New ARM Architecture Offers A DynamIQ Response To Compute

ARM has rearchitected its multi-core chips to they can better compete in a world where computing needs are becoming more specialized.

The new DynamIQ architecture will provide flexible compute, with up to eight different cores in a single cluster on a system on a chip. Each core can run at a different clock speed so a company making an ARM SoC can tailor the silicon to handle multiple workloads at varying power efficiencies. The DynamIQ architecture also adds faster access to accelerators for artificial intelligence or networking jobs, and a resiliency that allows it to be used in robotics, autonomous

New ARM Architecture Offers A DynamIQ Response To Compute was written by Timothy Prickett Morgan at The Next Platform.

Mozilla beats rivals, patches Firefox’s Pwn2Own bug

Mozilla last week patched a Firefox vulnerability just a day after it was revealed during Pwn2Own, the first vendor to fix a flaw disclosed at the hacking contest."Congrats to #Mozilla for being the first vendor to patch vuln[erability] disclosed during #Pwn2Own," tweeted the Zero Day Initiative (ZDI) Monday. ZDI, the bug brokerage run by Trend Micro, sponsored Pwn2Own.[ To comment on this story, visit Computerworld's Facebook page. ] Mozilla released Firefox 52.0.1 on Friday, March 17, with a patch for the integer overflow bug that Chaitin Security Research Lab leveraged in an exploit at Pwn2Own on Thursday, March 16. The Beijing-based group was awarded $30,000 by ZDI for the exploit, which combined the Firefox bug with one in the Windows kernel.To read this article in full or to leave a comment, please click here

Mozilla beats rivals, patches Firefox’s Pwn2Own bug

Mozilla last week patched a Firefox vulnerability just a day after it was revealed during Pwn2Own, the first vendor to fix a flaw disclosed at the hacking contest."Congrats to #Mozilla for being the first vendor to patch vuln[erability] disclosed during #Pwn2Own," tweeted the Zero Day Initiative (ZDI) Monday. ZDI, the bug brokerage run by Trend Micro, sponsored Pwn2Own.[ To comment on this story, visit Computerworld's Facebook page. ] Mozilla released Firefox 52.0.1 on Friday, March 17, with a patch for the integer overflow bug that Chaitin Security Research Lab leveraged in an exploit at Pwn2Own on Thursday, March 16. The Beijing-based group was awarded $30,000 by ZDI for the exploit, which combined the Firefox bug with one in the Windows kernel.To read this article in full or to leave a comment, please click here

ARM steps up chip performance to catch up with Intel, AMD

Can ARM chips compete neck-and-neck with Intel and AMD on benchmarks? That could be happening sooner than you think.Starting next year, ARM processors will get significantly faster thanks to big changes in the company's Cortex-A chip designs. ARM is taking a page from rivals like AMD that have focused on raising the performance threshold in chips.ARM isn't known for superfast chips; it is instead mainly associated with power-efficient chips that give long battery life to devices. That focus has helped the company succeed in mobile devices, an area where Intel's power hungry chips failed.But applications like virtual reality and machine learning need more performance, and ARM is preparing its processors to take on those emerging applications. ARM is adding more cores, instructions, and faster pipelines in smaller spaces to boost performance.To read this article in full or to leave a comment, please click here

ARM steps up chip performance to catch up with Intel, AMD

Can ARM chips compete neck-and-neck with Intel and AMD on benchmarks? That could be happening sooner than you think.Starting next year, ARM processors will get significantly faster thanks to big changes in the company's Cortex-A chip designs. ARM is taking a page from rivals like AMD that have focused on raising the performance threshold in chips.ARM isn't known for superfast chips; it is instead mainly associated with power-efficient chips that give long battery life to devices. That focus has helped the company succeed in mobile devices, an area where Intel's power hungry chips failed.But applications like virtual reality and machine learning need more performance, and ARM is preparing its processors to take on those emerging applications. ARM is adding more cores, instructions, and faster pipelines in smaller spaces to boost performance.To read this article in full or to leave a comment, please click here

5 reasons why China will rule tech, 2017 edition

China’s push to take over global technology leadership is relentless. It wants to lead in computing, semiconductors, research and development, and clean energy. It is accelerating science investment as the U.S. retreats.China may be planning a moon base. Surprised? Don’t be. It will soon have a manned space station. It is investing heavily in quantum technologies and it wants to be first to build an exascale supercomputer.In 2010, Computerworld looked at “Five reasons why China will rule tech.” Here's an update, and the case for China has grown stronger.To read this article in full or to leave a comment, please click here

What to consider in developing BYOD policy

Why Have a BYOD Policy?Image by ThinkstockIn today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the inevitable, companies should develop and implement a BYOD policy that protects the company and balances productivity with security. Brandon N. Robinson Partner, Balch & Bingham LLP - Privacy and Data Security Practice, provides some tips.To read this article in full or to leave a comment, please click here

What to consider in developing BYOD policy

Why Have a BYOD Policy?Image by ThinkstockIn today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the inevitable, companies should develop and implement a BYOD policy that protects the company and balances productivity with security. Brandon N. Robinson Partner, Balch & Bingham LLP - Privacy and Data Security Practice, provides some tips.To read this article in full or to leave a comment, please click here

US bans electronics larger than smartphones in cabins on certain flights

The U.S. Department of Homeland Security has ordered that passengers on flights departing for the U.S from 10 airports in the Middle East and Africa will have to carry personal electronics larger than a smartphone as checked baggage, citing increased terror threats.Giving the approximate size of a commonly available smartphone as a guideline for passengers, the DHS said that laptops, tablets, e-readers, cameras, portable DVD players, electronic game units larger than smartphones, and travel printers or scanners were the kind of personal electronics that would not be allowed in the cabin and would have to be carried as checked baggage.Approved medical devices may be brought into the cabin after additional screening. The size of smartphones is well understood by most passengers who fly internationally, according to the DHS, which in any case asked passengers to check with their airline if they are unsure whether their smartphone is impacted.To read this article in full or to leave a comment, please click here

US bans electronics larger than smartphones in cabins on certain flights

The U.S. Department of Homeland Security has ordered that passengers on flights departing for the U.S from 10 airports in the Middle East and Africa will have to carry personal electronics larger than a smartphone as checked baggage, citing increased terror threats.Giving the approximate size of a commonly available smartphone as a guideline for passengers, the DHS said that laptops, tablets, e-readers, cameras, portable DVD players, electronic game units larger than smartphones, and travel printers or scanners were the kind of personal electronics that would not be allowed in the cabin and would have to be carried as checked baggage.Approved medical devices may be brought into the cabin after additional screening. The size of smartphones is well understood by most passengers who fly internationally, according to the DHS, which in any case asked passengers to check with their airline if they are unsure whether their smartphone is impacted.To read this article in full or to leave a comment, please click here

Is this the world’s first combination head shop/computer store?

Just a few doors down the street from the iconic corner of Haight and Ashbury, ground zero for San Francisco’s Summer of Love 50 years ago, sits a most unusual store. On the ground floor of a building once occupied by Jimi Hendrix, Ashbury Tech is a unique melding of old and new San Francisco.From tobacco to tech  That’s because the three-level is store is not your garden-variety electronics shop. Until earlier this year, in fact, it had been known as Ashbury Tobacco Center for the past 23 years. And approximately half of its floor space is still dedicated to bongs, pipes, vapes and other accouterments of what is commonly known as a head shop. To read this article in full or to leave a comment, please click here

Nutanix

Maximum Performance from Acropolis Hypervisor and Open vSwitch describes the network architecture within a Nutanix converged infrastructure appliance - see diagram above. This article will explore how the Host sFlow agent can be deployed to enable sFlow instrumentation in the Open vSwitch (OVS)  and deliver streaming network and system telemetry from nodes in a Nutanix cluster.
This article is based on a single hardware node running Nutanix Community Edition (CE), built following the instruction in Part I: How to setup a three-node NUC Nutanix CE cluster. If you don't have hardware readily available, the article, 6 Nested Virtualization Resources To Get You Started With Community Edition, describes how to run Nutanix CE as a virtual machine.
The sFlow standard is widely supported by network equipment vendors, which combined with sFlow from each Nutanix appliance, delivers end to end visibility in the Nutanix cluster. The following screen captures from the free sFlowTrend tool are representative examples of the data available from the Nutanix appliance.
The Network > Top N chart displays the top flows traversing OVS. In this case an HTTP connection is responsible for most of the traffic. Inter-VM and external traffic flows traverse OVS and are efficiently Continue reading

The Linux Migration: Corporate Collaboration, Part 1

One major aspect of my migration to Linux as my primary desktop OS is how well it integrates with corporate communication and collaboration systems. Based on the feedback I’ve gotten from others on Twitter, this is a major concern for a lot of folks out there. In fact, a number of folks have indicated that this is the only thing keeping them from migrating to Linux. There are a number of different aspects to “corporate communication and collaboration,” so I’m breaking this down into multiple posts (each post will discuss one particular aspect). In this post, I’ll discuss integration with corporate e-mail.

Because corporate e-mail is such an important part of how people communicate these days, it’s a fairly significant concern when thinking of migrating to Linux. Fortunately, it’s actually pretty easy to solve.

My employer, like many companies out there, uses Office 365 for corporate e-mail. Many people think that this locks them into Outlook on the desktop side, but that’s not accurate. (Now, you may be locked into Outlook for other reasons, like calendaring—a topic I’ll touch on in part 2 of this series.) For Office 365 users, there are three paths open for accessing corporate e-mail:

  1. Continue reading

VMware NSX and vRNI Enabling Customer Operations

Recently, we had a customer challenge our team to prove to them the operational gains and demonstrate the cross-functional tooling VMware provides to assist them in scaling from zero to hundreds of VMs on the platform.  Our goal was simple –  exhibit a complete lifecycle for any customer to go from evaluation to production operation thereby enabling customer operations.  The result was a video summary demoing our enhanced tooling that complements our simple three-step workflow: environmental assessment, plan and enforcement, and then continuous monitoring.

Step 1 – Environmental Assessment:

Understanding your environment is crucial in today’s modern world of IT – and is especially key at the early stages of identifying an easy to implement micro-segmentation plan.  We’ve made this process very easy (even if you don’t have NSX in your environment yet!).  VMware offers the free VMware Virtual Network Assessment that will take that identified traffic and start to make suggested firewall and security recommendations.  Additionally, we provide correlated data and analysis to highlight useful metrics that are top-of-mind for network operators – such as the amount of East-West/North-South traffic present in your network, or how much data is seen on Continue reading

Like Flash, 3D XPoint Enters The Datacenter As Cache

In the datacenter, flash memory took off first as a caching layer between processors and their cache memories and main memory and the ridiculously slow disk drives that hang off the PCI-Express bus on the systems. It wasn’t until the price of flash came way down and the capacities of flash card and drives came down that companies could think about going completely to flash for some, much less all of their workloads.

So it will be with Intel’s Optane 3D XPoint non-volatile memory, which Intel is starting to roll out in its initial datacenter-class SSDs and will eventually deliver

Like Flash, 3D XPoint Enters The Datacenter As Cache was written by Timothy Prickett Morgan at The Next Platform.

RHV 4.1, Hosted Engine, Red Hat Summit

Hi folks, I’m still heads down on a lot of different things. The release of RHV 4.1 is right around the corner, as is a new product that involves RHV 4.1. I’ve also cut some new demo’s on Hosted Engine using RHVH – just like I promised I would several weeks ago. Ok, a couple months ago. You’ll just have to come see me at Red Hat Summit to see them…Or wait until just after Red Hat Summit. I still don’t have my “new” lab, but I did get my hands on some good gear that allows me show you the goodness that is Hosted Engine, especially with RHVH (Red Hat Virtualization Host). Hopefully I’ll have the new lab soon…..

As I mentioned in my last post, I’m presenting at Red Hat Summit again this year, focusing on providing HA for RHV – by way of Hosted Engine. Here are the session details if you’re going to be there:

Thursday, May 4, 3:30 PM – 4:15 PM – Room 152
Red Hat Summit, May 2-4, Boston, MA

I promise to give the full write-up and share the demo’s post Summit.

Captain KVM

The post RHV 4.1, Continue reading

Can you imagine Mars with Saturn-like rings?

It’s hard to fathom and may be even harder for it to happen but a couple NASA-funded scientists say Mars might have had Saturn-like rings around it in the past and may have them again sometime in the distant future.NASA’s Jet Propulsion Lab said Purdue University scientists David Minton and Andrew Hesselbrock developed a model that suggests debris that was pushed into space from an asteroid or other body slamming into Mars around 4.3 billion years ago alternates between becoming a planetary ring and clumping together to form a moon.More on Network World: Elon Musk’s next great adventure: Colonizing Mars+To read this article in full or to leave a comment, please click here