HPE joins Cisco, Juniper with faulty clock technology problem

Hewlett Packard Enterprise is the latest vendor to identify a faulty clocking component of its products that can cause them to crash and not recover. HPE joined Cisco and Juniper in identifying the problem, even going so far as to tap the widely-suspected Intel-based clock element as the cause. In a statement the company said:“To the best of our knowledge, our customers are not experiencing failures due to the Intel C2000 chip, which is deployed on a limited number of our products. We remain committed to assuring the highest quality experience from our solutions and are proactively working with Intel to mitigate any future risk and impact on our customers.” Unlike Cisco and Juniper however, HPE did not identify its affected products nor offer any details as to what customers can do with them should the problem occur.To read this article in full or to leave a comment, please click here

HPE joins Cisco, Juniper with faulty clock technology problem

Hewlett Packard Enterprise is the latest vendor to identify a faulty clocking component of its products that can cause them to crash and not recover. HPE joined Cisco and Juniper in identifying the problem, even going so far as to tap the widely-suspected Intel-based clock element as the cause. In a statement the company said:“To the best of our knowledge, our customers are not experiencing failures due to the Intel C2000 chip, which is deployed on a limited number of our products. We remain committed to assuring the highest quality experience from our solutions and are proactively working with Intel to mitigate any future risk and impact on our customers.” Unlike Cisco and Juniper however, HPE did not identify its affected products nor offer any details as to what customers can do with them should the problem occur.To read this article in full or to leave a comment, please click here

HPE joins Cisco, Juniper with faulty clock technology problem

Hewlett Packard Enterprise is the latest vendor to identify a faulty clocking component of its products that can cause them to crash and not recover.HPE joined Cisco and Juniper in identifying the problem, even going so far as to tap the widely-suspected Intel-based clock element as the cause.In a statement the company said:“To the best of our knowledge, our customers are not experiencing failures due to the Intel C2000 chip, which is deployed on a limited number of our products. We remain committed to assuring the highest quality experience from our solutions and are proactively working with Intel to mitigate any future risk and impact on our customers.” Unlike Cisco and Juniper however, HPE did not identify its affected products nor offer any details as to what customers can do with them should the problem occur.To read this article in full or to leave a comment, please click here

AMD bundles Ashes of the Singularity with FX processors ahead of Ryzen’s launch

The hotly anticipated Ryzen processors are expected to start rolling out in early March, but AMD's still pushing its older FX-series chips folks looking to build a budget gaming PC. Newegg and AMD just revealed a FX processor promotion that bundles a 6- or 8-core chip with the real-time strategy game Ashes of the Singularity: Escalation, the poster child for cutting-edge DirectX 12 technology.To read this article in full or to leave a comment, please click here

AMD bundles Ashes of the Singularity with FX processors ahead of Ryzen’s launch

The hotly anticipated Ryzen processors are expected to start rolling out in early March, but AMD's still pushing its older FX-series chips folks looking to build a budget gaming PC. Newegg and AMD just revealed a FX processor promotion that bundles a 6- or 8-core chip with the real-time strategy game Ashes of the Singularity: Escalation, the poster child for cutting-edge DirectX 12 technology.To read this article in full or to leave a comment, please click here

Understanding CNI (Container Networking Interface)

If you’ve been paying attention to the discussions around container networking you’ve likely heard the acronym CNI being used.  CNI stands for Container Networking Interface and it’s goal is to create a generic plugin-based networking solution for containers.  CNI is defined by a spec (read it now, its not very long) that has some interesting language in it.  Here are a couple of points I found interesting during my first read through…

  • The spec defines a container as being a Linux network namespace.  We should be comfortable with that definition as container runtimes like Docker create a new network namespace for each container.
  • Network definitions for CNI are stored as JSON files.
  • The network definitions are streamed to the plugin through STDIN.  That is – there are no configuration files sitting on the host for the network configuration.
  • Other arguments are passed to the plugin via environmental variables
  • A CNI plugin is implemented as an executable.
  • The CNI plugin is responsible wiring up the container.  That is – it needs to do all the work to get the container on the network.  In Docker, this would include connecting the container network namespace back to the host somehow.
  • The CNI plugin is responsible for Continue reading

SAP license fees are due even for indirect users, court says

SAP's named-user licensing fees apply even to related applications that only offer users indirect visibility of SAP data, a U.K. judge ruled Thursday in a case pitting SAP against Diageo, the alcoholic beverage giant behind Smirnoff vodka and Guinness beer.The consequences could be far-reaching for businesses that have integrated their customer-facing systems with an SAP database, potentially leaving them liable for license fees for every customer that accesses their online store."If any SAP systems are being indirectly triggered, even if incidentally, and from anywhere in the world, then there are uncategorized and unpriced costs stacking up in the background," warned Robin Fry, a director at software licensing consultancy Cerno Professional Services, who has been following the case.To read this article in full or to leave a comment, please click here

Japan Keeps Accelerating With Tsubame 3.0 AI Supercomputer

The Global Scientific Information and Computing Center at the Tokyo Institute of Technology has been at the forefront of accelerated computing, and well before GPUs came along and made acceleration not only cool but affordable and normal. But its latest system, Tsubame 3.0, being installed later this year, the Japanese supercomputing center is going to lay the hardware foundation for a new kind of HPC application that brings together simulation and modeling and machine learning workloads.

The hot new idea in HPC circles is not just being able to run machine learning workloads side by side with simulations, but to

Japan Keeps Accelerating With Tsubame 3.0 AI Supercomputer was written by Timothy Prickett Morgan at The Next Platform.

Insecure Android apps put connected cars at risk

Android applications that allow millions of car owners to remotely locate and unlock their vehicles are missing security features that could prevent tampering by hackers.Researchers from antivirus vendor Kaspersky Lab took seven of the most popular Android apps that accompany connected cars from various manufacturers and analyzed them from the perspective of a compromised Android device. The apps and manufacturers have not been named.The researchers looked at whether such apps use any of the available countermeasures that would make it hard for attackers to hijack them when the devices they're installed on are infected with malware. Other types of applications, such as banking apps, have such protections.To read this article in full or to leave a comment, please click here

Insecure Android apps put connected cars at risk

Android applications that allow millions of car owners to remotely locate and unlock their vehicles are missing security features that could prevent tampering by hackers.Researchers from antivirus vendor Kaspersky Lab took seven of the most popular Android apps that accompany connected cars from various manufacturers and analyzed them from the perspective of a compromised Android device. The apps and manufacturers have not been named.The researchers looked at whether such apps use any of the available countermeasures that would make it hard for attackers to hijack them when the devices they're installed on are infected with malware. Other types of applications, such as banking apps, have such protections.To read this article in full or to leave a comment, please click here

Test driving App Firewall with IPTables

With more and more application moving to the cloud, web based applications have become ubiquitous. They are ideal for providing access to applications sitting on the cloud (over HTTP through a standard web browser). This has removed the need to install specialized application on the client system, the client just needs to install is a … Continue reading Test driving App Firewall with IPTables

IDG Contributor Network: What’s a data infrastructure?

Whether you realize it or not, you may already be using, rely upon, affiliated with, support or otherwise involved with data infrastructures. Granted what you or others generically refer to as infrastructure or the data center may, in fact, be the data infrastructure. download Business, IT Information, Data and other Infrastructures Business, IT Information, Data and other Infrastructures overview image Greg Schulz - Server StorageIO Generally speaking, people tend to refer to infrastructure as those things that support what they are doing at work, at home, or in other aspects of their lives. For example, the roads and bridges that carry you over rivers or valleys when traveling in a vehicle are referred to as infrastructure. This is also the situation with IT systems and services where, depending on where you sit or use various services, anything below what you do may be considered infrastructure.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What’s a data infrastructure?

Whether you realize it or not, you may already be using, rely upon, affiliated with, support or otherwise involved with data infrastructures. Granted what you or others generically refer to as infrastructure or the data center may, in fact, be the data infrastructure. download Business, IT Information, Data and other Infrastructures Business, IT Information, Data and other Infrastructures overview image Greg Schulz - Server StorageIO Generally speaking, people tend to refer to infrastructure as those things that support what they are doing at work, at home, or in other aspects of their lives. For example, the roads and bridges that carry you over rivers or valleys when traveling in a vehicle are referred to as infrastructure. This is also the situation with IT systems and services where, depending on where you sit or use various services, anything below what you do may be considered infrastructure.To read this article in full or to leave a comment, please click here