ARM Servers: Qualcomm Is Now A Contender

Many have tried to wrench the door of the datacenter open with ARM processors, but Qualcomm, which knows a thing or two about creating and selling chips for smartphones and other client devices, has perhaps the best chance of actually selling ARM chips in volume inside of servers.

The combination of a rich and eager target market with a good product design tailored for that market and enough financial strength and stability to ensure many generations of development are what are necessary to break into the datacenter, and the “Falkor” cores that were unveiled this week at Hot Chips were

ARM Servers: Qualcomm Is Now A Contender was written by Timothy Prickett Morgan at The Next Platform.

Top 10 supercomputers of 2017

The fastest of the fastImage by ThinkstockYes, your new gaming PC that supports VR headsets is impressively fast. But can it simulate the entire universe over millions of years? Shed light on the forces that cause destructive summer storms in Europe? Ensure the safety and reliability of nuclear weapons? We didn’t think so; those are jobs for supercomputers.To read this article in full or to leave a comment, please click here

Top 10 supercomputers of 2017

The fastest of the fastImage by ThinkstockYes, your new gaming PC that supports VR headsets is impressively fast. But can it simulate the entire universe over millions of years? Shed light on the forces that cause destructive summer storms in Europe? Ensure the safety and reliability of nuclear weapons? We didn’t think so; those are jobs for supercomputers.To read this article in full or to leave a comment, please click here

IGF-USA: Promoting a More Inclusive Internet

The IGF-USA took place in Washington D.C on July 24, 2017. During the event, the panel "Promoting a More Inclusive Internet" looked at current barriers to an inclusive Internet and explored how access could be expanded to underserved areas and to underrepresented communities. Moderated by Dr. Brandie Nonnecke, Research & Development Manager for CITRIS and the Banatao Institute at the University of California-Berkeley and Chair of the San Francisco-Bay Area Internet Society Chapter Working Group on Internet Governance, the panel brought together several experts on access provision, each with many years experience of connecting the unconnected in the USA and overseas.

Decentralized Approach

Susannah Gray

Ukraine Leaks Russian Social Media Ban

Another development in the long-running conflict between Ukraine and Russia occurred in May of this year when Ukrainian President Petro Poroshenko enacted a ban on Russia’s four most prominent internet companies in the name of national security.  The ban included the two most widely used social media websites, VKontakte (often referred to as the “Russian Facebook“) and Odnoklassniki (“Classmates” in Russian), as well as email service provider Mail.ru and Russian search engine Yandex.

These websites have such a significant Ukrainian user base that Mail.ru says it expects to lose $13 million this year as a result of the ban and Yandex is appealing the ban through Ukraine’s Supreme Administrative Court.

And now it appears that this ban has spilled out into the global routing table.  On 27 July 2017, Ukrainian ISP UARNet (AS3255) began announcing several new BGP routes that were hijacks of the IP address space of these Russian internet companies.  On this day, AS3255 briefly announced more-specific hijacks of each of these four Russian internet companies including 94.100.180.0/24 (Mail.ru), 87.250.250.0/23 (Yandex), 87.240.165.0/24 (Vkontakte) and 217.20.159.0/24 (Odnoklassniki).  While Continue reading

First In-Depth View of Wave Computing’s DPU Architecture, Systems

Propping up a successful silicon startup is no simple feat, but venture-backed Wave Computing has managed to hold its own in the small but critical AI training chip market–so far.

Seven years after its founding and the company’s early access program for beta machines based on its novel DPU manycore architecture is now open, which is prompting Wave to be more forthcoming about the system and chip architecture for deep learning-focused dataflow architecture.

Dr. Chris Nicol, Wave Computing CTO and lead architect of the Dataflow Processing Unit (DPU) admitted to the crowd at Hot Chips this week that maintaining funding

First In-Depth View of Wave Computing’s DPU Architecture, Systems was written by Nicole Hemsoth at The Next Platform.

Get ready for new storage technologies and media

In a push to improve storage density, new, oblong-shaped solid-state drives (SSDs) are coming from Intel by the end of the year, the company has announced. It’s just one of a bunch of new memory forms and technologies that we’ll be seeing in due course, though.Intel’s “ruler” style drives are designed to slip neatly into a standard rack. The concept abandons the premise that memory products should look like traditional magnetic hard disc drives (HDDs) or Peripheral Component Interconnect Express (PCIe) expansion cards.To read this article in full or to leave a comment, please click here

Get ready for new storage technologies and mediums

In a push to improve storage density, new, oblong-shaped solid-state drives (SSDs) are coming from Intel by the end of the year, the company has announced. It’s just one of a bunch of new memory forms and technologies that we’ll be seeing in due course, though.Intel’s “ruler” style drives are designed to slip neatly into a standard rack. The concept abandons the premise that memory products should look like traditional magnetic hard disc drives (HDDs) or Peripheral Component Interconnect Express (PCIe) expansion cards.To read this article in full or to leave a comment, please click here

Connected cars have an ‘indefensible’ security vulnerability

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags.But according to security firm Trend Micro, these safety systems are even more vulnerable to hacking than was previously thought. In a blog post published last week, "The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard," the company publicized an effective, vendor-neutral hack that is “currently indefensible by modern car security technology.”To read this article in full or to leave a comment, please click here

Connected cars have an ‘indefensible’ security vulnerability

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags.But according to security firm Trend Micro, these safety systems are even more vulnerable to hacking than was previously thought. In a blog post published last week, "The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard," the company publicized an effective, vendor-neutral hack that is “currently indefensible by modern car security technology.”To read this article in full or to leave a comment, please click here

Worth Reading: The changing UX of European Banking

How you see and interact with your online bank accounts is about to change. That’s because Europe is forcing change into the financial market.
Digital transformation is a thing this decade. “Digital disruption,” startups who want to be “the Uber of X” in their industry, and going “mobile first” are not new trends. But the banking industry has been slow to move with the times. —Michael Gardner @ Free Code Camp

The post Worth Reading: The changing UX of European Banking appeared first on rule 11 reader.