While the on-premises server business remains firmly in the grip of the x86 world, cloud service providers are giving Arm-based servers a much more welcoming embrace. Both Chinese cloud giant Alibaba and Microsoft Azure have recently launched new instances with Arm processors.Alibaba Cloud unveiled its Yitian 710 processor design for use in its data centers back in October 2021. The company also announced the development of its proprietary servers, called Panjiu, promising optimized computing performance and energy efficiency.Yitian 710 is built on a 5nm manufacturing process and has 128 Arm cores, each with a top clock speed of 3.2GHz. It’s built on the Armv9 architecture and includes eight DDR5 memory channels per CPU and 96-lane PCIe 5.0. Alibaba claims the Yitian 710 achieved a SPECint2017 that beat the current state-of-the-art Arm server processor by 20% in performance and 50% in energy efficiency.To read this article in full, please click here
When you're trying to find your way around the Linux file system and want some information on specific commands, the whereis, whatis, and which commands can help. Each provides a different view of the command you're asking about. In this post, I'll compare these commands and explain what they tell us and what they don't tell us.which
The which command is the simplest of the three. When you use it to ask about a Linux command, it will run down your search path looking for executable files by the name you specify. These can be commands that are available on your system as well as scripts. As long as the files provide you with execute privilege, they fit the bill. Here are some examples:To read this article in full, please click here
Anytime you're planning to do a lot of calculations on a Linux system, you can use the power of bash to create a quick function and then use it repeatedly to do the calculations for you. In this post, we'll look at how this trick works and what you need to be aware of to ensure that your calculations are correct.Let's start with this mathematical function as an example:$ ? () { echo "$*" | bc ; }
Troubleshooting your bash scripts in Linux
This command sets up a function that will pass the values and mathematical operators that you provide as arguments to the bc calculator command. Note that to call the function, you simply type a "?" followed by the arguments. In the first example below, the arguments are 1, followed by the multiplication character "*", followed by a 2, a "+" sign and a 3. The result is 5.To read this article in full, please click here
Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here
Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here
Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku.
[ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here
Edge computing is rapidly shedding its reputation as a fringe concept, and both adopters and vendors are focusing their sights on the technology's next goal: fully autonomous deployment and operation.The edge deployment experience is drawing closer to the simplicity of unboxing a new mobile phone, says Teresa Tung, cloud first chief technologist at IT advisory and consulting firm Accenture. "We're seeing automated technology that simplifies handling the edge’s unique complexity for application, network, and security deployments."The ability to create and manage containerized applications enables seamless development and deployment in the cloud, with the edge simply becoming a specialized location with more stringent resource constraints, Tung says. "Self-organizing and self-healing wireless mesh communications protocols, such as Zigbee, Z-Wave, ISA100.11a, or WirelessHART can create networks where devices can be deployed ad hoc and self-configure."To read this article in full, please click here
California-based chipmaker Ampere confidentially filed for an initial public offering on April 11, when it submitted a draft registration statement with the US Securities and Exchange Commission.Founded by the former Intel president Renée James in 2017, Ampere designs fabless server processors based on Arm architectures. It is riding a strong wave of recent demand thanks to its latest Altra and Altra Max CPUs, which are designed for the data center based on the Arm Neoverse N1 architecture. It counts the likes of ByteDance, Cloudflare, Equinix, Oracle, and Tencent as customers of its processors.To read this article in full, please click here
The &&, ||, and ! operators allow you to run a lot of useful commands on Linux, but you first need to get used to syntax that is a little trickier than the if-then-else command you might normally use.To get started, I should explain that one thing the command examples in this post have in common is the use of something that I might call a shorthand “if” test. Here’s an example:$ [ -f donuts ]
$ echo %?1
The -f donuts command asks if there is a file (-f) named “donuts”. Unless we display the return code afterwards with "echo $?", the result of the test is not displayed. In this case, it’s false (i.e., not zero), so we know the file doesn’t exist. No donuts for us!To read this article in full, please click here
You want edge computing? How about 250 miles straight up? HP Enterprise has announced that the Spaceborne Computer-2 (SBC-2) on the International Space Station (ISS) has successfully completed 24 research experiments in less than a year.The SBC-2 is the first in-space commercial edge computing and AI-enabled system to run on the ISS, according to HPE, and was installed in May 2021. The experiments involved real-time data processing and testing of new applications to prove reliability in space to increase autonomy for astronauts. HPE said the experiments reduced the time-to-insight from days and months to minutes.How to choose an edge gateway
SBC-2 consists of HPE’s Edgeline Converged EL4000 Edge system, which is designed to perform in harsher edge environments, including space. SBC-2 is also made up of the HPE ProLiant DL360 high-performance server designed for workloads like HPC, and AI.To read this article in full, please click here
You want edge computing? How about 250 miles straight up? HP Enterprise has announced that the Spaceborne Computer-2 (SBC-2) on the International Space Station (ISS) has successfully completed 24 research experiments in less than a year.The SBC-2 is the first in-space commercial edge computing and AI-enabled system to run on the ISS, according to HPE, and was installed in May 2021. The experiments involved real-time data processing and testing of new applications to prove reliability in space to increase autonomy for astronauts. HPE said the experiments reduced the time-to-insight from days and months to minutes.How to choose an edge gateway
SBC-2 consists of HPE’s Edgeline Converged EL4000 Edge system, which is designed to perform in harsher edge environments, including space. SBC-2 is also made up of the HPE ProLiant DL360 high-performance server designed for workloads like HPC, and AI.To read this article in full, please click here
You want edge computing? How about 250 miles straight up? HP Enterprise has announced that the Spaceborne Computer-2 (SBC-2) on the International Space Station (ISS) has successfully completed 24 research experiments in less than a year.The SBC-2 is the first in-space commercial edge computing and AI-enabled system to run on the ISS, according to HPE, and was installed in May 2021. The experiments involved real-time data processing and testing of new applications to prove reliability in space to increase autonomy for astronauts. HPE said the experiments reduced the time-to-insight from days and months to minutes.How to choose an edge gateway
SBC-2 consists of HPE’s Edgeline Converged EL4000 Edge system, which is designed to perform in harsher edge environments, including space. SBC-2 is also made up of the HPE ProLiant DL360 high-performance server designed for workloads like HPC, and AI.To read this article in full, please click here
As data centers evolve, the skills needed to run them change as well, creating both a challenge and opportunity for current data-center workers.By necessity, modern data centers are at the forefront of efficiency for energy consumption, space utilization and automation. That efficiency extends to the personnel that staffs them and who must swiftly implement hardware, software, and architecture changes as best practices improve. That calls for new roles in administration, management, and planning.Existing career fields and legacy skill sets won’t cut it in many cases, but IT pros will be able to augment their existing skills to fill new roles as they open up—jobs with a more forward-looking focus.To read this article in full, please click here
Intel this week announced details of its new Blockscale ASIC chip designed specifically for more efficient blockchain computing than CPUs or GPUs. It first said it was making such a chip just two months ago.Blockscale is specifically designed to process the Secure Hash Algorithm-256 (SHA-256), which is used by blockchain, and the performance is phenomenal, at least on paper. Blockscale has a hash rate operating speed of up to 580GH/s, or gigahashes per second.To read this article in full, please click here
Intel this week announced details of its new Blockscale ASIC chip designed specifically for more efficient blockchain computing than CPUs or GPUs. It first said it was making such a chip just two months ago.Blockscale is specifically designed to process the Secure Hash Algorithm-256 (SHA-256), which is used by blockchain, and the performance is phenomenal, at least on paper. Blockscale has a hash rate operating speed of up to 580GH/s, or gigahashes per second.To read this article in full, please click here
There are many ways to remove duplicate lines from a text file on Linux, but here are two that involve the awk and uniq commands and that offer slightly different results.Remove duplicate lines with awk
The first command we'll examine in this post is a very unusual awk command that systematically removes every line in the file that is encountered more than once. It leaves the first instance of the line intact, but "remembers" it and removes any duplicates encountered afterwards.Here's an example. Initially, the file looks like this:To read this article in full, please click here
The relatively stable world of enterprise networking has undergone quite a bit of upheaval over the past few years. As a result, networking professionals with traditional job titles have assumed new responsibilities, and entirely new job titles have emerged.Key trends reshaping the jobs of network professionals include increased adoption of cloud services; the push for more automation of business processes; and the rise of technologies such as software-defined networking (SDN), SD-WAN, Internet of Things (IoT) , secure access service edge (SASE), Zero Trust Network Access (ZTNA) and edge computing.To read this article in full, please click here