ARM Goes To War In The Datacenter With “Aries” Designs

When Arm Holdings, the division of the Softbank conglomerate that designs and licenses the core component of the processor architecture that bears its name, launched its Neoverse revamping of the Arm architecture for the datacenter and the edge last October, the company put the architecture on a strict annual cadence and promised to deliver 30 percent performance increases at the system level with each generation.

ARM Goes To War In The Datacenter With “Aries” Designs was written by Timothy Prickett Morgan at .

VMware’s ongoing reinvention

VMware’s introduction of x86 server-virtualization technology was a game-changing event in the history of enterprise computing. But if you look at VMware’s corporate messaging today, it’s almost as if server virtualization has been scrubbed from the lexicon. Instead, VMware highlights its multi-cloud strategies, software-defined data centers, networking, hyperconverged infrastructures, security, SD-WAN, containers, blockchain, IoT and more.To read this article in full, please click here

VMware’s ongoing reinvention

VMware’s introduction of x86 server-virtualization technology was a game-changing event in the history of enterprise computing. But if you look at VMware’s corporate messaging today, it’s almost as if server virtualization has been scrubbed from the lexicon. Instead, VMware highlights its multi-cloud strategies, software-defined data centers, networking, hyperconverged infrastructures, security, SD-WAN, containers, blockchain, IoT and more.To read this article in full, please click here

VMware’s ongoing reinvention

VMware’s introduction of x86 server-virtualization technology was a game-changing event in the history of enterprise computing. But if you look at VMware’s corporate messaging today, it’s almost as if server virtualization has been scrubbed from the lexicon. Instead, VMware highlights its multi-cloud strategies, software-defined data centers, networking, hyperconverged infrastructures, security, SD-WAN, containers, blockchain, IoT and more.To read this article in full, please click here

VMware’s ongoing reinvention

VMware’s introduction of x86 server-virtualization technology was a game-changing event in the history of enterprise computing. But if you look at VMware’s corporate messaging today, it’s almost as if server virtualization has been scrubbed from the lexicon. Instead, VMware highlights its multi-cloud strategies, software-defined data centers, networking, hyperconverged infrastructures, security, SD-WAN, containers, blockchain, IoT and more.To read this article in full, please click here

Next Generation Global Connectivity

Technologies like SDWAN have fundamentally changed the way we think about WAN infrastructures for enterprise IT environments over the past few years. Global WAN offerings are no longer a necessity as pretty much ‘any’ connectivity will do. You are no longer bound to private (MPLS-based) connections/networks. Software and smarter routing mechanisms will fix all your […]

Protecting user privacy: an approach for untraceable web browsing history and unambiguous user profiles

Protecting user privacy: an approach for untraceable web browsing history and unambiguous user profiles Beigi et al., WSDM’19

Maybe you’re reading this post online at The Morning Paper, and you came here by clicking a link in your Twitter feed because you follow my paper write-up announcements there. It might even be that you fairly frequently visit paper write-ups on The Morning Paper. And perhaps there are several other people you follow who also post links that appear in your Twitter feed, and occasionally you click on those links too. Given your ‘anonymous’ browsing history I could probably infer that you’re likely to be one of the 20K+ wonderful people with a wide-ranging interest in computer science and the concentration powers needed to follow longer write-ups that follow me on Twitter. You’re awesome, thank you! Tying other links in the browsing history to other social profiles that have promoted them, we might be able to work out who else our mystery browser probably follows on social media. It won’t be long before you’ve been re-identified from your browsing history. And that means everything else in that history can be tied back to you too. (See ‘De-anonymizing web Continue reading

Edge security: There’s lots of attack surfaces to worry about

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades.But the edge adds its own wrinkles to those problems, making them, in many cases, more difficult to address. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The most common IoT vulnerability occurs because many sensors and edge computing devices are running some kind of built-in web server to allow for remote access and management. This is an issue because many end-users don’t – or, in some cases, can’t – change default login and password information, nor are they able to seal them off from the Internet at large. There are dedicated gray-market search sites out there to help bad actors find these unsecured web servers, and they can even be found with a little creative Googling, although Joan Pepin, CISO at security and authentication vendor Auth0, said that the search giant has taken steps recently to make that process Continue reading

Edge security: There’s lots of attack surfaces to worry about

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades.But the edge adds its own wrinkles to those problems, making them, in many cases, more difficult to address. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The most common IoT vulnerability occurs because many sensors and edge computing devices are running some kind of built-in web server to allow for remote access and management. This is an issue because many end-users don’t – or, in some cases, can’t – change default login and password information, nor are they able to seal them off from the Internet at large. There are dedicated gray-market search sites out there to help bad actors find these unsecured web servers, and they can even be found with a little creative Googling, although Joan Pepin, CISO at security and authentication vendor Auth0, said that the search giant has taken steps recently to make that process Continue reading

Wi-Fi 6, 5G play big in Cisco’s mobile forecast

The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here

Wi-Fi 6, 5G play big in Cisco’s mobile forecast

The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here

Wi-Fi 6, 5G play big in Cisco’s mobile forecast

The popularity of mobile devices will continue its dramatic growth over the next four years as new technologies kick in with higher density and bandwidth, according to Cisco’s annual Global Mobile Data Traffic Forecast Update (2017 – 2022) released this week. Perhaps the key forecast: Mobile traffic will be on the verge of reaching an annual run rate of a zettabyte by the end of 2022. In that timeframe, mobile traffic will represent nearly 20 percent of global IP traffic and will reach 930 exabytes annually – nearly 113 times more than all mobile traffic generated globally in 2012. (An exabyte is 1,000,000,000 gigabytes and a zettabyte is 1,000 exabytes.)To read this article in full, please click here

Ethernet And The Future Of Data Networking

The need to host, process, and transmit more data, in less time and more securely, is putting huge strain on existing datacenter network, server, and storage architectures, with the demands of specific applications like artificial intelligence, machine learning, image recognition, and data analytics exacerbating the problem.

Ethernet And The Future Of Data Networking was written by Timothy Prickett Morgan at .