Parallel Programming Approaches for Accelerated Systems Compared

In high performance computing, machine learning, and a growing set of other application areas, accelerated, heterogeneous systems are becoming the norm.

With that state come several parallel programming approaches; from OpenMP, OpenACC, OpenCL, CUDA, and others. The trick is choosing the right framework for maximum performance and efficiency—but also productivity.

There have been several studies comparing relative performance between the various frameworks over the last several years, but many take two head to head for compares on a single benchmark or application. A team from Linneaus University in Sweden took these comparisons a step further by developing a custom tool

Parallel Programming Approaches for Accelerated Systems Compared was written by Nicole Hemsoth at The Next Platform.

IDG Contributor Network: The big news at DockerCon 2017 was no big news

The biggest news from DockerCon 2017, the semi-annual conference on Linux containerization, was the lack of big news. After the last two years of feverish development, there are signs one of the hottest trends in tech might be slowing down.“I’m not sure,” said one software developer loitering just outside of the Austin Convention Center. That was the most common response to my question, “What was the biggest news at DockerCon this year?” I must have asked 30 people that question over my two days at the event. An informal, unscientific polling of my Twitter, LinkedIn and Facebook connections has been similar.To read this article in full or to leave a comment, please click here

More Windows PCs infected with NSA backdoor DoublePulsar

The number of Windows computers infected with NSA backdoor malware continues to rise since Shadow Brokers leaked the hacking tools on April 14.DoublePulsar infection rate climbing Two different sets of researchers scanning for the DoublePulsar implant saw a significant bump in the number of infected Windows PCs over the weekend.For example, Dan Tentler, CEO of the Phobos Group, suggested that Monday would not be a good day for many people, as his newest scan showed about 25 percent of all vulnerable and publicly exposed SMB machines are infected.To read this article in full or to leave a comment, please click here

More Windows PCs infected with NSA backdoor DoublePulsar

The number of Windows computers infected with NSA backdoor malware continues to rise since Shadow Brokers leaked the hacking tools on April 14.DoublePulsar infection rate climbing Two different sets of researchers scanning for the DoublePulsar implant saw a significant bump in the number of infected Windows PCs over the weekend.For example, Dan Tentler, CEO of the Phobos Group, suggested that Monday would not be a good day for many people, as his newest scan showed about 25 percent of all vulnerable and publicly exposed SMB machines are infected.To read this article in full or to leave a comment, please click here

Bring Your Own Authentication is upending online security practices

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Seeing the success of the Bring Your Own Device movement, a cadre of leading companies are starting to explore if a similar approach can be used to address the authentication challenge. If BYOD essentially makes the device a proxy for the work environment, can that same device serve as a proxy for customers online?This new movement, known as Bring Your Own Authentication (BYOA), holds the same promise of reimagining the way we think of authentication, putting the consumer (and device) front and center in the interaction, and relegating passwords to the background or eliminating them completely. But there are challenges to overcome in order for mass adoption.To read this article in full or to leave a comment, please click here

Bring Your Own Authentication is upending online security practices

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Seeing the success of the Bring Your Own Device movement, a cadre of leading companies are starting to explore if a similar approach can be used to address the authentication challenge. If BYOD essentially makes the device a proxy for the work environment, can that same device serve as a proxy for customers online?This new movement, known as Bring Your Own Authentication (BYOA), holds the same promise of reimagining the way we think of authentication, putting the consumer (and device) front and center in the interaction, and relegating passwords to the background or eliminating them completely. But there are challenges to overcome in order for mass adoption.To read this article in full or to leave a comment, please click here

Bring Your Own Authentication is upending online security practices

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Seeing the success of the Bring Your Own Device movement, a cadre of leading companies are starting to explore if a similar approach can be used to address the authentication challenge. If BYOD essentially makes the device a proxy for the work environment, can that same device serve as a proxy for customers online?

This new movement, known as Bring Your Own Authentication (BYOA), holds the same promise of reimagining the way we think of authentication, putting the consumer (and device) front and center in the interaction, and relegating passwords to the background or eliminating them completely. But there are challenges to overcome in order for mass adoption.

To read this article in full or to leave a comment, please click here

Windows laptops running on ARM chips is a terrible idea

Last week, Qualcomm revealed that the first Windows 10 laptops using its Snapdragon 835 processors are due to hit the market late in 2017. That’s a big deal because up until now, Windows 10 has run only on x86 chips from Intel and AMD, and the Snapdragon chips use an ARM-based architecture optimized for mobile use.Windows 10 on ARM: Thinner, lighter, more connected Here’s how PC World described these new machines, which are being jointly developed by Microsoft and Qualcomm:To read this article in full or to leave a comment, please click here

Ubuntu Phone security updates end in June, app store closing

When Mark Shuttleworth, founder of Canonical (the company behind the Ubuntu Linux distribution), announced his company would not only be abandoning their custom desktop environment (Unity), but also halting development on their phone/tablet operating system, many questions were left unanswered.One of those questions: What happens to the existing phones and tablets running Ubuntu Touch that have already been sold? To read this article in full or to leave a comment, please click here

Ring Video Doorbell Pro Discounted $50 on Amazon – Deal Alert

With a motion-activated camera, two-way audio and HD video, you’ll never miss a visitor again. Ring detects motion and can alert you on your mobile device, even at night thanks to built-in infrared LED night vision. Optionally, video can be archived to the cloud for later viewing. See, hear and speak to whomever is at your door in real time from your smartphone, tablet or desktop. Day or night, rain or shine -- you’re always home. Right now the Ring Video Doorbell Pro is discounted 20%, or $50, on Amazon. Its typical list price of $249 has dropped to $199.99 (see Ring Video Doorbell Pro now on Amazon). That's a deal that doesn't come around very often.To read this article in full or to leave a comment, please click here

Russian man receives longest-ever prison sentence in the US for hacking

A 32-year-old Russian hacker was sentenced to 27 years in prison in the U.S. for stealing millions of payment card details from businesses by infecting their point-of-sale systems with malware.The sentence is the longest ever handed out in the U.S. for computer crimes, surpassing the 20-year jail term imposed on American hacker and former U.S. Secret Service informant Albert Gonzalez in 2010 for similar credit card theft activities.Roman Valeryevich Seleznev, a Russian citizen from Vladivostok, was sentenced Friday in the Western District of Washington after he was found guilty in August of 10 counts of wire fraud, eight counts of intentional damage to a protected computer, nine counts of obtaining information from a protected computer, nine counts of possession of 15 or more unauthorized access devices and two counts of aggravated identity theft.To read this article in full or to leave a comment, please click here

Russian man receives longest-ever prison sentence in the US for hacking

A 32-year-old Russian hacker was sentenced to 27 years in prison in the U.S. for stealing millions of payment card details from businesses by infecting their point-of-sale systems with malware.The sentence is the longest ever handed out in the U.S. for computer crimes, surpassing the 20-year jail term imposed on American hacker and former U.S. Secret Service informant Albert Gonzalez in 2010 for similar credit card theft activities.Roman Valeryevich Seleznev, a Russian citizen from Vladivostok, was sentenced Friday in the Western District of Washington after he was found guilty in August of 10 counts of wire fraud, eight counts of intentional damage to a protected computer, nine counts of obtaining information from a protected computer, nine counts of possession of 15 or more unauthorized access devices and two counts of aggravated identity theft.To read this article in full or to leave a comment, please click here

Join Us for the Docker Federal Summit on May 2nd 2017

 Docker is excited to announce that we are returning to the Newseum in Washington DC on May 2nd to host the second annual Docker Federal Summit event.  A one day event packed with breakout sessions, discussions, hands on labs and technology deep dives from Docker and our ecosystem partners.

 

This event is designed for federal agency developers and IT ops personnel looking to learn more about how to approach Docker containers, cloud and devops to accelerate agency IT initiatives to support critical civilian and defense missions.

  • Government agency registration: Complimentary
  • Industry and ecosystem partner registration is $100

Register to save your seat.

Featured Speakers and Sessions

Technology leaders from agencies like GSA, USCIS and JIDO will share their experiences in deploying containers to production and provide pragmatic guidance in how to approach this change from technology to process and culture.

 

 View the full agenda here.

Featured Breakout Sessions: A wide variety of breakout sessions feature technical deep dives, demonstrations and discussions around compliance and security.

  • Accelerating app development in the cloud
  • The latest initiatives around compliance for IT projects
  • How to scale and secure applications requiring FIPS
  • Docker technology deep dive from orchestration, security, management and more
  • Continue reading

11 technologies developers should explore now

New and evolving technologies are rapidly reshaping how we work—offering creative opportunities for developers who are willing to pivot and adopt new skills. We took a look at 11 tech trends experts say are likely to disrupt current IT approaches and create demand for engineers with an eye on the future.It isn’t all about The Next Big Thing. Future opportunities for developers are emerging from a confluence of cutting-edge technologies, such as AI, VR. augmented reality, IoT, and cloud technology ... and, of course, dealing with the security issues that are evolving from these convergences.[ Find out how to get ahead with our career development guide for developers. | The art of programming is changing rapidly. We help you navigate what's hot in programming and what's going cold. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ] If you're interested in expanding your developer’s toolkit, check out these trending domains—and our tips on how to get ahead by getting started with them.To read this article in full or to leave a comment, please click here

11 technologies developers should explore now

New and evolving technologies are rapidly reshaping how we work—offering creative opportunities for developers who are willing to pivot and adopt new skills. We took a look at 11 tech trends experts say are likely to disrupt current IT approaches and create demand for engineers with an eye on the future.It isn’t all about The Next Big Thing. Future opportunities for developers are emerging from a confluence of cutting-edge technologies, such as AI, VR. augmented reality, IoT, and cloud technology ... and, of course, dealing with the security issues that are evolving from these convergences.[ Find out how to get ahead with our career development guide for developers. | The art of programming is changing rapidly. We help you navigate what's hot in programming and what's going cold. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ] If you're interested in expanding your developer’s toolkit, check out these trending domains—and our tips on how to get ahead by getting started with them.To read this article in full or to leave a comment, please click here