Posts

Showing posts from January, 2021

Why companies are moving from TensorFlow to PyTorch

 A subcategory of machine learning, deep learning (also known as deep learning) uses multi-layered neural networks to scale up tasks that are still quite difficult for machines, such as image recognition, natural language processing (NPL) and automatic translation.  The TensorFlow , who came from Google in 2015, has been the deep learning framework most popular open source research and business. But PyTorch , which emerged from Facebook in 2016, quickly achieved this solution, thanks to improvements made by the community in ease of use and deployment for an ever- expanding range of use cases.  PyTorch is having a particularly strong adoption in the automotive industry - where it can be applied in autonomous steering systems from companies like Tesla and Lyft, at level 5 of automotive autonomy. The framework is also being used for content rating and recommendation in media companies and to assist support robots in industrial applications.  Joe Spisak, artificial intelligence product lea

Microsoft launches new Azure family cloud service for secret data

On Monday, Microsoft announced the expansion of Azure Government Secret, an Azure cloud offering for U.S. government customers, and the announcement of a new cloud to serve customers with secret confidential data, Azure Government Top Secret . Know more:  Managed Juniper Services In a statement , Tom Keane, Corporate Vice President, Azure Global, Microsoft Azure, said the company has completed the creation of new Azure Government Top Secret regions and that they work with the US government on accreditation. “As part of our ongoing commitment to business parity as per government mission requirements, Azure Government Top Secret regions are designed to provide the same capabilities as Azure (commercial), Azure Government and Azure Government Secret, allowing for continuous computing from the mission cloud to the tactical advantage, ”he said. According to the executive, mission owners will benefit from a greater choice in the modernization of legacy systems, with a secure cloud platform t

Cybercriminals bring fake covid-19 vaccine ads to Darknet

In early December 2020, Check Point researchers reported how a number of counterfeit coronavirus vaccines and drugs were available and available on the darknet. Several vendors have been identified advertising vaccines starting at $ 250, with some reaching as much as $ 1,000. Check Point's research began in December, the result of which was published in the first report on the 11th of that month, a period when Covid-19 vaccines became officially available worldwide. The researchers' updates compare the information found with the new findings made during the first week of January 2021. Initially, Covid-19's vaccine search on the darknet resulted in several pages of hundreds of offers, which represented an overall 400% increase in ads since the beginning of December last year. Vaccine prices have also increased significantly. In the previous Check Point report, the average price was $ 250. Now, recent research shows that suppliers have doubled or even quadrupled their prices,

IT Mistakes in Small and Medium Business

 Do you care about good IT practices? Check out the tips that Helpdigital has prepared to optimize your environment and optimize your results: 1) SEE TECHNOLOGY ONLY AS AN MORE COST RISK: Waste of resources, stoppages and loss of competitive advantage due to lack of planning. Know more:  Managed Meraki Services SOLUTION: Integrate the objectives to be achieved with IT into the strategic planning of the business. More than serving as an infrastructure for employees, technology should be exploited to promote innovation, quality and other advances capable of generating competitive advantages. “A company with no goals for IT navigates without a compass,” says Sérgio Saad, director of hardware at IBM. 2) FINDING THAT THE CONTIGENCY PLAN IS AN EXAGGERATION RISK: Losing data and being inoperative in the event of fire, flood, theft or power failure. SOLUTION: Establish a disaster recovery policy, defining the critical services that cannot stop, the investments needed to keep these services ava

Advantages of migrating from IT to cloud

 First, it is critical to understand the benefits that the cloud brings to IT operations and the business as a whole. After all, no major corporate change occurs without considering the impacts it may have in the future. Therefore, we will highlight here the main advantages of migrating. 1. Cost optimization A criterion that is always used to check the feasibility of a change is the financial impact it can bring. In the case of migration to the cloud, the optimization of costs is significant, which brings a lot of security to the company. Infrastructure expenses are reduced. The service has more predictable expenses, facilitating the IT management process . Ultimately, the tendency is to reduce costs and, going further, to increase control over them. 2. Expansion of physical and logical security Maintaining an internal IT infrastructure is complicated and has been feasible for only a few companies. In addition to regular costs, you need to be concerned with the issue of security, both

What are the benefits of the cloud for the automotive industry?

As you have seen, there are many advantages to cloud computing. Now, learn more details about the benefits that the sector can obtain: IT cost reduction With no need to invest large amounts of money in infrastructure , companies can obtain resources and services virtually and use their budgets for innovation and sales. Management improvements Using virtualized solutions, organizations can experiment with new practices and methods. Thus, the technological capacity is expanded to compete with the big names in the sector who migrated their databases, systems and servers to the cloud. Mobility Wherever authorized users are, they can take advantage of the technology as long as they are connected to the web. This is true for both company employees and customers. Innovation Regarding the creation of innovative cars and services, no technology has offered as many possibilities as cloud computing. In addition to the highlighted examples, we can also mention the Ford Evos , which arrived on the

Only the provider is responsible for cloud security

 The belief that, when hiring cloud resources, the company is 100% free from information security concerns is also a myth. What is true is that the company's users also have responsibilities that define success in protecting data. They must commit, for example, not to release the access keys to anyone and they must also pay attention to what they put inside their unit.  That is, in a cloud provider, the operating systems that the client contracts must be updated directly by him or upon his request to the provider, as the latter cannot, out of respect for privacy, access his environment without permission.  It is necessary to keep in mind the tasks and functions of each one of the involved, client and provider, contracted and contractor, and that both care for the safety of the environments, each according to its function and purpose, like any work with four hands. The IT Support Engineer is responsible for taking offer application and technical support to the users. They have to r

Discover how to choose the best cloud storage

The digital transformation has caused an exponential increase in data production in companies, both by employees and by the internet of things. This new moment presents managers with a great challenge: after all, how can we store this huge range of data that keeps growing without increasing costs? The big trend is cloud storage. Therefore, in this post, you will know the questions that must be analyzed when choosing the best cloud storage to deploy in your company. Follow and check! Why should companies migrate to the cloud? We could make an e-book only with the advantages that migration to the cloud generates for a company, but we will focus here on the main ones. The first benefit is the reduction in costs that the company will have with equipment, both in acquisition and maintenance. The internal IT team will be able to focus on more strategic tasks focused on the company's core activity and on security issues in relation to access control. In other words, if you go back to the

How can Hyper Agile parameters improve IT management?

 See now, a breakdown of the principles of Hyper Agile and how they are useful in IT management. Short iterations and process automation At Hyper Agile, all the benefits of traditional agile development are employed. With special attention to short iterations, always relying on periodic feedbacks. The practice of automating everything in support of continuous integration is also a very important parameter in this approach. Massively parallel virtual pipelining This is the process of unfolding the life cycle in as many separate steps as possible. And then apply that cycle to each user requirement on an individual basis in parallel. This allows for a high degree of asynchronous activity, which makes it easier for shorter iterations. It refers to the virtual pipeline, as several stages of the pipeline may overlap with the same stages in other pipelines. In addition, these stages can be performed in different locations. Development hierarchy A development hierarchy is a representation of t