Cloudflare Says Intel Is Not Inside Its Next-Gen Servers – Ice Lake

Total Page:16

File Type:pdf, Size:1020Kb

Cloudflare Says Intel Is Not Inside Its Next-Gen Servers – Ice Lake {* SERVERS *} Cloudflare says Intel is not inside its next-gen servers – Ice Lake melted its energy budget 64-core AMD Epycs win again as upgrade delivers performance boost without slurping more 'leccy Simon Sharwood, APAC Editor 15 Wed 1 Sep 2021 // 06:03 UTC Internet-grooming company Cloudflare has revealed that it was unable to put Intel inside its new home-brew servers, because they just used too much energy. A Tuesday post by platform operations engineer Chris Howells reveals that Cloudflare has been working on designs for an eleventh-generation server since mid-2020. "We evaluated Intel's latest generation of 'Ice Lake' Xeon processors," Howells wrote. "Although Intel's chips were able to compete with AMD in terms of raw performance, the power consumption was several hundred watts higher per server – that's enormous." Fatally enormous – Cloudflare's evaluation saw it adopt AMD's 64-core Epyc 7713 for the servers it deploys to over 200 edge locations around the world. Power savings also influenced a decision to go from three disks to two in the new design. A pair of 1.92TB Samsung drives replaced the three of the Korean giant's 960GB units found in previous designs. The net gain was a terabyte of capacity, and six fewer watts of power consumption. Howellls's post also reveals that testing produced data showing that equipping its servers with 512GB of RAM did not produce enough of a performance boost to justify the expense. The company has therefore settled on 384GB of memory, but did jump from DDR4-2933 to DDR4-3200 as the slight cost increase delivered a justifiable performance boost. • It's time to decentralize the internet, again: What was distributed is now centralized by Google, Facebook, etc • Don't rush to adopt QUIC – it's a slog to make it faster than TCP • Cloudflare slams AWS egress fees to convince web giant to join its discount data club Cloudflare stuck with Mellanox ConnectX-4 dual-port 25G Ethernet adapters. "We investigated higher-speed Ethernet, but we do not currently see this as beneficial," Howells wrote. That's not a brickbat for fast Ethernet, but a decision made possible by Cloudflare's highly distributed architecture that removes the need for higher speeds and the higher cost of faster kit. One change in the new servers is the use of OpenBMC to deploy firmware. "With access to the source code, we have been able to configure BMC features such as the fan PID controller, having BIOS POST codes recorded and accessible, and managing networking ports and devices," Howells wrote. "Whilst our current BMC is an industry standard, we feel that OpenBMC better suits our needs and gives us advantages such as allowing us to deal with upstream security issues without a dependency on our vendors. "Some opportunities with security include integration of desired authentication modules, usage of specific software packages, staying up to date with the latest Linux kernel, and controlling a variety of attack vectors." Howells rated Cloudflare's new servers as a refinement, rather than the "enormous" change between its ninth- and tenth-generation boxes that saw it go from dual-socket Intel servers to single-socket AMDs. But the refinement delivered a huge payoff: the ability to handle "approximately 29 per cent more requests than generation ten without an increase in power consumption". Howells's post states that Ampere's Arm servers also made its shortlist for eleventh-gen servers, and promised to reveal details of those designs in a future post. He also wrote that he and Cloudflare value ongoing competition between AMD and Intel, "and we look forward to seeing how Intel's next generation shapes up". Intel claims that new generation – named Sapphire Rapids – delivers a generational jump in performance and efficiency. Cloudflare's decision to go with AMD shows it needs to. ® SHARE 15 Comments MORE Amd Intel Cloudflare Corrections Send us news Imaginary numbers help AIs solve the very real problem of adversarial imagery Duke University boffins figure out a way to boost the security of recognition networks Gareth Halfacree Thu 2 Sep 2021 // 08:32 UTC Boffins from Duke University say they have figured out a way to help protect artificial intelligences from adversarial image-modification attacks: by throwing a few imaginary numbers their way. Computer vision systems which recognise objects are at the heart of a whole swathe of shiny new technologies, from automated shops to robotaxis. Increasingly broad deployment makes them increasingly of interest to ne'er-do-wells - and attacks like AMpLe Poltergeist show how they can be fooled with potentially deadly results. "We're already seeing machine learning algorithms being put to use in the real world that are making real decisions in areas like vehicle autonomy and facial recognition," said Eric Yeats, a doctoral student at Duke University, following the presentation of his team's work at the 38th International Conference on Machine Learning. "We need to think of ways to ensure that these algorithms are reliable to make sure they can't cause any problems or hurt anyone." CONTINUE READING AWS Tokyo outage takes down banks, share traders, and telcos Six-hour slump for Direct Connect caused by 'loss of networking devices' – we'll assume that means they broke, not that they fell behind a couch Simon Sharwood, APAC Editor Thu 2 Sep 2021 // 07:55 UTC The AP-NORTHEAST-1 region of Amazon Web Services, located in Tokyo, has endured six hours of sub-optimal performance. The cloud colossus's status report states that AWS Direct Connect hybrid cloud networking service had trouble connecting to resources in the region due to "failures in core networking devices". As of 15:30pm Pacific Time on September 1st — 7:30am in Tokyo — AWS said it was working to restore the services. CONTINUE READING Low code? No problem… just dodge these pitfalls This ebook that helps you avoid common mistakes as you embrace low- code David Gordon Thu 2 Sep 2021 // 07:30 UTC SPONSORED The low code movement offers some tantalizing benefits for businesses that must deliver ever more software, even as their existing development teams become ever more stretched. With development expertise in short supply, who wouldn’t consider an approach that promises to help leverage your team’s existing resources and get your code crunchers and business types working together in perfect harmony. Done right, low code can help you produce full-strength applications at ten or more times the speed of traditional environments, where deep experts in code are often siloed off from the very business units they’re supposed to be helping. Of course, not all low code platforms are created equal, and every business is different. But there are some common pitfalls that every organisation faces, and you can get a rundown on these, and strategies to circumvent them, in this handy ebook courtesy of our friends at Appian. CONTINUE READING Arm dismisses suggestion its Chinese JV has staged a 'heist' Remains worried about rogue CEO, but is unconcerned about China JV striking out in new directions Simon Sharwood, APAC Editor Thu 2 Sep 2021 // 06:59 UTC 1 Arm Ltd has dismissed an analyst's opinion that its Chinese joint venture has conducted a "heist" that has damaged the chip design firm's prospects in China. The heist allegation appeared in a post by Dylan Patel, chief analyst at an outfit named SemiAnalysis. The post is titled "The Semiconductor Heist Of The Century | Arm China Has Gone Completely Rogue, Operating As An Independent Company With Inhouse IP/R&D". The post revisits the odd situation at Arm China – known locally as An MouTechnology – which in June 2020 fired CEO Allen Wu. CONTINUE READING Google is designing its own Arm-based processors for 2023 Chromebooks – report Why not if you've got the money for it? Katyanna Quach Thu 2 Sep 2021 // 06:27 UTC 4 Google is reportedly designing its own Arm-based system-on-chips for Chromebook laptops and tablets to be launched in 2023. The internet search giant appears to be following the same path as Apple by developing its own line of processors for client devices, according to Nikkei Asia. Google earlier said its latest Pixel 6 and Pixel 6 Pro Android smartphones will be powered by a homegrown system-on-chip named Tensor. This component will be made up of CPUs and GPU cores licensed from other designers as well as Google’s own AI acceleration engine to boost machine-learning-based features, such as image processing and speech recognition. CONTINUE READING Can we talk about Kevin McCarthy promising revenge if Big Tech aids probe into January insurrection? 'A Republican majority will not forget' Iain Thomson in San Francisco Thu 2 Sep 2021 // 05:31 UTC 15 The Republican minority leader of the US House of Representatives this week issued a very public threat to cellphone networks and social media giants that were asked to cooperate with a congressional investigation into the storming of the Capitol in January. Kevin McCarthy (R-CA) warned "a Republican majority will not forget" if the corporations participate as asked in the probe, which is being conducted by a Democratic-led House select committee. That panel of lawmakers asked 35 companies, including Facebook, Google, Microsoft, Twitter and Signal, plus Verizon Wireless, AT&T, Sprint and T-Mobile US, to preserve their records of certain users' phone and computer activities between April 1, 2020, to January 31, 2021. CONTINUE READING Dissected: A dropper-as-a-service miscreants pay to push their malware onto potentially 1,000s of victims Sophos gazes into the abyss Gareth Corfield Thu 2 Sep 2021 // 04:27 UTC 3 A dropper-as-a-service, which cyber-crime newbies can use to easily get their malware onto thousands of victims' PCs, has been dissected and documented this week.
Recommended publications
  • Bringing the Openbmc for Platform Manage- Ment System in Telco Cloud
    Rongqiang Zhang Bringing the OpenBMC for Platform Manage- ment System in Telco Cloud Helsinki Metropolia University of Applied Sciences Master of Engineering Information Technology Master’s Thesis 30 Apr 2019 Abstract Rongqiang Zhang Author(s) Bringing the OpenBMC for Platform Man-agement System in Title Telco Cloud Number of Pages 88 pages + 0 appendices Date 30 Apr 2019 Degree Master of Engineering Degree Programme Information Technology Specialisation option Networking and Services Ville Jääskeläinen, Head of Degree Program Instructor(s) Zinaida Grabovskaia, PhL, Senior Lecturer Antti Koivumäki, Senior Lecturer Ari Helminen, Business Manager The current platform management system in Telco cloud infrastructure is based on closed firmware stack. With the upcoming 5G, this closed firmware stack has created several tech- nology and business problems. The major problems are hardware-software vendor lock-in, long lead time for feature development and bug fixing, and security risks. The objective of this study is to evaluate the possibility to bring an Open Source software stack for platform management system and baseboard management controller in Telco cloud. The study was divided into 3 parts. First part is to analyse the current state and project specification. Second part is to introduce and evaluate the OpenBMC, an open source soft- ware stack for the objective of this study. Third part is Proof of Concept to run OpenBMC on Telco. Keywords BMC, 5G, NFV, Redfish, Security Table of Contents Abstract List of Abbreviations 1 Introduction
    [Show full text]
  • Server Base Manageability Requirements 1.0 Platform Design Document Non-Confidential
    Arm® Server Base Manageability Requirements 1.0 Platform Design Document Non-confidential Copyright © 2020 Arm Limited or its affiliates. All rights reserved. Document number: DEN0069B Server Base Manageability Requirements Server Base Manageability Requirements Copyright © 2020 Arm Limited or its affiliates. All rights reserved. Release inormation The Change History table lists the changes made to this document. Table 1-1 Change history Date Issue Confidentiality Change 30 January 2020 A Non-Confidential Initial release, SBMR 1.0 15 June 2020 B Non-Confidential License LES-PRE-21585 Page 2 of 45 Copyright © 2020 Arm Limited or its affiliates. All rights reserved. DEN0069B 1.0 Server Base Manageability Requirements Arm Non-Confidential Document Licence (“Licence”) This Licence is a legal agreement between you and Arm Limited (“Arm”) for the use of the document accompanying this Licence (“Document”). Arm is only willing to license the Document to you on condition that you agree to the terms of this Licence. By using or copying the Document you indicate that you agree to be bound by the terms of this Licence. If you do not agree to the terms of this Licence, Arm is unwilling to license this Document to you and you may not use or copy the Document. “Subsidiary” means any company the majority of whose voting shares is now or hereafter owner or controlled, directly or indirectly, by you. A company shall be a Subsidiary only for the period during which such control exists. This Document is NON-CONFIDENTIAL and any use by you and your Subsidiaries (“Licensee”) is subject to the terms of this Licence between you and Arm.
    [Show full text]
  • OCP's Rack Manager Controller Subproject (Openrmc)
    OSF-OpenRMC OCP's Rack Manager Controller subproject (OpenRMC) John Leung, Principle Engineer Intel Corporation Han Wang, Senior Architect Inspur OpenRMC Overview OpenRMC OPENRMC • Goals and Motivation • Logistics and meetings Specifications Status • Reviewed of existing rack management implementations Embedded • Specifying interface and requirements Software • Received Code Contributions RMC for openEdge Platform to DC The OpenRMC Goals manager Specify the Rack Manager Controller service RMC Client interfaces • Northbound interface to datacenter manager (spec) Redfish • Southbound interface requirements to OCP Northbound Interface platforms in the rack Rack Manager Controller Deliver a Rack Manager implementation Service • Available as open source Southbound Interface OCP compliant hardware designs I2C IPMI Redfish • Handled by other OCP projects to OCP platforms Motivation for OpenRMC RMC Rack Mgr Service Controller 1. System Firmware (BIOS) 3 In-band • OCP System Firmware project SW OS 2. BMC Firmware Agent Out-of-band • OpenBMC governed by Linux Foundation (Redfish) 3. Rack Manager Software/Firmware BIOS CPU NIC 1 • OCP OpenRMC NC-SI BMC FW BMC 2 • With OpenBMC, the industry unified the various repositories in 2018 device other • With rack manager, OCP will provide a device source repository and prevent splintering Server The RMC can be hosted in various locations OpenRACK EIA, OpenRACK Olympus (within power shelf) (within switch) (standalone) Switch RMC FW Switch w/ RMC FW Switch Power Shelf w/ RMC FW Server Server Server Server
    [Show full text]
  • Openbmc Overview
    Andrew Geissler [email protected] What is a BMC? ▶ BMC – Baseboard Management Controller ▶ Separate uproc (eg. AST 2500) with dedicated RAM and Flash ▶ Provides ▶ System Power/thermal control ▶ Out of Band management ▶ IPMI, REST, etc ▶ Data collection ▶ Debug ▶ GUI and Command line ▶ Interfaces to Host/OCC ▶ System error logging ▶ Based on OpenEmbedded technologies built via Yocto ▶ Embedded Linux stack ▶ Linux Kernel 4.10….4.18, Yocto 2.3…2.6, python, SSH ▶ Applications communicate via D-Bus ▶ Users communicate via REST, IPMI and GUI ▶ Reports externally to management entity ▶ No customer network functional interaction What is the OpenBMC Project Free open source software management Linux distribution designed for the embedded environment … OpenPOWER Eco-system Enablement Industry Collaboration Quality Solutions Reduce Redundant Effort Openness -- provides proof of security Part of Linux Foundation What is OpenBMC ▶ 100% compatible with OpenPOWER Hostboot/Opal/OCC ▶ Aka BIOS ▶ https://github.com/open-power/op-build ▶ Can simply be a reference implementation ▶ Currently runs on… ▶ Barreleye, S822LC, S822LC For HPC, P8 Reference ▶ Witherspoon -- P9 AC922LC Power AI and CORAL ▶ P9 reference boards ▶ AST2400 and AST2500 BMC hardware Core Infrastructure of the OpenBMC Project Control the Functions in your OpenBMC… ▶ Built on Yocto-Linux ▶ YAML/XML input for system configuration Infrastructure at the ready ▶ Process management Systemd ▶ IPC via D-Bus ▶ External Interfaces via REST, IPMI, GUI ▶ Journaling for Trace/debug ▶ Code update ▶ Code
    [Show full text]
  • Openbmc Update
    OpenBMC Update Gunnar Mills IBM OpenBMC Overview OpenBMC Today Release Content Agenda Redfish on OpenBMC Community Forums Get Involved • Open Source Baseboard Management Controller (BMC) firmware • Linux Foundation Project • Companies with layers include: Arm, Aspeed, Facebook, Google, OpenBMC IBM, Intel, Inspur, Lenovo, Mellanox, Microsoft, Nuvoton, Qualcomm, Yado • Underlying technologies • Yocto Project • D-Bus • Systemd • 2014 - Out of a Facebook hackathon an open BMC firmware stack named OpenBMC History • 2015 - IBM collaborates with Rackspace on an open BMC firmware stack also named OpenBMC • These projects were similar in name and concept only • March 2018 - OpenBMC becomes a Linux Foundation Project converging • Technical steering committee formed to guide the project • Agreed upon path to a unified OpenBMC community Project Charter and Linux Foundation • Lightweight, flexible charter (five pages) • Apache 2.0 license for code contributions (with clause for exceptions) • CC BY 4.0 license for documentation • Requires execution of corporate or individual contributor license agreement to contribute • https://www.openbmc.org/wp- content/uploads/sites/62/2018/03/charter_op enbmc_02142018.pdf • Linux Foundation owns project trademarks, DNS registrant, and GitHub organization owner • Members • Brad Bishop (IBM) • Sai Dasari (Facebook) • Sagar Dharia (Microsoft) • James Mihm (Intel) Technical Steering • Supreeth Venkatesh (Arm) Committee • Nancy Yuen (Google) • Community contributions drive project direction • Provide resolution at last
    [Show full text]
  • Flatbed Design Specification DRAFT Revision 0.07 Author: Scott Mccauley (​[email protected]​) Author: Nate Klein (​Nxk@G
    Flatbed Design Specification DRAFT Revision 0.07 Author: Scott McCauley ([email protected]) ​ ​ Author: Nate Klein ([email protected]) ​ ​ Author: Bill Barry ([email protected]) ​ ​ Open Compute Project Flatbed Design Specification DRAFT ​•​ ​ 1. License Contributions to this Specification are made under the terms and conditions set forth in Open Web Foundation Contributor License Agreement (“OWF CLA 1.0”) by: Google, Inc. ​ You can review the signed copies of the applicable Contributor License(s) for this Specification on the OCP website at http://www.opencompute.org/products/specsanddesign ​ ​ Usage of this Specification is governed by the terms and conditions set forth in Open Web Foundation Final Specification Agreement (“OWFa 1.0”). You can review the applicable Specification License(s) executed by the above referenced contributors to this Specification on the OCP website at http://www.opencompute.org/participate/legal-documents/ Note: The following clarifications, which distinguish technology licensed in the Contribution License ​ and/or Specification License from those technologies merely referenced (but not licensed), were accepted by the Incubation Committee of the OCP: CONTRIBUTORS AND LICENSORS OF THIS SPECIFICATION MAY HAVE MENTIONED CERTAIN TECHNOLOGIES THAT ARE MERELY REFERENCED WITHIN THIS SPECIFICATION AND NOT LICENSED UNDER THE OWF CLA OR OWFa. THE FOLLOWING IS A LIST OF MERELY REFERENCED TECHNOLOGY: INTELLIGENT PLATFORM MANAGEMENT INTERFACE (IPMI) I2C TRADEMARK OF PHILLIPS SEMICONDUCTOR. SMBus OpenBMC REST API NC-SI ATX EPS12V MAX31790 (Maxim IC) TM4C129 (Texas Instruments) ISO1540 (Texas Instruments) PCA9548 (Texas Instruments, Phillips Semiconductor) TCA9555 (Texas Instruments, Phillips Semiconductor) LTC4316 (Linear Technology) ADUM1250 (Analog Devices) 24C04 EEPROM Molex Minifit Molex Microfit Tyco Connectivity 5499910-1 Molex 90130-1210 Samtec HW-TH series IMPLEMENTATION OF THESE TECHNOLOGIES MAY BE SUBJECT TO THEIR OWN LEGAL TERMS.
    [Show full text]
  • Redfish on Openbmc
    Redfish on OpenBMC Gunnar Mills IBM What is Redfish Getting Started with Redfish OpenBMC’s Redfish Implementation Agenda OpenBMC Releases Redfish Data Model Redfish Sessions Redfish Major Collections • Open industry standard specification for hardware management • Definition community-driven • Distributed Management Task Force (DMTF) • History • Redfish Forum created in 2014 • First Redfish specification Aug 2015 • Latest 2019.2 (3Q 2019) • 30 companies • Broadcom Inc., Cisco, Dell Inc., Ericsson AB, Hewlett Packard Enterprise, Intel Corporation, Lenovo, Supermicro, Vertiv, VMware Inc. What is • American Megatrends, Inc., ARM, Inc, Artesyn Embedded Technologies, Atosm, Cray, Inc., Eaton, Fujitsu, Google LLC, Huawei, IBM, Insyde Software Corp., Mellanox Technologies, Microchip Technology Inc., NetApp, New H3C Technologies Co., OSIsoft, LLC, Quanta Computer Inc, Solarflare Redfish? Communications, Toshiba Memory Corporation, Western Digital Corporation • First release focused on Servers • Intended to meet OCP Remote Machine Management requirement • Full server category: Rackmount, Blades, HPC, Racks, Etc • Replacement for IPMI-over-LAN • New specification every 4 months • Working with SNIA to cover more advanced Storage (Swordfish) • Working with The Green Grid & ASHRAE to cover Facilities (Power/Cooling) • Working with the IETF to cover some level of Ethernet Switching Redfish • RESTful API, HTTPS, JSON • Don’t invent anything new if robust solutions exist • Schema-backed but human-readable • OData (Open Data Protocol) • Usable by Apps,
    [Show full text]
  • Open Source Firmware @ Facebook
    Open Source Firmware @ Facebook David Hendricks: Firmware Engineer Andrea Barberio: Production Engineer • Open source initiatives • Problem statement Agenda • How we're using LinuxBoot at Facebook • systemboot and provisioning • Collaborations and partnerships Open Source @ Facebook • Facebook promotes open source • Systems Software: Kernel, CentOS, chef, systemd, etc. • Hardware: Open Compute Project, Telecom Infrastructure Project • Lots more: https://github.com/facebook and https://github.com/facebookincubator ...but there is a missing piece Any guesses? Open Source Firmware @ Facebook OpenBMC initially released in 2015 and is quickly becoming standard on OCP hardware System firmware is the next logical step Why open source firmware? Open Source Firmware @ Facebook Scoping out the problem That's a lot of servers (and switches, too!) ...and we're not just working on datacenters. Booting is hard • Ever-increasing amount of hardware • Many local/removable storage media and networking devices • Complex setup, complex protocols • Firmware has become an operating system • More demands for firmware security • Verified/secure boot, measured/trusted boot, attestation • Secure network protocols, crypto • Provisioning is hard Problems with closed firmware • Archaic, complex, often quite buggy • Even open firmwares are often unfamiliar and difficult to extend • Reactive instead of Proactive debugging • Hard to maintain, can't forward/backport features and fixes • Vendor-specific tools • "Dimensions" of supporting firmware at scale • Robustness, flexibility, debugging, build and deployment... Sustaining Operations • Firmware has impact across product lifecycle • Design, build, test, deploy, sustain, decommission • What we want: • Support many generations of equipment • Feature parity • Unified, adaptable toolkit • Must support many different use cases • Familiar / low barrier to entry How we're addressing the problem Why LinuxBoot • We use Linux..
    [Show full text]
  • Book Are Increasing by an Order of Magnitude Annually in Some Cases
    Contents A great conference for a great year! 2 Sponsors 3 A conference with a history 4 Keynote 6 Session 1 8 Session 2 14 Session 3 19 Session 4 26 ORNL staff form first-of-its-kind regional computing association 32 Dinner and a show 34 Data Challenge brings joy of discovery to participants, new insights to ORNL researchers 36 SMC presenter bios 38 SMC data challenges 44 1 A great conference for a great year! 2018 was a remarkable year for computing at Oak Ridge National Laboratory. Our Leadership Computing Facility celebrated its 25th anniversary and launched Summit, an IBM system that is currently the world’s fastest and most AI-compatible computer, marking the third time that ORNL has claimed the number one spot on the coveted TOP500 list; we acquired a vendor for our first exascale machine, Frontier, to be delivered in 2021; and we once again hosted the best and brightest from the computing and data worlds at the 2018 Smoky Mountains Conference in Gatlinburg, Tennessee. 2018’s theme, “the integration of experiment, data analytics, and modeling and simulation into instruments for discoveries in science and engineering,” proved a fertile one for discussion as our esteemed lineup of speakers brought us up to speed on the states of the art in both computing and big data. With more than 180 people registered, 15 great sponsors, and more Data Challenge participants than we have ever had, 2018 marked the biggest SMC on record. The conference has come a long way since its humble beginnings in 2003, when 45 participants descended on Fall Creek Falls in Pikeville, Tennessee.
    [Show full text]
  • Supreeth Venkatesh, Staff System Architect Arm Open System Firmware
    Open System Firmware Server Base Manageability Guide for SBSA Compliant Arm (AARCH64) Servers Supreeth Venkatesh, Staff System Architect Arm Agenda • Rationale • History • Introduction • Proof of Concept • Roadmap/Plan • Call to Action Rationale • Arm Ecosystem Partners value standardized common server manageability capabilities with scope for flexible customizations which add value to the end user. • Standardization is key to ensure that Arm Ecosystem does not get fragmented by point solutions that plague the industry today. • Leverage industry standard system management specifications including but not limited to Redfish, Platform Level Data Model (PLDM), Management Component Transport Protocol (MCTP) as defined by the Distributed Management Task Force (DMTF). • Leverage Hardware Management Specifications and designs as defined by Open Compute Group (OCP). History • Server Base System Architecture (SBSA) -Hardware system architecture for servers based on 64-bit ARM processors. -Standardizes processor element features and key aspects of system architecture. -http://infocenter.arm.com/help/topic/com.arm.doc.den0029b/Server_Base_System_Architecture_v5_0_ARM_DEN_0029B.pdf • Server Base Boot Requirements (SBBR) -Defines the Boot and Runtime Services expected by an enterprise platform Operating System or hypervisor, for an SBSA-compliant Arm AArch64 server. -Based on UEFI, SMBIOS and ACPI specifications. -http://infocenter.arm.com/help/topic/com.arm.doc.den0044c/Server_Base_Boot_Requirements_v1_1_Arm_DEN_0044C.pdf History • ARM Enterprise ACS -Architecture Compliance Suite tests SBSA and SBBR specifications. https://github.com/ARM-software/arm-enterprise-acs FWTS LuvOS SBBR SBSA SBSA SBBR PAL SCT UEFI TF-A FVP Arm Partner OSS Introduction • Server Base Manageability is a specification that is under development in conjunction with partners across the industry. • Together with SBSA and SBBR, the SBMG provides a standard based approach to building Arm servers, their firmware and their server management capabilities.
    [Show full text]
  • Versatile Configuration and Control Framework for Real Time Data Acquisition Systems
    Versatile Configuration and Control Framework for Real Time Data Acquisition Systems N. Karcher, R. Gebauer, R. Bauknecht, R. Illichmann, O. Sander Abstract—Modern physics experiments often utilize FPGA- and calibration tasks can be handled in software. Quicker based systems for real-time data acquisition. Integrated analog implementation time and features such as advanced arithmetic electronics demand for complex calibration routines. Further- support with hardware division or floating-point calculations more, versatile configuration and control of the whole system is a key requirement. Beside low-level register interface to the FPGA, come in handy for these tasks. Also, remote monitoring also access to I2C and SPI buses is often needed to configure the and control access to DAQ systems is mandatory for larger complete system. Calibration through an FPGA is inflexible and experiments that can contain dozens of such platforms and yields a complex hardware implementation. On the contrary, measure over a longer time period. calibration through a remote system is possible but considerably We designed and implemented a versatile control framework slower due to repetitive network accesses. By using SoC-FPGA solutions with a microprocessor, more sophisticated configuration for DAQ systems based on heterogeneous MPSoCs. Our devel- and calibration solutions, as well as standard remote access opment primarily targets the application domains concerning protocols, can be efficiently integrated in software. the readout of superconducting sensors and quantum bits. Based on Xilinx Zynq US+ SoC-FPGAs, we implemented a Both fields need highly customized FPGA processing due versatile control framework. This software framework offers a to performance and latency requirements. At the same time, convenient access to the hardware and a flexible abstraction via remote-procedure calls (RPCs).
    [Show full text]
  • Bridging The
    VERTIV WHITEPAPER Bridging the Gap From OpenBMC to Commercial Embedded Management Technology The IT industry is experiencing a major shift in platform State of OpenBMC management technology. Over the past decade, IT device manufacturers and service providers have struggled with the OpenBMC is built on a standard Linux distribution that challenges of managing datacenters with non-standard, simplifies integration and porting to different offerings. Many proprietary Baseboard Management Controller (BMC) firmware. modular components are available that allow developers to Customers who rely on these assets to run their business were build a BMC solution and create advanced management often left frustrated because they had insufficient control over features. With support for OpenBMC coming largely from their datacenters. With BMC failures being one of the largest Facebook, Microsoft, Google, and IBM, the solution in the factors in datacenter reliability, customers had to rely community addresses the requirements for cloud-scale server completely on third-party BMC firmware providers. This often management. However, today’s embedded management resulted in poor reliability, costly schedules, lack of landscape spans across the entire IT infrastructure, across customization, slow issue resolution, and feeling vulnerable to multiple CPU architectures, and has a range of custom security threats at any given time. Furthermore, businesses features tailored to various customer segments. As the who wanted standardize methods of managing IT platforms OpenBMC community evolves, we will see its usability were relegated to inconsistent and non-standard vendor expanded across a broad range of platforms and segments. implementations of Intelligent Platform Management Interface Supporters of OpenBMC understand the limitations of (IPMI) which did little to address external security concerns.
    [Show full text]