|
Compute accelerators -- whether they be GPUs, Intel Xeon Phi, or FPGAs -- are increasingly common in HPC and so it is important that we assess the use of such technologies from within VMware vSphere® as part of our efforts to virtualize research computing and other HPC environments. Last year when I tested Intel Xeon Phi in passthrough mode (VM Direct Path I/O) with VMware ESX® 5.5, we found that it didn't work due to some limitations in our passthrough implementation. However, using an engineering build of ESX, I was able to successfully configure the device in passthrough mode, run Intel's bundled Phi performance tests, and demonstrate good performance. While this wasn't of practical use to customers since I was not testing with a released version of ESX, it did validate that with appropriate engineering changes it would be possible to use Intel Xeon Phi with ESX and achieve good performance. It was a promising first step. With the release of ESX 6.0, Na Zhang recently validated that, 1) ESX 6.0 does now correctly allow access to Intel Xeon Phi in passthrough mode, and 2) performance is generally very good. This blog entry shares our performance results and explains how to expose Intel Xeon Phi [...]]>...
|
|
|
Full View / NID: 55049 / Submitted by: The Zilla of Zuron
|
|
Give your VMware vCloud® Air™ the kick it needs with our new vCloud Air vTech Talk video series! Every Tuesday, we’ll publish a new video demonstration in the vCloud Air Community which will cover a wide range of cloud-related topics, including virtual to cloud conversions, vCloud Air sizing guides, real, everyday questions from vCloud Air […]]>...
|
|
|
Full View / NID: 55048 / Submitted by: The Zilla of Zuron
|
|
The demand for VMware NSX is growing. And while customers realize its potential, they are often unclear on thetangible business benefits made possible with VMware NSX. We sat down with Hatem Naguib, VMware VicePresident, Network and Security, and asked him to share his insight on VMware NSX and the advantages it offersVMware customers. This interview […]]>...
|
|
|
Full View / NID: 55047 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (July 14, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability, which exists in Windows Remote Procedure Call (RPC) authentication, could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
|
|
|
Full View / NID: 55045 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (July 14, 2015): Bulletin published Summary: This security update resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow remote code execution if an authenticated attacker runs a specially crafted query that is designed to execute a virtual function from a wrong address, leading to a function call to uninitialized memory. To exploit this vulnerability an attacker would need permissions to create or modify a database.
|
|
|
Full View / NID: 55044 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (July 14, 2015): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker who is logged on to a domain-joined system runs a specially crafted application that could establish a connection with other domain-joined systems as the impersonated user or system. The attacker must be logged on to a domain-joined system and be able to observe network traffic.
|
|
|
Full View / NID: 55043 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Critical Revision Note: V1.0 (July 14, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Windows Hyper-V. The vulnerabilities could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine hosted by Hyper-V. An an attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability.
|
|
|
Full View / NID: 55042 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (July 14, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow Remote Code Execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory and then convinces the user to open an RTF file or to launch a program that is designed to load a trusted DLL file but instead loads the attacker’s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
|
|
|
Full View / NID: 55041 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (July 14, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker convinces a user to open a file that contains a specially crafted OLE component.
|
|
|
Full View / NID: 55040 / Submitted by: The Zilla of Zuron
|
|
Severity Rating: Important Revision Note: V1.0 (July 14, 2015): Bulletin published. Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.
|
|
|
Full View / NID: 55039 / Submitted by: The Zilla of Zuron
|
|
The news of Seagate’s alliance with HP and its extended relationship with IBM is receiving widespread attention from industry and business media across the U.S. and EMEA. Coverage to date is listed below: EMEA Storage Consortium: Seagate combined with IBM HPC ClusterStor Spectrum Scale Software IT Times: Seagate Technology lowers revenue forecast - Cooperation with […]
|
|
|
Full View / NID: 55038 / Submitted by: The Zilla of Zuron
|
|
NCSOFT, the developer behind the Lineage franchise, pioneered massively multiplayer online games. They’ve captured the imagination of Korean gamers — some of the most demanding on Earth — and haven’t let go. Now, we’re teaming up with NCSOFT to take their latest flagship title, Lineage Eternal, to another level. Just like the loot-filled world of… Read More
|
|
|
Full View / NID: 55037 / Submitted by: The Zilla of Zuron
|
|
- Trusted value-added distributor with extensive product knowledge and technical expertise to sell SRT products through reseller network - London, UK - 14 July 2015 - South River Technologies Inc. (SRT), an innovator in secure file transfer, has partnered with UK file transfer consultancy and value-added distributor Pro2col as part of its continued worldwide expansion. Pro2col is an independent consultancy specialising in managed file transfer solutions. Since 2003, the company has been trusted to find...
Source: RealWire
|
|
|
Full View / NID: 55036 / Submitted by: The Zilla of Zuron
|
|
Trafford Council Leader Sean Anstee visited the Chief Executive Officer of Trafford's latest new employer, LDeX2 Datacentre, Rob Garbutt earlier this week. He was joined by Executive Member for Economic Growth and Planning, Cllr Michael Young.As well as welcoming Rob and his Datacentre business to the Borough and taking a tour of the new facility, they took the opportunity to reinforce the hugely positive steps being taken by the Council, working with local businesses of...
Source: RealWire
|
|
|
Full View / NID: 55035 / Submitted by: The Zilla of Zuron
|
|
Gaming Software Development Specialist d3t Future-Proofs Its Version Control System by Standardising on Perforce Helix Wokingham (UK), July 14, 2015 - Perforce Software today announced that Develop Industry Excellence Awards finalist d3t Ltd., a software development consultancy specialising in games, apps and embedded systems, will standardise its software development on Perforce Helix. The company uses Helix to enable its designers, engineers and artists to work in parallel and collaborate more effectively on projects ranging from...
Source: RealWire
|
|
|
Full View / NID: 55034 / Submitted by: The Zilla of Zuron
|
|
Interoute Virtual Data Centre provides on demand, resilient ICT infrastructure for growing online personalised printing companyLondon, 14 July 2015 - PhotoBox Group, a leading European personalised printing company, has selected Interoute's global networked cloud infrastructure platform Interoute Virtual Data Centre (VDC), to ensure customers have a fast seamless ordering experience across Europe, during seasonal traffic peaks on its e-retail consumer websites. The Group, made of several brands including PhotoBox, Moonpig and Sticky9, has more than...
Source: RealWire
|
|
|
Full View / NID: 55033 / Submitted by: The Zilla of Zuron
|
|
Updated IT Asset Management Suite Gives Simplified View of Assets, Helps Organisations Prepare for Software AuditsLONDON - July 14, 2015 - LANDESK today unveiled a new version of its IT Asset Management (ITAM) Suite that includes a LANDESK Workspace, targeted at IT asset managers. The suite provides a simplified view of IT assets in one central place, putting key decision-making data at the fingertips of asset managers. "With LANDESK Workspaces we wanted to reinvent the...
Source: RealWire
|
|
|
Full View / NID: 55032 / Submitted by: The Zilla of Zuron
|
|
The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
|
|
|
Full View / NID: 55031 / Submitted by: The Zilla of Zuron
|
|
In explaining the inexplicable, high-profile cyber security threats impacting United Airlines, The New York Stock Exchange, The Wall Street Journal and The Office of Personnel Management security industry experts and media pundits have used terms like ‘glitches’, ‘outages’ and ‘gremlins’. For most these labels were just as useful as the descriptions offered for the occurrences, […]
|
|
|
Full View / NID: 55030 / Submitted by: The Zilla of Zuron
|
|
|
Full View / NID: 55029 / Submitted by: The Zilla of Zuron
|
|
|
Full View / NID: 55028 / Submitted by: The Zilla of Zuron
|
|
On September 21-25 in Reston, Virginia, you have a unique opportunity to participate in the BETA version of our new VMware NSX: Install, Configure, Manage [V6.2] course. This comprehensive, fast-paced training course focuses on installing, configuring, and managing VMware NSX™. This course covers VMware NSX as a part of the software-defined data center (SDDC) platform, […]]>...
|
|
|
Full View / NID: 55027 / Submitted by: The Zilla of Zuron
|
|
Horizon View Administrators continue to open support requests with issues surrounding SSL certificates in the product configuration. Nobody really enjoys setting up SSL and all the other security aspects that go along with it - it's a necessary evil. Maybe that explains why, when running into issues with it, the first reaction is to get […]]>...
|
|
|
Full View / NID: 55026 / Submitted by: The Zilla of Zuron
|
|
Post by vExpert Michael Webster vSphere 6 is the latest and much anticipated flagship release from VMware and has been available since March 2015. It is the first time in a while that we’ve seen a new major release from VMware, and they’ve made a concerted effort to ensure that this release is as rock […]]>...
|
|
|
Full View / NID: 55025 / Submitted by: The Zilla of Zuron
|
|
It’s a new cloud-driven world out there. Can your private or hybrid cloud deployment handle the pressure? How are your infrastructure resources? Do you have new cloud capabilities, but just seem to be short on capacity? In our upcoming webcast, you’ll learn from Taka Uenishi, Product Line Marketing Manager of VMware Cloud Management, and Ryan […]]>...
|
|
|
Full View / NID: 55024 / Submitted by: The Zilla of Zuron
|
|
Type 2 hypervisors are cool. If you’re looking at the ones from VMware (Fusion Pro, Fusion, Workstation & Player Pro) then you should know that the core technology in those is not only the same, but it’s the same as in vSphere- the solution that powers many of the world’s most in-demand and high performance […]]>...
|
|
|
Full View / NID: 55023 / Submitted by: The Zilla of Zuron
|
|
In explaining the inexplicable, high-profile cyber security threats impacting United Airlines, The New York Stock Exchange, The Wall Street Journal and The Office of Personnel Management security industry experts and media pundits have used terms like ‘glitches’, ‘outages’ and ‘gremlins’. For most these labels were just as useful as the descriptions offered for the occurrences, […]
|
|
|
Full View / NID: 55022 / Submitted by: The Zilla of Zuron
|
|
Computing cores aren’t getting faster. Rather processors are getting more parallel. This has been the trend for the last decade, and is likely to continue. If you’re a researcher, you can take advantage of parallel computing to accelerate your scientific application with OpenACC. It’s an approach that’s resulted in big leaps forward for many of… Read More
|
|
|
Full View / NID: 55021 / Submitted by: The Zilla of Zuron
|
|
London, 13 July, 2015 - GBG, the global leader in identity data intelligence, and CarSpring, the recently launched revolutionary online marketplace for pre-owned cars, have partnered to provide consumers with a completely new and secure method of buying a used car. CarSpring is using GBG's award-winning ID verification solution, ID3global, to get quick, accurate insight on both buyers and sellers - to ensure that they are who they say are. CarSpring, a Rocket Internet company,...
Source: RealWire
|
|
|
Full View / NID: 55019 / Submitted by: The Zilla of Zuron
|
|
Move expands Capsule's international partner network LONDON, July 13 , 2015 - Capsule Technologie, the leading global provider of medical device integration solutions, today announced it has signed a reseller agreement with InterSystems, a global leader in software for connected healthcare. Under the terms of the agreement, InterSystems will be authorized to resell Capsule's SmartLinx Medical Device Information System® (MDIS). The two companies' partnership stems from a shared vision of connected care and strong global...
Source: RealWire
|
|
|
Full View / NID: 55018 / Submitted by: The Zilla of Zuron
|