IBM’s blazing Power9 chip is coming, and here’s what you need to know

IBM's Power processors have a storied history; they were notably used in the Watson supercomputer that outsmarted humans in the game of Jeopardy in 2011. The latest chip in the family, called the Power9, is coming next year, and it stands out for its blazing speed and for technologies never seen in chips before.IBM is spilling Power9 details at the Hot Chips conference in Cupertino, California, this week. Here's some important information about the chip.Power9 servers will be smarter than the Jeopardy winner The sheer computing power in Power9 will make supercomputers virtually unbeatable in Jeopardy, unless a superhuman demonstrating exceptional intelligence comes along. The Power9 architecture has up to 24 cores and provides blazing throughput to speed up complex calculations.To read this article in full or to leave a comment, please click here

Nvidia’s NVLink 2.0 will first appear in Power9 servers next year

Graphics processors with Nvidia's NVLink throughput technology have just started coming out, but a successor to the groundbreaking interconnect is already on its way.IBM's upcoming Power9 chip will include NVLink 2.0 technology, and servers using the chip will be available next year.Nvidia hasn't yet announced when GPUs with NVLink 2.0 would come out, but they could be available around the same time as the new Power9 servers come out.IBM is projecting Power9 servers to be out by the middle of next year, but the company hasn't nailed down a specific date.A presentation on Nvidia's website says NVLink 2.0 will be in GPUs code-named Volta, which also will come out next year.To read this article in full or to leave a comment, please click here

Alleged NSA hackers probably gave away a small fortune by leaking exploits

Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales in the black market when they leaked valuable cyberweapons allegedly stolen from the U.S. National Security Agency.The hackers, known as the Shadow Brokers, posted a sample file of the cyberweapons earlier this month and at least some of them appear to be zero-day exploits, or attacks that rely on software defects that practically no one knew about.Before they were publicly leaked, each of these zero-day exploits could have sold for a great deal of money, according to security researchers. They’re designed to affect firewall and router products from Cisco, Juniper Networks and Fortinet, in addition to those from Chinese vendors.To read this article in full or to leave a comment, please click here

Alleged NSA hackers probably gave away a small fortune by leaking exploits

Anonymous hackers probably gave away hundreds of thousands of dollars in potential sales in the black market when they leaked valuable cyberweapons allegedly stolen from the U.S. National Security Agency.The hackers, known as the Shadow Brokers, posted a sample file of the cyberweapons earlier this month and at least some of them appear to be zero-day exploits, or attacks that rely on software defects that practically no one knew about.Before they were publicly leaked, each of these zero-day exploits could have sold for a great deal of money, according to security researchers. They’re designed to affect firewall and router products from Cisco, Juniper Networks and Fortinet, in addition to those from Chinese vendors.To read this article in full or to leave a comment, please click here

Republicans subpoena three tech companies over Clinton emails

Republicans in Congress have subpoenaed three technology companies that declined to hand over documents about former U.S. Secretary of State Hillary Clinton’s private email server.On Monday, Datto, SECNAP Network Security and Platte River Networks received subpoenas from U.S. Rep. Lamar Smith, a Texas Republican.Smith is demanding documents from the companies as two congressional committees from the House and Senate investigate the Democratic presidential nominee’s use of a private email server while she was secretary of state.All three companies either sold products used in Clinton’s email server or were hired to maintain it, Smith said in the subpoenas. For example, Datto provided an online backup system that eventually began storing Clinton’s emails off site.To read this article in full or to leave a comment, please click here

Republicans subpoena three tech companies over Clinton emails

Republicans in Congress have subpoenaed three technology companies that declined to hand over documents about former U.S. Secretary of State Hillary Clinton’s private email server.On Monday, Datto, SECNAP Network Security and Platte River Networks received subpoenas from U.S. Rep. Lamar Smith, a Texas Republican.Smith is demanding documents from the companies as two congressional committees from the House and Senate investigate the Democratic presidential nominee’s use of a private email server while she was secretary of state.All three companies either sold products used in Clinton’s email server or were hired to maintain it, Smith said in the subpoenas. For example, Datto provided an online backup system that eventually began storing Clinton’s emails off site.To read this article in full or to leave a comment, please click here

Tableau turns to AWS for a cloud-savvy CEO

Data visualization specialist Tableau Software is bringing in seasoned talent to help it compete in an increasingly cloud-based world. The company has hired longtime Amazon Web Services executive Adam Selipsky as its CEO, replacing cofounder Christian Chabot.Chabot, who has been CEO for 14 years, will continue to serve as chairman of Tableau’s board of directors. Selipsky, who currently is vice president of marketing, sales and support for AWS, will join Tableau on Sept. 16.“Adam is going to take Tableau to the next level,” Chabot said in a press release, citing Selipsky's cloud experience. “He is the right person to lead Tableau to the next stage of growth.”To read this article in full or to leave a comment, please click here

EFF condemns Windows 10 data collection

The Electronic Frontier Foundation (EFF) is lambasting Microsoft over Windows 10's telemetry technology, urging it to "come clean" with customers.In a piece posted last week to the EFF's blog, Amul Kalia, the San Francisco-based advocacy organization's intake coordinator, criticized Microsoft's practice of collecting large amounts of data from Windows 10 users."Windows 10 sends an unprecedented amount of usage data back to Microsoft, particularly if users opt in to 'personalize' the software using the OS assistant called Cortana," wrote Kalia, referring to the voice-controlled digital aide. "Microsoft should come clean with its user community. The company needs to acknowledge its missteps and offer real, meaningful opt-outs to the users who want them, preferably in a single unified screen."To read this article in full or to leave a comment, please click here

25% off NETGEAR N300 Wi-Fi Range Extender, Essentials Edition – Deal Alert

Convenient, discreet and easy to install, extended Wi-Fi coverage is just an outlet away with the NETGEAR N300 Wi-Fi Extender. Boost your Wi-Fi for mobile devices and connect a wired device such as Smart TVs or game consoles. Boost your existing network range & speed, delivering Wi-Fi up to 300Mbps. External antennas provide better Wi-Fi coverage and higher speed, while the convenient wall-plug design saves space. It works with any standard Wi-Fi router & is ideal for keeping your mobile devices connected as you move throughout your home.  With nearly 12,000 reviews on Amazon, it averages 4 out of 5 stars (read reviews). Its typical list price of $39.99 has been reduced by 25% to $29.99.  See the discounted NETGEAR N300 Wi-Fi Extender. now on Amazon.To read this article in full or to leave a comment, please click here

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Last year, private sector companies globally spent more than $75 billion on security software to safeguard their systems and data.That number is expected to grow about 7% annually, according to Gartner and other analyst firms. It doesn’t include all the massive amounts spent on fraud prevention by banks, a number that is widely underreported and expected to reach into the billions annually.Has all that spending made private sector data and systems any safer? Is customer personal data any safer?MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords The general answer is no, according to many analysts, but that’s not necessarily because the latest software is considered ineffective.To read this article in full or to leave a comment, please click here

25% off NETGEAR N300 Wi-Fi Range Extender, Essentials Edition – Deal Alert

Convenient, discreet and easy to install, extended Wi-Fi coverage is just an outlet away with the NETGEAR N300 Wi-Fi Extender. Boost your Wi-Fi for mobile devices and connect a wired device such as Smart TVs or game consoles. Boost your existing network range & speed, delivering Wi-Fi up to 300Mbps. External antennas provide better Wi-Fi coverage and higher speed, while the convenient wall-plug design saves space. It works with any standard Wi-Fi router & is ideal for keeping your mobile devices connected as you move throughout your home.  With nearly 12,000 reviews on Amazon, it averages 4 out of 5 stars (read reviews). Its typical list price of $39.99 has been reduced by 25% to $29.99.  See the discounted NETGEAR N300 Wi-Fi Extender. now on Amazon.To read this article in full or to leave a comment, please click here

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Last year, private sector companies globally spent more than $75 billion on security software to safeguard their systems and data.That number is expected to grow about 7% annually, according to Gartner and other analyst firms. It doesn’t include all the massive amounts spent on fraud prevention by banks, a number that is widely underreported and expected to reach into the billions annually.Has all that spending made private sector data and systems any safer? Is customer personal data any safer?MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords The general answer is no, according to many analysts, but that’s not necessarily because the latest software is considered ineffective.To read this article in full or to leave a comment, please click here

Microsoft acquires intelligent scheduling startup Genee

Microsoft has acquired Genee, a startup that provided a virtual assistant for scheduling appointments. The deal, announced Tuesday, will bring the Genee team into the Microsoft fold and put them to work on bringing intelligence into Office 365. Genee's service let users loop in an artificial intelligence assistant that could interpret sentences like "set up lunch at some point this week" and turn them into calendar appointments. Acquiring Genee is part of Microsoft's ongoing crusade to build intelligent productivity software and services using AI. The company has focused on that area under the tenure of CEO Satya Nadella, with features like Office Delve, which finds documents shared within an organization that are relevant to a user, and Focused Inbox in Outlook, which filters unimportant email into a separate tab so it's not cluttering a user's experience. To read this article in full or to leave a comment, please click here

DC Fabric Segment Routing Use Case (4)

In the last post in this series, I discussed using SR labels to direct traffic from one flow onto, and from other flows off of, a particular path through a DC fabric. Throughout this series, though, I’ve been using node (or prefix) SIDs to direct the traffic. There is another kind of SID in SR that needs to be considered—the adj-sid. Let’s consider the same fabric used throughout this series—

benes-segment-03

So far, I’ve been describing the green marked path using the node or (loopback) prefix-sids: [A,F,G,D,E]. What’s interesting is I could describe the same path using adj-sids: [a->f,f->g,g->d,d->e], where the vector in each hop is described by a single entry on the SR stack. There is, in fact, no difference between the two ways of describing this path, as there is only one link between each pair of routers in the path. This means everything discussed in this series so far could be accomplished with either a set of adj SIDs ore a set of node (prefix) SIDs.

Given this, why are both types of SIDs defined? Assume we zoom in a little on the border leaf node in this topology, and find—

border-leaf

Assume—

Another day, another 4,600 lines of Linux kernel code

The Linux kernel is improving faster than ever, gaining 7.8 patches per hour and 4,600 lines of new code every day.That's according to a new report published Monday by the Linux Foundation and focusing on the state of kernel development. Entitled “Linux kernel development -- how fast it is going, who is doing it, what they are doing, and who is sponsoring it,” the report is the seventh the nonprofit has published on the topic in roughly as many years.This year’s paper covers work completed through Linux kernel 4.7, with an emphasis on releases 3.19 to 4.7. The last report was released March 2015 and focused on versions 3.11 to 3.18.To read this article in full or to leave a comment, please click here

LinuxCon: With open-source’s great power comes great responsibility

One of the biggest Linux events of the year opened with a look at the social role of the largest open-source project in history, as well as Linux’s potential place in the history books.LinuxCon North America 2016 kicked off today in Toronto with keynotes from Linux Foundation director Jim Zemlin and Ainissa Ramirez, an author and former Bell Labs researcher who works to make technology accessible to the mainstream.+ALSO ON NETWORK WORLD: 10 sci-fi technologies we are close to having + ARM has a new weapon in race to build world's fastest computersTo read this article in full or to leave a comment, please click here