A Blockchain Service Built on Oracle Cloud Expedites Loan Processing
Once a borrower’s identity is established, it can never be changed.
Once a borrower’s identity is established, it can never be changed.
Customers are still on the hook for nodes running in a cluster.
We’ll be at AWS re:INVENT in Las Vegas all week (Nov 27 – Dec 1, 2017)!
Come say hi to the NSX Team at the VMware booth (#900 right as you walk in the main entrance) in the Expo Hall at the Venetian Hotel. Stop by our booth to…
As always, continue the conversation with us on Twitter @vmwarensx or use the hashtag #RunNSX or #NSXMindset. We hope to see you at the show!
The post Come Visit Us at AWS re:Invent! appeared first on Network Virtualization.
The “Naples” Epyc server processors do not exactly present a new architecture from a new processor maker, but given the difficulties that AMD had at the tail end of the Opteron line a decade ago and its long dormancy in the server space, it is almost like AMD had to start back at the beginning to gain the trust of potential server buyers.
Luckily for AMD, and its Arm server competitors Qualcomm and Cavium, there is intense pressure from all aspects of high-end computing – internal applications and external ones at hyperscalers and some cloud builders as well as enterprises …
The Ecosystem Expands For AMD Epyc Servers was written by Timothy Prickett Morgan at The Next Platform.
In a joint project, IBM Security along with Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) today launched a free service designed to give consumers and businesses added online privacy and security protection. The new DNS service is called Quad9 in reference to the IP address 9.9.9.9 offered for the service. The group says the service is aimed at protecting users from accessing malicious websites known to steal personal information, infect users with ransomware and malware, or conduct fraudulent activity. —CircleIDIn a joint project, IBM Security along with Packet Clearing House (PCH) and The Global Cyber Alliance (GCA) today launched a free service designed to give consumers and businesses added online privacy and security protection. The new DNS service is called Quad9 in reference to the IP address 9.9.9.9 offered for the service. The group says the service is aimed at protecting users from accessing malicious websites known to steal personal information, infect users with ransomware and malware, or conduct fraudulent activity. —CircleID
I’ve been traveling to northern Europe these past few months to meet with various customers, deliver onsite trainings and speak at meetups. I’ve noticed some common themes that crop up no matter with whom I speak. IT professionals are exhausted by the complexity required to manage and maintain their infrastructure. Somehow, networking and server interconnectivity has become this unmanageable complex mess over the past 20 years. And I don’t blame them. As networking has layered on more and more solutions, it becomes hard to separate out the complexity from the deployment.
Normally when I have these conversations, I start at the most basic levels. I focus on two topics that create the most grief for the vast majority of networks:
The reason I start there is because resolving these two issues in the data center would eradicate over 90% of all issues that cause late maintenance windows and urgent midnight troubleshooting calls.
At Cumulus Networks, we resolve these issues by rethinking what it means to configure a network device. The most effective solution to both of these issues is simplification of configuration. Because we focus on integration and solution first, we are able Continue reading
Think of Blockchain as primarily two things. 1) A peer-to-peer technology 2) A way of keeping a public record.
The technological backing of Blockchain is the ability to have many (many) computers host the same information. Snippets of code (known as blocks) are duplicated and maintained in so many different places rendering fraud impossible. The fact that each of these blocks is timestamped and unique makes it increasingly challenging to outsmart. If you’re interested in learning more about the technological specifics there are a number of great resources online including this presentation by Binh Nguyen, IBM’s Blockchain Fabric Chief Architect.
Today, Blockchain is most commonly thought of in connection to Bitcoin as it describes the technology and process that we’ve all come to know as being so secure. Bitcoin’s past affiliations with illegalities of all sorts have given a bad name to Blockchain but there are many benefits to secure transactions all with a public record as our purchases and currency become increasingly digital.
Want to learn more? Check out these sources:
Terminology Tuesday is a new blog series. What would you like Continue reading
Company sees its "agentless approach" as well suited to function-as-a-service platforms.
There will be 1 billion 5G subscribers by the end of 2023, the company estimates.
Another execellent recording by the folks at the Network Collective. Roland Dobbins on the history of Distributed Denial of Service attacks!
The security-as-a-service is based on a zero-trust approach.
This is a liveblog of the AWS re:Invent 2017 session titled “Deep Dive on Amazon Elastic File System (EFS).” The presenters are Edward Naim and Darryl Osborne, both with AWS. This is my last session of day 2 of re:Invent; thus far, most of my time has been spent in hands-on workshops with only a few breakout sessions today. EFS is a topic I’ve watched, but haven’t had time to really dig into, so I’m looking forward to this session.
Naim kicks off the session with looking at the four phases users go through when they are choosing/adopting a storage solution:
Starting with Phase 1, Naim outlines the three main things that people think about. The first item is storage type. The second is features and performance, and the third item is economics (how much does it cost). Diving into each of these items in a bit more detail, Naim talks about file storage, block storage, and object storage, and the characteristics of each of these approaches. Having covered these approaches, Naim returns to file storage (naturally) and talks about why file Continue reading
Building the first exascale systems continues to be a high-profile endeavor, with efforts underway worldwide in the United States, the European Union, and Asia – notably China and Japan – that focus on competition between regional powers, the technologies that are going into the architectures, and the promises that these supercomputers hold for everything from research and government to business and commerce.
The Chinese government is pouring money and resources into its roadmaps for both pre-exascale and exascale systems, Japan is moving forward with Fujitsu’s Post-K system that will use processors based on the Arm architecture rather than the …
Debating The Role Of Commodity Chips In Exascale was written by Jeffrey Burt at The Next Platform.