It Takes a Lot of Supercomputing to Simulate Future Computing

The chip industry is quickly reaching the limits of traditional lithography in its effort to cram more transistors onto a piece of silicon at a pace consistent with Moore’s Law. Accordingly, new approaches, including using extreme ultraviolet light sources, are being developed. While this can promise new output for chipmakers, developing this technology to enhance future computing is going to take a lot of supercomputing.

Lawrence Livermore National Lab’s Dr. Fred Streitz and his teams at the HPC Innovation Center at LLNL are working with Dutch semiconductor company, ASML, to push advances in lithography for next-generation chips. Even as a

It Takes a Lot of Supercomputing to Simulate Future Computing was written by Nicole Hemsoth at The Next Platform.

Containerize Windows workloads with Image2Docker

Yesterday, we held a packed webinar on using the Image2Docker tool that prototypes shifting a legacy Windows virtual machine to a Windows Container Dockerfile.

Image2Docker is an open source, community generated powershell module that searches for common components of a Windows Server VM and generates a Dockerfile to match. Originally created by Docker Captain Trevor Sullivan, it is now an open source tool hosted in our GitHub repository. Currently there is discovery of components such IIS, Apache, SQL Server and more. As an input it supports VHD, VHDX, and WIM files. When paired with Microsoft’s Virtual Machine Converter, you can start with pretty much any VM format.

Image2Docker is community supported and designed to show you how easy it is to create Windows Containers from your existing servers. We strongly encourage you to fork it, play with it and contribute pull requests back to the community. Or just install it and use it to generate your own Dockerfiles.

Watch the on-demand webinar to learn more about how it was built, how to use it, and how to contribute.

 Here are some of the most popular questions from the sessions with answers.

Is it possible to containerize an application Continue reading

IDG Contributor Network: Securing the breach trumps breach prevention

In my prior posts, I discussed both the changing face of data breaches and the reality distortion field surrounding today’s IT security professionals when they talk about effective ways to combat data breaches. Three things we know for certain, though, is that data breaches are not going away, our adversaries are continuing to innovate and attack, and the costs of a breach are becoming more tangible.Just this month, Verizon claimed the massive hack on Yahoo caused irreparable harm to the tech company in terms of customer trust, possibly allowing the wireless provider to withdraw from or renegotiate the terms of its $4.83 billion acquisition agreement. Also, in October, the U.K. Information Commissioner’s Office hit TalkTalk with more than $400,000 in fines for its 2015 cyber attack.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Securing the breach trumps breach prevention

In my prior posts, I discussed both the changing face of data breaches and the reality distortion field surrounding today’s IT security professionals when they talk about effective ways to combat data breaches. Three things we know for certain, though, is that data breaches are not going away, our adversaries are continuing to innovate and attack, and the costs of a breach are becoming more tangible.Just this month, Verizon claimed the massive hack on Yahoo caused irreparable harm to the tech company in terms of customer trust, possibly allowing the wireless provider to withdraw from or renegotiate the terms of its $4.83 billion acquisition agreement. Also, in October, the U.K. Information Commissioner’s Office hit TalkTalk with more than $400,000 in fines for its 2015 cyber attack.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Dealing with multiple service providers: A necessary evil

It takes a technologically nimble and well-managed enterprise to take advantage of today’s fast-changing market conditions. Eschewing the plodding, monolithic business models of the past, today’s best-run businesses rely on interchangeable, best-of-breed approaches that allow them to adapt on the fly and seize market opportunities others miss.Multi-sourcing brings speed, but also complications At the heart of such speed and agility is the practice of multi-sourcing, a business model that has been on the rise for many years and is now considered a secular trend. But many enterprises still struggle with managing and integrating so many service streams to achieve their desired business outcomes.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Dealing with multiple service providers: A necessary evil

It takes a technologically nimble and well-managed enterprise to take advantage of today’s fast-changing market conditions. Eschewing the plodding, monolithic business models of the past, today’s best-run businesses rely on interchangeable, best-of-breed approaches that allow them to adapt on the fly and seize market opportunities others miss.Multi-sourcing brings speed, but also complications At the heart of such speed and agility is the practice of multi-sourcing, a business model that has been on the rise for many years and is now considered a secular trend. But many enterprises still struggle with managing and integrating so many service streams to achieve their desired business outcomes.To read this article in full or to leave a comment, please click here

FCC tells ISPs to get customer permission before sharing sensitive info

The U.S. Federal Communications Commission has passed rules requiring broadband providers to receive opt-in customer permission to share sensitive personal information, including web-browsing history, geolocation, and financial details with third parties.The FCC on Thursday voted 3-2 to adopt the new broadband privacy rules, which also include requirements that ISPs promptly notify customers of serious data breaches.Broadband customers need transparency and control over how their data is used, said Jessica Rosenworcel, one of three Democratic commissioners voting for the rules. Broadband providers are increasingly sharing customer data with third-party companies such as advertising networks and analytics firms, she said.To read this article in full or to leave a comment, please click here

FCC tells ISPs to get customer permission before sharing sensitive info

The U.S. Federal Communications Commission has passed rules requiring broadband providers to receive opt-in customer permission to share sensitive personal information, including web-browsing history, geolocation, and financial details with third parties.The FCC on Thursday voted 3-2 to adopt the new broadband privacy rules, which also include requirements that ISPs promptly notify customers of serious data breaches.Broadband customers need transparency and control over how their data is used, said Jessica Rosenworcel, one of three Democratic commissioners voting for the rules. Broadband providers are increasingly sharing customer data with third-party companies such as advertising networks and analytics firms, she said.To read this article in full or to leave a comment, please click here

The Death of Transit?

I was struck at a recent NANOG meeting just how few presentations looked at the ISP space and the issues relating to ISP operations and how many were looking at the data centre environment. If the topics that we use to talk to each other are any guide, then this is certainly an environment which appears to be dominated today by data centre design and the operation of content distribution networks. And it seems that the ISP function, and particularly the transit ISP function is waning. It’s no longer a case of getting users to content, but getting content to users. Does this mean that the role of transit for the Internet’s users is now over?

IDG Contributor Network: The growing importance of the network in the digital-first economy

What happens when you have great experiences with a brand? For most people it captivates them, changes their thinking and resets their expectations.I had the opportunity to work at Walt Disney World in the central reservations department, taking phone calls from families, travel agents and special events coordinators who all wanted to share in the trademarked Disney magic. At my core I was a salesperson, leveraging a well-structured process to guide “guests” to the highest-revenue resort rooms.+ Also on Network World: How the 'digitization of everything' will become a reality + I had the opportunity to see first hand the value of a great customer experience. People from around the globe travel thousands of miles to get a slice of the Disney “guest” experience. And somehow the theme, view or location of a hotel room most people will spend little to no waking hours in matters. It matters only because it’s part of the experience and therefore not rationalized independently.To read this article in full or to leave a comment, please click here

ServiceNow enables businesses to embrace the cloud

The cloud has been mainstream now for over a decade, but adoption has been spotty as businesses experimented and learned what kind of benefits it can provide. Over the past couple of years, digital transformation has become a top initiative for business leaders, causing IT executives to look for ways to be more agile and dynamic. This has increased the adoption of cloud as not just a cheaper alternative to traditional, on-premises computing but rather a strategic alternative that can pay big dividends. We are rapidly approaching a cloud “tipping point” where there will be more workloads and applications in the cloud than in an organization’s private data center. This week ServiceNow, a company that has enabled many organizations to make the shift to cloud, announced some interesting survey data, as well as a new solution for businesses that are thinking cloud-first. To read this article in full or to leave a comment, please click here

No need to shoot down drones! Many of them can now be hijacked

A security researcher has devised a method of hijacking a wide variety of radio- controlled airplanes, helicopters, cars, boats and other devices that use a popular wireless transmission technology.The attack was developed by Jonathan Andersson, manager of the Advanced Security Research Group at Trend Micro DVLabs, and targets a "wideband, frequency-agile 2.4GHz signal protocol" called DSMx. This protocol is used in radio-control (R/C) toys, including in drones, that are owned by millions of users.Andersson's attack exploits weaknesses in DSMx and was presented in detail Wednesday at the PacSec security conference in Tokyo. The researcher built a device that he dubbed Icarus, using off-the-shelf electronic components and software-defined radio (SDR). With it, he can take over the control of drones or other R/C devices and lock out their real owners in seconds.To read this article in full or to leave a comment, please click here

No need to shoot down drones! Many of them can now be hijacked

A security researcher has devised a method of hijacking a wide variety of radio- controlled airplanes, helicopters, cars, boats and other devices that use a popular wireless transmission technology.The attack was developed by Jonathan Andersson, manager of the Advanced Security Research Group at Trend Micro DVLabs, and targets a "wideband, frequency-agile 2.4GHz signal protocol" called DSMx. This protocol is used in radio-control (R/C) toys, including in drones, that are owned by millions of users.Andersson's attack exploits weaknesses in DSMx and was presented in detail Wednesday at the PacSec security conference in Tokyo. The researcher built a device that he dubbed Icarus, using off-the-shelf electronic components and software-defined radio (SDR). With it, he can take over the control of drones or other R/C devices and lock out their real owners in seconds.To read this article in full or to leave a comment, please click here

DARPA looking to develop drone destroying, personnel protection system

Looking to protect military personnel from a swarming drone attack is the goal behind a new system that the researchers from the Defense Advanced Research Projects Agency are set to develop.The three-phase program, called Mobile Force Protection will in the next few years potentially develop a prototype system that could sense an attack, identify the attacker and then use a number of techniques, from communications jamming to capturing mid-flight any attacking drones. DARPA says it will offer $3 million for each phase 1 developer.To read this article in full or to leave a comment, please click here

DARPA looking to develop drone destroying, personnel protection system

Looking to protect military personnel from a swarming drone attack is the goal behind a new system that the researchers from the Defense Advanced Research Projects Agency are set to develop.The three-phase program, called Mobile Force Protection will in the next few years potentially develop a prototype system that could sense an attack, identify the attacker and then use a number of techniques, from communications jamming to capturing mid-flight any attacking drones. DARPA says it will offer $3 million for each phase 1 developer.To read this article in full or to leave a comment, please click here

Qualcomm agrees to buy NXP for over $37 billion

Microprocessor maker Qualcomm is spending its way out of a stagnating mobile phone industry, offering to buy NXP Semiconductors, a company with a strong position in automotive chips, for more than US$37 billion.Qualcomm formalized its offer Thursday, barely a month after rumors began circulating that a deal was in the offing.NXP has only just digested its own multibillion acquisition, of Freescale Semiconductor, which closed in December 2015.The combination of Qualcomm and NXP will have annual revenue of around $35 billion, Qualcomm said. That's still well behind the $55 billion Intel reported for its full fiscal year 2015, although catching up.To read this article in full or to leave a comment, please click here

IT spending on ‘innovation’ is now a priority

Businesses are increasing their spending on technology, with cloud services as the big beneficiary. Hardware and software spending is declining as spending on cloud services rises, particularly on SaaS, according to the most recent annual survey from the Society for Information Management (SIM). Analytics/business intelligence and cybersecurity are the top two IT spending priorities, something that has been true for the several years. But marching into this mix now is "innovation" spending, an IT category signaling business expectations for IT.To read this article in full or to leave a comment, please click here