Is the Network Part of Your Data Backup Strategy?
Make sure to include the network in your data protection planning.
Make sure to include the network in your data protection planning.
Professor Satoshi Matsuoka, of the Tokyo Institute of Technology (Tokyo Tech) researches and designs large scale supercomputers and similar infrastructures. More recently, he has worked on the convergence of Big Data, machine/deep learning, and AI with traditional HPC, as well as investigating the Post-Moore Technologies towards 2025.
He has designed supercomputers for years and has collaborated on projects involving basic elements for the current and more importantly future Exascale systems. I talked with him recently about his work with the Tsubame supercomputers at Tokyo Tech. This is the first in a two-part article. For background on the Tsubame 3 system …
Inside View: Tokyo Tech’s Massive Tsubame 3 Supercomputer was written by Nicole Hemsoth at The Next Platform.
Cisco-Springpath deal induces yawns as hyperconverged infrastructure space continues to shake out.
Cut through the marketing hype with these questions for potential suppliers.
The post Worth Reading: Transitioning to a single root appeared first on rule 11 reader.
Versa sees uptick now that Viptela belongs to Cisco.
In the U.S. it is easy to focus on our native hyperscale companies (Google, Amazon, Facebook, etc.) and how they design and deploy infrastructure at scale.
But as our regular readers understand well, the equivalent to Google in China, Baidu, has been at the bleeding edge with chips, systems, and software to feed its own cloud-delivered and research operations.
We’ve written much over the last few years about the company’s emphasis on streamlining deep learning processing, most notably with GPUs, but Baidu has a new processor up its sleeve called the XPU. For now, the device has just been demonstrated …
An Early Look at Baidu’s Custom AI and Analytics Processor was written by Nicole Hemsoth at The Next Platform.
MoNArch is the second European coalition to focus on network slicing.
Companies cite enterprise demand for easier container integration.
“We’re not talking about IPO,” a Druva exec says.
Note, this is a reposting of the blog that I initially posted here on humairahmed.com. In a prior blog, VMware NSX and SRM: Disaster Recovery Overview and Demo, I described and demoed how VMware NSX and SRM with vSphere Replication combined provide for an enhanced disaster recovery (DR) solution. SRM also provides additional integration with NSX when Storage Policy Protection Groups (SPPGs) are used by providing the ability to automate network mappings. One of the great things about the NSX-V platform, is it can be used with any DR orchestration tool that supports the VMware vSphere ESXi hypervisor. Some of the tools customers are using with NSX include VMware SRM, Dell EMC RP4VM, Zerto, and Veeam. As SRM was discussed and demonstrated in a prior blog, Zerto and NSX together is explained in more detail below. Continue reading
D-Line has already certified a Pluribus OS to run on the open hardware.
This weekend, I experienced one of those moments that make me question the value of information technology. My trusty windows phone, for whatever reason, failed. Given I was traveling in less than 24 hours, I needed to find a replacement. So I traipsed to the local phone store, and was told “I’m sorry, we don’t sell windows phones. They aren’t popular enough.” So there I stood, like the shopper in the proverbial aisle of cereal, trying to choose which new phone to get.
After staring at all the different phones for a while, it dawned on me that the apparent variety is fake. I really only had two choices.
The first is the iPhone. The iPhone is a throwback to the late 1990’s, at least one generation behind current hardware, and with a user interface that falls into the “cute retro gamified Windows 3.11/Xerox Star” sort of thing. Getting anything done requires jumping through multiple hoops. There is no way to pin anything you use on a regular basis to the screen, no information available without entering an app, the icons are tiny candies, etc. Sorry Apple fanfolk, but Apple hasn’t innovated in at least 10 years in Continue reading
New security platform features focus on visualization and security policy development.