More high-end GPUs are now compatible with Dell’s 8K monitor

Getting 8K displays to work with Windows 10 PCs can be difficult, as Dell is finding out.But playing with 8K on PCs is a discovery process for Dell, which shipped the first-ever 8K display -- the Dell 32 UltraSharp 8K Monitor -- last week. The small initial stock of the US$5,000 display sold out in a few days.The display won't work on all PCs and needs specific hardware and display ports. But Dell is finding out that more hardware than it originally thought can handle 8K graphics, including AMD's Radeon Pro WX 7100 workstation GPU.To read this article in full or to leave a comment, please click here

Fujitsu Takes On IBM Power9 With Sparc64-XII

While a lot of the applications in the world run on clusters of systems with a relatively modest amount of compute and memory compared to NUMA shared memory systems, big iron persists and large enterprises want to buy it. That is why IBM, Fujitsu, Oracle, Hewlett Packard Enterprise, Inspur, NEC, Unisys, and a few others are still in the big iron racket.

Fujitsu and its reseller partner – server maker, database giant, and application powerhouse Oracle – have made a big splash at the high end of the systems space with a very high performance processor, the Sparc64-XII, and a

Fujitsu Takes On IBM Power9 With Sparc64-XII was written by Timothy Prickett Morgan at The Next Platform.

OPNFV “Danube” upgrade looks to spur open source NFV expansion

Looking to drive the use of Network Functions Virtualization, the OPNFV project this week released the fourth version of its open source platform, known as Danube, that promises to help large organizations and service providers get a better handle on virtualization, SDN and cloud services.+More on Network World: Open source routing project gets a vital technology infusion+Heather Kirksey, director, OPNFV said Danube melds a ton of work that has been done around NFV and brings DevOps methodologies to NFV. “It brings together full next-gen networking stacks in an open, collaborative environment. By harnessing work with upstream communities into an open, iterative testing and deployment domain, we’re delivering the capabilities that truly enable NFV,” Kirksey said.To read this article in full or to leave a comment, please click here

4 reasons Cisco’s IoT forecast is right, and 2 why it’s wrong

Peter Corcoran, Ph.D., who describes himself as long-term IoT skeptic, published a research paper recently on arXiv.org—Third time is the charm – Why the World just might be ready for the Internet of Things this time around (pdf)—in which he speculates that this incarnation of the Internet of Things (IoT) may succeed.Technologies often fail on introduction, later to reemerge and become widely adopted. The PC, smartphone and tablet all went through at least one of these cycles.RELATED: IoT catches on in New England fishing town In the early 1990s, the Consumer Electronics Association first tried to promote CEBus, a specification for interconnecting devices in the home that supported multiple physical layers, including twisted pair, coaxial cable, powerline, wireless and even RF. CEBus was too early.To read this article in full or to leave a comment, please click here

38% off Corsair Gaming SCIMITAR RGB MOBA/MMO Gaming Mouse With Key Slider Mechanical Buttons – Deal Alert

The Scimitar RGB gaming mouse revolutionizes game play with its Key Slider control system, 12 mechanical side buttons, and pro-proven 12,000 DPI optical sensor. It’s purpose built to deliver the ultimate MOBA and MMO gaming experience. Brilliant customizable multicolor backlighting immerses you in the game and provides nearly unlimited lighting adjustability. The gaming mouse averages 4 out of 5 stars from over 380 people on Amazon (read reviews), where its typical list price of $79.99 has been reduced 38% to $49.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Critical Xen hypervisor flaw endangers virtualized environments

A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system's entire memory.This is a serious violation of the security barrier enforced by the hypervisor and poses a particular threat to multi-tenant data centers where the customers' virtualized servers share the same underlying hardware.The open-source Xen hypervisor is used by cloud computing providers and virtual private server hosting companies, as well as by security-oriented operating systems like Qubes OS.The new vulnerability affects Xen 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x and has existed in the Xen code base for over four years. It was unintentionally introduced in December 2012 as part of a fix for a different issue.To read this article in full or to leave a comment, please click here

Critical Xen hypervisor flaw endangers virtualized environments

A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the host system's entire memory.This is a serious violation of the security barrier enforced by the hypervisor and poses a particular threat to multi-tenant data centers where the customers' virtualized servers share the same underlying hardware.The open-source Xen hypervisor is used by cloud computing providers and virtual private server hosting companies, as well as by security-oriented operating systems like Qubes OS.The new vulnerability affects Xen 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x and has existed in the Xen code base for over four years. It was unintentionally introduced in December 2012 as part of a fix for a different issue.To read this article in full or to leave a comment, please click here

Google says its AI chips smoke CPUs, GPUs in performance tests

Four years ago, Google was faced with a conundrum: if all its users hit its voice recognition services for three minutes a day, the company would need to double the number of data centers just to handle all of the requests to the machine learning system powering those services.Rather than buy a bunch of new real estate and servers just for that purpose, the company embarked on a journey to create dedicated hardware for running machine- learning applications like voice recognition.The result was the Tensor Processing Unit (TPU), a chip that is designed to accelerate the inference stage of deep neural networks. Google published a paper on Wednesday laying out the performance gains the company saw over comparable CPUs and GPUs, both in terms of raw power and the performance per watt of power consumed.To read this article in full or to leave a comment, please click here

First In-Depth Look at Google’s TPU Architecture

Four years ago, Google started to see the real potential for deploying neural networks to support a large number of new services. During that time it was also clear that, given the existing hardware, if people did voice searches for three minutes per day or dictated to their phone for short periods, Google would have to double the number of datacenters just to run machine learning models.

The need for a new architectural approach was clear, Google distinguished hardware engineer, Norman Jouppi, tells The Next Platform, but it required some radical thinking. As it turns out, that’s exactly

First In-Depth Look at Google’s TPU Architecture was written by Nicole Hemsoth at The Next Platform.

Enterprise Ready Software from Docker Store

Docker Store is the place to discover and procure trusted, enterprise-ready containerized software – free, open source and commercial.

Docker Store is the evolution of the Docker Hub, which is the world’s largest container registry, catering to millions of users. As of March 1, 2017, we crossed 11 billion pulls from the public registry!  Docker Store leverages the public registry’s massive user base and ensures our customers – developers, operators and enterprise Docker users get what they ask for. The Official Images program was developed to create a set of curated and trusted content that developers could use as a foundation for building containerized software. From the lessons learned and best practices, Docker recently launched a certification program that  enables ISVs, around the world to take advantage of Store in offering great software, packaged to operate optimally on the Docker platform.

Docker Hub

The Docker Store is designed to bring Docker users and ecosystem partners together with

  • Certified Containers with ISV apps that have been validated against Docker Enterprise Edition, and comes with cooperative support from Docker and the ISV
  • Enhanced search and discovery capabilities of containers, including filtering support for platforms, categories and OS.
  • Self service publisher workflow and interface to facilitate Continue reading

Cisco/AppDynamics upgrade broadens DevOps role in app management game

Cisco’s AppDynamics this week rolled out a developer toolkit that will let corporate development teams quickly build and measure the business impact of Web and mobile applications.The AppDynamics Developer Toolkit will feature a variety of languages and diagnostic tools that let application teams measure the business impact of new programs.+More on Network World: Cisco closes AppDynamics deal, increases software weight+“We expect that the developers toolkit will help customers take real-time application performance data and tie it to business outcomes,” said Matt Chotin, product marketing chief at AppDynamics “It will help enterprises break down silos, become more collaborative and get DevOps more involved in making the business innovative.”To read this article in full or to leave a comment, please click here

Is it crazy to be afraid of password managers?

I admit it: Like most people, I’m terrible at passwords. Too often I use too-simple passwords, and I don’t always come up with a new one for every site and service I log into. Then, when I do come up with a strong, unique password, I often forget it entirely and have to request an email to reset it—typically to something either too easy to guess or something I’ll instantly forget again.+ Also on Network World: Stop using password manager browser extensions + That’s why password managers exist. They’re designed to let you enter a single, secure password in one place and then generate new, strong passwords for every application where you need one.To read this article in full or to leave a comment, please click here

Is it crazy to be afraid of password managers?

I admit it: Like most people, I’m terrible at passwords. Too often I use too-simple passwords, and I don’t always come up with a new one for every site and service I log into. Then, when I do come up with a strong, unique password, I often forget it entirely and have to request an email to reset it—typically to something either too easy to guess or something I’ll instantly forget again.+ Also on Network World: Stop using password manager browser extensions + That’s why password managers exist. They’re designed to let you enter a single, secure password in one place and then generate new, strong passwords for every application where you need one.To read this article in full or to leave a comment, please click here

IoT garage door opener disabled over bad review, then re-enabled after backlash

When you take a chance and buy internet of insecure things devices, you already have to accept apps that have crazy overreaching permissions if you want your smart devices to work—and hope any vulnerabilities discovered will be patched. But should you have to worry about ticking off the device maker and having your device remotely disabled?There are all kinds of services and products that do not offer customer support on a Saturday night, which is frustrating when something goes wrong over the weekend and you need help. In the case of IoT garage door opener Garadget, unhappy customer Robert Martin wrote on a Garadget support thread:To read this article in full or to leave a comment, please click here