Summit Press
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Automated Analysis of Speculation Windows in Spectre Attacks
Barbara Gigerl Automated Analysis of Speculation Windows in Spectre Attacks MASTER'S THESIS to achieve the university degree of Diplom-Ingenieurin Master's degree programme: Software Engineering and Management submitted to Graz University of Technology Supervisor: Daniel Gruss Institute for Applied Information Processing and Communication Graz, May 2019 i AFFIDAVIT I declare that I have authored this thesis independently, that I have not used other than the declared sources/resources, and that I have explicitly indicated all material which has been quoted either literally or by content from the sources used. The text document uploaded to TUGRAZonline is identical to the present master's thesis. Date Signature EIDESSTATTLICHE ERKLARUNG¨ Ich erkl¨arean Eides statt, dass ich die vorliegende Arbeit selbstst¨andig verfasst, andere als die angegebenen Quellen/Hilfsmittel nicht benutzt, und die den benutzten Quellen w¨ortlich und inhaltlich entnommenen Stellen als solche kenntlich gemacht habe. Das in TUGRAZonline hochgeladene Textdokument ist mit der vorliegenden Masterarbeit identisch. Datum Unterschrift Abstract Speculative execution is a feature integrated into most modern CPUs. Although intro- duced as a way to enhance the performance of processors, the release of Spectre attacks showed that it is a significant security risk. Since CPUs from various vendors, includ- ing Intel, AMD, ARM, and IBM, implement speculative execution, all different kinds of devices are affected by Spectre attacks, for example, desktop PCs and smartphones. Spectre attacks exploit the branch prediction mechanisms of the CPU and then use a cache covert channel to leak secret data. Several attack variants have been discovered since the release, including Spectre-PHT which targets the Pattern History Table of the CPU. -
NVIDIA's New Ampere Data Center GPU in Full Production
NVIDIA’s New Ampere Data Center GPU in Full Production New NVIDIA A100 GPU Boosts AI Training and Inference up to 20x; NVIDIA’s First Elastic, Multi- Instance GPU Unifies Data Analytics, Training and Inference; Adopted by World’s Top Cloud Providers and Server Makers GTC 2020 -- NVIDIA today announced that the first GPU based on the NVIDIA® Ampere architecture, the NVIDIA A100, is in full production and shipping to customers worldwide. The A100 draws on design breakthroughs in the NVIDIA Ampere architecture — offering the company’s largest leap in performance to date within its eight generations of GPUs — to unify AI training and inference and boost performance by up to 20x over its predecessors. A universal workload accelerator, the A100 is also built for data analytics, scientific computing and cloud graphics. “The powerful trends of cloud computing and AI are driving a tectonic shift in data center designs so that what was once a sea of CPU-only servers is now GPU-accelerated computing,” said Jensen Huang, founder and CEO of NVIDIA. “NVIDIA A100 GPU is a 20x AI performance leap and an end-to-end machine learning accelerator — from data analytics to training to inference. For the first time, scale-up and scale-out workloads can be accelerated on one platform. NVIDIA A100 will simultaneously boost throughput and drive down the cost of data centers.” New elastic computing technologies built into A100 make it possible to bring right-sized computing power to every job. A multi-instance GPU capability allows each A100 GPU to be partitioned into as many as seven independent instances for inferencing tasks, while third-generation NVIDIA NVLink® interconnect technology allows multiple A100 GPUs to operate as one giant GPU for ever larger training tasks. -
Defeating Invisible Enemies:Firmware Based
Defeating Invisible Enemies: Firmware Based Security in OpenPOWER Systems — Linux Security Summit 2017 — George Wilson IBM Linux Technology Center Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation Agenda Introduction The Case for Firmware Security What OpenPOWER Is Trusted Computing in OpenPOWER Secure Boot in OpenPOWER Current Status of Work Benefits of Open Source Software Conclusion Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 2 Introduction Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 3 Disclaimer These slides represent my views, not necessarily IBM’s All design points disclosed herein are subject to finalization and upstream acceptance The features described may not ultimately exist or take the described form in a product Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 4 Background The PowerPC CPU has been around since 1990 Introduced in the RS/6000 line Usage presently spans embedded to server IBM PowerPC servers traditionally shipped with the PowerVM hypervisor and ran AIX and, later, Linux in LPARs In 2013, IBM decided to open up the server architecture: OpenPOWER OpenPOWER runs open source firmware and the KVM hypervisor with Linux guests Firmware and software designed and developed by the IBM Linux Technology Center “OpenPOWER needs secure and trusted boot!” Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 5 The Case for Firmware Security Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 6 Leaks Wikileaks Vault 7 Year 0 Dump NSA ANT Catalog Linux Security Summit / Defeating Invisible Enemies / September 14, 2017 / © 2017 IBM Corporation 7 Industry Surveys UEFI Firmware Rootkits: Myths and Reality – Matrosov Firmware Is the New Black – Analyzing Past Three Years of BIOS/UEFI Security Vulnerabilities – Branco et al. -
Oracle Linux Unbreakable Enterprise Kernel (UEK 5) Cryptographic Module
FIPS 140-2 Non-Proprietary Security Policy Oracle Linux Unbreakable Enterprise Kernel (UEK 5) Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R7-5.0.0 Date: March 4th, 2021 Document Version 2.2 ©Oracle Corporation This document may be reproduced whole and intact including the Copyright notice. Title: Oracle Linux Unbreakable Enterprise Kernel Cryptographic Module Security Policy Date: March 4th , 2021 Author: Oracle Security Evaluations – Global Product Security Contributing Authors: Oracle Linux Engineering Acumen Security Oracle Corporation World Headquarters 2300 Oracle Way Austin, TX 78741 U.S.A. Worldwide Inquiries: Phone: +1.650.506.7000 Sales: 1-800-672-2531 www.oracle.com Copyright © 2021, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. Oracle specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may reproduced or distributed whole and intact including this copyright notice. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Oracle Linux Unbreakable Enterprise -
New Report: IT Market in China 2014-2018
May 11, 2015 03:31 EDT New Report: IT Market in China 2014- 2018 About IT IT is an integrated platform that includes hardware, software, and service solutions. An IT department of an organization is responsible for storing, protecting, processing, transmitting, and retrieving information. The role of the IT section in an organization is to integrate various business processes through hardware, software, and services solutions and smooth the flow of information and processes. IT also helps organizations to align their business processes with various other technologies. It is required to develop a safe and secure cyber environment, maintain a uniform flow of information, and help increase the revenue generation of an organization. Awareness of these benefits is leading several companies in China, the world's second largest economy, to invest heavily in IT. The rapid economic growth in the IT market in China has encouraged many business organizations to invest in the IT sector and contribute toward the development of IT infrastructure in the country. Our analysts forecast the IT market in China will grow at a CAGR of 10.62 percent over the period 2013-2018. Covered in this Report This report covers the present scenario and the growth prospects of the IT market in China for the period 2014-2018. The IT market in China is predominantly categorized into three segments: Hardware, Software, and Services. The report also covers the IT spending across key end-user segments and the market share analysis of the top vendors in the market. This report, IT Market in China 2014-2018, has been prepared based on an in- depth market analysis with inputs from industry experts. -
Foundation Overview February 2014
OpenPOWER Overview May 2015 Keith Brown Director, IBM Systems Technical Strategy & Product Security [email protected] http://openpowerfoundation.org/ © 2015 OpenPOWER Foundation What is the OpenPOWER Ecosystem? Cloud Software Existing ISV community of 800+ Standard Operating Open Environment Source All major Linux distros (System Mgmt) Software Communities Operating Open sourced Power8 System / KVM firmware stack New OSS Firmware OpenPOWER Resources for porting and Firmware Community optimizing on Hardware OpenPOWER OpenPOWERFoundation.org Technology 2 © 2015 OpenPOWER Foundation A Fast Start for OpenPOWER! The year • Collaborative solutions, standards, and reference designs available • Independent members solutions and systems ahead • Sector growth in technical computing and cloud • Global growth with increasing depth in all layers • Broad adoption across hardware, software, and end users 3 © 2015 OpenPOWER Foundation Fueling an Open Development Community 4 © 2015 OpenPOWER Foundation Critical workloads run on Linux on Power Web, Java Apps and Infrastructure Analytics & Research HPC applications for Life Sciences • Highly threaded • Compute intensive • Throughput oriented • High memory bandwidth • Scale out capable • Floating point • High quality of service • High I/O rates Business Applications Database • High quality of service • Handle peak workloads • Scalability • Scalability • Flexible infrastructure • High quality of service • Large memory footprint • Resiliency and security 5 © 2015 OpenPOWER Foundation IBM, Mellanox, and NVIDIA -
Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — Pocs Poised to Enter Full-Blown Production
Market Share Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — POCs Poised to Enter Full-Blown Production Ritu Jyoti Peter Rutten Natalya Yezhkova Ali Zaidi THIS IDC MARKET SHARE EXCERPT FEATURES IBM IDC MARKET SHARE FIGURE FIGURE 1 Worldwide Artificial Intelligence 2018 Share Snapshot Note: 2018 Share (%), Revenue ($M), and Growth (%) Source: IDC, 2019 July 2019, IDC #US45334719e IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market Share: Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — POCs Poised to Enter Full-Blown Production (Doc # US45334719). All or parts of the following sections are included in this excerpt: Executive Summary, Market Share, Who Shaped the Year, Market Context, Appendix and Learn More. Also included is Figure 1, Table 1 and 2. EXECUTIVE SUMMARY The artificial intelligence (AI) market experienced steady growth in 2018, growing 35.6% to $28.1 billion. As per IDC's Artificial Intelligence Global Adoption Trends and Strategies Survey of 2,473 organizations of various sizes across industries worldwide by those that are using artificial intelligence (AI) solutions, either developing them in-house, using COTS, or a combination of both: 18% had AI models in production, 16% were in the proof-of-concept (POC) stage, and 15% were experimenting with AI. While automation, business agility, and customer satisfaction are the primary drivers for AI initiatives, cost of the solution, lack of skilled personnel, and bias in data have held organizations from implementing AI broadly. In the past 12 months, organizations worldwide have used AI in IT operations, customer service and support, finance and accounting, and ecommerce with major redesign to their business processes to maximize the ROI of AI. -
12028871D1ac490693416e5b73
Global Research 7 September 2020 China Tech Sector Equities UBS A-share Conference 2020: Tech Company China Takeaways Technology Thompson Wu Analyst [email protected] UBS A-share Conference 2020 from 31 August to 2 September +886-28-722 7338 The UBS A-share Virtual Conference 2020 hosted over 90 corporates and over 550 Jimmy Yu investors during the three-day event. In the technology sector, we hosted a total of 21 Analyst companies including seven covered names and 14 non-rated names. Amongst these, S1460517080002 investors' most requested company meetings were Avary, Glodon, Han's Laser, [email protected] Hikvision, Shengyi, Shennan Circuit and USI. +86-21-3866 8880 Surveillance/Telecom gradually improving; Cloud demand remains solid Wendy Zhang Analyst Hikvision and Dahua's China business is gradually picking up in H220, in particular due S1460520040002 to enterprises' AI-solutions demand; however, overseas remains soft. Despite US Entity [email protected] List restrictions, both were comfortable with the localisation of their supply chains and +86-10-5832 8255 inventory preparations made in the past 12 months. FII was positive on US/China Cloud Zoe Xu companies' capex growth into 2021, plus share gains from its key customers. In Associate Analyst telecom, several companies highlighted a slowdown in 5G-related business due to [email protected] COVID-19 and the Huawei issue, but many expect improving demand in 2021. +852-2971 7724 Kayla Cai Huawei's impact on smartphone supply chain already felt; Apple ramping up Associate While most companies didn't want to comment on the impact of restrictions on [email protected] Huawei, most supply chain companies are more concerned now and it appears they +86-21-3866 8786 have seen a negative impact on procurement demand. -
Oracle for Linuxone and Linux on Z
Oracle for LinuxONE and Linux on Z Terry Ginther WW Data Serving SME, IBM LinuxONE [email protected] David Simpson Certified Oracle Database Specialist Advanced Technology Group (ATG) [email protected] Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. Chiphopper Db2* IBM* IBM Cloud MobileFirst S/390* z13* Cloud Paks GDPS* Ibm.com IBM Z* Power* Watson* z14* Cognos* HiperSockets IBM (logo)* Informix* Power Systems WebSphere* z/VM* * Registered trademarks of IBM Corporation Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. IT Infrastructure Library is a Registered Trademark of AXELOS Limited. ITIL is a Registered Trademark of AXELOS Limited. Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a worldwide basis. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. -
Linux and Open Source: the View from IBM
Linux @ IBM Linux and Open Source: The View From IBM Jim Elliott, Advocate, Strategic Growth Businesses IBM Canada Ltd. ibm.com/vm/devpages/jelliott SHARE Session 9200 February 28, 2005 © 2005 IBM Corporation Linux @ IBM Linux and Open Source: The View from IBM Session 9200 Linux and Open Source are game-changing technologies. Jim will provide a review of Linux and Open Source from IBM's point of view covering: – Overview, Value and Marketplace: A brief update on Linux and Open Source and the value to customers – Usage: How Linux and Open Source are being used by customers today and our view of the future – IBM and Open Source: How IBM is using Open Source software internally and IBM involvement in the Open Source community 2 SHARE Session 9200 February 28, 2005 Linux @ IBM Linux Overview, Value, and Marketplace “Linux will do for applications what the Internet did for networks.” Irving Wladawsky-Berger, IBM LinuxWorld, January 2000 SHARE Session 9200 February 28, 2005 © 2005 IBM Corporation Linux @ IBM Advancing Technology What if … ... everything is connected and intelligent? ... networking and transactions are inexpensive? ... computing power is unlimited? Adoption of Processor Storage Bandwidth Number of Interaction open standards speed networked costs devices 4 SHARE Session 9200 February 28, 2005 Linux @ IBM The road to On Demand is via Open Computing Open Source Open Architecture Open Standards 5 SHARE Session 9200 February 28, 2005 Linux @ IBM Open Source Software www.opensource.org What is Open Source? – Community develops, debugs, maintains – “Survival of the fittest” – peer review – Generally high quality, high performance software – Superior security – on par with other UNIXes Why does IBM consider Open Source important? – Can be a major source of innovation – Community approach – Good approach to developing emerging standards – Enterprise customers are asking for it 6 SHARE Session 9200 February 28, 2005 Linux @ IBM Freedom of Choice “Free software is a matter of liberty, not price. -
Huawei RH2488H V5 VS Servers of HPE, H3C, Lenovo, Dell, Inspur and Sugon
Huawei RH2488H V5 VS Servers of HPE, H3C, Lenovo, Dell, Inspur and Sugon Server Model Huawei RH2488H V5 Huawei RH2488 v5 HPE Proliant DL360 G10 Lenovo ThinkSystem HPE Proliant DL380 G10 Inspur NF8260 M5 Rack Server ---- Rack Server(2U)--- Server ---- Two-floor SR850 Server(2U) --- Server (2U) --- Single Server(2U) --- Two-floor Single-floor motherboard design Two-floor motherboard floor motherboard Two-floor motherboard design motherboard design design design motherboard design Advantages of Dell 1. Support two 1. Support two 1. Support two 1. Support two dual-width 1. NVDIMM support, low 1. Support two Servers dual-width GPU with dual-width GPU with dual-width GPU with GPU with multiple latency, high IO, data FPGA; multiple models; multiple models; multiple models; models; protection; 2. Maximum support 2. Support two FPGA; 2. Support two FPGA; 2. Support two FPGA; 2. Support two FPGA; 2. Support up to 2 24 x NVMe; 3. Up to support 24 x 3. Support front 3. Maximum support 24 x 3. Maximum support 24 x dual-width GPU or FPGA; 3. 8GB RAID card NVMe; hot-swap NVMe SSD, NVMe; NVMe; 3. Supports up to 24 x cache; 4. 8GB RAID card up to 24 x NVMe; 4. 8GB RAID card cache; 4. Support the application NVMe SSD 4. Max support 24 x cache; 4. 8GB RAID card 5. Max support 24 x 2.5" of 8180 CPU (205W) in 4. Efficient and 2.5" + 2 x 2.5" 5. Max support 24 x cache; + 2 x 2.5" SAP and HAN/A; automated server 2.5" + 2 x 2.5" 5. -
HARDWARE INNOVATION REVEAL Openpower Foundation Summit
HARDWARE INNOVATION REVEAL OpenPOWER Foundation Summit 2018 87 Solutions BPS-8201 Server The BPS-8201 is a High Density/Storage with IBM POWER8 Turismo SCM processor Platform , 2U/ (16) 3.5" SAS/SATA HDDs. System ADM-PCIE-9V3 - FPGA Accelerator Board—Latest FPGA accelerator board, is CAPI 2.0 and OpenCAPI enabled featuring a powerful Xilinx® Virtex® UltraScale+ ™ FPGA. The ADM-PCIE-9V3 is ideal for a variety of acceleration applications (Compute, Networking, Storage) packed Card into a small HHHL server friendly PCIe add-in card size. OpenCAPI FPGA Loop Back cable and OpenCAPI cable. These enable testing and OpenCAPI accelerators to be connected to standard PCIe while signaling to the host processor through sockets attached to the main system board. Cable Parallware Trainer aims to democratize access to HPC by providing sim- ple-to-use assistance in developing software for shared memory and accelerator technologies. Developed specifically to help software pro- grammers learn how to parallelise software, quickly and efficiently aids Software users in developing OpenMP and OpenACC enabled software. Escala E3-OP90 is an Open Power based server optimized for Deep Learning. The L3-OP90 features 2 Power9 sockets which are intercon- nected with up to 4 Nvidia Volta GPUs through NVlink 2.0. The architec- ture is designed for the implementation of large deep learning models System enabling highest levels of resolution / accuracy. HBA 9405W-16i Adapter—The x16 low-profile HBA9405W-16i is ide- al for high-performing, bandwidth-intense applications. The HBA enables internal communication to PCIe JBOFs and delivers the per- formance and scalability needed by critical applications such as video Card streaming, medical imaging and big data analytics.