TensorFlow 1.0 unlocks machine learning on smartphones

Email not displaying correctly? View it in your browser.

InfoWorld Daily: Weekend Edition

Feb 04, 2017
Featured Image

AI isn't for the good guys alone anymore

Criminals are beginning to use artificial intelligence and machine learning to get around cyberdefenses. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

TensorFlow 1.0 unlocks machine learning on smartphones
Review: The best frameworks for machine learning and deep learning
An ill wind blows through Silicon Valley
What you need to know about Docker in Windows

White Paper: Leidos

4 Challenges Facing Every Security Operations Center Manager

A comprehensive look at the top four challenges facing your security operations is the first step to mitigating them. Why not approach them as opportunities to strengthen your cybersecurity posture and better protect your assets! This white paper discusses the universal challenges facing every SOC: Resource allocation, Threat alert management, Vendor dependencies, Intelligence standardization Read More

Thumbnail Image

TensorFlow 1.0 unlocks machine learning on smartphones

The first major release of Google's machine learning library includes improvements to allow efficient deep learning on mobile devices. Read More

Thumbnail Image
INSIDER

Review: The best frameworks for machine learning and deep learning

TensorFlow, Spark MLlib, Scikit-learn, MXNet, Microsoft Cognitive Toolkit, and Caffe do the math. Read More

Thumbnail Image

An ill wind blows through Silicon Valley

Trump's executive order on immigration, if it stands, will mark the beginning of the end of U.S. technology leadership. Read More

Thumbnail Image

What you need to know about Docker in Windows

Microsoft has made application containers available in Windows itself, not only in Windows 10's Linux subsystem. Read More

White Paper: Leidos

5 Steps to Develop a Successful Insider Threat Detection Program

A comprehensive look into how organizations can develop and implement a successful insider threat detection program. This white paper outlines the five steps to success: Gain Leadership Support, Leverage the Latest Technology, Develop a Communications Plan, Execute a Training and Awareness Campaign, Establish a Governance Structure Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Daily: Weekend Edition as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.