Israeli startup UniFabriX is aiming to give multi-core CPUs the memory and memory bandwidth needed to run compute- and memory-intensive AI and machine-learning workloads.UniFabriX is pitching its Smart Memory Node technology as an alternative to socket-connected DRAM, which restricts memory capacity and bandwidth in CPUs. UniFabriX's technology is based on CXL (Compute Express Link), an industry-supported interconnect for processors, memory expansion, and accelerators. CXL technology maintains memory coherency between the CPU memory space and memory on attached devices, which allows resource sharing for higher performance, reduced software stack complexity, and lower overall system cost.To read this article in full, please click here
Content delivery network (CDN) and cloud computing provider Akamai has opened three new internet point of presence (POP) data centers this week, and will open two more later in the quarter, as the company looks to take over a bigger portion of the public cloud market.The three new sites open as of this week are in Paris, Washington, D.C., and Chicago. Sites in Seattle and Chennai will follow in the coming months, Akamai said. The expansion is part of the company's push into the public cloud market dominated by incumbents like Google, Amazon and Microsoft, Akamai said.The sites were chosen carefully, according to a statement from Akamai. Washington, D.C., is one of the biggest data center hubs in the world, with Northern Virginia containing upward of half of the major data center capacity in the US. Chicago is a well-situated secondary site for latency-sensitive workloads running either locally or in nearby markets, including Philadelphia and Washington, while the Paris site represents a new option for organizations facing data sovereignty challenges posed by EU regulation.To read this article in full, please click here
MLCommons, a group that develops benchmarks for AI technology training algorithms, revealed the results for a new test that determines system speeds for training algorithms specifically used for the creation of chatbots like ChatGPT.MLPerf 3.0 is meant to provide an industry-standard set of benchmarks for evaluating ML model training. Model training can be a rather lengthy process, taking weeks and even months depending on the size of a data set. That requires an awful lot of power consumption, so training can get expensive.The MLPerf Training benchmark suite is a full series of tests that stress machine-learning models, software, and hardware for a broad range of applications. It found performance gains of up to 1.54x compared to just six months ago and between 33x and 49x compared to the first round in 2018.To read this article in full, please click here
Cisco is continuing its summer buying spree with the acquisition of security startup Oort for an undisclosed amount.Oort offers an identity threat detection and response platform for enterprise security. Founded in 2019, Oort raised $15 million in Series A funding that included money from Cisco’s venture capital arm.“With Oort’s API-driven, cloud-native, and agentless platform, they eliminate identity visibility gaps across disparate data sources, show misconfigurations, check for security vulnerabilities, and offer predictive identity analytics to proactively stop attacks,” wrote Raj Chopra, senior vice president and chief product officer for Cisco Security, in a blog about the acquisition. To read this article in full, please click here
Kyndryl Bridge has found early success with nearly 1,000 customers expected by the end of the year, and the integration platform has several new services on tap – including for AI, security and sustainability efforts – to help enterprises better manage their infrastructure resources.Announced last September, Kyndryl Bridge has roughly 60 digitally enabled services to date, and the company expects to grow that to 190 Bridge services by March 2024, according to Kyndryl CTO Antoine Shagoury.Bridge integrates all manner of management tools, intellectual property, and processes that Kyndryl has cultivated through years of delivering services – it was, after all, a division of IBM until November 2021. It then takes that centralized information and uses it to deliver as-a-service capabilities and applications that help control and manage enterprise infrastructure. It also uses AI and ML to analyze the aggregated data in real time to provide IT operations teams with the intelligence they need to keep systems running at peak performance, Kyndryl says.To read this article in full, please click here
Microsoft is jumping into the competitive Secure Service Edge (SSE) arena with a software package aimed at protecting its Windows and Azure customers as well as other cloud-based enterprise resources.The new software is part of Microsoft’s Entra identity and network access suite, and it features two new elements – Entra Internet Access and Entra Private Access – that will control and secure access to cloud-based resources. Those two new pieces, coupled with Microsoft’s existing SaaS-focused cloud-access security broker (CASB), called Microsoft Defender for Cloud apps, comprise Microsoft's SSE package.To read this article in full, please click here
The European Commission said that the proposed acquisition of VMware by Broadcom may go forward, thanks to an investigation that suggested that the market would not be harmed and the acquiescence to several conditions by Broadcom.The Commission, in a statement issued Wednesday, said that its investigation centered on answering the question of whether Broadcom, if it acquired VMware, would be in a position to harm the competitive balance of the marketplace in several key technology areas, including Fibre Channel host bus adapters, network interface cards, and storage adapters.The investigation found that Broadcom didn’t have a strong enough position in the NIC and storage adapter markets, but noted that the proposed merger would let Broadcom harm its only rival for FC HBAs, Marvell, by making sure that VMware’s virtualization software didn’t work well with Marvell’s hardware.To read this article in full, please click here
Cisco unveiled a new version of its Secure Network Analytics (SNA) software aimed at making it easier to track more data flows and act faster on relevant security alerts. Enhancements in SNA release 7.4.2 include the ability to more efficiently gather, process and store data; advanced detection capabilities; improved telemetry support; and the ability to run on Cisco’s high-performance UCS M6 hardware.Cisco’s network analytics software is designed to help organizations detect and respond to security threats by harnessing telemetry data from multiple sources and providing insights into network behavior to proactively identify risks, according to a blog post by Jay Bethea, product marketing manager with Cisco’s secure email group.To read this article in full, please click here
The market for managed security services is shifting as enterprises weigh their requirements for cloud-based security capabilities and vendors refine their feature sets and product integrations.Converged security services can offer significant benefits to enterprises when it comes to manageability, scalability, security, and price, according to research firm Gartner, which introduced the term SASE, or secure access service edge. SASE is a network architecture that combines software-defined wide area networking (SD-WAN) and security functionality into a unified cloud service that promises simplified WAN deployments, improved efficiency and security, and application-specific bandwidth policies.To read this article in full, please click here
Some of the most convenient “tricks” on Linux depend on the use of a handful of special characters. This post takes a look at a number of them and shows how they work.Using > and >>
Using the > and >> characters will have similar but different effects, and both depend on how you use them in a command. The > character can be used to direct output into a file. For example, these commands will put the specified text into a file. If the file exists, however, any former content will be overwritten. Notice how only one "hello" remains in the file.$ echo hello > world
$ echo hello > world
$ cat world
hello
Using >>, on the other hand, will add the text provided to the end of a file. If the file doesn’t exist, the command will create it.To read this article in full, please click here
The mkdir command can do more than create a single directory. It can create multiple directories at once and can even create an entire directory structure with a single command. The required command will be a tad complex, but not particularly challenging.NOTE: If you try to set up a multi-level directory structure with a command like the one shown below, it won't work if the initial directories ("this" and "that") don't already exist.$ mkdir this/that/the_othermkdir: cannot create directory ‘this/that/the_other’: No such file or directory
Add a -p (for "parents") and the missing directories will be created and your this/that/the_other directory structure will be set up in your current directory as intended.To read this article in full, please click here
Three months after the UK regulator announced its concerns around the market dominance of AWS and Microsoft, it's asking for an investigation to take place in order to improve the market for customers.
Private 5G/LTE networks for the enterprise are becoming increasingly common, but a new forecast from tech analyst firm IDC has found that several headwinds exist for the technology, which could slow its adoption over the next 18 to 24 months.The report, authored by IDC research manager Patrick Filkins, predicted that private cellular networking infrastructure sales will grow from $2.4 billion in global revenue this year to $5.3 billion in 2027.The use cases for private cellular networks are numerous and varied, according to IDC, encompassing everything from wide-area applications like grid networks for utility systems and transport networks to local networks for manufacturing facilities or warehouses.To read this article in full, please click here
The adoption of artificial intelligence is changing the way servers are being procured while having a quick and positive impact on firms that deploy AI technologies, according to a pair of research reports from Omdia.In its upcoming cloud and data center market report, the research firm predicts a reduction in the number of server shipments for the first time since 2007. However, the server drop in 2007 was due to a global economic crisis. The current shift in server buying has a more positive spin.Omdia found that demand for compute resources remains high. However, it also reports that demand for more expensive servers with specialized hardware for AI model training (translation: GPUs) are being prioritized over the typical enterprise server with just a CPU.To read this article in full, please click here
China’s Ministry for Industry and Information Technology has said it wants to improve the country’s manufacturing capabilities, singling out the production of advanced semiconductor materials and automotive chips as areas that are in need of improvement.In its recently released Opinions on Manufacturing Reliability Improvement report, the department said it was putting forward a plan that would make up for the shortcomings of basic product reliability and improve the quality of core components in three industries: machinery, electronics, and automotive.To read this article in full, please click here
If you’re fairly new to Linux, you might need some help getting started on the command line. But you made it here, so let’s run through a number of ways that you can get comfortable and up to speed fairly quickly.Man pages
Every Linux command should have a "man page" (i.e., manual page) – an explanation of what the command does, how it works and the options that you can use to specify what you want the command to show you. For example, if you wanted to see the options for formatting the output of the date command, you should look at the man page with the command “man date”. It should among other things, show you the format of the date command like this:To read this article in full, please click here
Servers can consume more than half of the energy in modern data centers, which makes server efficiency attractive to companies looking to hit carbon-neutral sustainability targets. Plus, reducing energy usage can save money.To help reach that goal, here are five ways to boost server efficiency, according to recent research from the Uptime Institute, which is focused on improving the performance, efficiency, and reliability of business-critical infrastructure.
Upgrade to a newer server generation. For decades, server energy efficiency has consistently improved thanks to improved efficiency of processors that power them.
Pick servers with high compute capacity as measured in number of transactions per second. Those are the most energy efficient.
Go for high core count. In general, efficiency improves with the number of cores, although there is some tapering off at the highest end.
Be aware that while a server can be more energy efficient, its actual overall power consumed (Watts) can increase even as its efficiency (transactions per second per Watt) increases.
Embrace power-management features in two ways: by reducing core CPU voltage and frequency as utilization increases, and by moving unneeded cores to idle state.
For its analysis, Uptime focused servers that use AMD EPYC or Intel Xeon Continue reading
The EU and Japan have formed a new partnership to improve cooperation on digital issues, after recently pledging billions of dollars in investments to shore up their domestic chip industries.
To reduce the risk of service problems, Cisco is making it harder for organizations to use weak cryptographic algorithms when setting up authentication for OSPF packets on certain Catalyst Edge Platforms and Integrated Services Routers (ISR).Newer versions of Cisco’s IOS XE software (Release 17.11.1 and later) no longer support those algorithms—DES, 3DES, and MD5—by default, Cisco stated in a field Notice.Specifically, the algorithms are no longer default options for the open shortest path first v 3 (OSPFv3) protocol, which uses the IPsec secure socket API to add authentication to OSPFv3 packets that distribute routing information.To read this article in full, please click here