NVLink Takes GPU Acceleration To The Next Level

One of the breakthrough moments in computing, which was compelled by necessity, was the advent of symmetric multiprocessor, or SMP, clustering to make two or more processors look and act, as far as the operating system and applications were concerned, as a single, more capacious processor. With NVLink clustering for GPUs and for lashing GPUs to CPUs, Nvidia is bringing something as transformative as SMP was for CPUs to GPU accelerators.

The NVLink interconnect has been in development for years, and is one of the “five miracles” that Nvidia CEO and co-founder Jen-Hsun Huang said at the GPU Technology Conference

NVLink Takes GPU Acceleration To The Next Level was written by Timothy Prickett Morgan at The Next Platform.

Google turns on HTTPS for all blogspot blogs

All blogs hosted on Google's blogspot.com domain can now be accessed over an encrypted HTTPS connection. This puts more control into the hands of blog readers who value privacy.Google started offering users of its Blogger service the option to switch their blogspot.com sites to HTTPS in September, but now that setting was removed and all blogs received an HTTPS version that users can access.Instead of the "HTTPS Availability" option, blog owners can now use a setting called "HTTPS Redirect," which will redirect all visitors to the HTTPS version of their blogs automatically. If the setting is not used, users will still be able to access the non-encrypted HTTP version.To read this article in full or to leave a comment, please click here

Interop: 12 killer (and free) tools for network engineers

LAS VEGAS -- Visibility is key to troubleshooting network woes, but getting such access can be expensive. To help out, a veteran networking pro shared with attendees of the Interop conference in Las Vegas his list of a dozen mostly free “killer” tools. Network Protocol Specialists owner Mike Pennacchi: Free tools can be customized to fit your needs “There are commercial tools that do most of these functions,” says Mike Pennacchi, owner and lead network analyst at Network Protocol Specialists. “If you don’t have any budget, this gives you the tools without spending a lot of money.”To read this article in full or to leave a comment, please click here

Interop: 12 killer (and free) tools for network engineers

LAS VEGAS -- Visibility is key to troubleshooting network woes, but getting such access can be expensive. To help out, a veteran networking pro shared with attendees of the Interop conference in Las Vegas his list of a dozen mostly free “killer” tools. Network Protocol Specialists owner Mike Pennacchi: Free tools can be customized to fit your needs “There are commercial tools that do most of these functions,” says Mike Pennacchi, owner and lead network analyst at Network Protocol Specialists. “If you don’t have any budget, this gives you the tools without spending a lot of money.”To read this article in full or to leave a comment, please click here

Google turns on HTTPS for all blogspot blogs

All blogs hosted on Google's blogspot.com domain can now be accessed over an encrypted HTTPS connection. This puts more control into the hands of blog readers who value privacy.Google started offering users of its Blogger service the option to switch their blogspot.com sites to HTTPS in September, but now that setting was removed and all blogs received an HTTPS version that users can access.Instead of the "HTTPS Availability" option, blog owners can now use a setting called "HTTPS Redirect," which will redirect all visitors to the HTTPS version of their blogs automatically. If the setting is not used, users will still be able to access the non-encrypted HTTP version.To read this article in full or to leave a comment, please click here

25% off Nextbit Robin Unlocked Android Phone – Deal Alert

Currently averaging 5 out of 5 stars on Amazon (read reviews), Robin has been discounted through May 10th by 25%. With a list price of $399, this item is discounted by $100 and can be purchased via Amazon right now for $299. Robin was born from a Kickstarter campaign (over $1.3M raised from 3,611 backers), and a desire to create something that uniquely stands out. This very well designed smartphone merges 32GB of onboard storage with 100GB of cloud storage, seamlessly backing up your apps and photos into intelligent archives that can be restored instantly and effortlessly. It features a 5.2" 1080p LCD with Gorilla glass 4, 13 MP rear Camera with phase detection Autofocus and Dual tone flash, and Dual Front facing speakers with Dual amplifiers. Learn more about the discounted Nextbit Robin unlocked smartphone and explore buying options on Amazon now.To read this article in full or to leave a comment, please click here

IBM’s quantum processor comes out of hiding

A quantum computer for the people isn't just a theoretical dream; IBM is trying to make it a reality.IBM has built a quantum processor with five qubits, or quantum bits. Even better, IBM isn't hiding the quantum processor in its labs -- it will be accessible through the cloud for the public to run experiments and test applications.The goal is to unwrap decades-old mysteries around quantum computers and let people play with the hardware, said Jay Gambetta, manager of quantum computing theory and information at IBM.IBM's qubit processor is significant because it'll be the first quantum hardware accessible to the public, even if only through the cloud. Users will be able to work with qubits, study tutorials, and run simulations, Gambetta said. To read this article in full or to leave a comment, please click here

Review: HPE’s machine learning cloud overpromises, underdelivers

Developers longing to build more intelligent, more proactive, more personalized apps seem to gain more options with every passing day. With Haven OnDemand, Hewlett-Packard Enterprise (HPE) has joined the applied machine learning fray, competing directly with IBM Watson Services, Microsoft Cortana Analytics Suite, and several Google ML-based APIs.To read this article in full or to leave a comment, please click here(Insider Story)

5 secure habits of the paranoid PC user

We know how it goes: You mean to practice safe computing habits, really you do. But when you fire up your computer, you just want to get stuff done -- and that's when even savvy users begin to cut security corners.We'd all do well to take a lesson from truly paranoid PC users, who don't let impatience or laziness stand in the way of protecting their data. Let's take a look at some of their security habits that you may want to practice regularly.After all, staying safe online doesn't have to be onerous or time-consuming. Invest an hour or two this weekend to put a few safeguards in place, consciously start to practice a few good habits -- and before you know it, your good intentions will become a daily reality.To read this article in full or to leave a comment, please click here

5 secure habits of the paranoid PC user

We know how it goes: You mean to practice safe computing habits, really you do. But when you fire up your computer, you just want to get stuff done -- and that's when even savvy users begin to cut security corners.We'd all do well to take a lesson from truly paranoid PC users, who don't let impatience or laziness stand in the way of protecting their data. Let's take a look at some of their security habits that you may want to practice regularly.After all, staying safe online doesn't have to be onerous or time-consuming. Invest an hour or two this weekend to put a few safeguards in place, consciously start to practice a few good habits -- and before you know it, your good intentions will become a daily reality.To read this article in full or to leave a comment, please click here

Ads mislead over broadband Internet access pricing, regulator warns

Pricing in ads for broadband Internet access is too often misleading and needs tighter regulation.That's the verdict of the U.K.'s Advertising Standards Authority, which on Wednesday gave ISPs six months to clean up their act before it introduces new rules on how they can promote their services.The monthly cost of broadband Internet access bundled with fixed-line telephone service ought to be simple enough to determine.INSIDER: 5 tricks to improve poor TCP performance However, after viewing a typical ad, only 23 percent of people could correctly identify the cost in a study by the ASA and the U.K.'s communications regulator, Ofcom.To read this article in full or to leave a comment, please click here

Ads mislead over broadband Internet access pricing, regulator warns

Pricing in ads for broadband Internet access is too often misleading and needs tighter regulation.That's the verdict of the U.K.'s Advertising Standards Authority, which on Wednesday gave ISPs six months to clean up their act before it introduces new rules on how they can promote their services.The monthly cost of broadband Internet access bundled with fixed-line telephone service ought to be simple enough to determine.INSIDER: 5 tricks to improve poor TCP performance However, after viewing a typical ad, only 23 percent of people could correctly identify the cost in a study by the ASA and the U.K.'s communications regulator, Ofcom.To read this article in full or to leave a comment, please click here

5 videoconferencing fears (and how to overcome them)

More than half (54 percent) of employees regularly take part in work-related videoconferences, but not all of them are eager participants, according to a recent report. In the survey of more than 230 full-time U.S. workers by West Unified Communications, 23 percent of the respondents said that videoconferencing makes them feel uncomfortable, and three-quarters said they still prefer audio to video. “There’s a definite fear factor among employees when it comes to using videoconferencing,” says Dennis Collins, director of marketing at West. “Just like listening to a recording of your voice makes people uncomfortable, many are uncomfortable with seeing themselves on camera.” To read this article in full or to leave a comment, please click here

Cyber insurance can keep your business afloat after a cyberattack

Technology, social media and transactions over the Internet play key roles in how most organizations conduct business and reach out to prospective customers today. Those vehicles also serve as gateways to cyberattacks. Whether launched by run-of-the-mill hackers, criminals, insiders or even nation states, cyberattacks are likely to occur and can cause moderate to severe losses for organizations large and small. As part of a risk management plan, organizations routinely must decide which risks to avoid, accept, control or transfer. Transferring risk is where cyber insurance comes into play.What is cyber insurance? A cyber insurance policy, also referred to as cyber risk insurance or cyber liability insurance coverage (CLIC), is designed to help an organization mitigate risk exposure by offsetting costs involved with recovery after a cyber-related security breach or similar event. With its roots in errors and omissions (E&O) insurance, cyber insurance began catching on in 2005, with the total value of premiums forecasted to reach $7.5 billion by 2020. According to PwC, about one-third of U.S. companies currently purchase some type of cyber insurance.To read this article in full or to leave a comment, please click here

Performance reviews: 10 things to do before, during and after

While many organizations are experimenting with the notion of eliminating traditional performance reviews, most companies are still doing annual or semi-annual reviews. The process can be nerve-wracking and cause anxiety if employees don't know what to expect or aren't prepared, but it doesn't have to be like this."The most important thing to remember is that these reviews are supposed to be a two-way street with communication flowing both ways, between employee and manager or supervisor. And while, yes, it can be an anxious event, in the end, remember that you both want the same thing -- success and productivity within the organization," says Dominque Jones, chief people officer and vice president of HR at Halogen Software. Here, Jones shares her tips for making sure your next performance review process is productive, fulfilling and successful.To read this article in full or to leave a comment, please click here

Windows 10 migration: At least it’s not like last time

Enterprises should have an easier time migrating from Windows 7 to Windows 10 than they did the last go-round when they left behind Windows XP, an analyst said, citing lessons both Microsoft and corporations learned."Microsoft has provided the option to roll out [Windows 10] using most of the same processes you used with Windows 7," said Steve Kleynhans of research firm Gartner in an interview Tuesday. "For that, you get a new OS, but you don't get new capabilities. Later, you can make the decision to, say, turn on the tighter security of Windows 10, or change the way that applications are distributed by turning on the Store."The migrate-but-then-do-more-later plan is one many enterprises will adopt, Kleynhans said, which should make the transition smoother and faster than the one businesses struggled to complete in late 2013 and early 2014 as they purged XP.To read this article in full or to leave a comment, please click here