all of the credit cards you own because any thief who comes across your wallet will have a field day and you will have nothing to cushion you while you work on replacing your cards. It is advisable that you carry just one main card and an extra one just for back up.

Summary: Items you can leave behind (Password and PINs, Social Security card, coins, receipts, and gift cards)

Any identity cards, such as driver’s license, work access card, or state ID cards that you might not need to carry on particular days have no reason to be in the wallet, unless you need it for that day. By doing so, you declutter effectively and protect your identity. Memorize PIN codes and passwords and keep them away from your cards in order to safeguard your security.

Step 2: Identify the Essentials

After emptying out your wallet and getting rid of the useless items, it is important that you identify the essential cards that you’ll need to carry. Carry just two cards (a primary card and a back-up). This limits access for wireless scanner thieves and pickpockets. Furthermore, leaving store cards at home saves you from making impulse buying decisions that you might end up regretting later.

Always carry some cash for emergencies. Even though we live in a cashless society, smaller transactions are still best completed using cash. However, carry just enough to buy what you budgeted for.

To simplify the decluttering process, classify cards into cards for everyday carry such as driver’s license, credit cards, and optional carry for your planned purchases (punch cards and reward programs cards).

Step 3: Digitize Data

Smartphones boast of extremely powerful processing power capable of powering 120,000,000 Apollo space missions. With this kind of computing power, you can easily downsize your wallet’s daily carry by using handy apps. Digitization apps help you eliminate the dreaded membership cards that you aren’t sure about the next time you’ll ever need them.

Store your passwords using LastPass Password Manager and exchange receipts using Expensify. For cash available in your bank, use Android pay or Apple pay. If you prefer to carry fewer business cards, you can choose from a number of apps with card reader functionality. Camcard is one such app that helps you to scan cards directly onto your iPhone contacts. For reward and membership cards, Stocards and Keyring card apps allow you to store barcodes from cards you have stored up on your smartphone. As you can see, you have many options of digitizing using your smartphone. Therefore, you need to get started right away.

Step 4: Buy a Minimalist Wallet

After implementing the tips recommended above, there is one last thing you need to do: Get rid of your billfold wallet. Now would be the perfect time to buy a minimalist wallet, as this reflects your new decluttered lifestyle. The move to a cash-free society and the adoption of digital payment options means the bifold wallets are quickly getting antiquated. The design has undergone no changes ever since it was launched in the market and it is not a suitable option for anyone looking to go the minimalist route by carrying fewer items.

Thankfully, minimalist wallets are plentiful in the market. While most of the mass-produced wallets have no specific benefits, a few actually focus on the specific needs, depending on your desires. You can choose from a number of minimalist wallets including wooden wallets, metal wallets, card folders in calf or cow leather, slim bifolds, and many more. If you’ve made the decision to own a minimalist wallet, then you should ideally choose the seamless ones, as they eliminate bulk.


          Alibaba to Showcase Latest Technology at Flagship Event      Cache   Translate Page      
...compete with each other during hackathons and challenges on different themes including smart home design, wild-life animal protection, weather forecasts and the blockchain. Here is a sneak peek of the Cloud Computing Conference 2018: https://youtu.be/5dzcarmmsDU To keep ...

          Best Buy Initiative Seeks To Add Women Of Color To Computing Careers      Cache   Translate Page      
Reboot Representation Tech Coalition is designed to improve opportunities for under-represented women.
          Network Development Engineer II - Amazon.com - Herndon, VA      Cache   Translate Page      
Job Description Do you like helping U.S. Intelligence Community agencies implement innovative cloud computing solutions and solve technical problems? Would...
From Amazon.com - Tue, 11 Sep 2018 19:23:37 GMT - View all Herndon, VA jobs
          Learning by Wholes      Cache   Translate Page      
David Perkins is a senior professor of education at Harvard who has done a lot of super-applicable, general-audience writing. I just finished his book Make Learning Whole, and am eager to try applying each of the seven principles he outlines within. Here are some ideas of how I think each could apply to my own work, along with an explanation of the principles themselves.


Play the Whole Game

"We can ask ourselves when we begin to learn anything, do we engage some accessible version of the whole game early and often? When we do, we get what might be called a 'threshold experience,' a learning experience that gets us past the initial disorientation and into the game. From there it's easier to move forward in a meaningful motivated way."

By game, Perkins means a domain, a field, an area of learning. The point is to not to just talk about the game, not to pick away at learning just elements that are part of the game, but to actually do it and participate in it. Sure, you might have to play a junior version, probably with lots of scaffolding to support you at first, but that's still far superior to being promised you'll (maybe kinda sorta) get to the real thing later.

As a computing educator, it is tempting to say that playing the whole game comes for free since you start writing code pretty much right away. But the whole game isn't always present, at least not until later. There are oh-so-many examples of introductory programming learning experiences that go through a laundry list of concepts, using toy examples for each one before eventually getting to look at any sort of interesting, realistic problem. I avoided this with my CS1 design. It is structured around a series of demo programs in Processing. Each module is devoted to modelling how to create one demo, introducing computing concepts as they are needed. I want to make sure I continue to keep the whole game in mind for all my learning experiences. If my learners aren't doing something resembling the real thing, I need to fix that.

Make the Game Worth Playing

Motivation is always a tricky thing, especially in contexts where the reason for learning something is because a teacher said you have to. So how do we make the game worth playing? By playing the whole game, for a start. Look for intrinsic motivators. Connect to practical applications, personal insights, to other areas of the curriculum. Focus instruction on generative topics ("topics that figure centrally in the discipline or practice under study, resonate with the learner's interests and concerns, and, importantly, resonate with the teacher's also"). Teach in a way that highlights "understandings of wide scope, with enlightenment, empowerment, and responsibility in the foreground." Build a tone of enticement into the beginning of lessons. Teach for understanding. Foster a growth mindset. Provide a pleasantly frustrating challenge, seeking flow.

I've done a lot of thinking on game-like learning, and have led and contributed to development of a few game-like and even game-based learning experiences. I think that a lot of the ideas behind making the game worth playing connect well with game-like learning. I recently delivered a course to employees at work and struggled a bit with engagement. In my next experiment, I'm thinking of using game elements to increase engagement and retention.

Work on the Hard Parts

"The hard parts have an annoying characteristic: They do not always get better just through playing the whole game. Real improvement depends on deconstructing the game, singling out the hard parts for special attention, practicing them on the side, developing strategies to deal with them better, and reintegrating them soon into the whole game." Actionable assessment and communicative feedback are important aspects. To anticipate the hard parts, watch out for certain kinds of knowledge: ritual, inert, foreign, tacit, skilled, and conceptually difficult.

I've fully adopted backward course design, and have gotten pretty good at writing learning outcomes. In my next designs, I'd like to identify the 'hard parts' among the learning outcomes, and double check that I am isolating, practising, and reintegrating them. I think I am doing this in my aforementioned CS1, where I get learners to practice the newly introduced computing concept before reintegrating it back into the development of the module's demo.

Play Out of Town

We want our learners to be able to transfer their learning: "People learn something in one context, and this informs how well they learn and perform in another context. ... In other words, transfer is a matter of 'playing out of town,' applying the games we learn to bits and pieces of those games not just in their original contexts but elsewhere, in some other setting where they might be helpful." Think about "what is supposed to transfer, to where is it supposed to transfer, and how is the transfer accomplished." Fostering transfer means including "some of the connection making that we hope learners will do later on."

One of the big goals I had when starting our curriculum-aligned work-integrated learning program a few years ago was to help our students see computer science more holistically while making deliberate, explicit connections between academic theory and the industry work they do. Although I don't work on that program directly anymore, I'm always brainstorming ways to do this and making suggestions to the team. My hope is that the result will be better transfer of academic knowledge to the workplace. I'm also hoping to look for more ways to incorporate reflective abstraction and diverse applications into individual learning experiences.

Uncover the Hidden Game

"Any complicated and challenging activity always has multiple layers beneath the obvious. ... The hidden games are not only interesting but often important to doing well at the surface game. ... A great deal of learning proceeds as if there were no hidden games. But there always are. They need attention or the learners will always just be skating on the surface." A few example types of hidden games include the hidden games of strategy, causal thinking, inquiry, and power. Games hide under the rug of simplicity, within the margins of good enough, inside the cloak of the tacit, and beyond the horizon of readiness.

The next time I create a learning experience for developers who want to learn a different language or tech framework, I want to use my subject-matter experts to help me uncover the hidden game of what they do. I think a short lesson on the ideas from the book might help them know what I'm going after, and I can use my own expertise as a practitioner to dig further. I want to make sure the hidden game surfaces in the learning outcomes and therefore the rest of the learning experience.

Learn from the Team

So much of formal education has the expectation of learning solo. Learning from the team means engaging with richer participation structures (how activities are organized through roles and responsibilities) that are more social and collaborative. Effective participation structures include pair problem solving, studio learning, communities of practice, cross-age tutoring, and extreme team learning.

We've used a few of these, some more directly than others. For example, our work-integrated learning students are asked to pair program very early on in their industry-based education paths. As I work on my CS1 course to be delivered to employees, I'm planning on incorporating learning teams, each one assigned its own mentor. I also want to encourage pair or group problem solving and more meaningful peer evaluation opportunities.

Learn the Game of Learning

"Learning to learn has to do with many things: directing one's attention, choosing time and place, relating new ideas and skills to what you already know. Indeed, it has a lot to do with the previous six principles." To uncover the hidden game of learning, learners need to move from the passenger seat into the driver's seat. Skills ranging from problem-solving strategies to time management should be taught explicitly, either as a standalone course or incorporated throughout curriculum.

Our work-integrated learning program already has workshops that help our students learn the game of learning, such as a growth mindset workshop I led. As I continue to read books on how learning works, I'm hoping to compile the fundamentals into an easily-digestible format and potentially a workshop as well. The former could be shared with learners in my courses for employees as well.
          Cloud Computing Service Provider, Comport, Shares the Benefits of Using the Cloud for Your Business      Cache   Translate Page      
...your business. Organizations of all sizes often have a significant amount of data that accumulates over the years. From customer information to corporate data files crucial to keeping the company running smoothly, digital data has become an integral part of the ...

          Program Looking for Steel, Aluminum Project Proposals      Cache   Translate Page      

Lawrence Livermore National Laboratory issued a High Performance Computing for Manufacturing (HPC4Mfg) call for proposals for projects aimed at addressing key challenges in U.S. steel and aluminum manufacturing.


          Accounting Clerk - Gwinnett Place Honda - Duluth, GA      Cache   Translate Page      
The Accounting Clerk is responsible for computing, classifying, recording, and verifying numerical data for use in maintaining accounting records....
From Hendrick Automotive Group - Mon, 27 Aug 2018 23:32:40 GMT - View all Duluth, GA jobs
          Reddit and Wikipedia criticize EU’s controversial copyright law      Cache   Translate Page      

Reddit and Wikipedia are speaking out against the EU's controversial Copyright Directive, which was passed by the European Parliament on Wednesday. Reddit argued that the law is a significant blow to an open internet.

The post Reddit and Wikipedia criticize EU’s controversial copyright law appeared first on Digital Trends.


          Oracle's head of cloud left after butting heads with Larry Ellison, source says (ORCL)      Cache   Translate Page      

Thomas Kurian

  • A source tells Business Insider that 22-year Oracle veteran Thomas Kurian has butted heads with his boss, founder, CTO and executive chairman Larry Ellison.
  • Bloomberg reports that the issue concerns Oracle's strategy on its cloud computing.
  • Kurian may have been advocating for a cloud strategy that is as risky as it is wise.

Last week, the Oracle eco-system was surprised to learn that Thomas Kurian, one of Oracle's longest serving executives in charge of Oracle's all-important cloud business, had left for an extended leave of absence.

Inside Oracle, word is that Kurian's departure was due to butting heads with his boss Larry Ellison, a source tells Business Insider. This person says that Kurian's good-bye was intended as a resignation, although the company says that he has not resigned but is simply "taking some time off. We expect him to return soon," a spokesperson said.

The disagreement seems to have centered on the direction Oracle should take with its bet-the-company cloud computing business, reports Bloomberg.

Sources told Bloomberg that Kurian was pushing Ellison to allow more of Oracle's software to run on clouds that compete with Oracle, particularly market leaders Amazon and Microsoft

If true, this disagreement between the two strategies, and the two men, would not be surprising. Both of them are known for being tough, outspoken and opinionated — characteristics which describe a lot of Oracle's culture.

A page ripped out of the Microsoft playbook

If Kurian is pushing Oracle to embrace multiple clouds — even the clouds of its bitter enemies — the strategy would make a lot of sense.

It's similar to what Microsoft CEO Satya Nadella has done. There was a time when Microsoft's Bill Gates and Steve Ballmer were protectionist about Windows. But, with the rise of cloud computing, Nadella recognized that the world had changed.

Satya NadellaIt became far less important to push people to use Windows than to ensure that Microsoft's enormous catalog of software, particularly Office, could run on any device. So, Microsoft built out its cloud to serve up Office 365 to run on any device; it made sure that its Windows Server software could run on other clouds; and it embraced competitive software, like Linux, on its own cloud.

That way, Microsoft makes money when customers run its software on a competitive cloud (they still have to buy the software) or when they run a competitor's software on their own cloud (they have to pay for Microsoft cloud usage).

Oracle is in a similar quandary but with one key difference: Amazon has become a major threat to Oracle.

Amazon isn't just trying to get Oracle's customers to bring Oracle software to Amazon Web Services (which they can already do), it's trying to get customers to ditch Oracle's database and use Amazon's database instead. Amazon even built a tool to make it easier to move from an Oracle database to an Amazon one. Microsoft also has its own database and has been a bitter competitor with Oracle for years.

So Ellison has been building an Oracle cloud that competes with Amazon (and Microsoft) insisting Oracle's cloud is a faster, better way to run the database. If Oracle's customers don't stay within Oracle's own sphere, Oracle could lose them altogether.

The clock is ticking

Larry EllisonThe problem is, Oracle's cloud is years behind Amazon's in terms of features. It will take Oracle billions of dollars and several years to catch-up, if it even can because Amazon is adding features at an ever increasing rate, hundreds or more per quarter. Microsoft is widely considered the No. 2 cloud.

Enterprise customers are choosing their cloud providers now, based on the features they want and need now.

Oracle may not have years to play catch up. And the person responsible for that catch-up is 22-year Oracle veteran Kurian, and his team. Kurian is the president who heads engineering and product development. About a quarter of the company reports up to him.

There have been signs that Oracle's cloud ambitions are not growing as well as the company wants, too, putting Kurian on the hot seat. Although, to be fair, Oracle is doing a good job in getting many of its customers to sign up for the certain parts of its cloud. They like the cloud versions of its HR, marketing and financial software (similar to how Microsoft moved people from MS Office to Office 365). 

Should Ellison allow more of that software to run on competitors' clouds? And should it partner with its rivals (assuming such partnerships were an option) to run their software on its own cloud?

Probably yes. Other would-be Amazon competitors have either been crushed (Rackspace) or forced to eat crow and partner up (VMware). Once VMware got past the bitter taste, its partnership with Amazon has proved fruitful, filling a need with enterprise customers who want their datacenters to work better with the Amazon cloud (and making Amazon more of a beast, in the process).

But there's no question it's risky, and Ellison certainly wouldn't be crazy for being wary.

Oracle declined comment.

SEE ALSO: Read the email the Oracle executive once rumored to be the next CEO emailed the company to announce his 'extended' leave of absence

SEE ALSO: Elon Musk works so many hours at Tesla, employees are constantly finding him asleep under tables and desks

Join the conversation about this story »

NOW WATCH: An aerospace company reintroduced its precision helicopter with two crossing motors


          Digitalization key to sustainable world energy       Cache   Translate Page      
Just as engineers prefer stable energy sources and processes that run as expected, economists and businesses favor predictable financial streams. Fortunately, both can take advantage of the ongoing emergence of digital technologies, such as software, cloud-computing services and the Industrial Internet of Things (IIoT).
          Associate Customer Technical Support Engineer - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Good understanding of Amazon AWS and/or Microsoft Azure ecosystems. Experience supporting applications running on either Amazon AWS or MS Azure....
From Snowflake Computing - Tue, 11 Sep 2018 22:11:33 GMT - View all Alwal, Hyderabad, Telangana jobs
          Technical Account Manager - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Amazon AWS, Microsoft Azure, OpenStack). Snowflake’s mission is to enable every organization to be data-driven with instant elasticity, secure data sharing and...
From Snowflake Computing - Tue, 11 Sep 2018 22:11:33 GMT - View all Alwal, Hyderabad, Telangana jobs
          Customer Technical Support Engineer - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Good understanding of Amazon AWS and/or Microsoft Azure ecosystems. Experience supporting applications running on either Amazon AWS or MS Azure....
From Snowflake Computing - Tue, 11 Sep 2018 22:11:33 GMT - View all Alwal, Hyderabad, Telangana jobs
          Sr. Solution Architect - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Amazon AWS, Microsoft Azure, OpenStack, etc.). Snowflake’s mission is to enable every organization to be data-driven with instant elasticity, secure data...
From Snowflake Computing - Tue, 11 Sep 2018 22:11:32 GMT - View all Alwal, Hyderabad, Telangana jobs
          Partner Solutions Architect - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Amazon AWS, Microsoft Azure, OpenStack, etc.). Snowflake’s mission is to enable every organization to be data-driven with instant elasticity, secure data...
From Snowflake Computing - Fri, 31 Aug 2018 04:11:36 GMT - View all Alwal, Hyderabad, Telangana jobs
          Senior Manager of Cloud Alliances - Snowflake Computing - Alwal, Hyderabad, Telangana      Cache   Translate Page      
Develop and manage Snowflake's relationship with our Cloud Alliances (Microsoft, Amazon, Google, Tableau, Looker, MicroStrategy, Informatica, Talend and others...
From Snowflake Computing - Thu, 23 Aug 2018 22:11:25 GMT - View all Alwal, Hyderabad, Telangana jobs
          FIU Launches Diversity Mentor Professor Initiative in STEM      Cache   Translate Page      

FIU launches diversity mentor professorship stem 660x440FIU’s Diversity Mentor Professor Initiative is a special program aimed at recruiting multiple excellent STEM faculty with strong research programs to FIU who have a history of and commitment to the mentorship of women and underrepresented minority students in STEM.

The post FIU Launches Diversity Mentor Professor Initiative in STEM appeared first on FIU College of Engineering and Computing.


          Google AI with Jeff Dean      Cache   Translate Page      

Jeff Dean, the lead of Google AI, is on the podcast this week to talk with Melanie and Mark about AI and machine learning research, his upcoming talk at Deep Learning Indaba and his educational pursuit of parallel processing and computer systems was how his career path got him into AI. We covered topics from his team’s work with TPUs and TensorFlow, the impact computer vision and speech recognition is having on AI advancements and how simulations are being used to help advance science in areas like quantum chemistry. We also discussed his passion for the development of AI talent in the content of Africa and the opening of Google AI Ghana. It’s a full episode where we cover a lot of ground. One piece of advice he left us with, “the way to do interesting things is to partner with people who know things you don’t.”

Listen for the end of the podcast where our colleague, Gabe Weiss, helps us answer the question of the week about how to get data from IoT core to display in real time on a web front end.

Jeff Dean

Jeff Dean joined Google in 1999 and is currently a Google Senior Fellow, leading Google AI and related research efforts. His teams are working on systems for speech recognition, computer vision, language understanding, and various other machine learning tasks. He has co-designed/implemented many generations of Google’s crawling, indexing, and query serving systems, and co-designed/implemented major pieces of Google’s initial advertising and AdSense for Content systems. He is also a co-designer and co-implementor of Google’s distributed computing infrastructure, including the MapReduce, BigTable and Spanner systems, protocol buffers, the open-source TensorFlow system for machine learning, and a variety of internal and external libraries and developer tools.

Jeff received a Ph.D. in Computer Science from the University of Washington in 1996, working with Craig Chambers on whole-program optimization techniques for object-oriented languages. He received a B.S. in computer science & economics from the University of Minnesota in 1990. He is a member of the National Academy of Engineering, and of the American Academy of Arts and Sciences, a Fellow of the Association for Computing Machinery (ACM), a Fellow of the American Association for the Advancement of Sciences (AAAS), and a winner of the ACM Prize in Computing.

Cool things of the week
  • Google Dataset Search is in beta site
  • Expanding our Public Datasets for geospatial and ML-based analytics blog
    • Zip Code Tabulation Area (ZCTA) site
  • Google AI and Kaggle Inclusive Images Challenge site
  • We are rated in the top 100 technology podcasts on iTunes site
  • What makes TPUs fine-tuned for deep learning? blog
Interview
  • Jeff Dean on Google AI profile
  • Deep Learning Indaba site
  • Google AI site
  • Google AI in Ghana blog
  • Google Brain site
  • Google Cloud site
  • DeepMind site
  • Cloud TPU site
  • Google I/O Effective ML with Cloud TPUs video
  • Liquid cooling system article
  • DAWNBench Results site
  • Waymo (Alphabet’s Autonomous Car) site
  • DeepMind AlphaGo site
  • Open AI Dota 2 blog
  • Moustapha Cisse profile
  • Sanjay Ghemawat profile
  • Neural Information Processing Systems Conference site
  • Previous Podcasts
    • GCP Podcast Episode 117: Cloud AI with Dr. Fei-Fei Li podcast
    • GCP Podcast Episode 136: Robotics, Navigation, and Reinforcement Learning with Raia Hadsell podcast
    • TWiML & AI Systems and Software for ML at Scale with Jeff Dean podcast
  • Additional Resources
    • arXiv.org site
    • Chris Olah blog
    • Distill Journal site
    • Google’s Machine Learning Crash Course site
    • Deep Learning by Ian Goodfellow, Yoshua Bengio and Aaron Courville book and site
    • NAE Grand Challenges for Engineering site
    • Senior Thesis Parallel Implementations of Neural Network Training: Two Back-Propagation Approaches by Jeff Dean paper and tweet
    • Machine Learning for Systems and Systems for Machine Learning slides
Question of the week

How do I get data from IoT core to display in real time on a web front end?

  • Building IoT Applications on Google Cloud video
  • MQTT site
  • Cloud Pub/Sub site
  • Cloud Functions site
  • Cloud Firestore site
Where can you find us next?

Melanie is at Deep Learning Indaba and Mark is at Tokyo NEXT. We’ll both be at Strangeloop end of the month.

Gabe will be at Cloud Next London and the IoT World Congress.


          Oracle's head of cloud left after butting heads with Larry Ellison, source says (ORCL)      Cache   Translate Page      
Oracle's head of cloud left after butting heads with Larry Ellison, source says (ORCL)#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 · *A source tells Business Insider that 22-year Oracle veteran Thomas Kurian has butted heads with his boss, founder, CTO and executive chairman Larry Ellison.*
· *Bloomberg reports that the issue concerns Oracle's strategy on its cloud computing.*
· *Kurian may have been advocating for ... Reported by Business Insider 39 minutes ago.
          AMD Suggests They Are Helping Sony And Microsoft Build Consoles With New Tech      Cache   Translate Page      

It feels like only yesterday that we were all debating the theoretical specs of the Orbis and Durango, the codenames for the PlayStation 4 and Xbox One respectively, and now we're already talking about the graphical capabilities of their successors. Although Microsoft had already confirmed their next-gen console and Sony has more or less talked around the final years of the PS4, AMD CEO Lisa Su is giving us some more hints about what to expect.

In an interview with CNBC's Jim Cramer, Su said that they are working with Microsoft and Sony on their consoles, and that "they have their owns secret sauce that we're helping them do." While the comment could be read as a description of the PlayStation 4 and Xbox One, there's no real way to interpret the secret sauce comment about either of them. Considering the level of differentiation rumored in the next generation of hardware, Su might have let slip more than she intended.

While AMD used to also power Nintendo's consoles, the two split in favor of Nvidia's mobile technology for the Switch this generation. 

"People need more computing horsepower," Su told Cramer. "Just think about gaming these days with double-digit growth. Whether you're talking about game consoles or you're about PC gaming or you're talking cloud gaming, all of these markets like higher computing power and that's a great place for us to be."

Su also mentioned that AMD is investing heavily in gaming technology that might not be seen for three to five years. It is unclear if she means in AMD's standalone GPU market or within consoles, but Su seems confident that it will be a good long term decision.

If she is right and it takes about three years, that puts it around 2021, which is when Sony says it expects new PlayStation hardware to launch.

[Source: CNBC]


          Executive Administrative Assistant, Human Resources - Laramie County Community College - Cheyenne, WY      Cache   Translate Page      
Advanced working knowledge and ability with personal computing applications – specifically Microsoft Office Suite (e.g., Word, Excel, Outlook, and PowerPoint),... $34,323 - $36,897 a year
From Laramie County Community College - Thu, 23 Aug 2018 00:37:25 GMT - View all Cheyenne, WY jobs
          Administrative Assistant, Life Enrichment - Laramie County Community College - Cheyenne, WY      Cache   Translate Page      
Advanced working knowledge and ability with personal computing applications – specifically Microsoft Office Suite (e.g., Word, Excel, Outlook, and PowerPoint),... $12.07 - $12.97 an hour
From Laramie County Community College - Fri, 17 Aug 2018 18:37:59 GMT - View all Cheyenne, WY jobs
          Full Time Staff Pharmacist - Prince Albert, Saskatchewan - Loblaw Companies Limited - Prince Albert, SK      Cache   Translate Page      
Bachelor of Science, Pharmacy and a Class A Pharmacists license a must. Strong personal computing skills, as well as knowledge of KROLL Pharmacy Computer system...
From Loblaw Companies Limited - Tue, 21 Aug 2018 22:11:17 GMT - View all Prince Albert, SK jobs
          No new Macs, iPad Pros, AirPower or AirPods 2: What we didn't get from Apple today - CNET      Cache   Translate Page      

CNET

No new Macs, iPad Pros, AirPower or AirPods 2: What we didn't get from Apple today
CNET
Alas, there's nothing new yet on the AirPods front. Óscar Gutiérrez/CNET. Apple's Sept. 12 iPhone event has come and gone and -- no surprise -- it was about iPhones. Or mostly anyway. Apple also introduced the Apple Watch Series 4, but what about all ...
Kuo: 2019 iPhones Unlikely to Feature Time-of-Flight 3D Sensor in Rear CameraMac Rumors
Apple's upcoming iPad Pro rumored to switch from Lightning to USB-CThe Verge
7 must-have accessories for your favorite Apple productsEngadget
VentureBeat -Business Insider -Digital Trends -Ubergizmo
all 228 news articles »

          On This Day in Math - September 13      Cache   Translate Page      

Proof is the idol before whom the pure mathematician tortures himself.
~Sir Arthur Eddington


The 256th day of the year; 256 is the smallest composite to composite power,44.

Paul Erdos conjectured that no power of 2 is the sum of distinct powers of three.

from jim wilder @ wilderlab √256 = 2 • 5 + 6

The sum of the cubes of the first 256 odd numbers is a perfect number. \( \sum\limits_{i=0}^{255} (2i+1)^3 = 8589869056\) the 6th perfect number. (all perfect numbers (except 6) are the sum of the cubes of first 2n odd cubes for some (but not all) n) (so \( 28 = 1^3 + 3^3\) and \( 496=1^3 + 3^3 + 5^3 + 7^3\)  ).

256 is the middle number in a run of three successive numbers which are all constructible regular n-gons. 255= 3*5*17, is the product of distinct Fermat Primes, 256=28 and is a power of two, and 257 is a Fermat Prime. *HT to Don S. McDonald ‏@McDONewt


EVENTS

1763 Christopher Irwin’s marine chairs were loaded onto the Princess Louisa to head off to Barbados. Irwin’s chair was being tested alongside Tobias Mayer’s lunar tables and John Harrison’s sea watch.
On 13 September 1763, the log of Lieutenant Patrick Fotheringham records how the ship “Came alongside a Hoy with two Marine Chairs and apparatus for observing the Planet Jupiter in order to finding yet Longde. at Sea the Commissioners for ye Discovery to examine these Machines under ye Direction of Adml. Tyrrell in ye course of his Voyage; Do. came on Bd Mr. Christopher Erwin the Inventor of ye Marine Machine”. *Board of Longitude project, Greenwich

1789 Wm. Herschel writes to Wollaston, "I have found that Saturn has a satellite which has hitherto escaped our observation...".
* buffalolib.org 

Francis Wollaston (23 November 1731, London – 31 October 1815) was an English priest and astronomer.He achieved some distinction as an astronomer, becoming a member of the Royal Society in 1769 and later serving on its council. He also produced a catalog of stars and nebulae in 1789, which was used by many including his friend, William Herschel, about which he comments near the bottom of the letter.

1844 The term ABELIAN INTEGRAL is found in a letter of Sept. 8, 1844, from William Henry Fox Talbot: "What is the definition of an Abelian Integral? for it appears to me that most integrals possess the Abelian property." The letter was addressed to John Frederick William Herschel, who, in his reply of Sept. 13, 1844, wrote: "I suppose the most general definition of an Abelian Integral might be taken to be this that between ∫(x) and ∫(φ(x)) there shall subsist an algebraical relation between several such functions."  As a postscript, he adds that "a very curious photographic novelty occurred to me a day or 2 ago" in which he describes how to use a negative to create a positive image.(Talbot's original contributions included the concept of a negative from which many positive prints can be made (although the terms negative and positive were coined by Herschel), and the use of gallic acid for developing the latent image. [The Talbot letters are available here. ] *Jeff Miller Web site & Wik

1883 Opening of the University of Texas at Austin and Galveston. *VFR

1890 Scientific American carried an article featuring the latest writing technology for the classroom, a slate pen-tip eraser. The device, invented by Mrs Emma Hudson, nestled a piece of sponge inside a rubber casing which could be wetted to remove some, or all, of the marks on a student slate. (The first pencil tip eraser for a lead pencil had been invented in 1858.)


1955 Minor Planet (3167) Babcock 1955 RS. Discovered 1955 September 13 at the Goethe Link Observatory at Brooklyn, Indiana. Named in memory of Harold D. Babcock (1882-1968) and in honor of his son Horace W. Babcock, (on whose birthday it was discovered, see BIRTHS below) astronomers at Mount Wilson Observatory, the latter also serving as director of Palomar Observatory. The elder Babcock's precise laboratory studies of atomic spectra allowed others to identify the first "forbidden" lines in the laboratory and to discover the rare isotopes of oxygen. With C. E. St. John and others, he extended Rowland's tables of the solar spectrum into the ultraviolet and infrared. The Babcocks ruled excellent large gratings, including those used in the coudé spectrographs of the 2.5-m and 5-m telescopes, and they measured the distribution of magnetic fields over the solar surface to unprecedented precision. The younger Babcock invented and built many astronomical instruments, including the solar magnetograph, microphotometers and automatic guiders. By combining his polarization analyzer with the spectrograph he discovered magnetic fields in other stars, and he developed important models of sunspots and their magnetism. (M 15089) Name proposed by F. K. Edmondson. *NSEC

1959 Lunik II hit the moon, being the first man-made object to do so.In 1959, the first space probe to strike the moon was the Soviet Luna 2, which crashed east of the Sea of Serenity. Thirty-six hours after its launch, it was the first man-made object to reach a celestial body. *TIS On September 15, 1959, the premier of the USSR, Nikita Khrushchev, presented to the American president Dwight D. Eisenhower a copy of the spherical pennant (used onboard the Luna 2) as a gift. That sphere is located at the Eisenhower Presidential Library and Museum in Abilene, Kansas.*Wik The actual time of collision was September 13, 1959, 21:02:24 UTC

1983 Osborne Computer declares bankruptcy, two years after producing the first portable computer, the 24-pound Osborne I. Designed by company founder Adam Osborne, the \($1,795\) machine included software worth about \($1,500\). The machine featured a 5-inch display, 64 kilobytes of memory, a modem, and two 5 1/4-inch floppy disk drives.
In April 1981, Byte Magazine Editor-in-Chief Chris Morgan mentioned the Osborne I in an article on Future Trends in Personal Computing. He wrote: I recently had an opportunity to see the Osborne I in action. I was impressed with it's compactness: it will fit under an airplane seat. (Adam Osborne is currently seeking approval from the FAA to operate the unit on board a plane.) One quibble: the screen may be too small for some people's taste.*CHM

2007 Closing date for a prize for a solution to Fermat’s last theorem. Due to inflation the prize of one hundred thousand marks has long been worthless.*VFR (perhaps not completely worthless.) In 1908 The academy of sciences of Gottingen announced a prize of one hundred thousand marks, according to the will of Dr. Paul Wolfskehl, of Darmstadt, for the proof of Fermat’s great theorem. A German industrialist and amateur mathematician, Wolfskehl bequeathed 100,000 marks to the Göttingen Academy of Sciences to be offered as a prize for a complete proof of Fermat's Last Theorem. On 27 June 1908, the Academy published nine rules for awarding the prize. Among other things, these rules required that the proof be published in a peer-reviewed journal; the prize would not be awarded for two years after the publication; and that no prize would be given after 13 September 2007, roughly a century after the competition was begun. Wiles collected the Wolfskehl prize money, then worth $50,000, on 27 June 1997.
Prior to Wiles' proof, thousands of incorrect proofs were submitted to the Wolfskehl committee, amounting to roughly 10 feet (3 meters) of correspondence. In the first year alone (1907–1908), 621 attempted proofs were submitted, although by the 1970s, the rate of submission had decreased to roughly 3–4 attempted proofs per month. According to F. Schlichting, a Wolfskehl reviewer, most of the proofs were based on elementary methods taught in schools, and often submitted by "people with a technical education but a failed career". In the words of mathematical historian Howard Eves, "Fermat's Last Theorem has the peculiar distinction of being the mathematical problem for which the greatest number of incorrect proofs have been published."*Wik



BIRTHS

1873 Constantin Caratheodory born. (13 Sep 1873; 2 Feb 1950) He worked on the calculus of variations and the theory of real functions. He is the only modern Greek mathematician “who does not suffer by comparison with the famous names of Greek antiquity.” *VFR.
German mathematician of Greek origin who made important contributions to the theory of real functions and to the theory of point-set measure. He demonstrated that the calculus of variations (the theory of maxima and minima in curves) could be applied not just to smooth curves, but also those with corners. He also contributed to thermodynamics and helped develop Einstein's special theory of relativity. *TIS

1885 Wilhelm Blaschke  (13 Sep 1885; 17 Mar 1962) German mathematician whose major contributions to geometry concerned kinematics and differential geometry. Kinetic mapping (important later in the axiomatic foundations of various geometries) he both discovered and established it as a tool in kinematics. He also initiated topological differential geometry (the study of invariant differentiable mappings)*TIS

1912 Horace Welcome Babcock (13 Sep 1912; 29 Aug 2003) was a American astronomer, son of Harold Babcock. Working together, they were the first to measure the distribution of magnetic fields over the surface of the Sun. Horace invented and built many astronomical instruments, including a ruling engine which produced excellent diffraction gratings, the solar magnetograph, and microphotometers, automatic guiders, and exposure meters for the 100 and 200-inch telescopes. By combining his polarizing analyzer with the spectrograph he discovered magnetic fields in other stars. He developed important models of sunspots and their magnetism, and was the first to propose adaptive optics.*TIS

1913 Herman Heine Goldstine (September 13, 1913 – June 16, 2004), mathematician, computer scientist and scientific administrator, was one of the original developers of ENIAC, the first of the modern electronic digital computers.*Wik

1920 William Bowen Bonnor (September 13, 1920 - ) is a mathematician and gravitation physicist best known for his research into astrophysics, cosmology and general relativity. For most of his academic career he has been a professor of mathematics at the University of London.*Wik

1923 Peter K Henrici (13 Sept 1923 , 13 March 1987) He made "major contributions to preserving and enriching our mathematical heritage. His books and papers have helped greatly in maintaining numerical analysis as a subject with beauty, order, and structure, in the spirit of the great pioneers of the past. He keeps reminding us to ask what Gauss would have done with a parallel computer - or with a pocket calculator."
"Henrici was truly an internationally recognized numerical analyst, having written 11 books and over 80 research papers. A very cultured person who was also a gifted pianist, he was an outstanding teacher particularly interested in helping younger mathematicians. His lectures showed great polish and inspired many. His guidance and unselfish contributions as an editor have helped make Numerische Mathematik the respected journal it is. For this alone, we owe him a great debt of gratitude." *SAU

1926 Sidney David Drell (born September 13, 1926, Atlantic City) is an American theoretical physicist and arms control expert. He is a professor emeritus at the Stanford Linear Accelerator Center (SLAC) and a senior fellow at Stanford University's Hoover Institution. Drell is a noted contributor in the field of quantum electrodynamics and particle physics. The Drell–Yan process is partially named after him. He was one of the winners of the 2000 Enrico Fermi Award.*Wik



DEATHS

1296 Johannes Campanus (1220 in Novara, Italy - 13 Sept 1296 in Viterbo, Italy) also known as Campanus of Novara, was an Italian mathematician who published a Latin edition of Euclid's Elements. He also wrote on astronomy.*SAU

1940 Myron Mathisson (15 Dec 1897 , 13 Sept 1940) was a Polish Jew known for his work on the equations of motion of bodies in general relativity and for developing a new method to analyze the properties of fundamental solutions of linear hyperbolic differential equations. In particular, he derived the equations for a spinning body moving in a gravitational field and proved, in a special case, the Hadamard conjecture on the class of equations that satisfy the Huygens principle. His work still exerts influence on current research.*Cornell Univ Library


Credits :
*CHM=Computer History Museum
*FFF=Kane, Famous First Facts
*NSEC= NASA Solar Eclipse Calendar
*RMAT= The Renaissance Mathematicus, Thony Christie
*SAU=St Andrews Univ. Math History
*TIA = Today in Astronomy
*TIS= Today in Science History
*VFR = V Frederick Rickey, USMA
*Wik = Wikipedia
*WM = Women of Mathematics, Grinstein & Campbell
          ebook: Aggregating Data with Apache Spark™      Cache   Translate Page      
Learn why cluster computing makes Spark the ideal processing engine for complex aggregations, the different types of aggregations that you can do with Spark, and more.
          What is serverless?      Cache   Translate Page      
https://enterprisersproject.com/article/2018/9/what-serverless

Let’s examine serverless and Functions-as-a-Service (FaaS), how they fit together, and where they do and don’t make sense

By
CIO digital transformation
You likely have heard the term serverless (and wondered why someone thought it didn’t use servers). You may have heard of Functions-as-a-Service (FaaS) – perhaps in the context of Lambda from Amazon Web Services, introduced in 2014. You’ve probably encountered event-driven programming in some form. How do all these things fit together and, more importantly, when might you consider using them? Read on.
Servers are still involved; developers just don’t need to think about them in a traditional way.
Let’s start with FaaS. With FaaS, you write code to accomplish some specific task and upload the code for our function to a FaaS provider. The public cloud provider or on-premise platform then does everything else necessary to provision, run, scale, and manage the code. As a developer, you don’t need to do anything other than write your code and wire it up to other functions and services. FaaS provides programmers with an abstraction that allows them to focus on just writing code that takes action in response to events rather than interacting with the underlying server (whether bare metal, virtualized, or containerized).
[ Struggling to explain containers to non-techies? Read also: How to explain containers in plain English. ]
Now enter event-driven programming. Functions run in response to external events. It could be a call generated by a mouse click in a web app. But it could also be in response to some other action. For example, uploading a media file could trigger custom code that transcodes the file into a variety of formats.
Serverless then describes a set of architectural patterns that build on FaaS. Serverless combines custom FaaS code with common back-end services (such as databases and authentication) connected primarily through an event-driven execution model. From the perspective of a developer, these services are all managed by a third-party (whether an ops team or an external provider). Of course, servers are still involved; developers just don’t need to think about them in a traditional way.

Why serverless?

Serverless is an emerging technology area. There’s a lot of interest in the technology and approach although it’s early on and has yet to appear on many enterprise IT radar screens. To understand the interest, it’s useful to consider serverless from both operations and developer perspectives.
PaaS and FaaS are best thought of as being on a continuum rather than being entirely discrete.
For operations teams, one of the initial selling points of FaaS on public clouds was its pricing model. By paying only for an ephemeral (typically stateless) function while it was executing, you “didn’t pay for idle.” In general, while this aspect of serverless is still important to some, it’s less emphasized today. As a broader concept that brings in a wide range of services of which FaaS is just one part, the FaaS pricing model by itself is less relevant.
However, pricing model aside, serverless also allows operations teams to provide developers with a self-service platform and then get out of the way. This is a concept that has been present in platforms like OpenShift from the beginning. Serverless effectively extends the approach for certain types of applications.
The arguably more important aspect of serverless is increased developer productivity. This has two different aspects.
The first is that, as noted earlier, FaaS abstracts away many of the housekeeping details associated with server provisioning and management that are often just overhead for developers. In practice, this may not appear all that different to developers than a Platform-as-a-Service (PaaS). FaaS can even use containers under the covers just like a PaaS typically does. PaaS and FaaS are best thought of as being on a continuum rather than being entirely discrete.
The second is that, by offering common managed services out of the box, developers don’t need to constantly recreate them for new applications.

Where does serverless fit?

Serverless targets specific architectural patterns. As described earlier, it’s more or less wedded to a programming model in which functions and services react to each other in an event-driven and largely asynchronous way. Functions themselves are generally expected to be stateless, handle single tasks, and finish quickly. The fact that the interactions between services and functions are all happening over the network also means that the application as a whole should be fairly tolerant of latencies in these interactions.
You can think of FaaS as both simplifying and limiting.
While there are overlaps between the technologies used by FaaS, microservices, and even coarser-grained architectural patterns, you can think of FaaS as both simplifying and limiting. FaaS requires you to be more prescriptive about how you write applications.
Although serverless was originally most associated with public cloud providers, that comes with a caveat. Serverless, as implemented on public clouds, has a high degree of lock-in to a specific cloud vendor. This is true to some degree even with FaaS, but serverless explicitly encourages bringing in a variety of cloud provider services that are incompatible to varying degrees with other providers and on-premise solutions.
As a result, there’s considerable interest in and work going into open source implementations of FaaS and serverless, such as Knative and OpenWhisk, so that users can write applications that are portable across different platforms.
[ What's next for portable apps? Read also: Disrupt or be disrupted: 3 trends enabling next-level IT agility. ]

The speedy road ahead

Building more modern applications is a top priority for IT executives as part of their digital transformation journeys; it’s seen as the key ingredient to moving faster. To that end, organizations across a broad swath of industries are seeking ways to create new applications more quickly. Doing so involves both making traditional developers more productive and seeking ways to lower the barriers to software development for a larger pool of employees.
Serverless is an important emerging service implementation architecture that will be a good fit for certain types of applications. It will coexist with, rather than replace, architecture alternatives such as microservices used with containers and even just virtual machines. All of these architectural choices support a general trend toward simplifying the developer experience and making developers more productive.

          5 tips to improve productivity with zsh      Cache   Translate Page      
https://opensource.com/article/18/9/tips-productivity-zsh

The zsh shell offers countless options and features. Here are 5 ways to boost your efficiency from the command line.

computer screen
Image by : 
opensource.com
x

Get the newsletter

Join the 85,000 open source advocates who receive our giveaway alerts and article roundups.
The Z shell known as zsh is a shell for Linux/Unix-like operating systems. It has similarities to other shells in the sh (Bourne shell) family, such as as bash and ksh, but it provides many advanced features and powerful command line editing options, such as enhanced Tab completion.
It would be impossible to cover all the options of zsh here; there are literally hundreds of pages documenting its many features. In this article, I'll present five tips to make you more productive using the command line with zsh.

1. Themes and plugins

Through the years, the open source community has developed countless themes and plugins for zsh. A theme is a predefined prompt configuration, while a plugin is a set of useful aliases and functions that make it easier to use a specific command or programming language.
The quickest way to get started using themes and plugins is to use a zsh configuration framework. There are many available, but the most popular is Oh My Zsh. By default, it enables some sensible zsh configuration options and it comes loaded with hundreds of themes and plugins.
A theme makes you more productive as it adds useful information to your prompt, such as the status of your Git repository or Python virtualenv in use. Having this information at a glance saves you from typing the equivalent commands to obtain it, and it's a cool look. Here's an example of Powerlevel9k, my theme of choice:

zsh_theme_small.png

zsh Powerlevel9K theme
The Powerlevel9k theme for zsh
In addition to themes, Oh My Zsh bundles tons of useful plugins for zsh. For example, enabling the Git plugin gives you access to a number of useful aliases, such as:


$ alias | grep -i git | sort -R | head -10

g=git

ga='git add'

gapa='git add --patch'

gap='git apply'

gdt='git diff-tree --no-commit-id --name-only -r'

gau='git add --update'

gstp='git stash pop'

gbda='git branch --no-color --merged | command grep -vE "^(\*|\s*(master|develop|dev)\s*$)" | command xargs -n 1 git branch -d'

gcs='git commit -S'

glg='git log --stat'


There are plugins available for many programming languages, packaging systems, and other tools you commonly use on the command line. Here's a list of plugins I use in my Fedora workstation:
git golang fedora docker oc sudo vi-mode virtualenvwrapper

2. Clever aliases

Aliases are very useful in zsh. Defining aliases for your most-used commands saves you a lot of typing. Oh My Zsh configures several useful aliases by default, including aliases to navigate directories and replacements for common commands with additional options such as:


ls='ls --color=tty'

grep='grep  --color=auto --exclude-dir={.bzr,CVS,.git,.hg,.svn}'


In addition to command aliases, zsh enables two additional useful alias types: the suffix alias and the global alias.
A suffix alias allows you to open the file you type in the command line using the specified program based on the file extension. For example, to open YAML files using vim, define the following alias:
alias -s {yml,yaml}=vim
Now if you type any file name ending with yml or yaml in the command line, zsh opens that file using vim:


$ playbook.yml

# Opens file playbook.yml using vim


A global alias enables you to create an alias that is expanded anywhere in the command line, not just at the beginning. This is very useful to replace common filenames or piped commands. For example:
alias -g G='| grep -i'
To use this alias, type G anywhere you would type the piped command:


$ ls -l G do

drwxr-xr-x.  5 rgerardi rgerardi 4096 Aug  7 14:08 Documents

drwxr-xr-x.  6 rgerardi rgerardi 4096 Aug 24 14:51 Downloads


Next, let's see how zsh helps to navigate the filesystem.

3. Easy directory navigation

When you're using the command line, navigating across different directories is one of the most common tasks. Zsh makes this easier by providing some useful directory navigation features. These features are enabled with Oh My Zsh, but you can enable them by using this command:
setopt  autocd autopushd \ pushdignoredups
With these options set, you don't need to type cd to change directories. Just type the directory name, and zsh switches to it:


$ pwd

/home/rgerardi

$ /tmp

$ pwd

/tmp


To move back, type -:
Zsh keeps the history of directories you visited so you can quickly switch to any of them. To see the list, type dirs -v:


$ dirs -v

0       ~

1       /var/log

2       /var/opt

3       /usr/bin

4       /usr/local

5       /usr/lib

6       /tmp

7       ~/Projects/Opensource.com/zsh-5tips

8       ~/Projects

9       ~/Projects/ansible

10      ~/Documents


Switch to any directory in this list by typing ~# where # is the number of the directory in the list. For example:


$ pwd

/home/rgerardi

$ ~4

$ pwd

/usr/local


Combine these with aliases to make it even easier to navigate:


d='dirs -v | head -10'

1='cd -'

2='cd -2'

3='cd -3'

4='cd -4'

5='cd -5'

6='cd -6'

7='cd -7'

8='cd -8'

9='cd -9'


Now you can type d to see the first ten items in the list and the number to switch to it:


$ d

0       /usr/local

1       ~

2       /var/log

3       /var/opt

4       /usr/bin

5       /usr/lib

6       /tmp

7       ~/Projects/Opensource.com/zsh-5tips

8       ~/Projects

9       ~/Projects/ansible

$ pwd

/usr/local

$ 6

/tmp

$ pwd

/tmp


Finally, zsh automatically expands directory names with Tab completion. Type the first letters of the directory names and TAB to use it:


$ pwd

/home/rgerardi

$ p/o/z (TAB)

$ Projects/Opensource.com/zsh-5tips/


This is just one of the features enabled by zsh's powerful Tab completion system. Let's look at some more.

4. Advanced Tab completion

Zsh's powerful completion system is one of its hallmarks. For simplification, I call it Tab completion, but under the hood, more than one thing is happening. There's usually expansion and command completion. I'll discuss them together here. For details, check this User's Guide.
Command completion is enabled by default with Oh My Zsh. To enable it, add the following lines to your .zshrc file:


autoload -U compinit

compinit


Zsh's completion system is smart. It tries to suggest only items that can be used in certain contexts—for example, if you type cd and TAB, zsh suggests only directory names as it knows cd does not work with anything else.
Conversely, it suggests usernames when running user-related commands or hostnames when using ssh or ping, for example.
It has a vast completion library and understands many different commands. For example, if you're using the tar command, you can press Tab to see a list of files available in the package as candidates for extraction:


$ tar -xzvf test1.tar.gz test1/file1 (TAB)

file1 file2


Here's a more advanced example, using git. In this example, when typing TAB, zsh automatically completes the name of the only file in the repository that can be staged:


$ ls

original  plan.txt  zsh-5tips.md  zsh_theme_small.png

$ git status

On branch master

Your branch is up to date with 'origin/master'.



Changes not staged for commit:

  (use "git add ..." to update what will be committed)

  (use "git checkout -- ..." to discard changes in working directory)



        modified:   zsh-5tips.md



no changes added to commit (use "git add" and/or "git commit -a")

$ git add (TAB)

$ git add zsh-5tips.md


It also understands command line options and suggests only the ones that are relevant to the subcommand selected:


$ git commit - (TAB)

--all                  -a       -- stage all modified and deleted paths

--allow-empty                   -- allow recording an empty commit

--allow-empty-message           -- allow recording a commit with an empty message

--amend                         -- amend the tip of the current branch

--author                        -- override the author name used in the commit

--branch                        -- show branch information

--cleanup                       -- specify how the commit message should be cleaned up

--date                          -- override the author date used in the commit

--dry-run                       -- only show the list of paths that are to be committed or not, and any untracked

--edit                 -e       -- edit the commit message before committing

--file                 -F       -- read commit message from given file

--gpg-sign             -S       -- GPG-sign the commit

--include              -i       -- update the given files and commit the whole index

--interactive                   -- interactively update paths in the index file

--message              -m       -- use the given message as the commit message

... TRUNCATED ...


After typing TAB, you can use the arrow keys to navigate the options list and select the one you need. Now you don't need to memorize all those Git options.
There are many options available. The best way to find what is most helpful to you is by using it.

5. Command line editing and history

Zsh's command line editing capabilities are also useful. By default, it emulates emacs. If, like me, you prefer vi/vim, enable vi bindings with the following command:
$ bindkey -v
If you're using Oh My Zsh, the vi-mode plugin enables additional bindings and a mode indicator on your prompt—very useful.
After enabling vi bindings, you can edit the command line using vi commands. For example, press ESC+/ to search the command line history. While searching, pressing n brings the next matching line, and N the previous one. Most common vi commands work after pressing ESC such as 0 to jump to the start of the line, $ to jump to the end, i to insert, a to append, etc. Even commands followed by motion work, such as cw to change a word.
In addition to command line editing, zsh provides several useful command line history features if you want to fix or re-execute previous used commands. For example, if you made a mistake, typing fc brings the last command in your favorite editor to fix it. It respects the $EDITOR variable and by default uses vi.
Another useful command is r, which re-executes the last command; and r , which executes the last command that contains the string WORD.
Finally, typing double bangs (!!) brings back the last command anywhere in the line. This is useful, for instance, if you forgot to type sudo to execute commands that require elevated privileges:


$ less /var/log/dnf.log

/var/log/dnf.log: Permission denied

$ sudo !!

$ sudo less /var/log/dnf.log


These features make it easier to find and re-use previously typed commands.

Where to go from here?

These are just a few of the zsh features that can make you more productive; there are many more. For additional information, consult the following resources:
An Introduction to the Z Shell
A User's Guide to ZSH
Archlinux Wiki
zsh-lovers
Do you have any zsh productivity tips to share? I would love to hear about them in the comments below.

          China's 'Digital' Totalitarian Experiment      Cache   Translate Page      

Authored by Gordon Chang via The Gatestone Institute,

  • China's "social credit" system, which will assign every person a constantly updated score based on observed behaviors, is designed to control conduct by giving the ruling Communist Party the ability to administer punishments and hand out rewards. The former deputy director of the State Council's development research center says the system should be administered so that "discredited people become bankrupt".

  • Officials prevented Liu Hu, a journalist, from taking a flight because he had a low score. According to the Communist Party-controlled Global Times, as of the end of April 2018, authorities had blocked individuals from taking 11.14 million flights and 4.25 million high-speed rail trips.

  • Chinese officials are using the lists for determining more than just access to planes and trains. "I can't buy property. My child can't go to a private school," Liu said. "You feel you're being controlled by the list all the time."

  • Chinese leaders have long been obsessed with what Jiang Zemin in 1995 called "informatization, automation, and intelligentization," and they are only getting started Given the capabilities they are amassing, they could, the argument goes, make defiance virtually impossible. The question now is whether the increasingly defiant Chinese people will accept President Xi's all-encompassing vision.

By 2020, Chinese officials plan to have about 626 million surveillance cameras operating throughout the country. Those cameras will, among other things, feed information into a national "social credit system."

That system, when it is in place in perhaps two years, will assign to every person in China a constantly updated score based on observed behaviors. For example, an instance of jaywalking, caught by one of those cameras, will result in a reduction in score.

Although officials might hope to reduce jaywalking, they seem to have far more sinister ambitions, such as ensuring conformity to Communist Party political demands. In short, the government looks as if it is determined to create what the Economist called "the world's first digital totalitarian state."

China's President Xi Jinping is not merely an authoritarian leader. He evidently believes the Party must have absolute control over society and he must have absolute control over the Party. He is taking China back to totalitarianism as he seeks Mao-like control over all aspects of society. (Photo by Lintao Zhang/Getty Images)

That social credit system, once perfected, will surely be extended to foreign companies and individuals.

At present, there are more than a dozen national blacklists, and about three dozen various localities have been operating experimental social credit scoring systems. Some of those systems have failed miserably. Others, such as the one in Rongcheng in Shandong province, have been considered successful.

In the Rongcheng system, each resident starts with 1,000 points, and, based upon their changing score, are ranked from A+++ to D. The system has affected behavior: incredibly for China, drivers stop for pedestrians at crosswalks.

Drivers stop at crosswalks because residents in that city have, as Foreign Policyreported, "embraced" the social credit system. Some like the system so much that they have set up micro social credit systems in schools, hospitals, and neighborhoods. Social credit systems obviously answer a need for what people in other societies take for granted.

Yet, can what works on a city level be extended across China? As technology advances and data banks are added, the small experimental programs and the national lists will eventually be merged into one countrywide system. The government has already begun to roll out its "Integrated Joint Operations Platform," which aggregates data from various sources such as cameras, identification checks, and "wifi sniffers."

So, what will the end product look like? "It will not be a unified platform where one can type in his or her ID and get a single three-digit score that will decide their lives," Foreign Policy says.

Despite the magazine's assurances, this type of system is precisely what Chinese officials say they want. After all, they tell us the purpose of the initiative is to "allow the trustworthy to roam everywhere under heaven while making it hard for the discredited to take a single step."

That description is not an exaggeration. Officials prevented Liu Hu, a journalist, from taking a flight because he had a low score. The Global Times, a tabloid that belongs to the Communist Party-owned People's Dailyreported that, as of the end of April 2018, authorities had blocked individuals from taking 11.14 million flights and 4.25 million high-speed rail trips.

Chinese officials, however, are using the lists for determining more than just access to planes and trains. "I can't buy property. My child can't go to a private school," Liu said. "You feel you're being controlled by the list all the time."

The system is designed to control conduct by giving the ruling Communist Party the ability to administer punishments and hand out rewards. And the system could end up being unforgiving. Hou Yunchun, a former deputy director of the State Council's development research center, said at a forum in Beijing in May that the social credit system should be administered so that "discredited people become bankrupt".

"If we don't increase the cost of being discredited, we are encouraging discredited people to keep at it," Hou said. "That destroys the whole standard."

Not every official has such a vindictive attitude, but it appears that all share the assumption, as the dovish Zhi Zhenfeng of the Chinese Academy of Social Sciences said, that "discredited people deserve legal consequences."

President Xi Jinping, the final and perhaps only arbiter in China, has made it clear how he feels about the availability of second chances. "Once untrustworthy, always restricted," the Chinese ruler says.

What happens, then, to a country where only the compliant are allowed to board a plane or be rewarded with discounts for government services? No one quite knows because never before has a government had the ability to constantly assess everyone and then enforce its will. The People's Republic has been more meticulous in keeping files and ranking residents than previous Chinese governments, and computing power and artificial intelligence are now giving China's officials extraordinary capabilities.

Beijing is almost certain to extend the social credit system, which has roots in attempts to control domestic enterprises, to foreign companies. Let us remember that Chinese leaders this year have taken on the world's travel industry by forcing hotel chains and airlines to show Taiwan as part of the People's Republic of China, so they have demonstrated determination to intimidate and punish. Once the social credit system is up and running, it would be a small step to include non-Chinese into that system, extending Xi's tech-fueled totalitarianism to the entire world.

The dominant narrative in the world's liberal democracies is that tech favors totalitarianism. It is certainly true that, unrestrained by privacy concerns, hardline regimes are better able to collect, analyze, and use data, which could provide a decisive edge in applying artificial intelligence A democratic government may be able to compile a no-fly list, but none could ever come close to implementing Xi Jinping's vision of a social credit system.

Chinese leaders have long been obsessed with what then-President Jiang Zemin in 1995 called "informatization, automation, and intelligentization," and they are only getting started. Given the capabilities they are amassing, they could, the argument goes, make defiance virtually impossible.

Technology might even make liberal democracy and free-markets "obsolete" writesYuval Noah Harari of the Hebrew University of Jerusalem in the Atlantic. "The main handicap of authoritarian regimes in the 20th century — the desire to concentrate all information and power in one place — may become their decisive advantage in the 21st century," he writes.

There is no question that technology empowers China's one-party state to repress people effectively. Exhibit A for this proposition is, of course, the country's social credit system.

Yet China's communists will probably overreach. The country's experience so far with social credit systems suggests that officials are their own worst enemies. An early experiment to build such a system in Suining county in Jiangsu province was a failure:

"Both residents and state media blasted it for its seemingly unfair and arbitrary criteria, with one state-run newspaper comparing the system to the 'good citizen' certificates issued by Japan during its wartime occupation of China."

The Rongcheng system has been more successful because its scope has been relatively modest.

Xi Jinping will not be as restrained as Rongcheng's officials. He evidently believes the Party must have absolute control over society and he must have absolute control over the Party. It is simply inconceivable that he will not include in the national social credit system, when it is stitched together, political criteria. Already Chinese officials are trying to use artificial intelligence to predict anti-Party behavior.

Xi Jinping is not merely an authoritarian leader, as it is often said. He is taking China back to totalitarianism as he seeks Mao-like control over all aspects of society.

The question now is whether the increasingly defiant Chinese people will accept Xi's all-encompassing vision. In recent months, many have taken to the streets: truck drivers striking over costs and fees, army veterans marching for pensions, investors blocking government offices to get money back from fraudsters, Muslims surrounding mosques to stop demolition, and parents protesting the scourge of adulterated vaccines, among others. Chinese leaders obviously think their social credit system will stop these and other expressions of discontent.

Let us hope that China's people are not in fact discouraged. Given the breadth of the Communist Party's ambitions, everyone, Chinese or not, has a stake in seeing that Beijing's digital totalitarianism fails.


          Hawes & Curtis implements retail systems from Eurostop to enhance Customer Service      Cache   Translate Page      
Jermyn Street shirt retailer, owned by Dragon Touker Suleyman, is in the final stages of installing Eurostop CRM software and connected stock systems to increase focus on customer service. Eurostop,...
       

          Take back control of your email with revolutionary Siccura Safemail app      Cache   Translate Page      
• Stop prying eyes • Keep your content rights and existing email accounts! • Recall or destroy emails at any time • Military grade encryption keeps content secure London, 12th September 201...
       

          Finalists for The British Legal Technology Awards 2018 – Official announcement      Cache   Translate Page      
Finalists for the second ever British Legal Technology Awards (BLTA) have just been announced. The announcements are listed on the official British Legal Technology Awards website – www. britishleg...
       

          Is it really a ‘tug of war’ in contact centers? asks Teleopti      Cache   Translate Page      
When operations wants one thing and agents want another the atmosphere can become tense. Karim Chabane at Teleopti reveals how to work as a team and outlines several Workforce Management (WFM) practi...
       

          Nvidia launches the Tesla T4, its fastest data center inferencing platform yet      Cache   Translate Page      
Nvidia today announced its new GPU for machine learning and inferencing in the data center. The new Tesla T4 GPUs (where the ‘T’ stands for Nvidia’s new Turing architecture) are the successors to the current batch of P4 GPUs that virtually every major cloud computing provider now offers. Google, Nvidia said, will be among the […]
          Nvidia launches the Tesla T4, its fastest data center inferencing platform yet      Cache   Translate Page      
Nvidia today announced its new GPU for machine learning and inferencing in the data center. The new Tesla T4 GPUs (where the ‘T’ stands for Nvidia’s new Turing architecture) are the successors to the current batch of P4 GPUs that virtually every major cloud computing provider now offers. Google, Nvidia said, will be among the […]
          Cloud Computing Stack Layers Market 2018: Growth Factors, Applications, Regional Analysis, Key Players and Forecast By 2025      Cache   Translate Page      
Mart Research Published “Global Cloud Computing Stack Layers Market” Research Report Which Provides Industry Share, Key Players, Regions and Revenue. Key Content of Chapters (Including and can be customized, report is a semi-finished version, and it takes 48-72 hours to upgrade) Part 1: Terminology Definition, Industry Chain, Industry Dynamics & Regulations and Global Market Overview Part […]
          News September 12      Cache   Translate Page      
The Center for Women in Technology (CWIT) at UMBC is pleased to invite high-achieving high school girls who are interested in pursuing computing and engineering majors to campus for a couple of events this fall. Many programs are available to sign up for, including the Cyber 101 Program for interest in computing and the field...
          Salesforce Senior Engagement Manager, Director - Silverline Jobs - Casper, WY      Cache   Translate Page      
Silverline is a Salesforce Platinum Cloud Alliance Partner focused on delivering robust business solutions leveraging cloud-computing platforms....
From Silverline Jobs - Wed, 30 May 2018 06:22:53 GMT - View all Casper, WY jobs
          Salesforce Senior Engagement Manager, Director - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Silverline is a Salesforce Platinum Cloud Alliance Partner focused on delivering robust business solutions leveraging cloud-computing platforms....
From Silverline Jobs - Wed, 30 May 2018 06:22:47 GMT - View all Cheyenne, WY jobs
          Yes, You Can Name A Website “Fucknazis.us”      Cache   Translate Page      

Jeremy Rubin just wanted to speak out about the rise of white supremacist groups in the U.S. and raise some money to fight against those groups. But the Internet domain name he registered in late 2017 for his campaign—“fucknazis.us”—ran afoul of a U.S. Department of Commerce policy banning certain words from .US domain names. A government contractor took away his domain name, effectively shuttering his website. Last month, after EFF and the Cyberlaw Clinic at Harvard Law School intervened, Mr. Rubin got his site back.

A government agency shutting down an Internet domain based on the contents of its name runs afoul of the First Amendment. After a long back-and-forth with EFF and the Cyberlaw Clinic, the Commerce Department’s contractor Neustar agreed to give Mr. Rubin back his domain, and to stop banning “dirty words.” fucknazis.us has proudly returned to the Internet.

As anyone with a business or personal website knows, having a meaningful domain name can be the cornerstone of online presence. Mr. Rubin, moved to act after anti-Semitic and white supremacist incidents last summer, created a “virtual lapel pin” through the Ethereum computing platform as a fundraiser for opposition to these causes. The virtual pins, and the domain he registered to sell them, declared his message in a pithy fashion: “fucknazis.us

The Internet’s domain name system as a whole is governed by ICANN, an independent nonprofit organization. While ICANN imposes questionable rules from time to time, a blanket ban on naughty words in domain names has never been one of them. Unluckily for Mr. Rubin, the .US top-level domain is a different animal, because it’s controlled by the U.S. government.

Originally used only for government websites, .US is now open to anyone with a connection to the U.S. Since 1998, it’s been controlled by the National Telecommunications and Information Administration (NTIA), a part of the Department of Commerce. And it’s managed by registry operator Neustar, Inc., under contract with NTIA.

Shortly after Mr. Rubin registered “fucknazis.us,” Neustar suspended the domain, calling it a violation of an NTIA “seven dirty words” policy, a phrase with particular First Amendment significance.

As a general rule, First Amendment law makes clear that the government can rarely impose restrictions on speech based on the content of that speech, and when it does, must show some level of necessity. The well-known case of Federal Communications Commission v. Pacifica Foundation upheld the FCC’s decision to reprimand, though not fine or revoke the license of, a public broadcaster after it aired George Carlin’s famous monologue “Filthy Words.” In so doing, the Court approved of the FCC’s definition of “indecency,” a word otherwise without a constitutional definition. But the Supreme Court explained that “indecency” as a legal concept was limited to over-the-air broadcast media, because broadcasts made use of limited radio spectrum, were a scarce and highly regulated public resource, and were easily overheard by children in their everyday surroundings. Many years later, the Supreme Court directly rejected the US government’s attempt to impose a similar indecency regime on the Internet, and that regime has never been applied to any medium other than over-the-air radio and television broadcasts.

Last month, we learned that Neustar and NTIA were reversing course, allowing Mr. Rubin to proceed with the use of fucknazis.us, and more generally removing these kinds of restrictions from future .US domain name registrations.

Thanks to the First Amendment, the .US domain, advertised as “America’s Address,” is a place where one can say “Fuck Nazis” without censorship.


          Offer - Limited supply Dell PowerEdge R710 Server Rental and Sales Chennai - INDIA      Cache   Translate Page      
Product Highlights Processor: 2x Intel 55xx or 56xx LGA1366 Xeon CPU's Memory : Up to 192GB2 (18 DIMM slots) Graphics: Integrated Matrox® G200, 8MB shared video memory OS: Windows 7 Professional 64-bit, Windows 8.1 Pro 64-bit Designed for industry-leading performance and maximum energy efficiency, the Intel Xeon processor 5600 sequence delivers versatile one-way and two-way 64-bit multi-core servers and workstations that are ideally suited for a wide range of infrastructure, cloud, high-density, and high-performance computing (HPC) applications. Contact Rental India Name – Chackravarthy (8754542653) Name – Anushree (8971423090) Visit Us: https://shop.rental-india.com/product/dell-poweredge-r710-rack-server-available-on-rental-sale/ Mail Us: enquiry@rental-india.com Mandaveli, Chennai-28.
          Malta-Floriana: Office and computing machinery, equipment and supplies except furniture and software packages      Cache   Translate Page      
Department of Contracts Notre Dame Ravelin Floriana FRN 1600 +356 21220212 info.contracts@gov.mt +356 21247681 https://www.etenders.gov.mt/epps https://www.etenders.gov.mt/epps CT3183/2018 — Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Tender for the supply, installation and commissioning of Engineering technology equipment including Environmental friendly computers for VET Labs in Malta and Gozo. Lot 1: Electronic Hand Tools 1 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 2: Electronic Testing Equipment 2 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 3: Machinery 3 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 4: Measuring Making Out 4 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 5: Welding Sets 5 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 6: Manufacturing Hand Tools 6 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 7: Screwdrivers Hand Tools 7 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 8: Hand Tools Equipment 8 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 9: ESD Benches 9 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 10: CNC Software 10 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 11: CNC Router 11 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 12: CNC Laser 12 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 13: Benches 13 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 14: 3D Printer 14 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 Lot 15: Dedicated Computers 15 Tender for the Supply, Installation and Commissioning of Engineering Technology Equipment including Environmental Friendly Computers for VET Labs in Malta and Gozo Operational Programme I - European Structural and Investment Funds 2014-2020 2018/S 012-033505 1 1 Payment Options: No payment for documentation Public Contracts Review Board Notre Dame Ditch Floriana FRN 1601 +356 21239095 2018-09-07
          Boost VC & Precursor Ventures Back Observer Analytics to Bring the Next Generation of Analytics to The Immersive Computing Industry      Cache   Translate Page      
none
          Why Containers are the Future      Cache   Translate Page      

Software deployment has been a major problem for decades. On the client and the server.

On the client, the inability to deploy apps to devices without breaking other apps (or sometimes the client operating system (OS)) has pushed most business software development to relying entirely on the client's browser as a runtime. Or in some cases you may leverage the deployment models of per-platform "stores" from Apple, Google, or Microsoft.

On the server, all sorts of solutions have been attempted, including complex and costly server-side management/deployment software. Over the past many years the industry has mostly gravitated toward the use of virtual machines (VMs) to ease some of the pain, but the costly server-side management software remains critical.

At some point containers may revolutionize client deployment, but right now they are in the process of revolutionizing server deployment, and that's where I'll focus in the remainder of this post.

Fairly recently the concept of containers, most widely recognized with Docker, has gained rapid acceptance.

tl;dr

Containers offer numerous benefits over older IT models such as virtual machines. Containers integrate smoothly into DevOps; streamlining and stabilizing the move from source code to deployable assets. Containers also standardize the deployment and runtime model for applications and services in production (and test/staging). Containers are an enabling technology for microservice architecture and DevOps.

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Virtual Machines to Containers

Containers are somewhat like virtual machines, except they are much lighter weight and thus offer major benefits. A VM virtualizes the hardware, allowing installation of the OS on "fake" hardware, and your software is installed and run on that OS. A container virtualizes the OS, allowing you to install and run your software on this "fake" OS.

In other words, containers virtualize at a higher level than VMs. This means that where a VM takes many seconds to literally boot up the OS, a container doesn't boot up at all, the OS is already there. It just loads and starts our application code. This takes fractions of a second.

Where a VM has a virtual hard drive that contains the entire OS, plus your application code, plus everything else the OS might possibly need, a container has an image file that contains your application code and any dependencies required by that app. As a result, the image files for a container are much smaller than a VM hard drive.

Container image files are stored in a repository so they can be easily managed and then downloaded to physical servers for execution. This is possible because they are so much smaller than a virtual hard drive, and the result is a much more flexible and powerful deployment model.

Containers vs PaaS/FaaS

Platform as a Service and Functions as a Service have become very popular ways to build and deploy software, especially in public clouds such as Microsoft Azure. Sometimes FaaS is also referred to as "serverless" computing, because your code only uses resources while running, and otherwise doesn't consume server resources; hence being "serverless".

The thing to keep in mind is that PaaS and FaaS are both really examples of container-based computing. Your cloud vendor creates a container that includes an OS and various other platform-level dependencies such as the .NET Framework, nodejs, Python, the JDK, etc. You install your code into that pre-built environment and it runs. This is true whether you are using PaaS to host a web site, or FaaS to host a function written in C#, JavaScript, or Java.

I always think of this as a spectrum. On one end are virtual machines, on the other is PaaS/FaaS, and in the middle are Docker containers.

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

VMs give you total control at the cost of you needing to manage everything. You are forced to manage machines at all levels, from OS updates and patches, to installation and management of platform dependencies like .NET and the JDK. Worse, there's no guarantee of consistency between instances of your VMs because each one is managed separately.

PaaS/FaaS give you essentially zero control. The vendor manages everything - you are forced to live within their runtime (container) model, upgrade when they say upgrade, and only use versions of the platform they currently support. You can't get ahead or fall behind the vendor.

Containers such as Docker give you some abstraction and some control. You get to pick a consistent base image and add in the dependencies your code requires. So there's consistency and maintainability that's far superior to a VM, but not as restrictive as PaaS/FaaS.

Another key aspect to keep in mind, is that PaaS/FaaS models are vendor specific. Containers are universally supported by all major cloud vendors, meaning that the code you host in your containers is entirely separated from anything specific to a given cloud vendor.

Containers and DevOps

DevOps has become the dominant way organizations think about the development, security, QA, deployment, and runtime monitoring of apps. When it comes to deployment, containers allow the image file to be the output of the build process.

With a VM model, the build process produces assets that must be then deployed into a VM. But with containers, the build process produces the actual image that will be loaded at runtime. No need to deploy the app or its dependencies, because they are already in the image itself.

This allows the DevOps pipeline to directly output a file, and that file is the unit of deployment!

No longer are IT professionals needed to deploy apps and dependencies onto the OS. Or even to configure the OS, because the app, dependencies, and configuration are all part of the DevOps process. In fact, all those definitions are source code, and so are subject to change tracking where you can see the history of all changes.

Servers and Orchestration

I'm not saying IT professionals aren't needed anymore. At the end of the day containers do run on actual servers, and those servers have their own OS plus the software to manage container execution. There are also some complexities around networking at the host OS and container levels. And there's the need to support load distribution, geographic distribution, failover, fault tolerance, and all the other things IT pros need to provide in any data center scenario.

With containers the industry is settling on a technology called Kubernetes (K8S) as the primary way to host and manage containers on servers.

Installing and configuring K8S is not trivial. You may choose to do your own K8S deployment in your data center, but increasingly organizations are choosing to rely on managed K8S services. Google, Microsoft, and Amazon all have managed Kubernetes offerings in their public clouds. If you can't use a public cloud, then you might consider using on-premises clouds such as Azure Stack or OpenStack, where you can also gain access to K8S without the need for manual installation and configuration.

Regardless of whether you use a managed public or private K8S cloud solution, or set up your own, the result of having K8S is that you have the tools to manage running container instances across multiple physical servers, and possibly geographic data centers.

Managed public and private clouds provide not only K8S, but also the hardware and managed host operating systems, meaning that your IT professionals can focus purely on managing network traffic, security, and other critical aspects. If you host your own K8S then your IT pro staff also own the management of hardware and the host OS on each server.

In any case, containers and K8S radically reduce the workload for IT pros in terms of managing the myriad VMs needed to host modern microservice-based apps, because those VMs are replaced by container images, managed via source code and the DevOps process.

Containers and Microservices

Microservice architecture is primarily about creating and running individual services that work together to provide rich functionality as an overall system.

A primary attribute (in my view the primary attribute) of services is that they are loosely coupled, sharing no dependencies between services. Each service should be deployed separately as well, allowing for indendent versioning of each service without needing to deploy any other services in the system.

Because containers are a self-contained unit of deployment, they are a great match for a service-based architecture. If we consider that each service is a stand-alone, atomic application that must be independently deployed, then it is easy to see how each service belongs in its own container image.

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

This approach means that each service, along with its dependencies, become a deployable unit that can be orchestrated via K8S.

Services that change rapidly can be deployed frequently. Services that change rarely can be deployed only when necessary. So you can easily envision services that deploy hourly, daily, or weekly, while other services will deploy once and remain stable and unchanged for months or years.

Conclusion

Clearly I am very positive about the potential of containers to benefit software development and deployment. I think this technology provides a nice compromise between virtual machines and PaaS, while providing a vendor-neutral model for hosting apps and services.


          Become a Master in Cloud Computing      Cache   Translate Page      

Become a Master in Cloud Computing
Become a Master in Cloud Computing
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 3 hour | Size: 3.34 GB


          Intermediate Technical Analyst (Client Support)- Montreal - Nexus Systems Group - Montréal, QC      Cache   Translate Page      
**Government Clearance is Required** Job Description: The on-Site Support (OSS) team is responsible for overall End User Computing support encompassing...
From Nexus Systems Group - Fri, 07 Sep 2018 23:15:40 GMT - View all Montréal, QC jobs
          Comsol Multiphysics 5.3a (5.3.1.384) Multilingual      Cache   Translate Page      
Comsol Multiphysics 5.3a (5.3.1.384) Multilingual
Comsol Multiphysics 5.3a (5.3.1.384) Multilingual
File size: 4.3 GB
Simulation Tool for Electrical, Mechanical, Fluid Flow, and Chemical Applications. COMSOL Multiphysics® is a general-purpose software platform, based on advanced numerical methods, for modeling and simulating physics-based problems. With COMSOL Multiphysics, you will be able to account for coupled or multiphysics phenomena. With more than 30 add-on products to choose from, you can further expand the simulation platform with dedicated physics interfaces and tools for electrical, mechanical, fluid flow, and chemical applications. Additional interfacing products connect your COMSOL Multiphysics simulations with technical computing, CAD, and ECAD software.


          Welcome New Faculty!      Cache   Translate Page      

We Are Pleased to Welcome and Introduce the School of Natural Sciences’ Newest Faculty Members

 

 

Daniel Beller

Assistant Professor

Physics

Ph.D., University of Pennsylvania

Dr. Beller’s research centers around theoretical soft matter physics and focuses on defects in liquid crystals and colloidal crystals, often in the context of self-assembly strategies for particles at the micro and nano scales. He also studies problems in population genetics in connection with analogous questions in statistical physics. In his current research, he is studying the dynamics of biomaterials that form non-equilibrium, "active matter" analogues of liquid crystals. Before coming to UC Merced, Beller was a post-doctoral scholar at Harvard University and Brown University.

 

 

Kinjal Dasbiswas

Assistant Professor

Physics

Ph.D., University of Florida

Dr. Dasbiswas’ research focuses on a theoretical description of the active material properties of the cellular cytoskeleton. The goal of his research is to elucidate the organizational role that physical factors such as mechanics play in biology. Much of Dasbiswas’ work is informed by experiments and is in close collaboration with experimentalists. His research interests lie in the realm of theoretical soft matter and biological physics, particularly in using continuum theories of matter and statistical physics to understand and describe biological materials, cells, and tissue.

 

 

 

Changho Kim

Assistant Professor

Applied Mathematics

Ph.D., Korea Advanced Institute of Science and Technology

Dr. Kim worked as a post-doctoral scholar at Lawrence Berkeley National Laboratory after completing his Ph.D. in Chemistry at the Korea Advanced Institute of Science and Technology (KAIST). His current research includes the modeling of reactive electrolyte systems aiming at the simulation of small-scaled batteries and micropumps, and he investigates the underlying stochastic dynamics description of such systems as well as the effects of thermal fluctuations. His approaches are based on both continuum description (fluctuating hydrodynamics) and particle dynamics description (molecular dynamics).

 

 

Aurora Pribram-Jones

Assistant Professor

Chemistry & Chemical Biology

Ph.D., U.C. Irvine

Dr. Pribram-Jones develops finite-temperature and ensemble electronic structure methods for use in materials science, quantum chemistry, and warm dense matter theory. She collaborates with researchers at Harvey Mudd College, using high-performance computing to simulate ordered and disordered complex alloys. A former President's Postdoctoral Fellow at Lawrence Livermore National Laboratory and UC Berkeley, her activities within the community have included coordinating the Computational Chemistry and Materials Science Summer Institute, and visiting elementary schools to discuss the many ways to be a chemist, and how superheroes rely on metallurgy in the Marvel Universe.

 

 

 

Shahar Sukenik

Assistant Professor

Chemistry & Chemical Biology

Ph.D. Hebrew University

By combining live cell microscopy, spectroscopy, and computer simulations, Dr. Sukenik’s lab aims to understand how the environment surrounding proteins affects their behavior inside and outside the cell, in health and disease. During his time as a Ph.D. student at Hebrew University, Sukenik studied the biophysical chemistry of proteins – the molecular machines that enable life. His graduate research led him to pursue postdoctoral research with Martin Gruebele at the University of Illinois at Urbana-Champaign, where he developed microscopy methods to study how proteins function and interact in live cells.

 

 

Tommaso Buvoli 

Visiting Assistant Professor

Applied Mathematics

Buvoli is a visiting assistant professor in mathematics at the University of California Merced. Previously, he completed his graduate degree in applied mathematics at the University of Washington. His research areas are numerical analysis and scientific computing. He is primarily interested in high-order time-integrators, exponential integrators, and parallel-in-time methods. He also enjoys teaching numerical analysis and programming techniques.

 

 

Nicholas Knight

Visiting Assistant Professor

Applied Mathematics

Ph.D., U.C. Berkeley

Dr. Knight is a visiting assistant professor of Applied Mathematics at UC-Merced. He studies numerical algorithms for linear algebra problems. He also enjoys exploring the California outdoors.

 

 

Jennifer Pett-Ridge  

Adjunct Professor

Life & Environmental Sciences

PhD., U.C. Berkeley

Dr. Pett-Ridge’s research uses the tools of systems biology and biogeochemistry to link identity and function in environmental microbial communities. Pett-Ridge is a senior staff scientist and group leader at Lawrence Livermore National Laboratory who uses the tools of systems biology and biogeochemistry to link, identity, and function in environmental microbial communities. Recently awarded a DOE Early Career award to work on responses of tropical soil microbes to climate change, she has also pioneered the use of NanoSIMS isotopic imaging in the fields of microbial biology and soil biogeochemistry.


          Evolution of eCommerce In the Modern World      Cache   Translate Page      

With the advent of E-commerce, an evolution took place in the retail sector. One needs to know how this came to be and what it means in today’s world. E-commerce has seen advancements in payments technology, computing and mobility which have changed the face of it from what it was earlier. To understand the developments better, we will have to go back to when E-commerce first began.


          Programming: Julia, Go, and Perl      Cache   Translate Page      
  • An introduction to the Julia language, part 2

    Part 1 of this series introduced the Julia project's goals and development process, along with the language syntax, including the basics of control flow, data types, and, in more detail, how to work with arrays. In this part, user-defined functions and the central concept of multiple dispatch are described. It will also survey Julia's module and package system, cover some syntax features, show how to make plots, and briefly dip into macros and distributed computing.

  • Learning about Go internals at GopherCon

    GopherCon is the major conference for the Go language, attended by 1600 dedicated "gophers", as the members of its community like to call themselves. Held for the last five years in Denver, it attracts programmers, open-source contributors, and technical managers from all over North America and the world. GopherCon's highly-technical program is an intense mix of Go internals and programming tutorials, a few of which we will explore in this article.

    Internals talks included one on the scheduler and one on memory allocation; programming talks included why not to base your authorization strategy on hash-based message authentication codes (HMACs). But first, here's a little about upcoming changes to Go itself.

  • How subroutine signatures work in Perl 6

    In the first article in this series comparing Perl 5 to Perl 6, we looked into some of the issues you might encounter when migrating code into Perl 6. In the second article, we examined how garbage collection works in Perl 6, and in the third article, we looked at how containers replaced references in Perl 6. Here in the fourth article, we will focus on (subroutine) signatures in Perl 6 and how they differ from those in Perl 5.

read more


          Sr. Network Engineer Ops - Applied Computing Technologies, Inc. - Bethesda, MD      Cache   Translate Page      
Normal business hours are between 6 a.m. and 6 p.m. Eastern Time. Availability to work outside of normal business hours to support a production network....
From Indeed - Tue, 28 Aug 2018 19:23:49 GMT - View all Bethesda, MD jobs
          Firewall Network Engineer - Applied Computing Technologies, Inc. - Bethesda, MD      Cache   Translate Page      
Normal business hours are between 6 a.m. and 6 p.m. Eastern Time. Availability to work outside of normal business hours to support a production network....
From Indeed - Tue, 28 Aug 2018 14:48:12 GMT - View all Bethesda, MD jobs
          How Businesses Can Inject Security Into IoT Rollouts      Cache   Translate Page      
How Businesses Can Inject Security Into IoT Rollouts juliet.vanwage… Wed, 09/12/2018 - 11:44

For businesses everywhere, the Internet of Things has largely already arrived. According to Cisco's Internet of Things Group, by 2020 there will be over 50 billion connected devices worldwide.

Already, industries like retail, sports and entertainment, and more are tapping IoT tools to improve operations and cut costs. Standard Textiles, for instance, tapped IoT in conjunction with sensors and automation to inject greater visibility into its operations, improving quality and making operations more cost-effective.

The growth of connected sensors in business is a testament to the technology’s promise. But attaching unsecured connected devices to a business network broadens the attack surface for hackers.

“Whether devices are connected into a manufacturing system’s back-end or a consumer’s house, it’s another area where there is potentially a security weakness,” says Ravin Sanjith, program director of intelligent authentication at software analysis firm Opus Research.

Discover what IoT is already doing for companies on the leading edge!

4 Steps for a More Secure IoT Rollout

For businesses considering an IoT deployment of their own, here are four ways to reduce exposure to hacking:

  1. Make Security Part of the Deployment from the Start: Too many companies don’t consider the security issues of an IoT deployment until it’s too far along. Experts such as Sanjith advise including security in the budget and planning for any IoT deployment from the beginning.

  2. Test Devices Rigorously: The Ponemon Institute reported last year that 80 percent of IoT applications are not tested for security vulnerabilities. Conducting ongoing security tests, including from third parties, is a vital tactic, experts say.

  3. Protect Data in Transit: When data is transmitted from a device to the cloud, it’s potentially vulnerable. Companies can reduce the amount of data in transit by deploying edge computing to conduct data analysis right at the point of collection.

  4. Manage Security Directly: Too many businesses rely on end users to install ­security patches. Instead, update security automatically by remotely pushing out patches as soon as they’re available.


          China's 'Digital' Totalitarian Experiment      Cache   Translate Page      

Authored by Gordon Chang via The Gatestone Institute,

  • China's "social credit" system, which will assign every person a constantly updated score based on observed behaviors, is designed to control conduct by giving the ruling Communist Party the ability to administer punishments and hand out rewards. The former deputy director of the State Council's development research center says the system should be administered so that "discredited people become bankrupt".

  • Officials prevented Liu Hu, a journalist, from taking a flight because he had a low score. According to the Communist Party-controlled Global Times, as of the end of April 2018, authorities had blocked individuals from taking 11.14 million flights and 4.25 million high-speed rail trips.

  • Chinese officials are using the lists for determining more than just access to planes and trains. "I can't buy property. My child can't go to a private school," Liu said. "You feel you're being controlled by the list all the time."

  • Chinese leaders have long been obsessed with what Jiang Zemin in 1995 called "informatization, automation, and intelligentization," and they are only getting started Given the capabilities they are amassing, they could, the argument goes, make defiance virtually impossible. The question now is whether the increasingly defiant Chinese people will accept President Xi's all-encompassing vision.

By 2020, Chinese officials plan to have about 626 million surveillance cameras operating throughout the country. Those cameras will, among other things, feed information into a national "social credit system."

That system, when it is in place in perhaps two years, will assign to every person in China a constantly updated score based on observed behaviors. For example, an instance of jaywalking, caught by one of those cameras, will result in a reduction in score.

Although officials might hope to reduce jaywalking, they seem to have far more sinister ambitions, such as ensuring conformity to Communist Party political demands. In short, the government looks as if it is determined to create what the Economist called "the world's first digital totalitarian state."

China's President Xi Jinping is not merely an authoritarian leader. He evidently believes the Party must have absolute control over society and he must have absolute control over the Party. He is taking China back to totalitarianism as he seeks Mao-like control over all aspects of society. (Photo by Lintao Zhang/Getty Images)

That social credit system, once perfected, will surely be extended to foreign companies and individuals.

At present, there are more than a dozen national blacklists, and about three dozen various localities have been operating experimental social credit scoring systems. Some of those systems have failed miserably. Others, such as the one in Rongcheng in Shandong province, have been considered successful.

In the Rongcheng system, each resident starts with 1,000 points, and, based upon their changing score, are ranked from A+++ to D. The system has affected behavior: incredibly for China, drivers stop for pedestrians at crosswalks.

Drivers stop at crosswalks because residents in that city have, as Foreign Policyreported, "embraced" the social credit system. Some like the system so much that they have set up micro social credit systems in schools, hospitals, and neighborhoods. Social credit systems obviously answer a need for what people in other societies take for granted.

Yet, can what works on a city level be extended across China? As technology advances and data banks are added, the small experimental programs and the national lists will eventually be merged into one countrywide system. The government has already begun to roll out its "Integrated Joint Operations Platform," which aggregates data from various sources such as cameras, identification checks, and "wifi sniffers."

So, what will the end product look like? "It will not be a unified platform where one can type in his or her ID and get a single three-digit score that will decide their lives," Foreign Policy says.

Despite the magazine's assurances, this type of system is precisely what Chinese officials say they want. After all, they tell us the purpose of the initiative is to "allow the trustworthy to roam everywhere under heaven while making it hard for the discredited to take a single step."

That description is not an exaggeration. Officials prevented Liu Hu, a journalist, from taking a flight because he had a low score. The Global Times, a tabloid that belongs to the Communist Party-owned People's Dailyreported that, as of the end of April 2018, authorities had blocked individuals from taking 11.14 million flights and 4.25 million high-speed rail trips.

Chinese officials, however, are using the lists for determining more than just access to planes and trains. "I can't buy property. My child can't go to a private school," Liu said. "You feel you're being controlled by the list all the time."

The system is designed to control conduct by giving the ruling Communist Party the ability to administer punishments and hand out rewards. And the system could end up being unforgiving. Hou Yunchun, a former deputy director of the State Council's development research center, said at a forum in Beijing in May that the social credit system should be administered so that "discredited people become bankrupt".

"If we don't increase the cost of being discredited, we are encouraging discredited people to keep at it," Hou said. "That destroys the whole standard."

Not every official has such a vindictive attitude, but it appears that all share the assumption, as the dovish Zhi Zhenfeng of the Chinese Academy of Social Sciences said, that "discredited people deserve legal consequences."

President Xi Jinping, the final and perhaps only arbiter in China, has made it clear how he feels about the availability of second chances. "Once untrustworthy, always restricted," the Chinese ruler says.

What happens, then, to a country where only the compliant are allowed to board a plane or be rewarded with discounts for government services? No one quite knows because never before has a government had the ability to constantly assess everyone and then enforce its will. The People's Republic has been more meticulous in keeping files and ranking residents than previous Chinese governments, and computing power and artificial intelligence are now giving China's officials extraordinary capabilities.

Beijing is almost certain to extend the social credit system, which has roots in attempts to control domestic enterprises, to foreign companies. Let us remember that Chinese leaders this year have taken on the world's travel industry by forcing hotel chains and airlines to show Taiwan as part of the People's Republic of China, so they have demonstrated determination to intimidate and punish. Once the social credit system is up and running, it would be a small step to include non-Chinese into that system, extending Xi's tech-fueled totalitarianism to the entire world.

The dominant narrative in the world's liberal democracies is that tech favors totalitarianism. It is certainly true that, unrestrained by privacy concerns, hardline regimes are better able to collect, analyze, and use data, which could provide a decisive edge in applying artificial intelligence A democratic government may be able to compile a no-fly list, but none could ever come close to implementing Xi Jinping's vision of a social credit system.

Chinese leaders have long been obsessed with what then-President Jiang Zemin in 1995 called "informatization, automation, and intelligentization," and they are only getting started. Given the capabilities they are amassing, they could, the argument goes, make defiance virtually impossible.

Technology might even make liberal democracy and free-markets "obsolete" writesYuval Noah Harari of the Hebrew University of Jerusalem in the Atlantic. "The main handicap of authoritarian regimes in the 20th century — the desire to concentrate all information and power in one place — may become their decisive advantage in the 21st century," he writes.

There is no question that technology empowers China's one-party state to repress people effectively. Exhibit A for this proposition is, of course, the country's social credit system.

Yet China's communists will probably overreach. The country's experience so far with social credit systems suggests that officials are their own worst enemies. An early experiment to build such a system in Suining county in Jiangsu province was a failure:

"Both residents and state media blasted it for its seemingly unfair and arbitrary criteria, with one state-run newspaper comparing the system to the 'good citizen' certificates issued by Japan during its wartime occupation of China."

The Rongcheng system has been more successful because its scope has been relatively modest.

Xi Jinping will not be as restrained as Rongcheng's officials. He evidently believes the Party must have absolute control over society and he must have absolute control over the Party. It is simply inconceivable that he will not include in the national social credit system, when it is stitched together, political criteria. Already Chinese officials are trying to use artificial intelligence to predict anti-Party behavior.

Xi Jinping is not merely an authoritarian leader, as it is often said. He is taking China back to totalitarianism as he seeks Mao-like control over all aspects of society.

The question now is whether the increasingly defiant Chinese people will accept Xi's all-encompassing vision. In recent months, many have taken to the streets: truck drivers striking over costs and fees, army veterans marching for pensions, investors blocking government offices to get money back from fraudsters, Muslims surrounding mosques to stop demolition, and parents protesting the scourge of adulterated vaccines, among others. Chinese leaders obviously think their social credit system will stop these and other expressions of discontent.

Let us hope that China's people are not in fact discouraged. Given the breadth of the Communist Party's ambitions, everyone, Chinese or not, has a stake in seeing that Beijing's digital totalitarianism fails.


          เสี่ยวหมี่ อันดับ 2 ผู้นำตลาดอุปกรณ์สวมใส่ ไตรมาสสอง 2018      Cache   Translate Page      
ไชน่าเดลี (13 ก.ย.) อ้างรายงานจาก บริษัทวิจัยตลาด อินเตอร์เนต ดาต้าคอร์ป หรือ ไอดีซี (13 ก.ย.) ว่า บริษัท แอ็ปเปิ้ลอิงค์ (Apple Inc) เป็นผู้นำตลาดอุปกรณ์สวมใส่ (wearable computing) ระดับโลก มีปริมาณการจัดส่ง ยอดจำหน่าย 4.7 ล้านหน่
          NVIDIA Clara Platform to Usher in Next Wave of Medical Instruments      Cache   Translate Page      

NVIDIA today unveiled the NVIDIA Clara platform, a combination of hardware and software that brings AI to the next generation of medical instruments as a powerful new tool for early detection, diagnosis and treatment of diseases. At the heart of the platform are NVIDIA Clara AGX — a revolutionary computing architecture based on the NVIDIA Read article >

The post NVIDIA Clara Platform to Usher in Next Wave of Medical Instruments appeared first on The Official NVIDIA Blog.


          Apple continues to hide its AirPower wireless charging mat      Cache   Translate Page      
AirPower charging pad

Cupertino computing giant Apple used its September 12th, 2018 ‘Gather Round’ event to announce a slew of new products, but the company’s AirPower wireless charging mat continues to be a no-show. For those who don’t know, Apple first announced the AirPower mat at last year’s iPhone X event. At the time, the charging mat was...

The post Apple continues to hide its AirPower wireless charging mat appeared first on MobileSyrup.


          Oracle's head of cloud left after butting heads with Larry Ellison, source says (ORCL)      Cache   Translate Page      

Thomas Kurian

  • A source tells Business Insider that 22-year Oracle veteran Thomas Kurian has butted heads with his boss, founder, CTO and executive chairman Larry Ellison.
  • Bloomberg reports that the issue concerns Oracle's strategy on its cloud computing.
  • Kurian may have been advocating for a cloud strategy that is as risky as it is wise.

Last week, the Oracle eco-system was surprised to learn that Thomas Kurian, one of Oracle's longest serving executives in charge of Oracle's all-important cloud business, had left for an extended leave of absence.

Inside Oracle, word is that Kurian's departure was due to butting heads with his boss Larry Ellison, a source tells Business Insider. This person says that Kurian's good-bye was intended as a resignation, although the company says that he has not resigned but is simply "taking some time off. We expect him to return soon," a spokesperson said.

The disagreement seems to have centered on the direction Oracle should take with its bet-the-company cloud computing business, reports Bloomberg.

Sources told Bloomberg that Kurian was pushing Ellison to allow more of Oracle's software to run on clouds that compete with Oracle, particularly market leaders Amazon and Microsoft

If true, this disagreement between the two strategies, and the two men, would not be surprising. Both of them are known for being tough, outspoken and opinionated — characteristics which describe a lot of Oracle's culture.

A page ripped out of the Microsoft playbook

If Kurian is pushing Oracle to embrace multiple clouds — even the clouds of its bitter enemies — the strategy would make a lot of sense.

It's similar to what Microsoft CEO Satya Nadella has done. There was a time when Microsoft's Bill Gates and Steve Ballmer were protectionist about Windows. But, with the rise of cloud computing, Nadella recognized that the world had changed.

Satya NadellaIt became far less important to push people to use Windows than to ensure that Microsoft's enormous catalog of software, particularly Office, could run on any device. So, Microsoft built out its cloud to serve up Office 365 to run on any device; it made sure that its Windows Server software could run on other clouds; and it embraced competitive software, like Linux, on its own cloud.

That way, Microsoft makes money when customers run its software on a competitive cloud (they still have to buy the software) or when they run a competitor's software on their own cloud (they have to pay for Microsoft cloud usage).

Oracle is in a similar quandary but with one key difference: Amazon has become a major threat to Oracle.

Amazon isn't just trying to get Oracle's customers to bring Oracle software to Amazon Web Services (which they can already do), it's trying to get customers to ditch Oracle's database and use Amazon's database instead. Amazon even built a tool to make it easier to move from an Oracle database to an Amazon one. Microsoft also has its own database and has been a bitter competitor with Oracle for years.

So Ellison has been building an Oracle cloud that competes with Amazon (and Microsoft) insisting Oracle's cloud is a faster, better way to run the database. If Oracle's customers don't stay within Oracle's own sphere, Oracle could lose them altogether.

The clock is ticking

Larry EllisonThe problem is, Oracle's cloud is years behind Amazon's in terms of features. It will take Oracle billions of dollars and several years to catch-up, if it even can because Amazon is adding features at an ever increasing rate, hundreds or more per quarter. Microsoft is widely considered the No. 2 cloud.

Enterprise customers are choosing their cloud providers now, based on the features they want and need now.

Oracle may not have years to play catch up. And the person responsible for that catch-up is 22-year Oracle veteran Kurian, and his team. Kurian is the president who heads engineering and product development. About a quarter of the company reports up to him.

There have been signs that Oracle's cloud ambitions are not growing as well as the company wants, too, putting Kurian on the hot seat. Although, to be fair, Oracle is doing a good job in getting many of its customers to sign up for the certain parts of its cloud. They like the cloud versions of its HR, marketing and financial software (similar to how Microsoft moved people from MS Office to Office 365). 

Should Ellison allow more of that software to run on competitors' clouds? And should it partner with its rivals (assuming such partnerships were an option) to run their software on its own cloud?

Probably yes. Other would-be Amazon competitors have either been crushed (Rackspace) or forced to eat crow and partner up (VMware). Once VMware got past the bitter taste, its partnership with Amazon has proved fruitful, filling a need with enterprise customers who want their datacenters to work better with the Amazon cloud (and making Amazon more of a beast, in the process).

But there's no question it's risky, and Ellison certainly wouldn't be crazy for being wary.

Oracle declined comment.

SEE ALSO: Read the email the Oracle executive once rumored to be the next CEO emailed the company to announce his 'extended' leave of absence

SEE ALSO: Elon Musk works so many hours at Tesla, employees are constantly finding him asleep under tables and desks

Join the conversation about this story »

NOW WATCH: British Airways has a $13 million flight simulator that taught us how to take off, fly, and land an airplane


          Progetto Dolfin      Cache   Translate Page      

Nextmind ha definito e sviluppato il piano marketing e comunicazione del Progetto Dolfin (Energy efficiency of Data Centers and stabilizing of Smart Grids) http://83.212.168.152/

DOLFIN aims to significantly contribute towards improving the energy efficiency of Data Centres and stabilizing of Smart Grids, a holistic approach, across networks of Data Centres and Smart Grids. Today, most DCs are part of computing and storage clouds, offering their […]

The post Progetto Dolfin appeared first on Nextmind.


          2018-2023 Global Cloud Server Market Report (Status and Outlook)      Cache   Translate Page      
(EMAILWIRE.COM, September 13, 2018 ) This report covers the present scenario (with the base year being 2017) and the growth prospects of global Cloud Server market for 2018-2023. A cloud server is a logical server that is built, hosted and delivered through a cloud computing platform over the Internet. Over...
          Google’s top AI scientist leaves after fracas over Pentagon deal      Cache   Translate Page      
The chief scientist at Google’s cloud computing unit is leaving following dustups over a Pentagon contract and her moves to expand artificial intelligence research into China. In internal emails, Fei-Fei Li had praised “Project Maven,” a contract in which it was supplying the Pentagon with AI-powered image recognition software — and warned colleagues to keep...
          Junior Berater Cloud Computing Business Analysis / Requirements Engineering...      Cache   Translate Page      
Anbieter: nicht oeffentlich
Tel.: +49 (89) 411114-0 Strategien für Ihre Zukunft! Passgenaue...
Von: 13.09.2018 04:24 · Ort: D-04103 Leipzig, Sachsen
Diese Stellenanzeige Nr. 1.118.751.425
: ansehen · merken · weiterempfehlen

          Nvidia launches the Tesla T4, its fastest data center inferencing platform yet      Cache   Translate Page      
Nvidia today announced its new GPU for machine learning and inferencing in the data center. The new Tesla T4 GPUs (where the ‘T’ stands for Nvidia’s new Turing architecture) are the successors to the current batch of P4 GPUs that virtually every major cloud computing provider now offers. Google, Nvidia said, will be among the […]
          Arduino For Dummies, 2nd Edition      Cache   Translate Page      

 

Bring your ideas to life with the latest Arduino hardware and software

Arduino is an affordable and readily available hardware development platform based around an open source, programmable circuit board. You can combine this programmable chip with a variety of sensors and actuators to sense your environment around you and control lights, motors, and sound. This flexible and easy-to-use combination of hardware and software can be used to create interactive



Read More...

          Technical Architect (Salesforce experience required) Casper - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sat, 23 Jun 2018 06:15:28 GMT - View all Casper, WY jobs
          Technical Architect (Salesforce experience required) Cheyenne - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sun, 29 Jul 2018 06:18:46 GMT - View all Cheyenne, WY jobs
          Senior Information Security Consultant - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
With the ability to interface and communicate at the executive level, i.e. CIO's, CTO's and Chief Architects....
From Network Computing Architects, Inc. - Mon, 11 Jun 2018 23:15:53 GMT - View all Bellevue, WA jobs
          Nvidia launches the Tesla T4, its fastest data center inferencing platform yet      Cache   Translate Page      
Nvidia today announced its new GPU for machine learning and inferencing in the data center. The new Tesla T4 GPUs (where the ‘T’ stands for Nvidia’s new Turing architecture) are the successors to the current batch of P4 GPUs that virtually every major cloud computing provider now offers. Google, Nvidia said, will be among the […]
          Serverless e FaaS: cosa sono e come funzionano      Cache   Translate Page      

Nell’articolo di oggi vogliamo trattare un argomento molto interessante ovvero i sistemi Function as a service (Faas) serverless. Questa categoria di cloud computing service fornisce una piattaforma di servizi che permettono di gestire lo sviluppo e la distribuzione di servizi ed applicazioni.

Tali Cloud platform si occupano in pratica di eseguire funzionalità in risposta a determinati eventi. Il gestore del servizio può impostare delle regole da attivare ed eseguire a seguito di specifici eventi, esterni o derivati da comportamenti dell’utente come i click del mouse. È dunque possibile creare delle regole e delle azioni, testarle, connetterle con altre azioni …

The post Serverless e FaaS: cosa sono e come funzionano appeared first on Edit.


          Senior Information Security Consultant - Network Computing Architects, Inc. - Bellevue, WA      Cache   Translate Page      
With the ability to interface and communicate at the executive level, i.e. CIO's, CTO's and Chief Architects....
From Network Computing Architects, Inc. - Mon, 11 Jun 2018 23:15:53 GMT - View all Bellevue, WA jobs
          Cloud - Automation Engineer      Cache   Translate Page      
VA-Alexandria, Cloud Automation Engineer Alexandria, VA MUST: Experienced Cloud Automation Engineer 5 plus years of experience with deployments in both on premise and cloud environments 5 years of industry experience working with Cloud Automation at a large enterprise 5 years of Experience with hardening and securing computing environments to confirm with the STIG Requirements and the DOD RMF Lifecycle (Formerly
          VirtualBox 5.1.14 Build 112924 Final Portable + Extension Pack 180913      Cache   Translate Page      

VirtualBox 5.1.14 Build 112924 Final Portable + Extension Pack 180913
[center]
http://i91.fastpic.ru/big/2017/0119/30/08907e5f2362ac34dfdfa61e37277a30.jpg
VirtualBox 5.1.14 Build 112924 Final Portable + Extension Pack | 115 MB

VirtualBox is a general-purpose full virtualizer for hardware. Targeted at server, desktop and embedded use, it is now the only professional quality virtualization solution that is also Open Source Software. VirtualBox is a powerful virtualization product for enterprise as well as home use. VirtualBox provides are useful for several scenarios: Running multiple operating systems simultaneously. VirtualBox allows you to run more than one operating system at a time. This way, you can run software written for one operating system on another (for example, ShiChuang software on Linux or a Mac) without having to reboot to use it.
[/center]

[center]
Since you can con?�?gure what kinds of "virtual" hardware should be presented to each such operating system, you can install an old operating system such as DOS or OS/2 even if your real computer's hardware is no longer supported by that operating system.
Software vendors can use virtual machines to ship entire software con?�?gurations. For example, installing a complete mail server solution on a real machine can be a tedious task. With VirtualBox, such a complex setup (then often called an "appliance") can be packed into a virtual machine. Installing and running a mail server becomes as easy as importing such an appliance into VirtualBox.

Testing and disaster recovery. Once installed, a virtual machine and its virtual hard disks can be considered a "container" that can be arbitrarily frozen, woken up, copied, backed up, and transported between hosts. On top of that, with the use of another VirtualBox feature called "snapshots", one can save a particular state of a virtual machine and revert back to that state, if necessary. This way, one can freely experiment with a computing environment. If something goes wrong (e.g. after installing misbehaving software or infecting the guest with a virus), one can easily switch back to a previous snapshot and avoid the need of frequent backups and restores. Any number of snapshots can be created, allowing you to travel back and forward in virtual machine time. You can delete snapshots while a VM is running to reclaim disk space.

Infrastructure consolidation. Virtualization can signi?�?cantly reduce hardware and electricity costs. Most of the time, computers today only use a fraction of their potential power and run with low average system loads. A lot of hardware resources as well as electricity is thereby wasted. So, instead of running many such physical computers that are only partially used, one can pack many virtual machines onto a few powerful hosts and balance the loads between them.

Whats New:
VirtualBox 5.1.14 (released 2017-01-17)
This is a maintenance release. The following items were fixed and/or added:

VMM: fixed emulation of certain instructions for 64-bit guests on 32-bit hosts
VMM: properly handle certain MSRs for 64-bit guests on ancient CPUs without VT-x support for MSR bitmaps (bug #13886)
GUI: fixed a crash with multimonitor setups under certain conditions
GUI: allow cloning of snapshots when the VM is running
NVMe: fixed compatibility with the Storage Performance Development Kit (SPDK, bug #16368)
VBoxSVC: fixed a crash under rare circumstances
VBoxManage: added a sanity check to modifymedium --resize to prevent users from resizing their hard disk from 1GB to 1PB (bug #16311)
ShiChuang hosts: another fix for recent ShiChuang 10 hosts
Linux hosts: Linux 4.10 fixes
Linux Additions: fixed protocol error during certain operations on shared folders (bug #8463)

Buy a premium  to download file with fast speed
thanks
Rapidgator.net
http://rapidgator.net/file/e9b636653087 … e.rar.html
alfafile.net
http://alfafile.net/file/eYKw/iixyc.Vir … rtable.rar
[/center]


          Technical Architect (Salesforce experience required) Casper - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sat, 23 Jun 2018 06:15:28 GMT - View all Casper, WY jobs
          Technical Architect (Salesforce experience required) Cheyenne - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sun, 29 Jul 2018 06:18:46 GMT - View all Cheyenne, WY jobs
          NMSU gets $3.9M grant for computer science students      Cache   Translate Page      
The National Science Foundation has awarded New Mexico State University a grant worth nearly $4 million to prepare students for careers in computing. The university announced Wednesday that the funding … Click to Continue »
          (USA-PA-Hermitage) Energy Assistance Worker-Mercer CAO      Cache   Translate Page      
Energy Assistance Worker-Mercer CAO Print Apply Energy Assistance Worker-Mercer CAO Salary $17.21 - $25.68 Hourly Location Mercer County, PA Job Type Civil Service Seasonal Full-Time Department Department of Human Services Job Number R18005244680C4325063 Closing 9/28/2018 11:59 PM Eastern Job Code 44680 Worksite Address 2236 Highland Rd City Hermitage Zip Code 16148 Contact Name Talent Acquisition and Planning Unit Contact Email ra-pwfieldepars@pa.gov + Description + Benefits THE POSITION The Department of Human Services Mercer County Assistance Office is searching for an enthusiastic, personable, service-oriented individual for the position of Energy Assistance Worker in our Low Income Heating Energy Assistance Program. In order to be eligible for this position you must: + Have successfully examined andhave a current score on file for this job titlewith the State Civil Service Commission. If you have not already done so, you must first apply to the exam posting and follow the directions provided. Link toENERGY ASSISTANCE WORKER EXAM POSTING + Meet Pennsylvania residency requirements + Be able to perform essential job functions Work Schedule: Monday-Friday 8:30 to 5:00 This is a full time SEASONAL position. **Hiring preference for this vacancy will be given to candidates who live within Mercer County. If no eligible candidates who live within Mercer County apply for this position, candidates who reside in other counties may be considered. **Multiple positions may be filled. Equal Opportunity Employer/Program - Auxiliary Aids and Services available upon request DESCRIPTION OF WORK Job duties include interviewing applicants to gather data in order to determine eligibility; validating data in order to establish need for financial assistance; computing income to ensure clients receive the most equitable benefit based on their economic situation and program entitlements; calling vendors to verify benefit amounts and to schedule delivery of heating source; maintaining control of pending applications and ensures timely and accurate processing according to policy guidelines and procedures. Get your start as an Energy Assistance Worker with the Commonwealth of Pennsylvania by applying today. Health & Wellness We offer a comprehensive benefits package, including health coverage, vision, dental, and wellness programs.* Work/Life Balance We understand that there is more to life than work – and we want you to enjoy it! We offer paid vacation days, paid sick days, military leave, as well as paid time off for most major U.S. holidays. Alternate work schedules and telecommuting arrangements are available for certain positions. Career Development We want to help you grow and see your goals become a reality! Supervisors and human resource staff are available to help employees create a plan to develop skills for their current jobs or prepare for the next step in their careers. Employees can easily transfer between positions or agencies to expand knowledge and pursue new challenges while retaining leave and benefits. Additionally, there are a variety of programs available to help get you where you need to be. Other Rewards Commonwealth employees enjoy many other rewards, including opportunities for recognition, workplace charitable giving, and even special employee-only discounts. For more information about benefits, health and wellness, work-life balance, career development, and other rewards go towww.employment.pa.govand click on the benefits box. *Eligibility rules apply. Agency Commonwealth of Pennsylvania Address 613 North StreetHarrisburg, Pennsylvania, 17120 Website http://www.employment.pa.gov
          Systems Operations Specialist (Mobile Computing) - Open Systems Technologies, Inc. - Québec City, QC      Cache   Translate Page      
Optimizing hand-off of work to Level 2 offshore team. For our client in Montreal, we are looking for a senior systems operations consultant for a long term...
From Open Systems Technologies, Inc. - Sat, 30 Jun 2018 04:25:44 GMT - View all Québec City, QC jobs
          Mercury Receives $6.7M BuiltSECURE Memory Order for Airborne Computing Application      Cache   Translate Page      
Mercury Systems, Inc. (NASDAQ: MRCY, www.mrcy.com), announced it received a $6.7 million follow-on order from a leading defense prime contractor for BuiltSECURE™ high-density secure memory devices to be integrated into the command, control and intelligence system of an advanced airborne platform. The order was booked in the Company’s fiscal 2019 first quarter and is expected to be shipped over the next several quarters. The Company’s BuiltSECURE technology transforms a two-dimensional array
          Senior Network Operations Specialist (Mobile Computing) - NTT DATA Services - Montréal, QC      Cache   Translate Page      
Optimization and handoff of work to Level 2 offshore team- Infrastructure capacity management. At NTT DATA Services, we know that with the right people on board...
From NTT Data - Thu, 06 Sep 2018 20:03:04 GMT - View all Montréal, QC jobs
          (USA-US) Associate HRIS Analyst      Cache   Translate Page      
Associate HRIS Analyst Apply now » Apply now Start + Please wait... Date: Sep 12, 2018 Location: US, 48854 Company: Dart Container Overview: As the manufacturer of Dart® and Solo® brand products, Dart Container is an industry leading single-use food and beverage packaging company. With 15,000 employees and 40+ locations worldwide, Dart offers more than 4,000 products used every day in restaurants, hospitals, schools and homes around the globe. Benefits: Dart Container full-time employees enjoy great benefits, including medical, dental, vision, life insurance, 401(k) with company matching contributions, paid vacation, paid holidays, short-term disability, tuition assistance, product discounts and more. The HRIS Analyst will lead and support the design and functionality of HRIS systems, processes and related activities. This role will lead and/or assist the HR department with other analytical projects through researching, compiling, computing and analyzing data via a variety of external and internal resources. Day-to-Day Role: + Administer assigned components of HRIS systems, programs and processes according to established policies, procedures and/or laws + Research, plan, design and implement new systems as well as production level support for current systems + Plan and organize meetings to advance projects; traveling to other company locations to complete these responsibilities as required + Develop and document efficient and thorough processes/procedures to support assigned activities + Design, execute, summarize and analyze company-wide employment surveys, event surveys and/or ad-hoc surveys to accurately communicate feedback on such activities + Review and audit HR data on a periodic basis; take actions to help ensure integrity in systems and processes + Analyze both numeric and non-numeric data to identify trends, problems and propose solutions + Generate and analyze reports for special projects on a wide variety of issues for the purpose of assisting management with decision-making and legal reporting. Generally, these tasks would be done using mathematics, percentages, ratios, spreadsheets, relational databases, etc. + Review, assess and recommend improvements to existing company or HR related processes and procedures + Develop, present and maintain training programs associated with assigned responsibilities or projects. Core Skills and Qualifications: The ideal candidate must possess all of the following: + Bachelor's Degree in Business or related field; Human Resources preferred + Two (2) years of experience using an HR Master Data system (e.g. SAP HCM) + Two (2) years of experience in an HR analytical role + Microsoft Word skills to include the ability to open, close, create, edit and save documents + Microsoft Excel skills to include the ability to create spreadsheets (e.g. formulas such as V-lookup, graphs, pivot tables) + Strong project management skills and experience in managing projects + Excellent verbal and written skills necessary in order to communicate intricate job-related processes + Demonstrate proficiency and understanding of Company Systems (e.g. AS400/iSeries/SAP/SuccessFactors) in order to effectively support department functions that utilize these systems. + Ability to interact professionally with employees at all levels of the organization + Ability to obtain and maintain a valid driver’s license + Ability to travel domestically up to 20% of the time Preferred: + HRIS analyst experience + SuccessFactors administration experience + Relational database experience (i.e. MS Access or similar) with the ability to create tables, complex queries and reports from multiple sources of data + SAP HCM experience + Experience with AS400/iSeries/Sequel/SAP Dart Container is an equal opportunity employer and will consider all candidates for employment without regard to race, color, religion, sex, national origin, age, sexual orientation, gender identity, disability status, protected veteran status, or any other characteristic protected by law. https://www.dartcontainer.com/eeoaa/ If you have a disability and need an accommodation to access this website or for the application process, you should call Dart at (800) 545-3278 Ext 3370 or email us at ADArequests@dart.biz. Relay calls can be made by dialing 711 or the relay number for your state. If you experience difficulty applying online, you may call (800) 545-3278 Ext 3390 or email us at applicationassistance@dart.biz for assistance. Apply now » Apply now Start + Please wait...
          GaN Industrial Devices Market to Expand as Industries Aim to Increase Their Productivity      Cache   Translate Page      

A report by Market Research Reports (MRR) knits together several factors that have aided the growth of the global market for GaN industrial devices. The title of the report is “Global GaN Industrial Devices Market Professional Survey Report 2017”.

Albany, NY -- (SBWIRE) -- 09/12/2018 -- The demand within the global market for GaN industrial devices has been increasing on account of the rising need for optimising the efficiency of industrial processes. Gallium Nitride exhibits unique properties such as high switching frequencies, improved conduction, enhanced power efficiency, high breakdown voltage, and thermal stability. Owing to these favourable properties, several types of GaN industrial devices have pervaded the marketplace and are expected to attract commendable demand in the years to come. Furthermore, GaN devices have applications in key power devices such as broadband wireless network systems, home inverters, train inverters, heavy electrical systems, turbines, and hybrid vehicles. Owing to the aforementioned factors, it is safe to estimate that the demand within the global market for GaN industrial devices would escalate at a boisterous rate over the forthcoming years. Several power-intensive activities in industrial units take the support of GaN devices to optimise the collective productivity of process at hand. Furthermore, GaN technology has gained popularity due to the constant upgrades in existing GaN devices.

Get Sample PDF For More Insights @ https://www.marketresearchreports.biz/sample/sample/1208374

Silicon technologies are being gradually replaced by GaN technologies due to the efficiency of the latter in industrial processes. Furthermore, the superior characteristics of GaN have paved way for a large number of applications of GaN technologies, thus, enhancing the growth prospects of the global GaN industrial devices market. Seeing the wide-sclae application of GaN in industrial processes, a number of investors and venture capitalists are projected to direct funds into the market for GaN industries devices. Furthermore, GaN industrial devices also help multiple power devices in functioning at high voltages for long period of time. This is another key factor that is projected to enhance the growth prospects of the global market for GaN industrial devices over the years to come. The advent electro-mechanical computing in industrial units has also created growth spaces within the global market for GaN industrial devices. The report by MRR has elaborated on several intrinsic and extrinsic factors that are projected to facilitate market growth in the years to come.

Geographically, the demand within the market for GaN industrial devices in North America has risen on account of the deployment of efficient techniques across regional industrial units. Furthermore, the the demand within market for GaN industrial devices in Europe and Asia Pacific is also projected to touch new heights in the years to come. This owes to the escalating graph of industrial progress in these regions.

Request To Get List of Tables and Figures @ https://www.marketresearchreports.biz/reports/1208374/global-gan-industrial-devices-professional-market-research-reports/toc

Some of the key players in the global GaN industrial devices market are Panasonic, Texas Instruments, Freescale Semiconductor, and Fujitsu.

About MarketResearchReports.biz
MarketResearchReports.biz is the most comprehensive collection of market research reports, supporting clients' market intelligence needs with over 100,000 market research reports, company profiles, data books, and regional market profiles in its repository. We also offer consulting support for custom market research needs.

Our document database is updated by the hour, which means that our customers always have access to fresh data spanning over 300 industries. From Fortune 500 companies to SMEs, MarketResearchReports.biz has built a veritable reputation for fulfilling the most exacting market research needs.

Contact Us

State Tower
90 State Street, Suite 700
Albany, NY 12207
United States

Toll Free: 866-997-4948
(USA-Canada)

Tel: +1-518-621-2074
E: sales@marketresearchreports.biz

For more information on this press release visit: http://www.sbwire.com/press-releases/gan-industrial-devices-market-to-expand-as-industries-aim-to-increase-their-productivity-1047291.htm

Media Relations Contact

MRR Biz
Business Head
MarketResearchReports.Biz
Telephone: 1-518-621-2074
Email: Click to Email MRR Biz
Web: https://www.marketresearchreports.biz/

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000


          Cloud Robotics Market Insights, 2018 to 2025 - Manufacturers: FANUC, KUKA, ABB, Yaskawa, Mitsubishi, Irobot, SoftBank, Hit Robot Group, SIASUN      Cache   Translate Page      

The report analyzes and presents an overview on "Global Cloud Robotics Market Insights, Forecast to 2025" worldwide.

Albany, NY -- (SBWIRE) -- 09/12/2018 -- This report presents the worldwide https://www.marketresearchreports.biz/reports/1895507/global-cloud-robotics-insights-forecast-market-research-reports#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000">Cloud Robotics market size (value, production and consumption), splits the breakdown (data status 2013-2018 and forecast to 2025), by manufacturers, region, type and application.
This study also analyzes the market status, market share, growth rate, future trends, market drivers, opportunities and challenges, risks and entry barriers, sales channels, distributors and Porter's Five Forces Analysis.

Cloud robotics is an emerging field of robotics rooted in cloud computing, cloud storage, and other Internet technologies centered around the benefits of converged infrastructure and shared services. It allows robots to benefit from the powerful computational, storage, and communications resources of modern data centers. In addition, it removes overheads for maintenance and updates, and reduces dependence on custom middleware.

Request For Sample Copy For More Insights @ https://www.marketresearchreports.biz/sample/sample/1895507

Cloud robotics allows robots to take advantage of the rapid increase in data transfer rates to offload tasks without hard real time requirements. This is of particular interest for mobile robots, where on-board computation entails additional power requirements which may reduce operating duration and constrain robot mobility as well as increase costs.

The Robotics industry had an explosive growth in recent years. Many families and commercial enterprises or associations choose the Robotics. The reduced time for household or commercial activities is increasing the adoption of Robotics by the end-users for replacing their physical works.
At present, in global, the Robotics industry is generally at a more advanced level. The world's largest manufacturer is Fanuc which accounted for approximately 19.21% of the global revenue of cleaning robots in 2016.

The Cloud Robotics market was valued at xx Million US$ in 2017 and is projected to reach xx Million US$ by 2025, at a CAGR of xx% during the forecast period. In this study, 2017 has been considered as the base year and 2018 to 2025 as the forecast period to estimate the market size for Cloud Robotics.

The following manufacturers are covered in this report:
FANUC
KUKA
ABB
Yaskawa
Mitsubishi
Irobot
SoftBank
Hit Robot Group
SIASUN
Fenjin

Cloud Robotics Breakdown Data by Type
Hardware
Software
Services
Cloud Robotics Breakdown Data by Application
Industrial
Professional Service
Personal Service

Request To Get List of Tables and Figures @ https://www.marketresearchreports.biz/reports/1895507/global-cloud-robotics-insights-forecast-market-research-reports/toc

Cloud Robotics Production by Region
United States
Europe
China
Japan
Other Regions

Cloud Robotics Consumption by Region
North America
United States
Canada
Mexico
Asia-Pacific
China
India
Japan
South Korea
Australia
Indonesia
Malaysia
Philippines
Thailand
Vietnam
Europe
Germany
France
UK
Italy
Russia
Rest of Europe
Central & South America
Brazil
Rest of South America
Middle East & Africa
GCC Countries
Turkey
Egypt
South Africa
Rest of Middle East & Africa

The study objectives are:
To analyze and research the global Cloud Robotics status and future forecastinvolving, production, revenue, consumption, historical and forecast.
To present the key Cloud Robotics manufacturers, production, revenue, market share, and recent development.
To split the breakdown data by regions, type, manufacturers and applications.
To analyze the global and key regions market potential and advantage, opportunity and challenge, restraints and risks.
To identify significant trends, drivers, influence factors in global and regions.
To analyze competitive developments such as expansions, agreements, new product launches, and acquisitions in the market.

In this study, the years considered to estimate the market size of Cloud Robotics :
History Year: 2013 - 2017
Base Year: 2017
Estimated Year: 2018
Forecast Year: 2018 - 2025

This report includes the estimation of market size for value (million USD) and volume (Units). Both top-down and bottom-up approaches have been used to estimate and validate the market size of Cloud Robotics market, to estimate the size of various other dependent submarkets in the overall market. Key players in the market have been identified through secondary research, and their market shares have been determined through primary and secondary research. All percentage shares, splits, and breakdowns have been determined using secondary sources and verified primary sources.

Buy This Report From Here @ https://www.researchmoz.com/checkout?rep_id=1895507&licType=S

For the data information by region, company, type and application, 2017 is considered as the base year. Whenever data information was unavailable for the base year, the prior year has been considered.

About MarketResearchReports.biz
MarketResearchReports.biz is a seller of syndicated market studies, featuring an exhaustive collection of research reports from leading international publishers. Our repositoryis diverse, spanningvirtually every industrial sector and even more every category and sub-category within the industry. We also provide consulting services to enable our clients have adynamicbusiness perspective.

Contact Us

State Tower
90 State Street, Suite 700
Albany, NY 12207
United States

Toll Free: 866-997-4948
(USA-Canada)

Tel: +1-518-621-2074
E: sales@marketresearchreports.biz

For more information on this press release visit: http://www.sbwire.com/press-releases/cloud-robotics-market-insights-2018-to-2025-manufacturers-fanuc-kuka-abb-yaskawa-mitsubishi-irobot-softbank-hit-robot-group-siasun-1047236.htm

Media Relations Contact

MRR Biz
Business Head
MarketResearchReports.biz
Telephone: 1-518-621-2074
Email: Click to Email MRR Biz
Web: http://www.marketresearchreports.biz/

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000


          Plant Support - Limeplant - Pete Lien & Sons, Inc - Frannie, WY      Cache   Translate Page      
Complex Computing and Cognitive Thinking Y. An hourly employee who at the direction of a Plant Operator, Foreman or Supervisor supports production &amp; sales...
From Pete Lien & Sons, Inc - Tue, 14 Aug 2018 05:21:24 GMT - View all Frannie, WY jobs
          (USA) Desktop Support Technician      Cache   Translate Page      
Desktop Support Technician Medford, MA, US Requisition Number: 70102 As a Desktop Support Technician, you’ll work in a dynamic, start up like environment supporting our client in Medford, MA. You’ll have the opportunity to utilize your technical skills and continue to learn new ones all while having fun. Amazing pay and culture. We offer health benefits and 401k with a nice match!! Please note – This opportunity is a long term contract to hire!! The support tech will be onsite (5) days a week in MA. Once a month the support tech will be required to go to the clients other location in Vermont, which is (150) miles away, for (2-3) days. In addition, once a quarter the support tech will be required to fly to our clients headquarters in St. Louis, MO. Monthly and Quarterly TRAVEL IS A REQUIREMENT AND WILL BE ALL PAID EXPENSIVE FOR!!! *Must be able to work in the US without sponsorship. *Looking for talent to start ASAP! What you’ll do: + Support clients in person and over the phone + Troubleshoot end user desktop issues with Windows + Track fixed assets and inventory + Educate and set up new users on new hardware and software. + Strong leadership skills + Creative Problem-Solving Abilities + Provide quality customer service + Highly self-motivated + Excellent oral and written communication skills Requirements: + Very solid PC and Laptop Experience + 2+ year of desktop and laptop troubleshooting and support experience + Experience in LANs, WANs, Personal Computers, messaging and server software applications + Understanding of large account environments and protocol required. + Ability to multitask with strong organization and time management skills. + Able to respond effectively to inquiries or complaints in a timely fashion. + Perform installation and support of new and existing desktop, hand-held, and mobile computing equipment and software. + Provide basic local area network (LAN) equipment support. + Perform equipment and software inventory and updates in appropriate databases. + Perform preventative maintenance as directed and updates documentation. + Basic Microsoft word and excel skills to update necessary documentation. + Lift, carry, and/or push/pull various items (bag, boxes, carts, etc.) as directed by Client. + May be required to transfer equipment to an installation site (internal department and or a site depending on assignment). The position described above provides a summary of some the job duties required and what it would be like to work at Insight. For a comprehensive list of physical demands and work environment for this position, click here. Today, every business is a technology business. Insight Enterprises, Inc. empowers organizations of all sizes with Insight Intelligent Technology Solutions™ and services to maximize the business value of IT. As a Fortune 500-ranked global provider of digital innovation, cloud/data center transformation, connected workforce, and supply chain optimization solutions and services, we help clients successfully manage their IT today while transforming for tomorrow. From IT strategy and design to implementation and management, our 6,800 employees help clients innovate and optimize their operations to run smarter. Discover more at insight.com. + Global provider of Intelligent Technology Solutions™ for organizations of all sizes + Ranked #417 on the 2018 Fortune 500, #12 on the CRN Solution Provider 500 + Founded in 1988 in Tempe, Arizona; now celebrating our 30th anniversary and operating in 20 countries + $6.7 billion in revenue for 2017 + 8,000+ teammates worldwide working with 5,300+ partners + 2017 Arizona’s Most Admired Companies (AZ Business Magazine), #7 2017 Best Places to Work (Phoenix Business Journal) + 2018 Dell EMC Server Partner of the Year, 2018 Intel Retail Solution Partner of the Year, 2018 IBM Geography Excellence Award as the Top National Strategic Business Partner in North America, Microsoft’s largest global partner Today's talent leads tomorrow's success. Learn about careers at Insight: jobs.insight.com. Insight is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation or any other characteristic protected by law. Posting Notes: Medford || Massachusetts (US-MA) || United States (US) || None || None || Remote ||
          Consultant | EUC-Patching_and_Distribution | SCCM - Klein Management Systems - Denver, CO      Cache   Translate Page      
As a Consultant – Infrastructure Management, you will analyze the customer end user computing environment and contribute to solution creation, design and...
From Klein Management Systems - Wed, 29 Aug 2018 17:28:22 GMT - View all Denver, CO jobs
          647: How Alibaba Is Leading Digital Innovation in China      Cache   Translate Page      
Ming Zeng, the chief strategy officer at Alibaba, talks about how the China-based e-commerce company was able to create the biggest online shopping site in the world. He credits Alibaba’s retail and distribution juggernaut to leveraging automation, algorithms, and networks to better serve customers. And he says in the future, successful digital companies will use technologies such as artificial intelligence, the mobile internet, and cloud computing to redefine how value is created. Zeng is the author of "Smart Business: What Alibaba's Success Reveals about the Future of Strategy.”
          2018 Video Virtualization Market :: Global Trends, Size, Growth, and Forecast to 2022 Discussed in New Research Report      Cache   Translate Page      

The global video virtualization market is projected to grow at a significant growth rate in the near future primarily due to growing video internet traffic which accounts for 80% of total internet traffic.

Pune, India -- (SBWIRE) -- 09/12/2018 -- MarketReportsOnline.com adds "Global Video Virtualization Market: Size, Trends & Forecasts (2018-2022)" report to its research store.

The report entitled "Global Video Virtualization Market: Size, Trends & Forecasts (2018-2022)", provides a comprehensive analysis of the Video Virtualization Market. The analysis includes market by segments and market potential of video virtualization for different industries. The report also includes a brief analysis of online video platform market and data virtualization market as well. Moreover, the report assesses the key opportunities in the market and outlines the factors that are and will be driving the growth of the industry.

Major Key Players of Video Virtualization Market: Linius Technologies Ltd., VMware, Inc., Red Hat, Inc. & Microsoft Corporation

Access Full Copy of Video Virtualization Market spread across 57 Pages, Profiling 4 Companies and Supported with 8 Tables and 16 figures is now available @ http://www.marketreportsonline.com/773537.html.

Linius Technology Ltd. focuses on video virtualization, which is first of its kind in the virtualization market. This would give Linius first-mover advantage and help in the expansion of its business. No other company has yet introduced this kind of technology.

VMware and Red Hat Software are major players in virtualization software, similar to Linius. However, mainly focus on desktop, server, and application virtualization. A brief company profiling of Linius Technologies Ltd., VMware, Inc., Red Hat, Inc., and Microsoft Corporation has been provided in the report. Company profiling is based on attributes like business overview, financial overview and strategies adopted by these companies in order to grow in the market.

Virtualization is defined as the formation of a virtual rather than the real version of something like a server, operating system, a storage device and other network resources. The primary objective of virtualization is to organize workloads by converting traditional computing to make it more accessible. Today, virtualization is the most innovative part of IT landscapes and is applicable to a wide range of the system layers including operating system-level virtualization, hardware-level virtualization and server virtualization.

Direct Purchase of this "Global Video Virtualization Market" Research Report @ http://www.marketreportsonline.com/contacts/purchase.php?name=773537.

As data virtualization main purpose is to integrated data from different resources, in the same way video virtualization is nothing but transformation of videos into flexible data. It is one of the recent technologies developed by Linius Technologies Ltd. (Video Virtualization Engine) which is yet to be commercialized. Virtual video is a lighter, faster and malleable version of current digital video files.

Virtual video technology has the potential to revolutionize the way video is distributed and consumed around the globe. Video virtual technology has potential opportunities in four industries namely Personalized Advertising, Anti-Piracy, Search, and Security & Division.

The global video virtualization market is projected to grow at a significant growth rate in the near future primarily due to growing video internet traffic which accounts for 80% of total internet traffic. Growth in the market will be primarily driven by growing demand of video surveillance, rising spending on personalized video advertisement, and rising demand for anti-piracy software.

Major Points from Table of Contents:
1. Executive Summary
2. Introduction
3. Global Market Analysis
4. Market Dynamics
5. Competitive Landscape
6. Company Profiles

Browse all latest it & telecommunication market research reports at http://www.marketreportsonline.com/cat/information-technology-market-research.html.

About Market Reports Online
Market Reports Online is a comprehensive online library of more than 100,000 reports, in-depth market research studies on thousands of micro markets and a range of industries. The reports are analytically and statistically rich, and offer a comprehensive view of the dynamic market scenario across the globe. We offer online and offline support services to ensure your research requirements are met on time.

Contact Us:
Hrishikesh Patwardhan
2nd Floor, Metropole,
Next to Inox Theatre,
Bund Garden Road,
Pune - 411001.
Maharashtra, India.
Tel: + 1 888 391 5441
E-mail: sales@marketreportsonline.com

For more information on this press release visit: http://www.sbwire.com/press-releases/video-virtualization-market/video-virtualization-industry/release-1047497.htm

Media Relations Contact

Hrishikesh Patwardhan
MarketReportsOnline
Telephone: 1-888-391-5441
Email: Click to Email Hrishikesh Patwardhan
Web: http://www.marketreportsonline.com/773537.html

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000


          Sales Tax Software Market Global Trends, Size, Growth, and Forecast to 2022 Discussed in New Research Report      Cache   Translate Page      

Sales tax software enables individuals and business organizations to file various kinds of transactional taxes electronically and helps in streamlining the tax filing process by calculating the individual’s tax obligations automatically.

Pune, India -- (SBWIRE) -- 09/12/2018 -- MarketReportsOnline.com adds "Global Sales Tax Software Market: Size, Trends and Forecast (2018-2022)" report to its research store.

This latest report entitled "Global Sales Tax Software Market: Size, Trends and Forecast (2018-2022)" provides an in-depth analysis of the global Sales Tax Software Market including detailed description of market sizing and growth. The report provides analysis of the global sales tax software market by value and the global sales tax software market by region. The report also provides regional analysis of the sales tax software market for various other regions such as the US, Europe, Japan, China and India.

Key Company Coverage: Thomson Reuters, Xero, Wolters Kluwer & Avalara

Furthermore, the report also assesses the key opportunities in the market and outlines the factors that are and will be driving the growth of the industry. Growth of the overall global sales tax software market has also been forecasted for the period 2018-2022, taking into consideration the previous growth patterns, the growth drivers and the current and future trends.

Access Full Copy of Sales Tax Software Market spread across 68 Pages, Profiling 4 Companies and Supported with 3 Tables and 36 figures is now available @ http://www.marketreportsonline.com/773536.html.

The global sales tax software market consists of a number of players. The key market players are Thomson Reuters, Xero, Wolters Kluwer and Avalara. The company profiling of the above market players has been done in the report consisting of their business overview, financial overview and the business strategies adopted by the companies.

Country Coverage: Europe, The US, Japan, China & India

Sales tax refers to the amount of money, which is added to the cost of a product or service when purchased by a consumer at a retail location. Sales tax is calculated as a percentage of the cost of the good or service purchased.

Sales tax software enables individuals and business organizations to file various kinds of transactional taxes electronically and helps in streamlining the tax filing process by calculating the individual's tax obligations automatically.

Direct Purchase of this "Global Sales Tax Software Market" Research Report @ http://www.marketreportsonline.com/contacts/purchase.php?name=773536.

The global sales tax software market has been segmented on the basis of type, application, solution and industry verticals. On the basis of type, the market can be segmented into cloud, SaaS, mobile-android native and mobile-iOS native. The market can be segmented on the basis of application into small businesses, midsize enterprises and large enterprises. On the basis of solution, the market is divided into consumer use tax management, tax filings and others. Various industry verticals where the sales tax software is used are transportation, retail, telecom & IT, healthcare, BFSI etc.

The global sales tax software market has witnessed continuous growth in the past few years and is projected to grow even further during the forecast period (2018-2022). The market is expected to be driven by various factors such as rising internet penetration, increased availability of cloud computing solutions, growing demand for internet of things (IoT), increasing adoption of electronic tax accounting etc. However, the market faces certain challenges as well such as lack of skilled workforce and security and networking issues for cloud applications.

Major Points from Table of Contents:

1. Executive Summary
2. Introduction
3. Global Market Analysis
4. Regional Market Analysis
5. Market Dynamics
6. Competitive Landscape
7. Company Profiles

Browse all latest it & telecommunication market research reports at http://www.marketreportsonline.com/cat/information-technology-market-research.html.

About Market Reports Online
Market Reports Online is a comprehensive online library of more than 100,000 reports, in-depth market research studies on thousands of micro markets and a range of industries. The reports are analytically and statistically rich, and offer a comprehensive view of the dynamic market scenario across the globe. We offer online and offline support services to ensure your research requirements are met on time.

Contact Us:
Hrishikesh Patwardhan
2nd Floor, Metropole,
Next to Inox Theatre,
Bund Garden Road,
Pune - 411001.
Maharashtra, India.
Tel: + 1 888 391 5441
E-mail: sales@marketreportsonline.com

For more information on this press release visit: http://www.sbwire.com/press-releases/sales-tax-software-market/global-sales-tax-software--mar/release-1047492.htm

Media Relations Contact

Hrishikesh Patwardhan
MarketReportsOnline
Telephone: 1-888-391-5441
Email: Click to Email Hrishikesh Patwardhan
Web: http://www.marketreportsonline.com/773536.html

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000


          Senior Software Development Engineer - Distributed Computing Services (Hex) - Amazon.com - Seattle, WA      Cache   Translate Page      
Knowledge and experience with machine learning technologies. We enable Amazon’s internal developers to improve time-to-market by allowing them to simply launch...
From Amazon.com - Thu, 26 Jul 2018 19:20:25 GMT - View all Seattle, WA jobs
          Scientists Reveal "Lensless" Camera      Cache   Translate Page      
Cameras have come a long way since the days of photographers hiding under a cloak amidst a startling puff of smoke. At any camera store, you can find video cameras that can record underwater, devices that takes photographs with breathtaking clarity at incredible distances—or even ones that do both. However, regardless of how advanced they get, every digital camera currently in existence is constrained by one thing: the need for a focusing lens.

Dr. Rajesh Menon tinkers with a prototype "lensless" camera, which uses light scattered by an ordinary pane of glass.
Image Credit: University of Utah.
You may remember from high school science class that a focusing lens is typically a clear piece of plastic or glass that guides light rays passing through it toward a focal point. Generally speaking, in digital cameras this focal point will be the image sensor, the device that registers and records the light hitting it. When the lens isn’t set up right for objects at a given distance, you can tell by the blurry nature of the image—but when there isn’t a lens at all, the result is an unintelligible mess.

This schematic shows how a simple lens can refract light rays, focusing them to a single point.
Image Credit: Panther, via Wikimedia Commons.
Although they perform an essential function, lenses also add bulk and cost to cameras. It’s not easy to grind down glass to the perfect shape, and the precision involved there can add a lot to the price tag. And no matter how small your phone’s circuitry gets, the bulk of a lens will always be there. But there just doesn’t seem a way around it if you want your photographs to represent objects that you can recognize.

But, in the age of digital cameras and advanced computing, does the image that a camera takes in really need to be intelligible to humans? What if a machine could make sense of the garbled mess that is the result of a completely unfocused camera, and then “translate” it into an image that people could actually understand? That’s exactly what Dr. Rajesh Menon of the University of Utah wondered.

“All the lens does is rearrange this information [the light coming from the object of interest] for a human being to perceive the object or scene,” he says. “Our question was, what if this rearrangement doesn’t happen? Could we still make sense of the object or scene?”

To satiate his curiosity, Menon set up a miniature glass window—uncurved, so as to let light through without distorting it—in his lab, which he surrounded with reflective tape. On one edge of the window he attached a simple off-the-shelf image sensor, and in front of the window he placed a display that showed various simple images like a stick figure, a square, and the University of Utah “U”.

This set of diagrams illustrates Menon's experimental setup. In (a) you can see the general concept of the window/image sensor, while (b) shows how the light rays travel through the window; most pass directly through, but a few are scattered into the image sensor by the rough edge of the window and the reflective tape. Images (c) and (d) are photographs of the actual equipment.
Image Credit: R. Menon, via Optics Express.
As light from the display (representing an object being photographed) passed through the window, a very small fraction of it—about 1%—was scattered by the glass and redirected towards the image sensor by the reflective tape. It’s important to note that, although the light’s path was modified by the presence of this tape, it differs from the behavior of a true lens in that the light rays don't converge toward a single point. Next, Menon developed an algorithm using deep learning to “unscramble” the blurry images, reconstructing the original object.

And, to a large extent, it worked! Menon was able to take recognizable photographs using this “lens-less” camera, a first in the history of optics (unless you count the "pinhole camera" effect). Granted, the photos aren’t the sort of high resolution we’ve come to expect from cutting-edge camera technology, but they’re certainly usable. The applications for this technology are far-reaching; autonomous cars could have windows that double as sensors. Future construction projects could incorporate “security glass” that monitors the surrounding area, and augmented reality glasses could be drastically reduced in bulk. And these cameras could be quite cheap as well—Menon says that the biggest cost is in the image sensor itself, which is already quite low. The technology is actually agnostic to the type of image sensor used, so companies (and consumers) could conceivably shop around for the lowest prices. While he acknowledges that there could be an additional cost factor in the software package required to decode the image, Menon is optimistic. “I’d say the cost to the consumer will be much less than what cameras (in your phone, for example) cost today.”

Some of Menon's experimental results. On the left, you can see the pattern produced by the LED array or LCD, and in the center the unmodified image recorded by the image sensor. The rightmost column shows the "unscrambled" photographs after passing through the algorithm.
Image Credit: R. Menon, via Optics Express.

Even so, there are still some kinks to work out. To begin with, Menon’s research was conducted with a bright, high-contrast object, and it’s unclear how the technology will fare under less ideal conditions—outdoors at dusk, for example. Menon says, “My intuition is that with appropriate sensors and more sophisticated algorithms, it should work fine under normal daylight or room lighting.” He does point out that for low-light conditions, a flash or infrared light could help. Nevertheless, he considers the issue of lighting to be one of the biggest limitations in his technology.

The other big question mark is the camera’s range. Menon found that for the optimal photo, the object should be about 150mm—that’s about 6 inches—from the window. When we consider that many applications, like security cameras, require a much greater range, this is a fairly serious limitation. However, by including the use of additional sensors or adjusting their position, this optimal distance can be lengthened or shortened.

While the technology is far from perfect, Menon sees this project as an exciting implementation of what he calls “non-anthropomorphic cameras”. He explains, “Cameras have been designed for over 100 years based on human perception. It is arguably true that more images and videos are seen by machines today rather than by humans. This will inevitably be true in the future.”

So, what if we start designing cameras for machines rather than humans, and only have them translate when we need them to? Menon concludes, “Our paper is one small step in that direction.”

—Eleanor Hook
          (USA-TX-FORT WORTH) Manager In Training (MIT) Seafood Department      Cache   Translate Page      
This position has been posted for multiple locations. If selected, you need to be prepared to work at any of the locations listed. Job Summary Learn all duties required of a Seafood Department Manager. Assists Seafood Department Manager in directing and controlling the operation of the Seafood Department by understanding related work areas including: supervising seafood department personnel; planning and ordering merchandise; ensuring customer service and product quality, freshness and selection; assisting in coordination and management of department operations so as to control costs, meet targeted labor, maintain projected profit margins, and meet or exceed sales goals. Perform department clerk duties as needed. Typical Duties and Responsibilities + Assists Seafood Department Manager in meeting departmental projected sales and gross margin objectives. Creates effective promotional and seasonal displays; prepares, proofs, stages and packages products; prevents shrink; oversees cost/quality control; orders necessary products and ingredients; prepares department sales/production guides; prepares, charts and records sales dollars/percentages; computes gross profit; processes and maintains accurate department records; and controls expenses. + Maintains and encourages an atmosphere of fast, friendly, courteous customer service, etc. + Ensures adequate product quantity, quality and freshness. Orders, checks, receives and controls inventory; builds, maintains and organizes product display and storage areas; stocks and rotates products; inspects displays daily for substandard and outdated product and discards outdated or spoiled products; ensures proper temperatures are maintained in all phases of product handling and preparation; follows retail labeling laws and company code dating policy; follows company policy on processing re-work or reduced-to-clear items, damage and spoilage of product; trims, cuts, wraps, trays, displays and waters products as needed; ensures proper pricing and signing; conducts inventories of all department items; and prepares food items as needed. + Learns and assists Seafood Department Manager in supervising, motivating, coaching, training and hiring of Department personnel. + Learns and assists Seafood Department Manager in monitoring employee performance, and recommending personnel action (hiring, firing, layoff and disciplinary action). + Learns and assists Seafood Department Manager in scheduling personnel according to coverage needs and service level. + Performs customer relation duties and engages in suggestive selling and other sales techniques. + Ensures proper merchandising of product by understanding schematics, merchandising of advertised and special items, proper signing procedures, analyzing cutting tests and meeting customer demand. + Maintains cleanliness and eye-appeal of work area, storage area, equipment and retail displays according to company policy and legal regulations; and cleans work area by mopping, sweeping, taking out garbage, etc. + Maintains a safe/secure work environment and ensures compliance with security policies. + Performs receiving duties. Verifies orders against invoices; reports shortages and claims to ensure proper billing; breaks down loads and dates product; and cuts cases; stacks, prices and marks merchandise; etc. + Breaks down freight by moving product, placing it in inventory, operating fork lift, etc. + Performs all job duties and responsibilities with honesty and integrity. + Performs other duties as assigned or needed. + Completes the Manager in Training classroom and on the job training program. Requirements Education: + High School Diploma or Equivalent Experience: + Effective communication with co-workers and customers and following written instructions. + Demonstrating an understanding of overall company practices through previous experience in the seafood department or equivalent. + Providing leadership through skills in communication, management of people, customer relations, employee relations, analysis, planning orders, judgment, reaction to business activity, etc. + Performing basic math (adds, subtract, divide and multiply) and computing weights and measures. + Operating computers and windows software in a work setting. Ability to: + Consistently provide world class customer service to internal and external customers. + Work varied hours primarily between the hours of 6:00 am to 10:00 pm in a 24/7 operation; including night, weekends and holidays. + Perform all duties and responsibilities of seafood department clerk at a fully competent and independent level. + Perform supervisory skills (e.g., interviewing, scheduling, hiring, counseling, training, disciplining, etc.) + Effectively utilize excellent verbal, written, electronic and interpersonal communication skills. + Perform duties with mental alertness involving potential hazards with respect to related procedures, equipment (e.g., knives, cookers), and work aides. + Work with hands exposed to moisture, cold, frozen and fresh seafood. + Work around machinery emitting heat and cold conditions. + Have knowledge of all areas of department production. + Learn product variability, perishability, safety and sanitation procedures and department policies. + Learn taste, content and perishability of products; Conduct visual inspections and read reports, manuals, etc. + Calculate inventory. + Stand for long periods of time, walk and move rapidly, bend, stoop, twist and turn frequently. + Perform repetitious arm and hand movements frequently. + Reach, lift and maneuver objects of varying dimensions and weights up to 60 lbs. frequently. + Push and pull fully loaded hand trucks and pallet jacks containing product of substantial weight. + Proper use cleaning chemicals in accordance with manufacture’s guidelines and instructions. + Proper handling of related food products per State and County laws, and WinCo standards. + Perform primary duties efficiently and accurately. Additional Requirements: + Food Handlers Certification – current per State and County Laws and WinCo standard Machines and Equipment Operated: + Computer terminal and office machines. + Order/scan gun + All department specific equipment which could include any of the following: kitchen utensils, knives and appliances, automatic slicers, grinders, stuffers, tumblers, smokehouse, vacuum sealers, overwrappers, scales, band saws, meat tenderizers, meat slicers, bone dusters, bulkers, bailers, cubers, mixers, dough machines, shrink wrappers, cash registers, trash compactors, garbage disposals, cardboard bailers, pallet jacks, hand trucks, and/or fork lifts. Preferred Education, Experience and/or Credentials: + Experience in a role with formal supervision responsibilities managing performance and/or completion of supervisory training, coursework or education. + Experience in a role with product management responsibilities including all aspects of inventory, display and maintenance of products within the department. The above statements are intended to describe the general nature of work performed by the employees assigned to this job. All employees must comply with Company policies and applicable laws. The responsibilities, duties and qualifications required of personnel may vary. Requisition ID: 2018-37565 Street: 8968 TEHAMA RIDGE PKWY Salary Type: Hourly Vacation Eligible: Yes External Company Name: Winco Foods External Company URL: www.wincofoods.com Post End Date: 9/17/2018
          (USA-CA-Orangevale) Pizza Clerk      Cache   Translate Page      
Job Summary Prepares ready-to-bake / baked pizzas, provides customer service and conducts product demonstrations. Consistently provides world class customer service to internal and external customers. Performs other related work. Typical Duties and Responsibilities + Seeks opportunities to welcome, engage, serve and thank customers. Maintains an atmosphere of friendly, enthusiastic customer service with an emphasis of taking care of the customer. + Makes dough by weighing out ingredients and mixing + Preps toppings by opening cases, putting ingredients in containers, putting toppings in cooler, operating slicer and cutter for vegetables, weighing certain ingredients, etc. + Makes pizza crust by weighing out dough, operating a dough machine and rolling. + Takes orders over-the-counter, from the demo station and by phone. + Makes pizzas by getting dough, spreading sauce, measuring toppings, and sprinkling toppings. + Shrink wraps pizza by operating associated machine. + Places pizzas on and removes pizzas from oven conveyer belts. + Hands product to customers over-the-counter. + Performs cashier duties by operating a cash register, receiving and making change and providing the customer with a sales ticket. + Sells products directly to customers through the use of product samples and suggestive selling techniques. + Cleans the area by washing dishes, sweeping, mopping and operating vacuum cleaner. + Trains employees, provides leadership in the technical aspects of the department, etc.; orders supplies by checking and conducting inventory, estimating projected usage, etc.; writes production sheets for the department head based on projected sales; receives freight by verifying ordered products have been received, organizing it in the cooler, etc. (usually performed by manager or “lead person”). + Performs other duties as assigned or needed. Requirements Experience: + Performing basic math (add, subtract, divide and multiply) and computing weights and measures. + Ensuring accuracy in recording sales and handling monetary transactions with mental alertness and basic math skills. Ability to + Consistently provide world class customer service to internal and external customers. + Work varied hours typically between 8:00 am and 10:00 pm in a 24/7 operation; including nights, weekends and holidays. + Operate a cash register, dough machines, ovens, slicer and dicer. + Wear hats, hair net, gloves, aprons and other personal protective equipment as required. + Conduct visual inspections and read / follow production guides, recipes and product labels. + Use cleaning chemicals and handle related food products. + Strongly communicate (hearing and speech) to receive orders from customers, up sell and perform customer relation skills. + Frequently lift / carry up to Twenty (20) pounds and occasionally lift / carry up to Forty (40) pounds. + Operate kitchen utensils and equipment with manual dexterity and hand / eye coordination. + Perform repetitious arm movements for balling, rolling and preparing various pizza products. + Stand, walk and move rapidly for extended periods of time. + Bend, stoop and reach over the counter(s) frequently. + Occasionally reach / lift / carry pizza products to & from conveyer ovens. + Perform duties with mental alertness involving potential hazards with respect to related procedures, equipment (e.g. dough machines, ovens, slicer, knives) and work aides. + Profile content and perishability of products. Learn safety and sanitation procedures and department policies. + Perform duties efficiently and accurately. Additional Requirements: + Must be at least 16 years of age + Food Handlers Certification (per State Laws) Machines and Equipment Operated: + Cash Register + Slicer, Dicer, Dough Machines, Shrink Wrapper, Ovens and Pallet Jack. + Pizza clerks under the age of 18 are not to operate certain equipment as described by OSHA guidelines including the pizza department mixer and dough machines. The above statements are intended to describe the general nature of work performed by the employees assigned to this job. All employees must comply with Company policies and applicable laws. The responsibilities, duties and qualifications required of personnel may vary. Requisition ID: 2018-37175 Street: 8701 Green Back Lane Salary Type: Hourly Vacation Eligible: Yes External Company Name: Winco Foods External Company URL: www.wincofoods.com Post End Date: 9/18/2018
          Data Analytics und Cloud Computing: Per Crowdsourcing zum Data Lake in der Cloud      Cache   Translate Page      
Das Aachener Startup P3 insight sammelt Daten zu Mobilfunknetzen per Crowdsourcing und nutzt die Amazon Public Cloud für die Analyse.
          Full Time Staff Pharmacist - Prince Albert, Saskatchewan - Loblaw Companies Limited - Prince Albert, SK      Cache   Translate Page      
Bachelor of Science, Pharmacy and a Class A Pharmacists license a must. Strong personal computing skills, as well as knowledge of KROLL Pharmacy Computer system...
From Loblaw Companies Limited - Tue, 21 Aug 2018 22:11:17 GMT - View all Prince Albert, SK jobs
          Systems Operations Specialist (Mobile Computing) - Open Systems Technologies, Inc. - Québec City, QC      Cache   Translate Page      
Optimizing hand-off of work to Level 2 offshore team. For our client in Montreal, we are looking for a senior systems operations consultant for a long term...
From Open Systems Technologies, Inc. - Sat, 30 Jun 2018 04:25:44 GMT - View all Québec City, QC jobs
          Senior Network Operations Specialist (Mobile Computing) - NTT DATA Services - Montréal, QC      Cache   Translate Page      
Optimization and handoff of work to Level 2 offshore team- Infrastructure capacity management. At NTT DATA Services, we know that with the right people on board...
From NTT Data - Thu, 06 Sep 2018 20:03:04 GMT - View all Montréal, QC jobs
          Artificial Intelligence Distinguished Research Scientist - Accenture - San Jose, CA      Cache   Translate Page      
Collaborating with business subject matter experts and Technology delivery teams to deliver strategic cognitive computing projects from design and prototype to...
From Accenture - Mon, 09 Jul 2018 05:27:32 GMT - View all San Jose, CA jobs
          Radisys introduces multi-access edge computing software platform      Cache   Translate Page      
(Telecompaper) Radisys announced its Edge Computing Software Platform. The new platform provides an access-agnostic, ETSI standards-compliant Mobile Edge Platform...
          Infrastruktur allein reicht nicht aus: Cloud Service Provider müssen umdenken      Cache   Translate Page      
Cloud-Nutzung ist mittlerweile Standard. Zunehmend erwarten Unternehmen von ihren Service Providern für Cloud Computing mehr als nur Infrastrukturleistungen. Daraus ergeben sich zugleich Herausforderungen und Chancen für Provider.
          Episode 148: Our Friend Adrian      Cache   Translate Page      
This week Dave (https://twitter.com/davidegts) talks with Adrian Keward (https://twitter.com/adriankeward) about Ansible use in public sector and lessons learned from public sector customers around the globe Welcome Adrian Keward (https://twitter.com/adriankeward)! British Army Talks DevOps at AnsibleFest London 2017 (https://www.ansible.com/blog/british-army-devops-ansiblefest-london) Ansible helps the US Army with Hurricane Harvey relief (https://www.theregister.co.uk/2017/09/08/red_hat_speed_fiends_celebrate_automation/) Network Rail (https://www.computing.co.uk/ctg/news/2412536/enterprise-mobility-brings-network-rail-agility-never-before-conceived-to-be-possible) Red Hat Government Symposium 2017 (https://fedscoop.com/events/redhatgov/2017/) Red Hat Forum Tokyo (https://www.redhat-forum.jp/) Around the world .. but not in 80 Days – Government approaches to Open Source around the world – Part One (https://www.linkedin.com/pulse/around-world-80-days-government-approaches-open-source-adrian-keward/) Around the world .. but not in 80 Days – Government approaches to Open Source around the world – Part Two (https://www.linkedin.com/pulse/around-world-80-days-government-approaches-open-source-keward/) We Give Thanks * Adrian Keward (https://twitter.com/adriankeward) for being our special guest star! Special Guest: Adrian Keward.
          Nvidia launches the Tesla T4, its fastest data center inferencing platform yet      Cache   Translate Page      

Nvidia today announced its new GPU for machine learning and inferencing in the data center. The new Tesla T4 GPUs (where the ‘T’ stands for Nvidia’s new Turing architecture) are the successors to the current batch of P4 GPUs that virtually every major cloud computing provider now offers. Google, Nvidia said, will be among the […]

The post Nvidia launches the Tesla T4, its fastest data center inferencing platform yet appeared first on RocketNews | Top News Stories From Around the Globe.


          Episode 133: Walking on a Cloud      Cache   Translate Page      
  We Give Thanks Corey Sanders for being our special guest star! Special Guest: Corey Sanders.
          Episode 130: #130: Bless Your Heart      Cache   Translate Page      
We Give Thanks Special Guest: Jamie Duncan.
          #127: CRI-O, Skopeo, and Fork-o with Dan Walsh      Cache   Translate Page      

This week Dave talks with Dan Walsh about CRI-O (née OCID) and forking.

"No, I said *skopeo*."“No, I said *skopeo*.”

 

We Give Thanks

  • Dan Walsh for being our special guest star!

 

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Special Guest: Dan Walsh.
          The Changelog 314: Kubernetes brings all the Cloud Natives to the yard      Cache   Translate Page      

We talk with Dan Kohn, the Executive Director of the Cloud Native Computing Foundation to catch up with all things cloud native, the CNCF, and the world of Kubernetes.

Dan updated us on the growth KubeCon / CloudNativeCon, the state of Cloud Native and where innovation is happening, serverless being on the rise, and Kubernetes dominating the enterprise.

Sponsors

  • Hired –  Salary and benefits upfront? Yes please. Our listeners get a double hiring bonus of $600! Or, refer a friend and get a check for $1,337 when they accept a job. On Hired companies send you offers with salary, benefits, and even equity upfront. You are in full control of the process. Learn more at hired.com/changelog.
  • DigitalOcean –  DigitalOcean is simplicity at scale. Whether your business is running one virtual machine or ten thousand, DigitalOcean gets out of your way so your team can build, deploy, and scale faster and more efficiently. New accounts get $100 in credit to use in your first 60 days.
  • Algolia –  Our search partner. Algolia's full suite search APIs enable teams to develop unique search and discovery experiences across all platforms and devices. We're using Algolia to power our site search here at Changelog.com. Get started for free and learn more at algolia.com.
  • GoCD –  GoCD is an on-premise open source continuous delivery server created by ThoughtWorks that lets you automate and streamline your build-test-release cycle for reliable, continuous delivery of your product.

Featuring

Notes and Links


          Episode 95: #95: Run By Horses      Cache   Translate Page      

This week Dave and Gunnar talk about: San Jose’s license-plate opportunity, AT&T’s wifi opportunity, UK government’s Oracle opportunity, and DISA’s email opportunity.

1970s PORTRAIT OF BUSINESS...512 Megabytes?

Cutting Room Floor

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Desktop Support Analyst - Syntel Inc - Madison, WI      Cache   Translate Page      
Technical operational knowledge of common End User Computing standards and delivery methods, including Windows 7/10, Office products including Outlook and Skype...
From Indeed - Wed, 05 Sep 2018 17:48:06 GMT - View all Madison, WI jobs
          Episode 88: #88: The Usual.      Cache   Translate Page      

This week Dave and Gunnar talk about: Robots, security, hating on Uber. The usual.

ce30888d7e068103dd040a4760a5b58b_original

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 78: #78: Project Jellyfish      Cache   Translate Page      

This week Dave and Gunnar talk with Nirmal Mehta about Jellyfish, Project Jellyfish, and how to get a company to open source a project.

jellyfish-anatomy

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 70: #70: A TAM We Like      Cache   Translate Page      

This week, Dave and Gunnar talk to Dave Sirrine, Technical Account Manager and delightful human being.

sirrine-pie

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 69: #69: Supercookies      Cache   Translate Page      

This week, Dave and Gunnar talk about mobile phone surveillance that you pay for, peer-to-peer dropbox replacements, and the many faces of lock-in.

super-cookie-640x353

Cutting Room Floor

 

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 58: #58: You Will Know Dave’s Vacation By the Trail of Destruction      Cache   Translate Page      

This week, Dave and Gunnar talk about Barthelona, Gaudi, Toledo, Detroit, the Stasi, and why cloud providers can’t have nice things.

mens-old-time-bathing-suit-costume-891159

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Red Hat Summit 2014: Docker and Cloud Brokers with Nirmal Mehta      Cache   Translate Page      

Dave and Gunnar talk with one of their favorite partners: Nirmal Mehta of Booz Allen Hamilton, Red Hat Innovation Award winner in 2013. It’s a nerdfest. And a Dockerfest.

Highlights

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 44: #44: Glad to be here      Cache   Translate Page      

This week, Dave and Gunnar talk about affordances, partnerships, and a bunch of reasons Red Hat is a great place to work.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

Sophisticated multi-touch interfaces in vehicles have consequences.Sophisticated multi-touch interfaces in vehicles have consequences.

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 38: #38: Penchant for Hyperbole      Cache   Translate Page      

This week, Dave and Gunnar talk about: watching your email, hearing your GnuPG key, the smell of fresh-baked OpenStack, a taste of ARM on Fedora, a touch of Skynet.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

Hyperbole

This episode’s title is dedicated to Peter Larsen. We heard you, and welcome your feedback!

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 35: #35: Say My Name      Cache   Translate Page      

This week, Dave and Gunnar talk about: US Government bitcoins, skeumorphic bitcoins, TSA coin-flips, twitter drops a dime on the US government, OSS payload this Federal IT award season, our $.02 on RHEL 6.5 and Fedora 20.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

redhatheisenberg

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 34: #34: Velociraptor      Cache   Translate Page      

This week on Dave and Gunnar: Oracle plays with science, Amazon plays with the US Postal Service, and everyone plays with tracking you like a criminal.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

velociraptor

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 33: #33: Beard Phone      Cache   Translate Page      

This week, Dave and Gunnar talk about badBIOS and unreliable narrators, 85% of Android is crap, warrant canaries, and special guest star Adam Clater talking about OpenShift and ownCloud

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

beards

Cutting Room Floor

We Give Thanks

  • Adam Clater for guest starring!
  • Gunnar’s mom for teaching us about warrant canaries
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 31: #31: Pizza Hat      Cache   Translate Page      

This week, Dave and Gunnar talk about: turning people into products, patches into pounds and pence, protecting poultry, priorities, primary patchers on projects, and PDFs into poison.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

How do you say "infringement" in Farsi?How do you say “infringement” in Farsi?

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 29: #29: Travel Pudding      Cache   Translate Page      

This week, Dave and Gunnar talk about Pudding ‘n Airplanes, Penguins ‘n Space, Parkinson’s ‘n Chickens, Printing ‘n 3D, and IMAP.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

Pudding.

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 28: #28: Abandonment Issues      Cache   Translate Page      

This week, Dave and Gunnar talk about Batman, Acxiom as your personal data custodian, the TSA Pre-✓ Class War, and the HACK REACTOR.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

Abandoned Ferris Wheel

Cutting Room Floor

We Give Thanks

  • Matt Micene for helping us stay technically debt free
  • David A. Wheeler, Josh Davis, and Dan Risacher for advocating open source in the DoD
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 27: #27: Manchurian Candidate      Cache   Translate Page      

This week, Dave and Gunnar talk about: spying, conspiracy theories, boxing and calculus in Ohio, Klingons in Illinois, the return of Nirmal, a ball peen update, and LUG parenting teachable moments.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

Never trust a man with a mustache.Never trust a man with a mustache. Exhibit AExhibit A

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 26: #26: Hedbänger’s Bäll      Cache   Translate Page      

This week, Dave and Gunnar talk about: snollygosters firing 9 or every 10 sysadmins, even yet still more Google and privacy, hands-free computing, Gunnar’s reputation management problems, and Dave’s “how to say no” weapons turned against him.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

Dave gets incepted.Dave gets incepted.

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 25: #25: Great Expectations      Cache   Translate Page      

This week, Dave and Gunnar talk about: Google’s expectations of privacy, VMware’s expectations of profit, Dave’s expectations of SELinux, and Gunnar’s inflated expectations of productivity software.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

Another VMware customer.

Cutting Room Floor

We Give Thanks

  • Gunnar thanks Dave for not saying “cyber” this episode
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 20: #20: CommaFeed with a Bullet      Cache   Translate Page      

This week, Dave and Gunnar talk about Le PRISM, Slashdot Gunnarbait, OpenStack Security Guide, the Indie Web, a petabyte of tax data, and an interview with the creator of CommaFeed.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

wpid-IMG_20130703_181522.jpgWelcome to Texas, Gunnar.

The Alamo Drafthouse TicketbotThe Alamo Drafthouse Ticketbot

Cutting Room Floor

We Give Thanks

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Episode 19: #19: “This is an exploding motorcycle.”      Cache   Translate Page      

This week Dave and Gunnar talk about: Gunnar smoking funny cigarettes, OpenShift all over the place, motorcycles, hacking Gunnar’s house (in a bad way), how to ask for help, and how to receive help like a gentleman.

RSS Icon#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000 Subscribe via RSS or iTunes.

See if you can find where he installed the Raspberry PiSee if you can find where he installed the Raspberry Pi

Cutting Room Floor

We Give Thanks

  • Major Hayden for the systemd video tip
  • Camille Acey for being so responsive on the tooter
  • Matt Micene, for letting us name-check him.
  • Randy Pausch, RIP — thanks for the perspective!
  • Richard Matheson, RIP — thanks for the sci fi!
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          【速報】NVIDIA、Turing世代の「Tesla T4」を発表      Cache   Translate Page      
NVIDIAは2018年9月13日、同社プライベートカンファレンス「GTC Japan 2018」(2018年9月13〜14日、グランドプリンスホテル新高輪 国際館パミール)で、HPC(High Performance Computing)向けGPUボードの新製品となる「Tesla T4」を発表した。
          SDL and Alibaba Cloud Partner to Help Brands Develop Across Asia      Cache   Translate Page      

MAIDENHEAD, England, September 13, 2018 /PRNewswire/ -- SDL (LSE: SDL), a leader in global content management, translation and digital experience, today announced a strategic partnership with Alibaba Cloud, the cloud computing arm of Alibaba Group, to launch a co-developed solution...


          1901 Group Execs Discuss Cloud Migration Strategies      Cache   Translate Page      
What’s behind a successful approach to cloud? That’s one of the questions 1901 Group LLC executives Paul Wilkinson and Sonu Singh tackled in a recent interview with WashingtonExec. The duo also addressed advantages and roadblocks of cloud computing, favorite technologies and the presence of Hokie nation in federal IT. 1901 Group is a IT solutions [...]
          Tech Mahindra and Alef Mobitech to Offer End-to-End 5G Multi Access Edge Solution      Cache   Translate Page      
...profitability with ever-increasing bandwidth and data consumption needs. Operators need ways to generate additional revenue while minimizing their operating expenses and capital expenditures. Moving the computing and network intensive applications from the Cloud to the Mobile Edge enables operators to ...

          Asia-Pacific region would witness fastest CAGR in global Unified Communication market by 2023      Cache   Translate Page      
Asia-Pacific region would witness fastest CAGR in global Unified Communication market by 2023 Increase in technological advancements and surge in adoption of cloud computing technologies are expected to be the foremost factors driving the growth of the market during the forecast period. Allied Market Research published a report, titled, Unified Communication Market by Application

          Quantum Computing Is Almost Ready For Business      Cache   Translate Page      

Quantum computing – The use of private physics on an atomic scale seems to be a technology for the distant future, perhaps decades later. But the market launched by science fiction technology a few years ago was expected earlier because of new ideas about using its imperfect capabilities. Along with giants like Google and IBM, Reggie suggests that Berkeley should conquer the market. This is at least for now. “This platform is the first to implement an integrated computing system, which is the first architecture of Quantum Cloud Services,” said Chad Rigetti, founder and CEO of Quantum Cloud Services. Many of Righetti’s early users have announced that biotechnology and chemistry companies are using quantum technology to research complex molecules to develop new drugs. Among the many white fat cylinders that support supercoolers, the traditional server rack is a classic hybrid quantum system that brings this peculiar physicality to market. The specific processes that can be run by the quantum end of the system, although limited and prone to errors, are enough to boost the performance of conventional computers beyond what they can do – a landmark called a quantum advantage. A so-called hybrid algorithm using both systems can detect and […]

The post Quantum Computing Is Almost Ready For Business appeared first on Techyv.com.


          How data analytics-rich business networks help close the digital transformation gap      Cache   Translate Page      
The next BriefingsDirect thought leadership discussion explores how intelligence gleaned from business applications, data, and networks provides the best new hope for closing the digital transformation gap at many companies.

A recent global survey of procurement officers shows a major gap between where companies are and where they want to be when it comes to digital transformation. While 82 percent surveyed see digital transformation as having a major impact on processes -- only five percent so far see significant automation across their processes.

How can business networks and the cloud-based applications underlying them better help companies reach a more strategic level of business intelligence and automation?

Listen to the podcast. Find it on iTunes. Get the mobile app. Read a full transcript or download a copy

To find out, BriefingsDirect recently visited SAP in Palo Alto, Calif. to sit down with Darren Koch, Chief Product Officer at SAP Ariba. The discussion is moderated by Dana Gardner, Principal Analyst at Interarbor Solutions.

Here are some excerpts:

Gardner:What's holding companies back when it comes to becoming more strategic in their processes? They don’t seem to be able to leverage intelligence and automation to allow people to rise to a higher breed of productivity.

Koch
Koch: I think a lot of it is inertia. The ingrained systems and processes that exist at companies impact a lot of people. The ability for those companies to run their core operations relies on people and technology working together. The change management required by our customers as they deploy solutions -- particularly in the move from on-premises to the cloud -- is a major inhibitor.

But it's not just the capabilities and the change in the new technology. It's really re-looking at -- and reimagining -- the processes, the things that existed in the highly customized on-premises world, and the way those things change in a digital-centric cloud world. They are fundamentally different. 

Gardner: It's always hard to change behavior. It seems like you have to give people a huge incentive to move past that inertia. Maybe that's what we are all thinking about when we bring new data analytics capabilities to bear. Is that what you looking at, incentivization -- or how do we get that gap closed?

Reimagining change in the cloud

Koch: You are seeing more thought leadership on the executive side. You are seeing companies more willing to look holistically at their processes and saying, “Is this something that truly differentiates my company and adds sustainable competitive advantage?” And the answer on some processes is, “No."


And so, we see more moving away from the complex, on-premises deployments that were built in a world where a truckload of consultants would show up and configure your software to do exactly what you wanted. Instead, we’re moving to a data-centric best-practices type of world that gives scale, where everybody operates in the same general business fabric. You see the emergence of things like business networks.

Gardner: And why the procurement and supply chain management folks? Why are they in an advantageous position to leverage these holistic benefits, and then evangelize them?

Koch: There'sbeen a ton of talk and innovation on the selling side, on the customer resource management (CRM) side, such as our announcement of C/4HANAat Sapphire 2018 and the success in the cloud generally in the CRM space. What most people stop at is, for every seller there's a buyer. We represent the buy-side, the supply chain, the purchasing departments. And now from that buy-side we have the opportunity to follow the same thought processes on the sell-side.

The beauty at SAP Ariba is that we have the world's biggest business network. We have over $2 trillion of buy-side spend and our ability to take that spend and find real insights and real actionable change to drive value at the intersection of buyers and sellers. This is where we’re headed.

Gardner: It seems like we are moving rapidly beyond the buy and sell being just transactional and moving more to deeper partnerships, visibility, of understanding the processes on both sides of the equation. That can then bring about a whole greater than the sum of the parts.

Understanding partners 

Koch: Exactly. I spent 10 years working in the consumer travel space, and my team in particular was working on how consumers choose hotels. It's a very complex purchasing decision.

There are location aspects, there are quality aspects, there are amenities, room size, obviously price, and there are a lot of non-price actors that go into the purchase decision, too. When you look at what a procurement audience is doing, what a company is doing, there are a lot of such non-price factors. It’s exactly the same problem.

The investments that we are making inside of SAP Ariba get at allowing you to see things like supplier risk. You are seeing things like the Ariba Network handling direct materials. You are seeing time, quality, and risk factors -- and these other non-price dimensions -- coming in, in the same way that consumers do when choosing a hotel. Nobody chooses the cheapest one, or very few people do. Usually it’s a proper balance of all of these factors and how they best meet the total needs. We are seeing the same thing on the business procurement side.
When you look at what a procurement audience is doing, what a company is doing, there are now a lot of non-price factors.

Gardner: As consumers we have information at our fingertips -- so we can be savvy and smart – probably better than at any other time in history. But that doesn’t always translate to a larger business-to-business (B2B) decisions.

What sort of insights do you think businesses will want when it comes that broader visibility?

Koch: It starts with the basics. It starts with, “How do I know my suppliers? How do I add scale? Is this supplier General Data Protection Regulation (GDPR)-compliant? Do they have slavery or forced labor in their supply chain? Where are they sourcing their materials?” All of these aspects around supplier risk are the basics; knowing your supplier well is the basic element.

Then when you go beyond that, it's about things like, “Well how do I weigh geographic risk? How do I weigh supply chain risk?” And all the things that the practitioners of those disciplines have been screaming about for the rest of their companies to pay attention to.

That’s the new value they are providing. It's that progression and looking at the huge opportunity to see the way companies collaborate and share data strategically to drive efficiency into processes. That can drive efficiency ultimately into the whole value chain that leads to a better customer experience at the end.

Gardner: Customer experience is so important across the board. It must be a big challenge for you on the product side to be able to contextually bring the right information and options to the end-user at the right time. Otherwise they are overwhelmed, or they don't get the benefit of what the technology and the business networks can do.

What are you doing at SAP Ariba to help bring that right decision-making -- almost anticipating where the user needs to go -- into the actual applications and services?

Intelligent enterprise

Koch: That begins with our investments in re-platforming to SAP HANA. That feeds into the broader story about the intelligent enterprise. Purchasing is one facet, supply-chain management is a facet, sales is a facet, and production -- all of these components are elements of a broader story of how you synthesize data into a means where you have a digital twin of the whole enterprise.

Then you can start doing things like leveraging the in-memory capabilities of HANA around scenario planning, and around, “What are the implications of making this decision?”

What happens when a hurricane hits Puerto Rico and your supply chain is dramatically disrupted? Does that extend to my suppliers’ suppliers?  Who are my people on the ground there, and how are they disrupted? How should my business respond in an intelligent way to these world events that happen all the time?

Gardner: We have talked about the intelligent enterprise. Let's hypothetically say that when one or two -- or a dozen -- enterprises become intelligent that they gain certain advantages, which compels the rest of their marketplace to follow suit.

When we get to the point where we have a critical mass of intelligent enterprises, how does that elevate to an intelligent economy? What can we do when everyone is behaving with this insight, of having tools like SAP Ariba at their disposal?

Koch: You hit on a really valuable and important point. Way back, I was an economics major and there was a core thing that I took away 20 years ago from my intro to macroeconomics class. The core of it was that everything is either value or waste. Every bit of effort, everything that's produced around the world, all goods or services are either valuable or a waste. There is nothing in between.

The question then as we look at value chains, when we look at these webs of value, is how much of that is transaction cost? How much of that is information asymmetry? How much of that is basic barriers that get in the way of ultimately providing value to the end consumer? Where is all of that waste?

When you look at complex value chains, at all of the inventory sitting in warehouses, the things that go unsold, the mismatches between supply and demand across a value chain -- whether you are talking about direct materials or about pens and paper sitting in a supply closet -- it really doesn't matter.
When you look at complex value chains ... how much of that goes into actually delivering on what your customers and employees value -- and how much of it is waste?

It’s all about how much of that goes to actually delivering on what your customers, your employees, and your stakeholders’ value -- and how much of it is waste? As we link these data sets together -- the real production planning, understanding end-user demand, and all the way back through the supply chain – we can develop new transparency that brings a ton of value. And by ultimately everyone in the value chain understanding what the consumers’ actually value, then they can innovate in the right ways.

So, I see this all dramatically changing as you link these intelligent companies together. As companies move in the same way -- into a sharing mindset – then the sharing economy uses resources in a far more efficient way, in the exact same way as we use our data resources in a more efficient way.

Gardner: This also dovetails well with being purposeful as a business. If many organizations are encouraging higher productivity, which reduces inefficiencies and helps raise wages, it can lead to better standards of life. So, the stakes here are pretty high.

We’re not just talking about adding some dollars to the bottom and top lines. We’re also talking about a better economy that raises all boats.

Purposeful interconnections 

Koch: Yes, absolutely. You see companies like Johnson and Johnson, who at their core, from their founding principles, have the importance of their community as one of the core founding principles. You see it in companies like Ford and their long heritage. Those ideals are really coming back from the decade of the 1980s where greed was good and now back to a more holistic understanding of the interconnectedness of all of this.

And it’s good as humans. It’s also good from the business perspective because of the need to attract and retain the talent required to run a modern enterprise. And building the brands that our consumers are demanding, and holding companies accountable, they all go hand-in-hand.

And so, the purpose aspect really addresses the broader stakeholder aspects of creating a sustainable planet, a sustainable business, sustainable employment, and things like that.

Gardner: When we think about attaining this level of efficiency through insights and predictive analytics -- taking advantage of business networks and applications and services -- we are also on the cusp of getting even better tools.

We’re seeing a lot more information about machine learning (ML). We’re starting to tease out the benefits of artificial intelligence (AI). When these technologies are maturing and available, you need to be in a position to take advantage of them.

So, moving toward the intelligent enterprise and digital transformation are not just good or nice to have, they are essential because of what's going to come next in just a few years.

Efficiency in the digital future 

Koch: Yes, you see this very tactically in the chief procurement officers (CPOs) that I've talked with as I've entered this role. I have yet to run across any business leader who says, “I have so many resources, I don't know what to do.” That’s not usually what I hear. Usually, it's the opposite. It’s, “I'm being asked to do more with less.”

When you look at the core of AI, and the core of ML, it’s how do you increase efficiency? And that’s whether it's all the way on the full process automation side, or it’s along the spectrum of bringing the right intelligence and insights to streamline processes to make better decisions.

All of that is an effort to up-level the work that people do, so that raises wages, it raises productivity, all of those things. We have an example inside of our team. I was meeting with the head of our customer value organization, Chris Haydon, over dinner last night.  Chris was talking about how we were applying ML to enhance our capability to onboard new customers.

And he said the work that we've done has allowed him to redeploy 80 people in his team on to higher productivity use cases. All of those people became more valuable in the company because they were working on things that were at the next level of creating new solutions and better customer experiences, instead of turning the crank in the proverbial factory of deploying software.

Gardner: I happen to personally believe that a lot of the talk about robots taking over people’s jobs is hooey. And that, in fact, what's more likely is this elevation of people to do what they can do best and uniquely. Then let the machines do what they do best and uniquely.

How is that translating both into SAP Ariba products and services, and also into the synergy between SAP and SAP Ariba?
We're just getting through a major re-platforming to S/4 HANA and that's really exciting because of HANA's maturity and scale. We're using ML algorithms and applying them.

Koch: We are at a really exciting time inside of our products and services. We're just getting through a major re-platforming to S/4 HANA, and that’s really exciting because of HANA’s maturity and scale. It’s moving beyond basic infrastructure in the way that [SAP Co-Founder] Hasso Plattner had envisioned it.

We’re really getting to the point of not replicating data. We are using the ML algorithms and applying them, building them once and applying them at large. And so, the company’s investments in HANA and in Leonardo are helping to create a toolkit of capabilities that applications like SAP Ariba can leverage. Like with any good infrastructure investment, when you have the right foundation you see scale and innovation happen quickly.

You'll see a lot more of how we leverage the data that we have both inside the company as well as across the network to drive intelligence into our process. You will just see that come through more as we move from the infrastructure foundation setting stage to building the capabilities on top of that.

Gardner: Getting back to that concept of closing the transformation gap for companies, what is it they should be thinking about when these services and technologies become available? How can they help close their own technology gap by becoming acquainted in advances and taking some initiative to best use these new tools?

Digital transformation leadership 

Koch: The companies that are forward-leading on digital transformation are the ones that made the cloud move early. The next big move for them is to tap into business networks. How can they start sharing across their value chains and drive higher efficiency? I think you'll see from that the shift from tactical procurement to strategic procurement.

The relationships need to move from transactional to a true partnership, of how do we create value together? That change involves rethinking the ways you look at data and of how you share data across value chains.

Gardner: Let’s also think about spend management conceptually. Congratulations, by the way, on your recent Gartner Magic Quadrant positioning on pay-to-procure processes. How does spend management also become more strategic?

Koch: The building blocks for spend management always come down to what is our tactical spend and where should we focus our efforts for strategic spend? Whether that is in the services area, travel, direct materials, or indirect, what customers are asking SAP for is, how do all of these pieces fit together?

What's the difference between a request for proposal (RFP) for a hotel in New York City versus an RFP for chemicals in Southeast Asia? They're both a series of business processes of selecting the right vendor that balances all of the critical dimensions: Price and everything else that makes for a good decision and that has longevity.

We see a lot of shared elements in the way you interact with your suppliers. We see a lot of shared elements in the way that you deploy applications inside of your company. We’re exploring how well the different facets of the applications can work together, how seamless the user experience is, and how well all of these tie together for all the stakeholders.

Ultimately, each element of the team, each element of the company, has a role to play. That includes the finance organization’s desire to ensure that value is being created in a way that the company can afford. It means that the shareholders, employees, management, and end-users are all on the same page.

This is the core of spend management – and the intelligent enterprise as a whole. It means being able to see everything, by bringing it all together, so the company can manage its full operations and how they create value.

Gardner: The vision is very compelling. I can certainly see where this is not going to be just a small change -- but a step-change -- in terms of how companies can benefit in productivity.

As you were alluding to earlier, architecture is destiny when it comes to making this possible. By re-architecting around, as for S/4 HANA, by taking advantage of business networks, you are well on the way to delivering this. Let’s talk about the platform changes that grease the skids toward the larger holistic benefits.

Shifting to the cloud 

Koch: It's firmly our belief that the world is moving to mega-platforms. SAP has a long history of bringing the ecosystem along, whether the ecosystem is delivering process innovation or is building capabilities on top of other capabilities embedded deeply into the products.

What we're now seeing is the shift from the on-premises world to a cloud world where it's API-first, business events driven, and where you see a decoupling of the various components. Underneath the covers it doesn't matter what technology stack things are built on. It doesn't matter how quickly they evolve. It's the assumption that we have this API contract between two different pieces of technology: An SAP Ariba piece of technology, an SAP S/4 Cloud piece of technology, or a partner ecosystem piece of technology.

For example, a company like Solenis was recently up on stage with us at Ariba Live in Amsterdam. That's one of the fastest-growing companies. They have raised a B round at $1 billion valuation. Having companies that are driving innovation like that in partnership with an SAP platform brings not just near-term value for us and our customers, it brings future-proofing. It brings extensibility when there is a specific requirement that comes in for a specific industry or geography. It provides a way a customer can differentiate. You can just plug-in.
We're now seeing the shift from on-premises to cloud where you see a decoupling of the components. It doesn't matter what the technology stack is. ... It's now about API-first business events.

[SAP business unit] Concur has been down this path for a long time. The president of SAP Ariba, Barry Padgett, actually started the initiative of opening up the Concur platform. So deep at our core -- in our roots -- we believe that networks, ecosystems, and openness will ensure that our customers get the most value out of their solutions.

Gardner:Because SAP is an early adopter of multicloud, SAP can be everywhere at the most efficient level given what the hyperscale cloud providers are providing with global reach and efficiency. This approach also allows you to service small- to medium-sized businesses (SMBs), for example, essentially anywhere in the world.

Tell me why this long-term vision of a hyperscale-, multicloud-supported future benefits SAP, SAP Ariba, and its customers.

A hyperscale, multicloud landscape

Koch: When you look across the landscape of the hyperscalers and you look at the pace of innovation and the level of scale that that they are able to deliver, our lead time is slashed. We can also scale up and down as required. The cloud benefits apply to speed compared to having boxes installed in data centers, as well as ease in workload variability -- whether it's test variability or our ability to run ML-training models.

The idea that we still suffer multi-month lead times to get our physical boxes installed in our data centers is something that we just can't afford. Our customers demand more.

Thankfully there are multiple solutions around the world that solve these problems while at the same time giving us things like world-class security, geographic footprints, and localized expertise. When a server fails halfway around the world and the expert is somewhere else, the hyperscalers provide a solution to that problem.

They have somebody who walks through every data center and makes sure that the routers are upgraded, and the switches and load balancers are working the way they should. They determine whether data correctly rests inside of a Chinese firewall or inside of Europe [due to compliance requirements]. They are responsible for how those systems interact.

We still need to do our investment on the applications tier and in working with our customers to handle all of the needed changes in the landscape around data and security.

But the hyperscalers give us a base-level of infrastructure so we don't need to think about things like, “Is our air conditioner capacity inside of the data center sufficient to run the latest technology for the computing power?” We don't worry about that. We worry about delivering value on top of that base-level of infrastructure and so that takes our applications to the next level.

In the same way we were talking earlier about ML and AI freeing up our resources to work on higher-value things, [the multicloud approach] allows us to stop thinking about these base-level things that are still critical for the delivery of our service. It allows us to focus on the innovation aspects of what we need to do.

Gardner: It really is about driving value higher and higher and then making use of that in a way that's a most impactful to the consumers -- and ultimately the whole economy.

Koch: You got it.


          Alibaba to Showcase Latest Technology at Flagship Event      Cache   Translate Page      
The Computing Conference 2018, Alibaba’s annual flagship event, will showcase an array of cutting-edge technology from the company and its partners from September 19 to 22. The theme of this year’s Conference is Empower Digital China, and more than 60,000 participants—including entrepreneurs and developers across China—are expected to attend the four-day event in Hangzhou, Alibaba’s home base. Now in its ninth year, the world-class technology festival will feature the hottest tre...
          Investigating efficient methods for computing four-quark correlation functions      Cache   Translate Page      
We discuss and compare the efficiency of various methods, combinations of point-to-all propagators, stochastic timeslice-to-all propagators, the one-end trick and sequential propagators, to compute two-point correlation functions of two-quark and four-quark interpolating operators of different structure including quark-antiquark type, mesonic molecule type, diquark-antidiquark type and two-meson type. Although we illustrate our methods in the context of the $a_0(980)$, they can be applied for other multi-quark systems, where similar diagrams appear. Thus our results could provide helpful guidelines on the choice of methods for correlation function computation for future lattice QCD studies of meson-meson scattering and possibly existing tetraquark states.
          Principal Consultant, End-User Computing - Compugen Inc - Calgary, AB      Cache   Translate Page      
Architect, Design, Implement, and Support End-User Computing solutions. Five years of related job experience in the architecture &amp; design, and implementation of...
From Compugen Inc - Sat, 16 Jun 2018 02:10:57 GMT - View all Calgary, AB jobs
          Apple and Mobility Specialist, End User Computing - Compugen Inc - Calgary, AB      Cache   Translate Page      
This individual will be responsible for leading the architecture, design, implementation, and post-sales support of EUC solutions primarily around Apple and...
From Compugen Inc - Thu, 05 Jul 2018 23:44:30 GMT - View all Calgary, AB jobs
          Cloud&Heat locks in funding      Cache   Translate Page      
Cloud&Heat, a German provider of solutions for the cloud computing market, has raised 10 million euros in funding. ETF Partners led the round with participation from Inven Capital.
          Nvidia Will Keep Pascal GPUs on Store Shelves After RTX Launches      Cache   Translate Page      

Nvidia will launch its new Turing architecture in the coming weeks, but it won't be completely replacing Pascal.

The post Nvidia Will Keep Pascal GPUs on Store Shelves After RTX Launches appeared first on ExtremeTech.


          US Government forced to spend on of-the-shelf security      Cache   Translate Page      

banner_220x220The US Government is being forced to spend more money on commercial off-the-shelf (COTS)-based cybersecurity tools and systems as they face intense attacks, according to a new report.

Analysts Frost & Sullivan’s recent report with the catchy title “US DoD Cybersecurity Market, Forecast to 2023”, reveals that intense attacks from adversaries and non-state actors are compelling Department of Defense (DoD) cybersecurity spend for commercial off-the-shelf (COTS)-based cybersecurity tools and systems and the development of quantum computing and artificial intelligence technologies. more»


          Investigating efficient methods for computing four-quark correlation functions      Cache   Translate Page      
We discuss and compare the efficiency of various methods, combinations of point-to-all propagators, stochastic timeslice-to-all propagators, the one-end trick and sequential propagators, to compute two-point correlation functions of two-quark and four-quark interpolating operators of different structure including quark-antiquark type, mesonic molecule type, diquark-antidiquark type and two-meson type. Although we illustrate our methods in the context of the $a_0(980)$, they can be applied for other multi-quark systems, where similar diagrams appear. Thus our results could provide helpful guidelines on the choice of methods for correlation function computation for future lattice QCD studies of meson-meson scattering and possibly existing tetraquark states.
          NVidia Grid API Development      Cache   Translate Page      
I am looking for experienced NVidia Grid API Developer. I want to build a solution to play my GPU game remotely. There is something called game streaming which I need to be applied using APIs provided by NVidia... (Budget: $250 - $750 USD, Jobs: C++ Programming, Cloud Computing, Game Development, Graphics Programming, OpenGL)
          Salesforce Senior Engagement Manager, Director - Silverline Jobs - Casper, WY      Cache   Translate Page      
Silverline is a Salesforce Platinum Cloud Alliance Partner focused on delivering robust business solutions leveraging cloud-computing platforms....
From Silverline Jobs - Wed, 30 May 2018 06:22:53 GMT - View all Casper, WY jobs
          Salesforce Senior Engagement Manager, Director - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Silverline is a Salesforce Platinum Cloud Alliance Partner focused on delivering robust business solutions leveraging cloud-computing platforms....
From Silverline Jobs - Wed, 30 May 2018 06:22:47 GMT - View all Cheyenne, WY jobs
          NVidia Grid API Development      Cache   Translate Page      
I am looking for experienced NVidia Grid API Developer. I want to build a solution to play my GPU game remotely. There is something called game streaming which I need to be applied using APIs provided by NVidia... (Budget: $250 - $750 USD, Jobs: C++ Programming, Cloud Computing, Game Development, Graphics Programming, OpenGL)
          Network Development Engineer II - Amazon.com - Herndon, VA      Cache   Translate Page      
Job Description Do you like helping U.S. Intelligence Community agencies implement innovative cloud computing solutions and solve technical problems? Would...
From Amazon.com - Tue, 11 Sep 2018 19:23:37 GMT - View all Herndon, VA jobs
          Field Application Engineer (GPU) - Seattle - 56925 - Advanced Micro Devices, Inc. - Bellevue, WA      Cache   Translate Page      
Solutions Architects help AMD drive a new era of computing into the datacenter by engaging with key end users and independent software partners to demonstrate...
From Advanced Micro Devices, Inc. - Thu, 28 Jun 2018 07:32:28 GMT - View all Bellevue, WA jobs
          Apple Watch Series 4 can help keep tickers ticking      Cache   Translate Page      

Along with its refreshed iPhones, Apple debuted its latest Apple Watch today. The Apple Watch Series 4 introduces larger displays in new 40-mm and 44-mm models, a faster system-in-package for more responsive wrist computing, a case that's both thinner and better-suited to letting cellular transmissions and other radio waves through, and a sophisticated heartbeat-sensor array that can keep an eagle eye on just how well your ticker is ticking.

...

Read more...


          The rise of edge computing      Cache   Translate Page      
As people and organisations come to rely more on cloud services, they also begin demanding better performance from their online applications.
          ZOTAC Announces the Japan Office Grand Opening      Cache   Translate Page      
...users with quality options, from GPU servers for cloud computing, gaming hardware to industrial embedded and AI solutions. Get more information by visiting the following links: ZOTAC JAPAN Store ZOTAC Official Website About ZOTAC Technology Limited ZOTAC takes its name from ...


          Technical Architect (Salesforce experience required) Casper - Silverline Jobs - Casper, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sat, 23 Jun 2018 06:15:28 GMT - View all Casper, WY jobs
          Technical Architect (Salesforce experience required) Cheyenne - Silverline Jobs - Cheyenne, WY      Cache   Translate Page      
Company Overview: Do you want to be part of a fast paced environment, supporting the growth of cutting edge technology in cloud computing? Silverline...
From Silverline Jobs - Sun, 29 Jul 2018 06:18:46 GMT - View all Cheyenne, WY jobs
          Lead Administrator Database Infrastructure at Wipro Limited      Cache   Translate Page      
Wipro Limited is a leading global information technology, consulting and business process services company. We harness the power of cognitive computing, hyper-automation, robotics, cloud, analytics and emerging technologies to help our clients adapt to the digital world and make them successful.Why Work With UsWe are a company recognized globally for its comprehensive portfolio of services, a strong commitment to sustainability and good corporate citizenship, we have over 160,000 dedicated employees serving clients across six continents. Together, we discover ideas and connect the dots to build a better and a bold new future.Wipro is seeking a suitable and qualified candidate to joinJob Title: Lead Administrator Database InfrastructureJob ID: 57420Location: Lagos Lead Administrator Job description As a Lead Administrator, you should be able to act as a Single point of contact for the technical tower in front of the customer management.Ensure proper communication and quick resolution as a crisis manager.Responsible for Vendor Management and people management.Drives day to day operations and work plan allocation/management.Conduct periodic reviews with teams.Weekly and monthly status reports to higher management.Participate in business meetings with various stake holders.Take corrective actions based on the customer satisfaction surveys.Drive service improvement programs.Ensure adherence to quality / security standards defined for the engagement Perform Trend analysis, identify top few incidents and work with respective teams/individual to minimize the incidents.Effort estimation/reviews on need basis for new projects.

Apply at https://ngcareers.com/job/2018-09/lead-administrator-database-infrastructure-at-wipro-limited-247/


          Platform Operations Manager at Computer Warehouse Group (CWG) Plc      Cache   Translate Page      
Computer Warehouse Group (CWG) is a major technological company located in Lagos Nigeria, specialized in creating an edge with our cloud solutions which SMEs can now access wide ranges of platform servicesWe support growth strategies through top-notch platforms, End User Computing, Servers &amp; Storage, Payment System Terminals &amp; Devices, Data Centre Hardware, Software Services, Software Development &amp; System Integration, Banking Solutions, Consulting Services &amp; Training, Data Center Infrastructure Software, ERP Solutions.Why Work With UsCWG Plc shall deliver ICT Solutions that will add value to our customer&rsquo;s operation, meet and exceed our customer&rsquo;s expectation and we shall deliver them right first time and all the timeWe are seeking suitable and qualified candidate to join our team as an Platform Operations Manager&nbsp;Job Title: Platform Operations ManagerJob ID: 57420Salary: Very attractiveJob DescriptionThe Services of a Platform Operations Manager who will solely be responsible for operating and generating revenue from a gaming regulation platform with expertise in gaming, lottery operationsand varying gaming&nbsp;

Apply at https://ngcareers.com/job/2018-09/platform-operations-manager-at-computer-warehouse-group-cwg-plc-1000/


          Chief Finance Officer via PriceWaterhouseCoopers (PWC) at FHF Ltd      Cache   Translate Page      
PricewaterhouseCooper (PwC) - The Family Homes Funds Ltd is a limited liability company with the Federal Ministry of Finance and the Nigerian Sovereign Investment Authority as founding shareholders with a corporate office is located in F.C.T . Abuja. The Funds will be the largest affordable housing focused fund manager in Sub- Sahara Africa deploying capital in excess of N1trn towards two core objectives:Supporting access to affordable housing for at least 500,000 families on low to medium income by 2023 through strategic partnerships with various players in the sector and some of the world&rsquo;s main Development Finance Institutions.Take advantage of the opportunity a large- scale house building programme offers to create at least 1,500,000 jobs which are sustainable and offer families security, improved quality of life and hope.&nbsp;Corporate GovernanceStrategic direction and overall leadership is provided by the Board of Directors of whom a majority will be independent non executives. The appointment of the Board is expected to be completed by 30th September 2018. Day to day management of the Company is delegated to a 3 person senior leadership team headed by the Managing Director/Chief Executive Officer.&nbsp;What We DoTowards the achievement of its two core objectives, the Company will manage two funds:&nbsp;Homes Building Fund&nbsp;&ndash; Will provide debt and equity financing into eligible projects particularly those targeting people on low to medium incomes. The objective of the Homes Building Fund is to support development of new affordable housing through private and public sector partners. The financing opportunities are available in all states of the federation and the Federal Capital Territory. As at 30th June 2018, we have committed over N18bn towards the development of about 4000 homes. We expect to commit a further N100bn towards the development of 30,000 homes over the next 12 months.&nbsp;Homes Loans Assistance Fund&nbsp;&ndash; This fund will provide financing assistance to eligible home buyers. The facility is a key part of our strategy for improving affordability of home ownership towards people on low to medium income. By June 2019, we expect to have committed N25bn towards the programme.&nbsp;In addition to the above we expect to roll out a Rental Housing Fund and a Land Development Fund over the next 18months.&nbsp;Our work in these areas are underpinned by two key commitments:&nbsp;Partnerships - We can achieve much more collectively than any single player can individually. The Funds aims to build strong partnerships with a broad range of institutions and agencies to maximize every opportunity for enabling access to affordable housing for Nigerians, particularly those on low income.Innovation &ndash; We are committed to innovation across each area of our focus areas. This is an ongoing journey which will be shaped by the passion and commitment of our team to improve the quality of lives of the people we serve.Job Title: Chief Finance Officer_FHF 002Department:People &amp; Change NigeriaJob type: PermanentLocation:AbujaReference Number:&nbsp;130-PEO00927Roles &amp; ResponsibilitiesDevelop and oversee a disciplined, structured approach to strategic, operational and financial planningCoordinate the Funds&rsquo; budgeting process including planning and coordinating the timely preparation of annual budget estimates as well as track expenditure to ensure realization of strategic objectivesEnsure timeliness and accuracy of financial and management reporting data for investors and company&rsquo;s board of directorsOversee effectiveness of the accounting processes including proper functioning of all systems and databases, annual audit process and preparation of the Fund&rsquo;s annual account.Monitor and evaluate the Funds&rsquo; short and long-term funding needs and develop strategies and plans for financingEnsure provision of appropriate computing and data management services necessary to support the efficient operation of the Funds from time to time;Oversee the development and operation of an effective HR Function;Develop and manage key relationships with relevant external bodies/contacts e.g. regulatory organisations auditors, solicitors, banks etc. to facilitate effective business operationsContinuous assessment of the Funds&rsquo; capital, liquidity, foreign exchange and interest rate positions and develop strategies and plans for financingFacilitate the efficient operation of the Funds and cater for Disaster recovery and Business Continuity in event of business crisis

Apply at https://ngcareers.com/job/2018-09/chief-finance-officer-via-pricewaterhousecoopers-pwc-at-fhf-ltd-931/


          Senior Programmer Writer - Amazon.com - Seattle, WA      Cache   Translate Page      
Experience with distributed computing products, such as Hadoop, Spark, Presto, HBase, or Hive. Would you like to join a team focused on producing high-quality...
From Amazon.com - Wed, 12 Sep 2018 07:39:47 GMT - View all Seattle, WA jobs
          Senior Software Engineer, Cloud Engineering - ExtraHop Networks, Inc. - Seattle, WA      Cache   Translate Page      
Experience with data science information processing pipeline (Spark / Presto / SQL / Hadoop / HBASE). Big Data, the cloud, elastic computing, SaaS, AWS, BYOD,...
From ExtraHop Networks, Inc. - Tue, 11 Sep 2018 18:44:58 GMT - View all Seattle, WA jobs
          Solution Sales Account Executive (Salesforce Experience Preferred) - Silverline Jobs - Casper, WY      Cache   Translate Page      
Meet and exceed services booking quotas. Do you want to be part of a fast-paced environment, supporting the growth of cutting edge technology in cloud computing...
From Silverline Jobs - Sat, 08 Sep 2018 06:18:28 GMT - View all Casper, WY jobs
          TYAN Exhibits Artificial Intelligence and Deep Learning Optimized Server Platforms at GTC Japan 2018      Cache   Translate Page      
...per-unit cost computation for the AI revolution," said Danny Hsu , Vice President of MiTAC Computing Technology Corporation's TYAN Business Unit. Featuring maximum performance and system density, TYAN Thunder HX TA88-B7107 takes full advantage of NVIDIA NVLink™ technology and ...

          TuxMachines: today's leftovers      Cache   Translate Page      
  • Have You Ever Considered Replacing Windows with Linux? [Ed: Microsoft propagandist (for over a decade) Bogdan Popa continues to provoke GNU/Linux users]
  • Windows file sharing comes to Chromebooks

    You can run Android apps on Chromebooks. You can run Linux programs on Chromebooks. Heck, you can even run Windows programs on Chromebooks. But one thing you couldn't do natively on a Chromebook is read and write files on a Windows PCs or Windows and Samba servers. Things change. With the forthcoming release of Chrome OS 70, you can access network file shares from Chromebooks.

    To do this, once Chrome OS 70 is available to all users, open Settings, look for "Network File Shares", click the "Add File Share" button, and enter your user name and password. Then, click "Add" button and open the Files app to browse your newly mounted shared folder. That's all there is to it.

  • 5 examples of Prometheus monitoring success

    Prometheus is an open source monitoring and alerting toolkit for containers and microservices. The project is a hit with lots of different organizations regardless of their size or industrial sector. The toolkit is highly customizable and designed to deliver rich metrics without creating a drag on system performance. Based on the organizations that have adopted it, Prometheus has become the mainstream, open source monitoring tool of choice for those that lean heavily on containers and microservices.

    Conceived at SoundCloud in 2012, Prometheus became part of the Cloud Native Computing Foundation (CNCF) in 2016 and in August 2018, CNCF announced Prometheus was the second "graduated" project in the organization's history.

    Prometheus provides a key component for a modern DevOps workflow: keeping watch over cloud-native applications and infrastructure, including another popular CNCF project, Kubernetes.

  • Unique RTS game 'Circle Empires' to get Linux support later this month

    Publisher Iceberg Interactive sent word today that the unique RTS game Circle Empires from developer Luminous is heading to Linux. They didn't give an exact date other than "Later this month Circle Empires will also receive full Linux support.".

    Since I'm a big fan of RTS games, I was instantly quite surprised with how Circle Empires works. The map is literally split into circles, with you battling for control of each one of them.

  • Timespinner, a metroidvania featuring time travel, is set to be released September 25th

    Fans of metroidvanias will be getting a new game to sink their teeth into soon enough. A new trailer shows off what you can expect from the story and gameplay.

  • TensorFlow on Debian/sid (including Keras via R)

    I have been struggling with getting TensorFlow running on Debian/sid for quite some time. The main problem is that the CUDA libraries installed by Debian are CUDA 9.1 based, and the precompiled pip installable TensorFlow packages require CUDA 9.0 which resulted in an unusable installation. But finally I got around and found all the pieces.

  • Skylake mini-PC has dual M.2 slots and up to 32GB DDR4

    Aaeon has launched a Linux-ready “Nano-002N” mini-PC with a 6th Gen Core CPU, up to 32GB DDR4, 2x GbE, 2x HDMI, and 4x USB 3.0 ports, plus dual M.2 slots.

    Aaeon’s Nano-002N upgrades its Intel 5th Gen Nano-001N from 2015 with a dual-core, 6th Gen “Skylake” U-series CPU and additional new features. These include a serial port and twice the maximum memory for up to 32GB DDR4, among other enhancements. The mini-PC is well suited for media player, digital signage and POS, as well as other “tough applications in the factory, office, and off-site locations.”

read more


          Huawei Nova 3i vs OPPO F9 Specs, Benchmark Scores, Price, and Design : A Comparative Review      Cache   Translate Page      
When Huawei Nova 3i was officially launched globally on the last week of July 2018, many tech bloggers and editors called it the "New Midrange King" largely because of its stellar design, build, set of technical specifications, and imaging capabilities.

Fast forward to September 2018, does Huawei's popular mid-level release still get to keep the crown on its head in the face of serious competition posed by its rival manufacturers from China?

Huawei Nova 3i vs OPPO F9

As of writing, Huawei Nova 3i's main rival in the Philippine market appears to be the all-new OPPO F9, which was formally introduced to local bloggers, dealers, and members of the media on August 15, 2018.

Huawei Nova 3i vs OPPO F9

These two top-notch handsets were immediately pitted against each other largely because of their rather similar design and build as well as their comparable imaging features and internal hardware.

But which of the two is actually better and worth your hard-earned money?

In this TechPinas Comparison Post, I will try to answer that question - for the benefit of Pinoy mobile consumers - by doing a side-by-side comparison of their design, set of specs, price, and even benchmark scores -- in the most fair way that I can.


To make the comparison easier, I've included actual photos of these much-talked-about smartphone models along with the meticulous technical specifications table below, which makes it more convenient to spot the exact similarities or differences between these renowned midrange devices.

TechPinas Smartphone Technical Specifications Table

OPPO F9
Huawei Nova 3i
Dimensions 156.7 x 74 x 8 mm157.6 x 75.2 x 7.6 mm
Weight 169 grams169 grams
Display 6.23 inches, FullHD+ 1080 x 2280 pixels, 19:9 Aspect Ratio, LTPS LCD, 405 ppi6.3 inches FullHD+ 1080 x 2340 pixels, 19.5:9 Aspect Ratio, 409 ppi, IPS Display
Screen to Body Ratio 84% Screen to Body Ratio82.2% Screen To Body Ratio
Notch Yes, WaterdropYes, Oblong
Screen Protection Corning Gorilla Glass 6Scratch Resistant Glass (TBS)
Front Selfie Camera 25 MegaPixels, f/2.0, AI Beauty 2.1Dual Front Facing Camera 24 MegaPixels + 2 MegaPixels Depth Sensor
Rear Camera Dual Rear Camera: 16 MegaPixels, f/1.8, PDAF + 2MP Depth Sensor,
AI Imaging Technology, LED Flash
Dual Rear Camera: 16 MegaPixels f/2.2 PDAF + 2 MP f/2.4 Depth Sensor, AI Imaging Technology, LED Flash
Video Recorder Rear Video Recorder: FullHD 1080p 30fps with EIS

Front Video Recorder: 1080p 30fps
Rear Video Recorder: FullHD 1080p 30fps

Front Video Recorder: 1080p 30fps
User Interface Color OS 5.2EMUI 8.2 User Interface
Operating System Android 8.1 OreoAndroid 8.1 Oreo
Chipset 12nm Octa-Core (4 x 2.0 GHz ARM Cortex-A73 + 4 x 2.0 GHz ARM Cortex-A53), MediaTek Helio P60 Processor12nm Octa Core (4 x 2.2 GHz ARM Cortex-A73 + 4 x 1.7 GHz ARM Cortex-A53) Hisilicon Kirin 710
GPU Mali-G72 MP3Mali-G51 MP4
RAM 6GB4GB
ROM 64GB128GB
microSD Card Slot Yes, DedicatedYes, via Secondary Hybrid nanoSIM Card Slot
Battery Non-Removable Li-Po 3,400 mAhNon-Removable Li-Po 3,340 mAh
Charging Port microUSB 2.0, VOOC Flash ChargemicroUSB 2.0
WiFi 802.11 a/b/g/n802.11 a/b/g/n/ac
Bluetooth 4.24.2
4G LTE Yes, Cat13Yes, Cat13
Dual SIM Capability Yes, Two nanoSIM SlotsYes, Two nanoSIM Slots
Gyroscope YesYes
USB On-The-Go YesYes
Fingerprint Scanner YesYes
Facial Recognition YesYes
Protection Against The Elements NoNo
Colors Sunrise Red, Twilight Blue, Starry Purple - with Petal-Shaped Pattern DesignBlack, Pearl White, Iris Purple Premium Gradient
Availability 1st week of September 2018July 28, 2018
Official Suggested Retail Price in the Philippines PHP 17,990PHP 15,990

Alright! Let me jump straight to my commentary.

Design, Build, and Display

As you can see in these photos, Huawei Nova 3i and OPPO F9 share largely identical design language with some variance here and there.

The two phones have a rectangle with rounded corners form factor as well as a luxurious glass sandwich look although it is believed that OPPO F9 features polished acrylic back panel in lieu of real glass. Aside from that, these handsets share the exact same 169 grams heft and overall feel in the hand.

So how are they different in terms of looks?

Obviously, they come in different color variants, Huawei Nova 3i is available in Iris Purple (my favorite), Black, and Pearl White. On the other hand, OPPO F9 is currently out in Sunrise Red and  Twilight Blue with Petal Pattern at the back, and - eventually - Starry Purple.

The Iris Purple gradient finish of the Huawei Nova 3i has proven to be a real hit among Pinoys. In fact, this tone has been adopted by stylists and fashionistas not only in their outfits but also in the color of their hair. I guess that says something about Huawei's inclination to cater to the hip and trendy crowd who love expressing themselves through the colors and the designs of their outfits and gadgets.

Aside from the phones' colors, their camera modules at the back have different orientations. The one on Nova 3i is positioned vertically while OPPO F9 has it horizontally. Also, the Fingerprint Scanner below the cameras have a different shape on each phone; It's a perfect circle on the Nova 3i and oblong on the OPPO F9.

Even the position of the hardware buttons vary on each device. The power button is placed on the right panel on both phones but the one on the Nova 3i is slightly closer to the middle. The volume up and down buttons of the OPPO F9 are both placed on the left panel while Huawei Nova 3i has them also on the right panel, just above the power button.


Which model has the better button placement? It depends on the user. If you just like using your thumb to do the clicking, Nova 3i would be better for you. But if you like using multiple fingers to do the task, you might lean towards OPPO F9.

Now, as for their displays, these two actually share the same 6.3-inch FullHD+ IPS screen. However, Nova 3i's is taller as it has a 19.5:9 Aspect Ratio compared to 19:9 for the OPPO F9.

As shown in the image below, the display of each phone features a notch. The one on the OPPO F9 has a smaller waterdrop look while Nova 3i's is larger and looks more like that of the flagship-level Apple iPhone X.

What's good about Huawei Nova 3i's notch, however, is that it can easily be turned off by going to Settings > Display > Notch > Hide Notch.

Huawei Nova 3i vs OPPO F9

Imaging Capabilities

OPPO F9 and Huawei Nova 3i are powered by AI Imaging Technology that automatically figures out the subject in front of the camera - including food, people, greenery, and the sky, among others - and instantly tweaks the settings - like saturation, shadows, and highlights - to deliver the best shot possible.

For those who love taking selfies, the Nova 3i has two AI-powered cameras in front - a 24MP main snapper plus a 2MP Depth Sensor - while OPPO F9 only has one, which is a 25 MegaPixel f/2.0 cam powered by the company's AI Beauty 2.1 software that's made to capture the real you.

In my experience using both handsets, Nova 3i tends to deliver brighter selfies with more aggressive clearing while OPPO F9 tends to have smarter beautification effects to show your real facial features.

Since Huawei Nova 3i has a two front camera module, I find that it also gives you a slightly more refined bokeh effect for self-portraits wherein the background of the subject is beautifully blurred. I guess that secondary cam really helps. Also, the depth sensor helps power the handset's AR Lens for , which includes fun effects like 3D Qmoji and Backgrounds for Selfie Videos, which are so fun to use!

Huawei Nova 3i vs OPPO F9

As for the rear camera, both phones feature an AI-Powered 16MP primary cam + 2MP depth sensor that work together to give shallow depth of field effect on portrait, food, or product shots.

Both cameraphones are very reliable in capturing images and videos of various subjects with the Nova 3i often giving brighter shots with warmer tone in well-lit settings. However, frankly, in low light conditions OPPO F9 has an edge because of its primary cam's wider f/2.0 aperture and electronic image stabilization.

Reference: Sample Photos and Videos Taken Using Huawei Nova 3i and OPPO F9 (Youtube Video)

Internal Hardware and Benchmark Test Scores

As I've said, Huawei Nova 3i and OPPO F9 are very close when it comes to actual performance -- and that is proven by their 136,820 and 136,628 Antutu Benchmark Scores, respectively. It's really tight with Nova 3i scoring just a wee bit higher.

Huawei Nova 3i Antutu Benchmark Score, OPPO F9 Antutu Benchmark Score, Huawei Nova 3i vs OPPO F9

Looking at the scores, it's clear that the newer Kirin 710 processor of Nova 3i has more powerful multi-core computing performance -- but the Mali-G72 MP3 GPU of the older MediaTek Helio P60 chipset of the OPPO F9 is its saving grace, outperforming the Mali-G51 MP4 GPU of the Kirin 710.

I would give better multitasking performance to OPPO F9 because of its larger 6GB of RAM over just 4GB for the Nova 3i -- but when it comes to internal storage space, the Huawei Nova 3i is the clear winner with a whopping 128GB of ROM versus just 64GB for the competing phone.

Both handsets have a microSD card slot but the one in OPPO F9 is dedicated while Nova 3i has a secondary hybrid nanoSIM slot that can also take in a microSD card. Given the sheer size of Nova 3i's storage, though, I think it will take a long while before you will find the need to transfer files or to even consider getting a microSD card for additional space.

Battery Life and Fast Charging Features

Considering that F9's battery has a higher 3,400 mAh capacity compared to 3,340 mAh on the Nova 3i, I was expecting OPPO's hero midrange model to easily win this round.

That's why I was shocked when Nova 3i outlasted the F9 by more than an hour when I ran the PCMark Battery Life test on both phones. I mean look at the results. (I guess I'll have to run it again to confirm this. I remain baffled, actually. But hey, kudos to Huawei!)