Battle lines are drawn: IBM prepares Power9 to take on Intel and ARM

IBM has many goals with its upcoming Power9 chip, and one is to challenge the dominance of Intel's x86 chips in the data center.The company wants chips based on Power architecture to take a double-digit server chip market share by 2020, Doug Balog, general manager for Power Systems at IBM, said in an interview.It'll be a three-way battle between x86, Power, and ARM, which has a similar goal of a double-digit market share in the next four years. IBM's Power is off to a better start in terms of socket share, Balog said. IBM already is being used in servers, while ARM server processors are largely still being tested.Intel dominates the data center server chip market with a 90-plus percent market share. But IDC has predicted that Intel's share will shrink as ARM-based chips and AMD's x86-based Zen take away some of that lead.To read this article in full or to leave a comment, please click here

154 million American voters’ records exposed thanks to unsecured database

154 million U.S. voters’ records were exposed due to a misconfigured CouchDB instance, according to MacKeeper security researcher Chris Vickery. “It was configured for public access with no username, password, or other authentication required.”Vickery determined the leaky database was on Google’s Cloud services and traced it back to a client of L2, a company which claims to be the country’s “most trusted source for enhanced voter” data.The database included fields for addresses, age, congressional as well as state senate districts, education, estimated income, ethnic, name, gender, languages, marital status, phone, voting frequency, presence of children, and if the voter was a gun owner.To read this article in full or to leave a comment, please click here

154 million American voters’ records exposed thanks to unsecured database

154 million U.S. voters’ records were exposed due to a misconfigured CouchDB instance, according to MacKeeper security researcher Chris Vickery. “It was configured for public access with no username, password, or other authentication required.”Vickery determined the leaky database was on Google’s Cloud services and traced it back to a client of L2, a company which claims to be the country’s “most trusted source for enhanced voter” data.The database included fields for addresses, age, congressional as well as state senate districts, education, estimated income, ethnic, name, gender, languages, marital status, phone, voting frequency, presence of children, and if the voter was a gun owner.To read this article in full or to leave a comment, please click here

Inside Japan’s Future Exascale ARM Supercomputer

The rumors that supercomputer maker Fujitsu would be dropping the Sparc architecture and moving to ARM cores for its next generation of supercomputers have been going around since last fall, and at the International Supercomputing Conference in Frankfurt, Germany this week, officials at the server maker and RIKEN, the research and development arm of the Japanese Ministry of Education, Culture, Sports, Science and Technology (MEXT) that currently houses the mighty K supercomputer, confirmed that this is indeed true.

The ARM architecture now gets a heavy-hitter system maker with expertise in developing processors to support diverse commercial and technical workloads, and

Inside Japan’s Future Exascale ARM Supercomputer was written by Timothy Prickett Morgan at The Next Platform.

DockerCon Thoughts – Secure, Sufficient Applications

containerssuspended

I got to spend a couple of days this week at DockerCon and learn a bit more about software containers. I’d always assumed that containers were a slightly different form of virtualization, but thankfully I’ve learned my lesson there. What I did find out about containers gives me a bit of hope about the future of applications and security.

Minimum Viable App

One of the things that made me excited about Docker is that the process isolation idea behind building a container to do one thing has fascinating ramifications for application developers. In the past, we’ve spent out time building servers to do things. We build hardware, boot it with an operating system, and then we install the applications or the components thereof. When we started to virtualize hardware into VMs, the natural progression was to take the hardware resource and turn it into a VM. Thanks to tools that would migrate a physical resource to a virtual one in a single step, most of the first generation VMs were just physical copies of servers. Right down to phantom drivers in the Windows Device Manager.

As we started building infrastructure around the idea of virtualization, we stopped migrating physical boxes Continue reading

Is this the end for Kinect?

The recent E3 show saw Microsoft break with game console tradition. Normally when a console is released, the vendor does not change the specs for its lifespan (traditionally five to seven years). This way, developers will always have one hardware spec to target when creating games. That kind of certainty helps in game development and keeps the amount of patching down compared with PC games.But just three years after the release of the Xbox One, Microsoft gave its console a massive upgrade in the form of the Xbox One S, a console that will be 40 percent smaller than the Xbox One but will have six times the compute power. The Xbox One has around one teraflop of compute power, the S will have six teraflops, which means 4K video and virtual reality, according to Microsoft.To read this article in full or to leave a comment, please click here

HPC is Great for AI, But What Does Supercomputing Stand to Gain?

As we have written about extensively here at The Next Platform, there is no shortage of use cases in deep learning and machine learning where HPC hardware and software approaches have bled over to power next generation applications in image, speech, video, and other classification and learning tasks.

Since we focus on high performance computing systems here in their many forms, that trend has been exciting to follow, particularly watching GPU computing and matrix math-based workloads find a home outside of the traditional scientific supercomputing center.

This widened attention has been good for HPC as well since it has

HPC is Great for AI, But What Does Supercomputing Stand to Gain? was written by Nicole Hemsoth at The Next Platform.

Look who’s coming for the CEO role

Digital is the way of the marketplace today. One look at our hyper-connected, data-driven ways of working, and it’s clear that digital is also the way of the future. In the midst of rewiring business models, mindsets and mechanisms for the digital age, it’s important to ask about leadership. Who has the skills and experience to take on the challenging job of digital transformation today and tomorrow? Who from across the senior leadership ranks is best equipped to be CEO? Will it be COOs or CFOs? CMOs or CIOs?Because digital technologies touch all areas of the business, the best candidates for CEO roles will have experience associated with all of the major C-level roles—operational (COO), financial (CFO), marketing, sales, customer engagement (CMO) and information technology (CIO and CTO). Few senior executives could claim substantial experience in all of those areas until the recent emergence of the CDO (Chief Digital Officer) role. CDOs, tasked with leading and delivering digital transformation across all areas of the business, are gaining broad and varied business experience and skills. That diverse experience is one reason that leading candidates for the CEO roles of tomorrow may well be the CDOs (Chief Digital Officers) of today. Continue reading

IBM Watson/ XPrize open $5 million AI competition for world-changing applications

IBM and the XPrize organization have opened registration and set guidelines to competing for a $5 million purse to those interested in building advanced AI-based applications that could address the world’s biggest issues – everything from clean water to better energy resources.According to IBM and XPrize, the four-year competition aims to “accelerate adoption of AI technologies, and spark creative, innovative and audacious demonstrations of the technology that are truly scalable and solve societal grand challenges.+More on Network World: Cisco: IP traffic will surpass the zettabyte level in 2016+To read this article in full or to leave a comment, please click here

IBM Watson/ XPrize open $5 million AI competition for world-changing applications

IBM and the XPrize organization have opened registration and set guidelines to competing for a $5 million purse to those interested in building advanced AI-based applications that could address the world’s biggest issues – everything from clean water to better energy resources.According to IBM and XPrize, the four-year competition aims to “accelerate adoption of AI technologies, and spark creative, innovative and audacious demonstrations of the technology that are truly scalable and solve societal grand challenges.+More on Network World: Cisco: IP traffic will surpass the zettabyte level in 2016+To read this article in full or to leave a comment, please click here

AWS, Microsoft cloud win US government security approval

Three vendors, including Microsoft and Amazon Web Services, have won a key U.S. government authorization that allows federal agencies to put highly sensitive data on their cloud-computing services.The AWS GovCloud, Microsoft's Azure GovCloud, and CSRA's ARC-P IaaS have received provisional authority to offer services under the high baseline of the government's Federal Risk and Authorization Management Program (FedRAMP), a set of security standards for cloud services.The FedRAMP high baseline, including more than 400 security controls, allows federal agencies to use AWS for highly sensitive workloads, including personal information, AWS said Thursday.To read this article in full or to leave a comment, please click here

AWS, Microsoft cloud win US government security approval

Three vendors, including Microsoft and Amazon Web Services, have won a key U.S. government authorization that allows federal agencies to put highly sensitive data on their cloud-computing services.The AWS GovCloud, Microsoft's Azure GovCloud, and CSRA's ARC-P IaaS have received provisional authority to offer services under the high baseline of the government's Federal Risk and Authorization Management Program (FedRAMP), a set of security standards for cloud services.The FedRAMP high baseline, including more than 400 security controls, allows federal agencies to use AWS for highly sensitive workloads, including personal information, AWS said Thursday.To read this article in full or to leave a comment, please click here

Location of images on Junos Space after upload

Just a note for my own reference really –

The images you upload via the GUI to upgrade Space end up on the filesystem in /var/cache/jboss/jmp/<imageversion> directory.  In that directory is the actual image, plus a file called appVersionListFile.txt – this file seems to tell the system what other Space apps it is compatible with.

It seems to upload the image into this directory, and then extracts all the various .rpm files from it into /var/cache/jboss/jmp/payloads/<imageversion> directory.

 

I confirmed this by performing an ‘rm -rf <imageversion>’ on both the above directories, then uploading another image via the GUI again.  Both directories re-appeared.  I doubt this is recommended by TAC though, so do this at your own peril.

 


Register Now for the Docker 1.12 Hackathon

With the recent announcement of Docker 1.12, we are happy to announce that today marks the first day of the Docker 1.12 Hackathon! Now that the hackathon is open for registration, participants are encouraged to hack using the new features included in Docker 1.12 including: Swarm Mode, the Service Deployment API, and the built-in routing mesh.

For the Docker 1.12 Hackathon, we are using a platform called DevPost, which allows participants to review the rules, submit their hacks, view other hacks, participate in and start discussions, and easily find other participants with similar interests or complementary skills to join forces with! Submissions are due on Monday, July 25th followed by a week-long judging period.

The judging panel for the Docker 1.12 Hackathon include three Docker Captains and two Docker employees:

  • Phil Estes – Docker Captain and Senior Technical Staff Member at IBM Cloud Open Technologies
  • Arun Gupta – Docker Captain and VP of Developer Relations at Couchbase
  • Laura Frank – Docker Captain and Senior Engineer at Codeship
  • Mano Marks – Director of Developer Relations at Docker
  • Mike Coleman – Technical Evangelist at docker

docker1.12.committee

Each of our five judges will assign a rating of 1-5 Continue reading

The number of corporate users hit by crypto ransomware is skyrocketing

The prevalence of ransomware programs, both those that encrypt data and those that don't, has exploded over the past two years, with companies being increasingly targeted.Based on an analysis by security vendor Kaspersky Lab, more than 2.3 million users encountered ransomware between April 2015 and March, a jump of almost 18 percent over the previous 12 months.This includes programs that only lock the computer's screen to prevent its use as well as those that hold the data itself hostage by encrypting it -- the so-called cryptors. The rise of cryptors in particular has been significant, accounting for 32 percent of all ransomware attacks last year compared to only 7 percent the year before, according to Kaspersky Lab.To read this article in full or to leave a comment, please click here

The number of corporate users hit by crypto ransomware is skyrocketing

The prevalence of ransomware programs, both those that encrypt data and those that don't, has exploded over the past two years, with companies being increasingly targeted.Based on an analysis by security vendor Kaspersky Lab, more than 2.3 million users encountered ransomware between April 2015 and March, a jump of almost 18 percent over the previous 12 months.This includes programs that only lock the computer's screen to prevent its use as well as those that hold the data itself hostage by encrypting it -- the so-called cryptors. The rise of cryptors in particular has been significant, accounting for 32 percent of all ransomware attacks last year compared to only 7 percent the year before, according to Kaspersky Lab.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Ad blocking rapidly escalating, says researcher

Large parts of the internet may need to quickly adopt alternative revenue methods to thwart a massive surge in ad blocking.

Ad blocking is not going away, says eMarketer, a research firm that has just published startling projections. In fact, the digital marketing expert says more than a quarter of U.S. internet users will use ad blockers to perform ad-free web browsing in 2016. 

A double digit (34 percent) increase will lead to 69 million ad blocker users this year, eMarketer predicts.

And it’s going to get worse. The researcher says that number will be closer to 86 million ad blocking internet users in 2017. That’s growth of another 24 percent and will mean that almost a third (32 percent) of all internet users will use the barriers next year.

To read this article in full or to leave a comment, please click here

IDG Contributor Network: Ad blocking rapidly escalating, says researcher

Large parts of the internet may need to quickly adopt alternative revenue methods to thwart a massive surge in ad blocking.Ad blocking is not going away, says eMarketer, a research firm that has just published startling projections. In fact, the digital marketing expert says more than a quarter of U.S. internet users will use ad blockers to perform ad-free web browsing in 2016. A double digit (34 percent) increase will lead to 69 million ad blocker users this year, eMarketer predicts.And it’s going to get worse. The researcher says that number will be closer to 86 million ad blocking internet users in 2017. That’s growth of another 24 percent and will mean that almost a third (32 percent) of all internet users will use the barriers next year.To read this article in full or to leave a comment, please click here