First In-Depth View of Wave Computing’s DPU Architecture, Systems

Propping up a successful silicon startup is no simple feat, but venture-backed Wave Computing has managed to hold its own in the small but critical AI training chip market–so far.

Seven years after its founding and the company’s early access program for beta machines based on its novel DPU manycore architecture is now open, which is prompting Wave to be more forthcoming about the system and chip architecture for deep learning-focused dataflow architecture.

Dr. Chris Nicol, Wave Computing CTO and lead architect of the Dataflow Processing Unit (DPU) admitted to the crowd at Hot Chips this week that maintaining funding

First In-Depth View of Wave Computing’s DPU Architecture, Systems was written by Nicole Hemsoth at The Next Platform.

Get ready for new storage technologies and media

In a push to improve storage density, new, oblong-shaped solid-state drives (SSDs) are coming from Intel by the end of the year, the company has announced. It’s just one of a bunch of new memory forms and technologies that we’ll be seeing in due course, though.Intel’s “ruler” style drives are designed to slip neatly into a standard rack. The concept abandons the premise that memory products should look like traditional magnetic hard disc drives (HDDs) or Peripheral Component Interconnect Express (PCIe) expansion cards.To read this article in full or to leave a comment, please click here

Get ready for new storage technologies and mediums

In a push to improve storage density, new, oblong-shaped solid-state drives (SSDs) are coming from Intel by the end of the year, the company has announced. It’s just one of a bunch of new memory forms and technologies that we’ll be seeing in due course, though.Intel’s “ruler” style drives are designed to slip neatly into a standard rack. The concept abandons the premise that memory products should look like traditional magnetic hard disc drives (HDDs) or Peripheral Component Interconnect Express (PCIe) expansion cards.To read this article in full or to leave a comment, please click here

Connected cars have an ‘indefensible’ security vulnerability

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags.But according to security firm Trend Micro, these safety systems are even more vulnerable to hacking than was previously thought. In a blog post published last week, "The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard," the company publicized an effective, vendor-neutral hack that is “currently indefensible by modern car security technology.”To read this article in full or to leave a comment, please click here

Connected cars have an ‘indefensible’ security vulnerability

One of the most attractive promises of IoT-powered connected cars is enhanced safety. Connected cars use the Internet of Things (IoT) to help avoid accidents and control a wide array of safety technologies, from anti-lock brakes to airbags.But according to security firm Trend Micro, these safety systems are even more vulnerable to hacking than was previously thought. In a blog post published last week, "The Crisis of Connected Cars: When Vulnerabilities Affect the CAN Standard," the company publicized an effective, vendor-neutral hack that is “currently indefensible by modern car security technology.”To read this article in full or to leave a comment, please click here

Worth Reading: The changing UX of European Banking

How you see and interact with your online bank accounts is about to change. That’s because Europe is forcing change into the financial market.
Digital transformation is a thing this decade. “Digital disruption,” startups who want to be “the Uber of X” in their industry, and going “mobile first” are not new trends. But the banking industry has been slow to move with the times. —Michael Gardner @ Free Code Camp

The post Worth Reading: The changing UX of European Banking appeared first on rule 11 reader.

Announcing new DockerCon Europe tracks, sessions, speakers and website!

The DockerCon Europe website has a fresh look and new sessions added. The DockerCon Review Committee is still working through announcing final sessions in each breakout track, but below is an overview of the tracks and content you’ll find this year in Copenhagen. To view abstracts in more detail check out the Agenda Page.

In case you missed it, we have two summits happening on Thursday, October 19th. The Moby Summit, a hands-on collaborative event for advanced container users who are actively maintaining, contributing or generally interested in the design and development of the Moby Project and it’s components. The Enterprise Summit, a full day event for enterprise IT practitioners who want to learn how they can embrace the journey to hybrid IT and implement a new strategy to help fund their modernization efforts.

We have an excellent line up of speakers in store for you and are excited to share the agenda below. We hope that these sessions inspire you to register to DockerCon Europe.

Using Docker

Using Docker sessions are introductory sessions for Docker users, dev and ops alike. Filled with practical advice, learnings, and insight, these sessions will help you get started with Docker or Continue reading

Disaster Recovery with VMware NSX-V and Zerto

NSX-V Disaster Recovery with VMware NSX-V and Zerto Note, this is a reposting of the blog that I initially posted here on humairahmed.com. In a prior blog, VMware NSX and SRM: Disaster Recovery Overview and Demo, I described and demoed how VMware NSX and SRM with vSphere Replication combined provide for an enhanced disaster recovery (DR) solution. SRM... Read more →

Episode 10 – Grassroots Automation

In episode 10 we look at how to take the first steps towards automating your network. What tools should you use? Should you learn a programming language? And if so, which one? Should you buy or build your automation? Do you need to become a full fledged programmer in addition to being a network engineer? Our excellent panel of guests addresses all of the above and more!

—–
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Kirk Byers
Guest
Ken Celenza
Guest
Ryan Booth
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 10 – Grassroots Automation appeared first on Network Collective.

Episode 10 – Grassroots Automation

In episode 10 we look at how to take the first steps towards automating your network. What tools should you use? Should you learn a programming language? And if so, which one? Should you buy or build your automation? Do you need to become a full fledged programmer in addition to being a network engineer? Our excellent panel of guests addresses all of the above and more!

—–
Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/


Kirk Byers
Guest
Ken Celenza
Guest
Ryan Booth
Guest
Jordan Martin
Co-Host
Eyvonne Sharp
Co-Host
Phil Gervasi
Co-Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Episode 10 – Grassroots Automation appeared first on Network Collective.

AfPIF 2017 Kicks Off In Abidjan

The annual Africa Peering and Interconnection Forum (AfPIF) kicked off at the Azalai Hotel in Abidjan, Ivory Coast.

The first day is known as “Peering Coordinators Day” where peering managers from various networks, operators, and policy makers meet and deliberate on the various ways to exchange content locally, lower the cost of connectivity, and increase the number of internet users in the region.

Betel Hailu

How to protect your network from ransomware attacks

Ransomware attacks are becoming more rampant now that criminals have learned they are an effective way to make money in a short amount of time. Attackers do not even need any programming skills to launch an attack because they can obtain code that is shared among the many hacker communities. There are even services that will collect the ransom via Bitcoin on behalf of the attackers and just require them to pay a commission. This all makes it more difficult for the authorities to identify an attacker.+ Also on Network World: Network vulnerability analysis 101: Free online training + Many small and medium-size businesses pay ransoms because they do not backup their data and do not have any other options available to recover their data. They sometimes face the decision of either paying the ransom or being forced out of business. Also, hospitals that do not back up all their critical patient data and are not able to retrieve it in a timely manner will immediately pay the ransom because it is critical to access records of patients who require immediate care. It can become a life-or-death situation for someone in intensive care.To read this article in full Continue reading

How to protect your network from ransomware attacks

Ransomware attacks are becoming more rampant now that criminals have learned they are an effective way to make money in a short amount of time. Attackers do not even need any programming skills to launch an attack because they can obtain code that is shared among the many hacker communities. There are even services that will collect the ransom via Bitcoin on behalf of the attackers and just require them to pay a commission. This all makes it more difficult for the authorities to identify an attacker.+ Also on Network World: Network vulnerability analysis 101: Free online training + Many small and medium-size businesses pay ransoms because they do not backup their data and do not have any other options available to recover their data. They sometimes face the decision of either paying the ransom or being forced out of business. Also, hospitals that do not back up all their critical patient data and are not able to retrieve it in a timely manner will immediately pay the ransom because it is critical to access records of patients who require immediate care. It can become a life-or-death situation for someone in intensive care.To read this article in full Continue reading