Samsung could upset the AI and HPC markets with GPU entry

South Korea’s IT behemoth Samsung is working on a graphics processor unit (GPU) and has hired a major figure from Nvidia to help get the job done, according to a report from a graphics analyst.Jon Peddie Research reports that Samsung has hired Dr. Chien-Ping Lu, a former Nvidia executive who oversaw development of discrete and integrated GPUs used in Apple MacBooks as well as integrated processors before the advent of GPUs in CPUs.Now, many mobile CPUs have integrated GPUs, or the phone itself comes with its own GPU. Qualcomm has its own line called Adreno. But Peddie doesn’t think Samsung hired a heavy hitter like Lu to make mobile phone chips.To read this article in full, please click here

Pulling Storage Together at Extreme Scale

At the height of the Hadoop era there were countless storage and analytics startups based on the Hadoop Distributed File System (HDFS), several of which were backed by venture capital firm Andreessen Horowitz, which was committed to the Hadoop and open source-driven big data startup cause when that was all the rage in 2010 until around 2014 or so.

Pulling Storage Together at Extreme Scale was written by Nicole Hemsoth at .

Making network-services deals: Structuring the transaction

In our companion article, “Making network-services deals: Sourcing and service-delivery strategies that work,” we examine how enterprises should approach sourcing and designing managed network service arrangements under current outsourcing market conditions by applying certain  best practices to help identy the optimal providers and service delivery approaches.To read this article in full, please click here(Insider Story)

Making network-services deals: Structuring the transaction

In our companion article, “Making network-services deals: Sourcing and service-delivery strategies that work,” we examine how enterprises should approach sourcing and designing managed network service arrangements under current outsourcing market conditions by applying certain  best practices to help identy the optimal providers and service delivery approaches.To read this article in full, please click here(Insider Story)

Which two companies will lead the enterprise Internet of Things?

As the enterprise Interent of Things (eIoT) becomes an increasingly big deal, everyone is starting to wonder which companies have the inside track to dominate this hot new market.It’s not just a pie-in-the-sky question. A July 2018 study from Market Research Future predicted 26 percent annual growth in the eIoT market, hitting $58 billion in 2023.[ Now read: The future of enterprise IoT ] And last year, a McKinsey & Company survey noted, “Although enterprise IoT is a relatively new development, 98 percent of survey respondents reported that most companies within their industry include enterprise IoT initiatives in their strategic road maps, including those related to improving service operations, increasing visibility into operations, enabling new business models, and creating new product and service offerings.”To read this article in full, please click here

Top 10 Networking and Security Sessions at VMworld US 2018

Although it was before my time at VMware running the Networking and Security Business Unit, at VMworld 2017 we demonstrated our expanded NSX network virtualization capabilities in the data center, and the start of our journey to bring NSX to the cloud.

A lot has changed in a year.

Earlier in 2018, we announced the expansion of the NSX family of products to include NSX Data Center (formerly NSX), NSX Cloud, AppDefense, NSX SD-WAN by VeloCloud, and NSX Hybrid Connect.

With the new portfolio, we’ve delivered on the Virtual Cloud Network vision of connecting and protecting applications and data, regardless of where they sit – from the data center to the cloud, and the edge.

VMworld 2018

To help you learn about this vision and the advancements we’ve made in the products that underpin it, we have a huge VMworld 2018 in store for you. With over 70 dedicated networking and security sessions, we’ll cover everything from the basics to super-technical deep dives.

Below is my curated list of can’t-miss networking and security sessions. Make sure you jump onto the content catalog on VMworld.com to reserve your spot before they fill up.

I’m looking forward to joining all of you Continue reading

Using the win_dsc Module in Ansible

Ansible-Get-Started-Windows

Hello, and welcome to another Getting Started with Ansible + Windows post! In this article we’ll be exploring what Desired State Configuration is, why it’s useful, and how to utilize it with Ansible to manage your Windows nodes.

What is DSC?

So what exactly is Desired State Configuration? It’s basically a system configuration management platform that uses the declarative model; in other words, you tell DSC the “what”, and it will figure out the “how”. Much like Ansible, DSC uses push-mode execution to send configurations to the target hosts. This is very important to consider when delivering resources to multiple targets.

This time-saving tool is built into PowerShell, defining Windows node setup through code. It uses the Local Configuration Manager (which is the DSC execution engine that runs on each node).

Microsoft fosters a community effort to build and maintain DSC resources for a variety of technologies. The results of these efforts are curated and published each month to the Powershell Gallery as the DSC Resource Kit. If there isn't a native Ansible module available for the technology you need to manage, there may be a DSC resource.

How Do You Use DSC with Ansible?

DSC Resources are distributed as Continue reading

IDG Contributor Network: Securing the modern mobile OS

The idea for this blog post came to me during a discussion around some recent research performed by Cisco’s Talos threat research group.The post "Advanced Mobile Malware Campaign in India uses Malicious MDM" authored by Warren Mercer, Paul Rascagneres and Andrew Williams and the follow-up post containing additional research found in Part 2.In this beautiful piece of research, these guys identified and analyzed an attacker with malicious intent, that used a modified open source Mobile Device Manager (MDM) to control multiple mobile devices; and to install modified versions of well-known apps like WhatsApp and Telegram in order to gain access to what would otherwise be private data.To read this article in full, please click here