Google opens source TensorFlow 1.0 debuts – vies for platform status

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Google Alert

Feb 22, 2017
Featured Image

RSA: Eric Schmidt shares deep learning on AI

In a wide-ranging conversation focused on artificial intelligence, the Google executive also touched on security concerns and the need to keep the internet open. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Google opens source TensorFlow 1.0 debuts – vies for platform status
How to use your smartphone to get politically active
How Google reinvented security and eliminated the need for firewalls

Video/Webcast: ServiceNow

Best Practices for Addressing Vulnerabilities

Discover best practices for how to respond to new high-profile vulnerabilities. Read More

Thumbnail Image

Google opens source TensorFlow 1.0 debuts – vies for platform status

TensorFlow delivers machine learning along a continuum from research to operating at scale and opens machine learning to expert and application developers. Read More

Thumbnail Image

How to use your smartphone to get politically active

You want to do more than tweet, share, and like. You want to make a difference. These are the apps that can get you there. Read More

Thumbnail Image
INSIDER

How Google reinvented security and eliminated the need for firewalls

In some ways, Google is like every other large enterprise. It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. Read More

White Paper: ServiceNow

Forrester: Rules of Engagement

As the remediation costs, customer impacts, and reputational damage of a data breach continue to skyrocket, the security industry must find new ways to prevent the exfiltration of proprietary data by cybercriminals and other malicious actors. This report is a call to action for developing more automated threat response processes and a set of cyber rules of engagement. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 ways tech pros can take charge of their professional development

What cyberinsurance gotchas companies must be ready for Read More

Most-Read Stories

1. How Google reinvented security and eliminated the need for firewalls
2. Cisco reserves $125 million to pay for faulty clock component in switches, routers
3. Juniper facing fatal clock flaw that impacts Cisco routers, switches
4. University attacked by its own vending machines, smart light bulbs and 5,000 IoT devices
5. Apple to unveil iOS 11 at WWDC on June 5
6. 7 free tools every network needs
7. Why big data projects fail and how to make 2017
8. Hot products at RSA 2017
9. NSS Labs rated 13 advanced endpoint security products, flagged 2 with caution rating
10. RSA: Elite cryptographers scoff at idea that law enforcement can overcome encryption
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Google Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.