Cloud Service Providers Slow Server Spending, Cuts Into Dell, HPE’s Bottom Line
The Dell’Oro Group market report also found Dell is the No. 1 server vendor by revenue share...
The Dell’Oro Group market report also found Dell is the No. 1 server vendor by revenue share...

Without access to standards bodies Huawei loses patent rights to a wide range of technology.
The post ◎ Standards Bodies, Patents, Huawei and Unexpected Consquences appeared first on EtherealMind.
5G rollouts are ramping up in Europe as Vodafone also announced commercial launches in Italy and...
The longer you work on one system or application, the deeper the attachment. For years you have been investing in it—adding new features, updating functionality, fixing bugs and corner cases, polishing, and refactoring. If the product serves a need, you likely reap satisfaction for a job well done (and maybe you even received some raises or promotions as a result of your great work).
Attachment is a two-edged sword—without some form of attachment, it seems there is no way to have pride in your work. On the other hand, attachment leads to poorly designed solutions. For instance, we all know the hyper-certified person who knows every in and out of a particular vendor’s solution, and hence solves every problem in terms of that vendor’s products. Or the person who knows a particular network automation system and, as a result, solves every problem through automation.
The most pernicious forms of attachment in the network engineering world are to a single technology or vendor. One of the cycles I have seen play out many times across the last Continue reading
On today's Network Break we dive into Google's self-inflicted outage, examine Apple's new HomeKit partnerships and Sign In, discuss the IEEE's reversal on Huawei, and parse other IT and tech news bits.
The post Network Break 238: Google Borks Itself; Apple Slices IoT Gadgets Into Security Zones appeared first on Packet Pushers.
At the recent EuroHPC Summit in Poland, the nature of Europe’s first homegrown HPC processor was described in some detail. …
Europe’s Homegrown HPC Compute Begins To Take Shape was written by Michael Feldman at .
High-speed jobs: A new study suggests that better broadband service lowers unemployment rates, Vice.com reports. Researchers from the University of Tennessee at Chattanooga and Oklahoma State University tracked broadband availability and unemployment rates in Tennessee and found that counties with access to high-speed broadband had a slightly lower unemployment rate than those with slower service.
More moderation: YouTube plans to remove white supremacist, hate speech and hoax videos, the Washington Post reports. The new policy will go farther than YouTube’s former prohibition on videos that promote violence or hatred against people based on their age, religious beliefs, gender, religion, immigration status and sexual orientation.
Encryption fight: Yandex, a provider of Internet-related services in Russia and the former Soviet Union, has reached an agreement with the Russian FSB security service on handing over encryption keys, Reuters reports. Details of the agreement weren’t immediately available. Yandex had originally resisted the FSB’s demand for encryption keys, Reuters says.
Bigger than the weather: U.S. residents believe fake news is a bigger problem than climate change or racism, according to a new survey detailed at Business Insider. Half of those surveyed said made-up news is a major problem, while just 46 said the Continue reading
AMD’s second-generation Epyc processor, code-named “Rome,” has yet to be released into the wild, but it is already racking up some impressive wins in academic supercomputing. …
AMD Garners Academic Credentials With New Supercomputer Wins was written by Michael Feldman at .
The No Scripting Required to Start Your Automation Journey blog post generated lively discussions (and a bit of trolling from the anonymous peanut gallery). One of the threads focused on “how does automation work in real life IT department where it might be challenging to simplify operations before automating them due to many exceptions, legacy support…”
Here’s a great answer provided by another reader:
Read more ...PyTorch-BigGraph: a large-scale graph embedding system Lerer et al., SysML’19
We looked at graph neural networks earlier this year, which operate directly over a graph structure. Via graph autoencoders or other means, another approach is to learn embeddings for the nodes in the graph, and then use these embeddings as inputs into a (regular) neural network:
Working with graph data directly is difficult, so a common technique is to use graph embedding methods to create vector representations for each node so that distances between these vectors predict the occurrence of edges in the graph.
When you’re Facebook, the challenge in learning embeddings is that the graph is big: over two billion user nodes, and over a trillion edges. Alibaba’s graph has more than one billion users and two billion items; Pinterest’s graph has more than 2 billion entities and over 17 billion edges. At this scale we have to find a way to divide-and-conquer. We’ll need to find some parallelism to embed graphs with trillions of edges in reasonable time, and a way of partitioning the problem so that we don’t need all of the embeddings in memory at each node (‘many standard methods exceed the memory Continue reading
You know the world is a different place when shipping 2.58 million servers in a quarter feels like a slowdown, a disappointment, and perhaps a leading indicator of an overall economic slowdown in the world. …
A New Era In Servers Is Starting Now was written by Timothy Prickett Morgan at .
Workflows vary from seriously simple to notoriously complex and as humans, we might not even consciously observe the subtleties of what a workflow comprises of. Workflows are the source of control semantics and comprise of many elements, some obvious some not so. This post is a primer to help you think about the kind of workflows you encounter drawn from my experiences. This post offers a view with conviction backed by experience.
To set the tone, workflows have logical flow, temporal behaviour, consume and transmit data, for processing triggers, acting on decision points and returning states. Since the 1970s, I believe we haven’t actually come that far from a workflow orchestration standpoint. Atomic units of code exist that do one thing well, a real win for the 1970s and good automation systems understand how to instantiate, feed these atomic blobs of logic data and grab their exit state and content. On a *nix system, it’s possible to use bash to create a single chain of tasks using the | operator. One blob of logic effectively feeds it’s output to the next blob of logic. Who needs an orchestrator? It’s sensible to include detection logic within each blob of code to Continue reading
Last week, Docker hosted our 4th annual Mid-Atlantic and Government Docker Summit, a one-day technology conference held on Wednesday, May 29 near Washington, DC. Over 425 attendees in the public and private sector came together to share and learn about the trends driving change in IT from containers, cloud and DeVops. Specifically, the presenters shared content on topics including Docker Enterprise, our industry-leading container platform, Docker’s Kubernetes Service, Container Security and more.
Attendees were a mix of technology users and IT decision makers: everyone from developers, systems admins and architects to Sr. leaders and CTOs.
Highlights include a keynote by Docker’s EVP of Customer Success, Iain Gray, and a fireside chat by the former US CTO and Insight Ventures Partner, Nick Sinai, and current Federal US CIO, Suzette Kent.
The fireside highlighted top of mind issues for Kent and how that aligns with the White House IT Modernization Report; specifically modernization of current federal IT infrastructure and preparing and scaling the workforce. Kent mentioned, “The magic of IT modernization is marrying the technology with the people and the Continue reading
Today's Heavy Networking examines packet analysis with sponsor ExtraHop. We drill into the company's marketing claims about deep analysis at line rate with Mike Ernst, VP of Sales Engineering. We also tackle how ExtraHop handles encrypted traffic, incuding TLS 1.3 and Perfect Forward Secrecy. Mike promises to keep his inner salesperson on mute for this conversation.
The post Heavy Networking 454: Analyzing Encrypted Traffic In The TLS 1.3 Era With ExtraHop (Sponsored) appeared first on Packet Pushers.