December 27th, 2019 | 33 mins 33 secs
artificial intelligence, at, cloud, colab, cryptography, deoldify, devops, encryption, firewall, flat network, google colab, gpu, imagenet, jupiter broadcasting, jupyter notebook, lighthouse, machine learning, mesh network, mesh networking, mesh vpn, nat busting, nebula, networking, neural networks, noise protocol framework, overlay network, pachinko, plinko, ryan huber, security, security groups, slack, system administration, techsnap, udp, udp hole-punching, virtual network, vpn, wireguard
From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.
November 29th, 2019 | 26 mins 27 secs
ai, aiexpert, aimesh, amplifi, amplifi alien, artificial general intelligence, artificial intelligence, arvind narayanan, asus, ata, bitlocker, chip design, cpu, cryptography, dban, deep learning, deep learning boost, devops, drunkard's walk, encryption, ethernet, google, gpu, hard disk, hard drive, hardware encryption, home networking, i9-10980xe, ieee, inference, intel avx512, jeffrey dean, jupiter broadcasting, linear algebra, lora, luks, machine learning, matrix multiplication, mesh wifi, networking, neural network, npu, nvidia, ofdma, ofnp, on-off noise power communication, openvino, orthogonal frequency-division multiple access, resnet, router, secure erase, security, smallnetbuilder, solid state, ssd, storage, supercomputers, techsnap, tesla v100, tim higgins, tpu, training, ubiquiti, unifi, wifi, wifi 6, wireless
We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.
May 8th, 2018 | 37 mins 4 secs
ecc, freenas, gpu, iot, logitech harmony hub, rowhammer, supermicro, sysadmin podcast, techsnap, unixsurplus, zfs memory requirements
Our FreeNAS build is complete and Allan’s back to cover the final details. Plus the new GPU attack against Android phones, and a perfect example of poor IoT security.