Page 145«..1020..144145146147..150160..»

WhatsApp encryption isn’t the problem, metadata is – TechRadar

Once again, WhatsApp is under scrutiny for allegedly putting the data of its over two billion users at risk. Two distinctalthough entwinedstories made headlines lately and likely make you fear for your privacy.

Let's go with order. On May 22, 2024, The Intercept disclosed the content of an internal threat assessment in which WhatsApp engineers discussed some vulnerabilities that could enable government agencies to "bypass our encryption."

Three days later, it was the time for billionaire Elon Musk to take the stage, claiming from his X account that the popular messaging app "exports your user data every night."

In both instances, the Head of WhatsApp Will Cathcart turned to the social media platform to clarify such allegations. He's right about somethingWhatsApp encryption is secure and your messages are completely private. However, the two stories aren't about encryption but metadata. They aren't just about WhatsApp either, but there may be still something you can do about itlike using the best VPNs and other tricks to minimize the risk.

WhatsApp uses end-to-end encryption to protect your communications. It does so by scrambling the data into an unreadable form so that no one outside the sender and receiver can access it, not even Meta itself. At the same time, though, it regularly collects some seemingly less important details attached to your messaging activitiesmetadata.

This information includes IP addresses, phone numbers, who you have spoken with, and when, among others. It may not look so important, but even such small digital traces can act as identifiers. For instance, it was exactly a piece of metadataa Proton Mail recovery emailthat led to the arrest of a Catalan activist.

As for WhatsApp's Privacy Policy, the app records a wealth of usage logs including "the time, frequency, and duration of your activities and interactions." Other identifiable data such as your network details, the browser you use, ISP, and other identifiers linked to other Meta products (like Instagram and Facebook) associated with the same device or account are also collected.

Sign up for breaking news, reviews, opinion, top tech deals, and more.

WhatsApp logs your IP address when you use the service, too. That's interesting because your IP can be used to track down your location. As the company explained, even if you keep the location-related features off, IP addresses and other collected information like phone number area codes can be used to estimate your "general location."

WhatsApp is required by law to share this information with authorities during an investigation. Law enforcement will analyze the data to find patternsand that's something out of WhatsApp's control. "Even assuming WhatsApps encryption is unbreakable," the company memo revealed by The Intercept reads, "ongoing collect and correlate attacks would still break our intended privacy model."

The flaw that could bypass encryption is then linked to "ongoing exploitation of traffic analysis vulnerabilities." Again, the metadata. This is nothing new, though, and the company clearly states it in its policy.

Did you know?

While WhatsApp has been aware of this threat since last year, The Intercept reveals it became a contentious point inside the company after April's revelations that Israels army allegedly uses a data-centric AI tool known as Lavender to automatically choose their targets.

So, why are WhatsApp engineers worried about it just now?

The issue is that surveillance techniques are getting always more sophisticated. WhatsApps internal security team identified many instances of so-called correlation attacks where a smarter analysis of encrypted datalinked to its very much visible metadata counterpartcan evade the app's privacy protections.

Worse still, the same types of tracking, they note, work against other similar messaging apps as well.

"Todays messenger services werent designed to hide this metadata from an adversary who can see all sides of the connection," Matthew Green, a professor of cryptography at Johns Hopkins University, told The Intercept. "Protecting content is only half the battle. Who you communicate [with] and when is the other half."

Although very different in nature, also Musk's allegation refers to metadata. This time to be under scrutiny is how Meta itself uses these precious details for commercial purposes.

Again, this is clearly stated in WhatsApp's privacy policy and terms of use. "We may use the information we receive from [other meta companies], and they may use the information we share with them, to help operate, provide, improve, understand, customize, support, and market our Services and their offerings," reads the policy.

This means that yes, your messages are always private, but WhatsApp is actively collecting your metadata to build your digital persona across other Meta platforms. Let's face it, how many of us have an Instagram or Facebook account?

The threat level is clearly way different between the two stories. Yet, so-called surveillance capitalism de facto undermines your privacy and security as it enables much more effective targeted advertising, third-party attacks, and even political manipulation in some instancesthink of the Cambridge Analytica scandal, for example.

The good news is that, despite how difficult it is, there are still options to cut some ties from this invasive business model.

As we have seen, strong encryption isn't enough to truly protect your communications and identity online. Another stark reminder that metadata matters, too. In case you still want to keep using your WhatsApp account, there are a few steps you can take to minimize the amount of metadata collected.

For starters, I suggest using VPN software every time you access WhatsApp. A VPN, short for virtual private network, is a tool that spoofs your real IP address. This means that you'll be able to, at least, hide this piece of metadata and make it a bit more difficult to trace back your location. A WhatsApp VPN is also vital to use the app in countries where is banned.

I also recommend turning on WhatsApp's advanced privacy feature to minimize data collection. For example, starting from last year the app lets you hide your IP during calls. To turn on the option head to the Settings tab, click on Privacy, and then Advanced. Likewise, you can opt to disable link previews to avoid sharing your IP with third-party websites. You should also manage the app permissions accordingly to allow WhatsApp to collect only essential details. This means you should turn off all optional features like your precise location.

While these steps can help reduce the amount of metadata collected, it's crucial to bear in mind that it's impossible to completely avoid metadata collection on the Meta-owned app. Most importantly, perhaps, you cannot escape cross-platform tracking in case you're using other social media platforms from the group.

For extra privacy and security, I suggest switching to the more secure messaging app Signal. Completely open-sourced, it means that everyone can check out its code for vulnerabilities.

Signal is owned by the Signal Technology Foundation, a registered non-profit that's very vocal against surveillance capitalism methods. As its Terms of Service reads, "Signal does not sell, rent or monetize your personal data or content in any wayever."

In February, Signal officially abandoned phone numbers (the only identifiable data the app required to create an account) in the name of privacy. Most importantly, Signal has been implementing a technology known as Sealed Sender since 2018 to protect your metadata. It's worth mentioning, though, that some experts found some flaws in this system but it's arguably still a step forward in the right direction.

Read more here:
WhatsApp encryption isn't the problem, metadata is - TechRadar

Read More..

Global Banking Encryption Software Market size is expected – openPR

Banking Encryption Software Market

The global banking encryption software market is experiencing significant growth, driven by the increasing need for robust security measures to protect sensitive financial data. Financial institutions are investing heavily in advanced encryption technologies to safeguard against cyber threats and comply with stringent regulatory requirements. The adoption of digital banking services and the rising incidences of data breaches further underscore the importance of encryption software in the banking sector. As a result, the market is poised for continued expansion, with innovations in encryption methods and the integration of artificial intelligence expected to enhance security capabilities.

Global Banking Encryption Software Market Scope and Methodology:

The scope of the global banking encryption software market encompasses a comprehensive analysis of encryption solutions tailored specifically for the banking sector. This includes software designed to encrypt sensitive data such as customer information, financial transactions, and communication channels across various banking operations. Methodologically, market research involves gathering data from primary and secondary sources, including industry experts, financial reports, regulatory bodies, and market intelligence firms. The analysis encompasses factors such as market size, growth trends, competitive landscape, regulatory environment, and technological advancements driving the adoption of encryption software in banking. Additionally, qualitative insights from interviews and surveys with key stakeholders contribute to a holistic understanding of market dynamics and future prospects.

Click here for free sample + related graphs of the report @https://www.maximizemarketresearch.com/request-sample/189648

Global Banking Encryption Software Market Regional Insights

Regional insights into the global banking encryption software market reveal varying levels of adoption and regulatory frameworks across different geographical areas. North America, being a mature market with stringent data protection regulations such as GDPR in Europe and CCPA in the United States, exhibits a robust demand for encryption software among banking institutions. The region's strong emphasis on cybersecurity and the presence of key market players contribute to its dominance in the global market. In contrast, emerging economies in Asia-Pacific, such as China and India, are experiencing rapid growth driven by increasing digitalization and rising cybersecurity concerns. Government initiatives to strengthen data protection laws and encourage the adoption of encryption technologies further fuel market expansion in these regions. Additionally, the Middle East and Africa are witnessing growing awareness regarding the importance of data security in banking operations, driving investments in encryption software solutions to mitigate cyber risks. Overall, regional insights provide valuable perspectives on market dynamics, enabling stakeholders to tailor their strategies according to specific geographical nuances and regulatory requirements.

If you have any Inquiry please click here @:https://www.maximizemarketresearch.com/inquiry-before-buying/189648

Global Banking Encryption Software Market Segmentation

by Deployment Mode

Cloud-based On-premises

by Encryption Type

Symmetric Encryption Asymmetric Encryption Hashing Algorithms

by Application

Data Protection Secure Communication Payment Encryption Digital Identity Management

by End-User

Retail Banks Commercial Banks Investment Banks Other financial institutions

Unlock your exclusive sample PDF now!:https://www.maximizemarketresearch.com/request-sample/189648

Global Banking Encryption Software Market Key Players

Symantec Corporation (United States) Cisco Systems, Inc. (United States) Microsoft Corporation (United States) McAfee, LLC (United States) Sophos Group plc (United Kingdom)

For more information about this report visit: https://www.maximizemarketresearch.com/market-report/banking-encryption-software-market/189648/

Key questions answered in the Global Banking Encryption Software Market are:

What are the upcoming industry applications and trends for the Global Banking Encryption Software Market? What are the recent industry trends that can be implemented to generate additional revenue streams for the Global Banking Encryption Software Market? Who are the leading companies and what are their portfolios in Global Banking Encryption Software Market? What segments are covered in the Global Banking Encryption Software Market? Who are the key players in the Global Banking Encryption Software market? Which application holds the highest potential in the Global Banking Encryption Software market? What are the key challenges and opportunities in the Global Banking Encryption Software market? What is Global Banking Encryption Software? What was the Global Banking Encryption Software market size What will be the CAGR at which the Global Banking Encryption Software market will grow? What is the growth rate of the Global Banking Encryption Software Market? Which are the factors expected to drive the Global Banking Encryption Software market growth? What are the different segments of the Global Banking Encryption Software Market? What growth strategies are the players considering to increase their presence in Global Banking Encryption Software?

Key Offerings:

Past Market Size and Competitive Landscape Past Pricing and price curve by region Market Size, Share, Size & Forecast by different segment Market Dynamics - Growth Drivers, Restraints, Opportunities, and Key Trends by Region Market Segmentation - A detailed analysis by segment with their sub-segments and Region Competitive Landscape - Profiles of selected key players by region from a strategic perspective Competitive landscape - Market Leaders, Market Followers, Regional player Competitive benchmarking of key players by region PESTLE Analysis PORTER's analysis Value chain and supply chain analysis Legal Aspects of Business by Region Lucrative business opportunities with SWOT analysis Recommendations

More Related Reports:

LED Lighting Market https://www.maximizemarketresearch.com/market-report/global-led-lighting-market/15214/

Medical Electronics Market https://www.maximizemarketresearch.com/market-report/medical-electronics-market/13747/

LPG Market https://www.maximizemarketresearch.com/market-report/global-lpg-market/116743/

Global Heated & Climate Controlled Seats Market https://www.maximizemarketresearch.com/market-report/global-heated-climate-controlled-seats-market/79275/

B2B Enterprise & Industrial Wearables Market https://www.maximizemarketresearch.com/market-report/global-b2b-enterprise-industrial-wearables-market/99211/

Contact Maximize Market Research:

MAXIMIZE MARKET RESEARCH PVT. LTD. 3rd Floor, Navale IT park Phase 2, Pune Banglore Highway, Narhe Pune, Maharashtra 411041, India. +91 9607365656 mailto:sales@maximizemarketresearch.com https://www.maximizemarketresearch.com

About Maximize Market Research:

Maximize Market Research is one of the fastest-growing market research and business consulting firms serving clients globally. Our revenue impact and focused growth-driven research initiatives make us a proud partner of majority of the Fortune 500 companies. We have a diversified portfolio and serve a variety of industries such as IT & telecom, chemical, food & beverage, aerospace & defense, healthcare and others.

This release was published on openPR.

Read the rest here:
Global Banking Encryption Software Market size is expected - openPR

Read More..

Project Horizon Achieves Major Milestone with Full Encryption – elblog.pl

Project Horizon, a forward-thinking initiative still under considerable development, has recently cleared a significant technical challenge. The developers have successfully implemented full encryption, ensuring a secure foundation for their endeavor. Although decentralized artificial intelligence remains a novel and complex feat with no known successful creation to date, global efforts are continuously being pursued.

One of the latest advancements in the technological sphere comes from the realm of cryptocurrency trading. Mosaic Alpha, a pioneering trading platform in the crypto domain, counts Vidkovics Attila among its founding members. Attila, an innovator and thought leader, shared valuable insights during a conversation with Andor-Tth Anna in the Kriptoverzum segment shedding light on the intricacies and developments within the competitive landscape of digital currencies and decentralized technologies.

The breakthroughs and discussions surrounding Project Horizon and platforms such as Mosaic Alpha highlight the dynamic nature of tech industries, where encryption and decentralized systems are setting new standards for privacy and autonomy in the digital age. As pioneers in the space bridge theoretical complexities with tangible solutions, the future of secure and decentralized digital infrastructure looks increasingly promising.

Key Questions & Answers Related to Project Horizons Encryption Milestone:

Q: What is the significance of full encryption for Project Horizon? A: Full encryption is crucial for any digital project as it ensures the confidentiality and security of data. For Project Horizon, it means that any information or transaction within the system cannot be accessed or deciphered by unauthorized parties, which is especially important for a project involving decentralized artificial intelligence.

Q: Are there any specific challenges associated with implementing full encryption in a decentralized AI context? A: One of the main challenges is balancing security with performance. Encryption can sometimes slow down processes, which could be a significant factor when dealing with complex AI computations that require speed and efficiency. Additionally, the decentralized nature of the project adds complexity to the encryption protocols, as these need to be robust enough to secure data across a potentially vast and disparate network.

Advantages and Disadvantages of Full Encryption:

Advantages: Enhanced Security: Full encryption greatly reduces the risk of data breaches or unauthorized access, which is essential for maintaining the privacy and protection of users information. Trust: It builds trust among users and investors, as it demonstrates a commitment to safeguarding data integrity and securing communications. Compliance: Full encryption helps in meeting various regulatory requirements that mandate the protection of sensitive data.

Disadvantages: Complexity: Implementing robust encryption can add complexity to the development process, potentially increasing the time and cost to market. Performance Impact: Encryption algorithms can impact system performance, potentially slowing down operations which could be critical in time-sensitive applications. Management: Managing keys and encryption protocols can be challenging, especially as the system scales and evolves.

Related Discussions and Controversies:

Theres an ongoing discussion on the trade-off between security and usability with full encryption. While some argue that security should never be compromised, others believe that too much security might make the system less user-friendly, potentially hindailing adoption rates. Moreover, controversies around encryption often revolve around the inability of law enforcement agencies to access encrypted data, even when they have legitimate reasons.

For more information on encryption and decentralized technologies, you may refer to The Electronic Frontier Foundation for a broad overview of digital privacy issues. For insights into cryptocurrency trading platforms and trends like those discussed by Mosaic Alpha, an authoritative source would be CoinDesk. Please note that links should be verified for accuracy before use, as they might change over time.

See the original post here:
Project Horizon Achieves Major Milestone with Full Encryption - elblog.pl

Read More..

What Is The Genesis Block? History, Purpose And Mysteries, Explained – CCN.com

Key Takeaways

Blockchain technology is an attempt to create a public ledger using a decentralized system that records transactions across many computers so that the record cannot be altered retroactively.

A blockchain is a distributed ledger that maintains a list of records documented in blocks. Each block is cryptographically linked to the block that comes before and after. A block stores a cryptographic hash of the previous block using the timestamp and transaction data. This means that because all blocks are inherently connected neither can be changed without changing prior blocks.

Transparency and trust in the network, without the need for a central authority, are the result of this cryptographic connection of blocks. Essentially this means that at the time of this article, we are on block 846474 and this block is connected to the very first block, also known as the genesis block.

The genesis block, also known as Block 0, is the very first block created in a blockchain network. For Bitcoin, it was mined by the mysterious creator, Satoshi Nakamoto, on January 3, 2009. This block is unique because it does not reference any previous block, establishing the initial point of the blockchain.

The Bitcoin genesis block not only kick started the Bitcoin network but embedded within the block held a significant message:

The Times 03/Jan/2009 Chancellor on brink of second bailout for banks. Satoshi Nakamoto

It is believed that this cryptic message was made to serve as a timestamp for Bitcoin and a commentary on the financial instability that Bitcoin aimed to address. The genesis block laid the groundwork for the blockchains immutable ledger, making sure all subsequent transactions and blocks are built on this foundation.

The Bitcoin genesis block was mined during a time of the great recession, following the 2008 financial crisis. Block zeros creation by Satoshi started a revolutionary concept of a peer-to-peer electronic cash system, aiming to offer an alternative to traditional banking and financial systems that are reliant on centralized entities prone to failure.

The pseudonymous creator of Bitcoin, Satoshi Nakamoto, mined the genesis or first block created on the Bitcoin blockchain. Nakamotos identity remains unknown and by creating the genesis block, Nakamoto not only initiated the Bitcoin network but set a precedent for decentralized finance.

The act of mining the genesis block was a monumental moment, symbolizing the launch of a new era in digital money and the concept of blockchain technology.

The Bitcoin genesis blocks embedded message The Times 03/Jan/2009 Chancellor on brink of second bailout for banks. was a cryptic message that metaphorically positioned Bitcoin as the antidote to the economic conditions that laid ahead of it, reflecting the financial crisis and the subsequent bailouts of banks in 2008.

This message highlights the motivation behind Bitcoins immaculate creation to offer a decentralized and transparent alternative to the existing financial system, free from the control and failures of central authorities.

The Bitcoin genesis block is a uniquely produced structure containing several key elements being; a version number, a timestamp, the previous block hash (which is all zeros for the genesis block), a Merkle root (a hash of the root of the Merkle tree of all transactions in the block), the difficulty target, a nonce, and the block reward.

One of the main differences between the genesis block and subsequent blocks is the absence of a previous block reference. The genesis blocks previous block hash field is set to all zeros, illustrating that there is no block which comes before block zero. This unique aspect distinguishes block zero as the starting point of the entire Bitcoin blockchain.

Another significant difference is the hardcoded nature of the genesis block in the blockchain code. Unlike other blocks that are dynamically generated through mining processes, the genesis block is explicitly defined in the Bitcoin software. This hardcoding ensures that all nodes in the Bitcoin network start with the same initial block, providing a common foundation for the blockchain.

The hidden message in Bitcoins genesis block emphasized the instability and failures of traditional banking systems, leading cypherpunks and early adopters to view Bitcoin as a safer and more reliable store of value and compare it to digital gold.

Bitcoin was forever to become a global hedge against economic uncertainties and geopolitical risks, prompting investors to diversify portfolios and protect wealth. The message inspired the creation of numerous other cryptocurrencies.

The true identity of Satoshi Nakamoto, the creator of Bitcoin and the Bitcoin genesis block, remains one of the biggest mysteries in the crypto world. Various theories suggest Nakamoto could be an individual or a group of people.

Some speculate that prominent figures in cryptography or early Bitcoin developers might be Nakamoto. Despite numerous claims and investigations, Nakamotos identity remains unidentified, adding an element of intrigue and mystery to Bitcoins origins.

The Bitcoin genesis block and its embedded message symbolized an alternative future. Where fiat currencies are not the only option available to society. The message clearly had a profound impact on the cypherpunk community, reinforcing the ideals of decentralization, transparency, and financial freedom.

Finding the Bitcoin genesis block is quite straightforward using a blockchain explorer.

Genesis blocks are found in all blockchain networks, and each has a set of unique characteristics. For example, Ethereums genesis block, created by Vitalik Buterin and his team, was launched on July 30, 2015. Unlike Bitcoins genesis block, Ethereums genesis block did not contain a hidden message but laid the groundwork for smart contract functionality and decentralized applications.

Other blockchain networks also have distinctive genesis blocks.

For example, the Litecoin genesis block, created by Charlie Lee, launched on October 7, 2011, mirrors Bitcoins structure but with modifications to improve transaction speed and efficiency. Litecoins genesis block did not contain an embedded message.

The Bitcoin genesis block, mined by Satoshi Nakamoto on January 3, 2009, marks the start of blockchain technology and decentralized finance.

The first block has embedded, within it, a message citing a newspaper article in which the banks are receiving a bail out. The message laid the foundation for a new era of financial transparency, autonomy, and innovation.

The genesis block is referred to as block 0 in the Bitcoin blockchain.

The Genesis Block rule dictates that the first block in a blockchain has no predecessor.

The Bitcoin genesis block reward was 50 Bitcoin, although these coins are unspendable.

The Bitcoin genesis block was mined by Satoshi Nakamoto, but the identity of Nakamoto remains unknown.

Was this Article helpful? Yes No

See the article here:

What Is The Genesis Block? History, Purpose And Mysteries, Explained - CCN.com

Read More..

Next-Gen Computing: MiTAC and TYAN Launch Intel Xeon 6 Processor-Based Servers for AI, HPC, Cloud, and … – PR Newswire

TAIPEI, June 3, 2024 /PRNewswire/ --the subsidiary of MiTAC Holdings Corp.(TSE:3706), MiTAC Computing Technology and its server brand TYAN, the leading manufacturer in server platform design worldwide, unveil their new server systems and motherboards optimized for today's AI, HPC, cloud, and enterprise workloads at COMPUTEX 2024, Booth # M1120 in Taipei, Taiwan from June 4 to June 7. Harnessing the power of the latest Intel Xeon 6 processorand 4th and 5th Gen Intel Xeon Scalable processors, these solutions deliver cutting-edge performance.

"For over a decade, MiTAC has worked with Intel at the forefront of server technology innovation, consistently delivering cutting-edge solutions tailored for AI and high-performance computing (HPC). The integration of Intel's latest Xeon 6 processors into our MiTAC and TYAN server platforms transforms computational capabilities, significantly enhancing AI performance, boosting efficiency, and scaling cloud operations. These advancements empower our customers with a competitive edge through superior performance and optimized total cost of ownership," said Rick Hwang, President of MiTAC Computing Technology Corporation.

New MiTAC/TYAN servers with Intel Xeon 6: trusted performance and exceptional efficiencyIntel Xeon 6 introduces two classes of processors to meet diverse requirements. Featuring high memory bandwidth and rich I/O with up to 8 channels of DDR5, up to 64 lanes of CXL 2.0, and up to 88 lanes of PCIe 5.0, Intel Xeon 6700 with Efficient-cores (E-cores) deliver high core density and exceptional performance per watt, offering distinct advantages for cloud-scale workloads that demand high throughput. With exceptional memory bandwidth and I/O, Performance-cores (P-cores) excel in the widest range of workloads and provide better AI performance than other CPUs. Additionally, the built-in accelerators of P-cores give an additional boost to targeted workloads for greater performance and efficiency. E-cores and P-cores have a compatible architecture with a shared software stack and enjoy the support of the largest ecosystem of hardware and software vendors.

MiTAC presents two new dual-socket server platforms powered by Intel Xeon 6 processors. Tailored for HPC and AI workloads, TX86-E7148 (codenamed "Katmai Pass") is the follow-on model of Intel server D50DNP family that accommodates up to 4 computing modules within a 2U enclosure and supports both air and liquid cooling for different facility infrastructure. TX77A-E7142 (codenamed "Deer Creek Pass"), the follow-on model of Intel server M50FCP family, is a full-featured, performance-optimized platform made for data-intensive applications.

TYAN debuts three Intel Xeon 6-based server products at COMPUTEX. First up is the Thunder HX FT83B-B7149, a 4U dual-socket server platform designed for massive-parallel AI and HPC workloads. Featuring 32 DDR5 RDIMM slots and up to 8 double-width PCIe 5.0 x16 slots, FT83B-B7149 is a powerful platform for computing intensive AI and HPC applications. The next is Thunder CX GC73A-B5660, a single-socket 1U server accommodating 12 hot-swap NVMe U.2 drive bays, 2 standard PCIe 5.0 x16 and 2 OCP 3.0 mezzanine slots for on-prem. edge compute/storage applications. Lastly, TYAN presents the Tempest HX S5662, a single-socket AI server motherboard in standard CEB form factor built for multiple GPU cards deployment. It supports 8 DDR5 RDIMM slots, 5 PCIe 5.0 x16 slots, 2 NVMe M.2 slots, dual 25GbE and one GbE ports.

4th and 5th Gen Intel Xeon Scalable processor server platforms: meeting the growing needs of AI, HPC, and cloudIn July 2023, Intel transitioned the right to manufacture and sell products based on the Intel Data Center Solution Group (DSG) designs to MiTAC. Ever since then, MiTAC has dedicated itself to continuous investment in and support for the DSG product lineup. This year at COMPUTEX 2024, MiTAC unveils its DSG products. The Intel server D50DNP family, powered by 4th and 5th Gen Intel Xeon Scalable processors or the Intel Xeon CPU Max series, delivers exceptional computing performance, along with enhanced AI and in-memory analytics acceleration integrated into the processor. In the meantime, the Intel server M50FCP family delivers outstanding compute performance, high-speed I/O, and memory throughput for most of mainstream server applications.

TYAN also offers a diverse range of products supporting 4th and 5th Gen Intel Xeon Scalable processors. For deskside AI servers, TYAN introduces the Thunder HX FT65T-B5652, a rack-convertible, pedestal single-socket server platform designed for up to 4 double-slot GPU cards adoption.

TYAN provides several types of density servers for different workload requirement in space-constraint datacenters. The Thunder CX TD76-B5658 is a 2U enclosure accommodates 4 single-socket server nodes for high-density computing requirement; Thunder CX GC68A-B7136 is a 1U dual-socket server implementation with 16 DDR5 RDIMM slots and hybrid storage configuration; Thunder CX GC79A-B7132 is the other 1U dual-socket server provides up to 32 DDR5 RDIMM slots and all-flash configuration,

For mainstream 2U dual-socket storage servers, Thunder HX TS75A-B7132 and Thunder SX TS70A-B7136 are the two platforms providing high data IOPs with hybrid 2.5" drive configurations whereas Thunder SX TS70-B7136 is the other implementation for larger storage capacity requirement by having 12 3.5" hybrid drive bays. For cold data storage, Thunder SX TX88-B5652, a single-socket storage server featuring 24 3.5" SATA and 2 2.5" NVMe hot-swappable and tool-less drive bays, is recommended.

In addition to server systems, TYAN also showcases its 4th and 5th Gen Intel Xeon CPU-based industry standard motherboards at the booth. The highlighted products are Tempest HX S5652- an AI server board designed for deploying multiple GPU cards in CEB form factor and Tempest HX S7130, a mainstream dual-socket board supporting 5 PCIe 5.0 slots in EEB form factor.

Apart from the mentioned products, MiTAC and TYAN also provide other solutions to cater to various needs. One solution is the TYAN Thunder CX GX40-B5573, equipped with Intel Xeon E-2400 processors, tailored for cloud and on-premise computing. This 1U one-socket server system is designed for cost-effective edge computing, presenting an ideal option for small businesses. And, there's an O-RAN DU server presented by MiTAC: the WS1S11(Whitestone2). This DU server supports 4th Gen Intel Xeon Scalable processors with Intel vRAN boost and features IEEE1588 time sync, synchronous ethernet, onboard NIC for ORAN FH/MH, and dual -48VDC power input.

About MiTAC Computing Technology Corp.MiTAC Computing Technology Corp, a MiTAC Holdings Corp. (TSE:3706) subsidiary, specializes in cloud and edge computing solutions and has over 30 years of design and manufacturing expertise. With a strong focus on large-scale data centers, the company offers flexible and customized supply models for various systems and applications. Its product lineup includes TYAN servers, ORAN servers, high-performance AI servers, and data center products. Intel Datacenter Solutions Group (DSG) transited its business to MiTAC since July 2023, allowing MiTAC expanding its product offerings with cutting-edge total cost of ownership solutions for next-gen data center equipment.

MiTAC Computing Technology Corporationwebsite: http://www.mitacmct.com

MiTAC DSG website: https://datacentersolutions.mitacmct.com/

About TYANTYAN, as a leading server brand of MiTAC Computing Technology Corporation under the MiTAC Holdings Corp. (TSE:3706), designs, manufactures and markets advanced x86 and x86-64 server/workstation board technology, platforms and server solution products. Its products are sold to OEMs, VARs, System Integrators and Resellers worldwide for a wide range of applications. TYAN enables its customers to be technology leaders by providing scalable, highly-integrated, and reliable products for a wide range of applications such as server appliances and solutions for HPC, hyper-scale/data center, server storage, AI and security appliance markets. For more information, please visit TYAN's website at http://www.tyan.com or MiTAC Computing Technology Corporation website at http://www.mitacmct.com

Intel, the Intel logo, and other marks are trademarks of Intel Corporationor its subsidiaries.

SOURCE MiTAC Computing Technology Corporation

Continue reading here:
Next-Gen Computing: MiTAC and TYAN Launch Intel Xeon 6 Processor-Based Servers for AI, HPC, Cloud, and ... - PR Newswire

Read More..

TYAN Presents AMD EPYC Server Platforms Optimized for Data Center Compute Performance and Large-Scale AI … – PR Newswire

TAIPEI, June 4, 2024 /PRNewswire/ --COMPUTEX 2024 -- TYAN, an industry leader in server platform design and a subsidiary of MiTAC Computing Technology Corporation, brings its latest AMD EPYC server platforms to the COMPUTEX 2024, Booth # M1120 in Taipei, Taiwan from June 4 to June 7.

"With the advanced capabilities of 4th GenAMD EPYC Processors, TYAN's AMD EPYC server platforms deliver optimized performance for modern data centers and large-scale AI/HPC infrastructure, ensuring high energy efficiency and robust security," said Rick Hwang, President of MiTAC Computing Technology Corporation. "For the group of smaller businesses and dedicated hosters, TYAN offers AMD EPYC 4004 CPU-based servers that provide cost-effective, user-friendly solutions with enterprise-grade reliability, scalability, and security."

Innovative designs for diverse HPC, cloud-native computing, and generative AI workloadsHigh-performance and energy-efficient server platforms powered by the AMD EPYC 9004 series processoroffer innovative solutions for scaling data centers while prioritizing efficiency and TCO objectives. TYAN presents three models within its AI/HPC product segment. The Transport HX UT85A-B8267 is an 8U dual-socket server equipped with eight AMD Instinct MI300X Accelerators. It features eight 2.5" hot-swap NVMe U.2 tool-less drive trays and supports up to 9TB registered DDR5 memory, rendering it an optimal choice for advanced large-scale AI and HPC infrastructure. Following this is the Transport HX TN85-B8261, a 2U dual-socket GPU server engineered to elevate HPC and deep learning performance. It accommodates up to four dual-slot GPU cards, two half-height PCIe 5.0 x16 slots, 24 DDR5 RDIMM slots, and eight 2.5" hot-swap NVMe U.2 tool-less drive trays. Lastly, there's the Transport HX FT65T-B8050, a 4U pedestal single-socket GPU server featuring support for up to two high-performance GPU cards, eight DDR5 RDIMM slots, eight 3.5" SATA and two 2.5" NVMe U.2 hot-swap tool-less drive trays.

To meet the requirements of contemporary enterprises, cloud servers need to demonstrate exceptional scalability, reliability, performance, energy efficiency, support for virtualization, and robust network connectivity. The Transport CX TD76-B8058emerges as a 2U multi-node server housing four front-serviced nodes. It supports 16 DDR5 RDIMM slots, four hot-swap E1.S drive trays, two NVMe M.2 slots, one standard PCIe 5.0 x16 expansion slot, and one OCP 3.0 LAN mezzanine slot. Excelling in high-density data center deployment, front-end web servers, and various scale-out applications, it delivers adaptability across diverse settings. TYAN offers another streamlined solution, the Transport CX GC68C-B8056, a single-socket 1U server equipped with 24 DDR5 registered DIMM slots and 12 2.5" NVMe U.2 hot swap, tool-less drive bays, addressing the need for efficient and space-saving server solutions.

Optimized to streamline data I/O operations seamlessly between memory and storage elements within data centers, TYAN exhibits the Transport SX TS70-B8056and Transport SX TS70A-B8056, designed for cloud storage applications in a standard 2U form factor. The Transport SX TS70-B8056 houses 12 front 3.5" drive trays, accommodating up to four NVMe U.2 drives, alongside two rear 2.5" NVMe U.2 hot-swap, tool-less drive trays, ideal for storing large datasets. Meanwhile, the Transport SX TS70A-B8056, crafted for high IOPS storage requirements, features 26 2.5" NVMe U.2 hot-swap, tool-less drive trays.

An ideal balance between cost-effectiveness and high performanceTYAN's server platforms, featuring AMD EPYC 8004 series processors, are carefully designed for cloud and edge computing tasks, delivering both cost savings and energy efficiency. The TYAN Transport CX GC73A-B8046stands as a compact 1U server, equipped with 12 hot-swappable NVMe U.2 drive bays and the capacity to support a dual-slot GPU card, making it an excellent fit for AI inference, cloud gaming, and VDI applications. The platform also integrates DC-SCM to meet stringent server security requirements. Furthermore, TYAN offers the Tomcat HX S8040and Tomcat CX S8047 server motherboards, ideal for constructing video streaming and content distribution network (CDN) appliances.

Accessibility, affordability and energy efficiencyWith integrated standard-based manageability and essential security features, TYAN's AMD EPYC 4004 CPU-based solutionseffectively reduce operating costs during business hours while seamlessly addressing the 24/7 demands of hosted service providers. The Tomcat CX S8016, a compact and cost-effective motherboard supporting AMD EPYC 4004 series processors in micro ATX form factor, serves as the foundation for two server platforms. The Transport CX HG68-B8016, a 6U 5-node platform, is designed to meet the hosting demands of cloud gaming. Each server node has the capacity to accommodate a dual-slot high-performance gaming GPU card along with two extra PCIe slots for network connections. Conversely, the Transport CX GX40-B8016, a 1U server equipped with up to 4 internal SATA drives and one PCIe 5.0 x16 slot via riser, is optimized to efficiently fulfill the cost-effective computing needs of both data centers and cloud-edge applications.

About TYANTYAN, as a leading server brand of MiTAC Computing Technology Corporation under the MiTAC Holdings Corp. (TSE:3706), designs, manufactures and markets advanced x86 and x86-64 server/workstation board technology, platforms and server solution products. Its products are sold to OEMs, VARs, System Integrators and Resellers worldwide for a wide range of applications. TYAN enables its customers to be technology leaders by providing scalable, highly-integrated, and reliable products for a wide range of applications such as server appliances and solutions for HPC, hyper-scale/data center, server storage, AI and security appliance markets. For more information, please visit TYAN's website at http://www.tyan.com or MiTAC Computing Technology Corporation website at http://www.mitacmct.com

AMD, the AMD Arrow logo, EPYC, and combinations thereof are trademarks of Advanced Micro Devices, Inc.

SOURCE MiTAC Computing Technology Corporation

Read more from the original source:
TYAN Presents AMD EPYC Server Platforms Optimized for Data Center Compute Performance and Large-Scale AI ... - PR Newswire

Read More..

HPE takes $4.5bn in enterprise IT AI server orders – ComputerWeekly.com

Growth in the take-up of artificial intelligence (AI)-based systems was among the big wins for HPE as it announced its second-quarter financial results.

The company posted Q2 revenue of $7.2bn, up 3%.

New AI servers are being delivered in as little as six weeks after the company fixes supply chain issues.

In a blog discussing the results, CEO Antonio Neri spoke about the growth of AI, particularly among HPEs enterprise customers. Demand for HPEs AI offerings is accelerating at a faster pace, and our solid execution enabled us to more than double our AI systems revenue sequentially to more than $900m, helped by supply chain conversion through improved GPU [graphics processing unit] availability, he said.

Neri added that HPEs AI business doubled from the prior quarter, driven by a strong order book and better conversion from its supply chain.

We tripled the number of enterprise AI customers year-over-year, now representing more than 15% of our $4.6bn of cumulative AI orders, he said.

In the blog,Neri spoke about HPEs leadership in water cooling technology for AI servers, and its strengths in green IT. HPE now has four of the top 10 worlds fastest supercomputers, all of which are direct liquid-cooled, he said. I am also proud that we have built seven of the worlds top 10 energy-efficient systems.

In terms of water cooling technology, he said the liquid cooling capabilities of its AI servers has resulted in more than 300 HPE patents.

The company also experienced strong demand for its GreenLake offerings, which posted an annual recurring revenue (ARR) of over $1.5bn.

AI was the fastest growth component of ARR this quarter, while storage and networking typically the fastest growth elements of ARR both retained robust growth rates, said Neri.

During the earnings call, he was asked about enterprise adoption of HPEs AI servers. According to the transcript, posted on Seeking Alpha, enterprise customers interest in HPEs AI capabilities is accelerating. As these engagements continue to progress from the exploration and discovery phase, we anticipate additional acceleration in enterprise AI systems orders through the end of the fiscal year, said Neri.

Supply chain constraints due to demand for GPUs has curtailed many IT leaders ambitions to build out their enterprise AI strategy.

Neri also spoke about better lead times on the supply of AI servers. We feel pretty good about the ability to deliver systems [within] six to 12 weeks, he said.

Chief financial officer Marie Myers added: For servers, we expect improving GPU supply for AI systems and improving demand for traditional servers to drive sequential revenue increases through fiscal year 2024.

In the blog, Neri said that along with the AI growth opportunity, HPE was also seeing indications of market recovery in the traditional and cloud infrastructure markets. Orders for traditional servers grew sequentially and year-over-year, driven by enterprise, public sector, and SMB customers in North America and Europe and revenue grew sequentially as customers transition to HPE ProLiant Gen 11 servers, he said.

Its GreenLake offering has also benefited from the AI uptake among HPE enterprise IT customers. The company recently introduced HPE GreenLake for File Storage capabilities, which Neri said had options specifically targeting the unstructured data demands of AI.

Read the original post:
HPE takes $4.5bn in enterprise IT AI server orders - ComputerWeekly.com

Read More..

MSI New Server Platforms Drive Cloud-Scale Efficiency with Intel Xeon 6 Processor – PR Newswire UK

TAIPEI, June 4, 2024 /PRNewswire/ -- MSI, a leading global server provider, today introduced its latest Intel Xeon 6 processor-based server platforms at Computex 2024, booth #M0806 in Taipei, Taiwan from June 4-7. These new products showcase a new level of performance and efficiency, tailored to meet the diverse demands of cloud-native and hyperscale workloads.

"Data center infrastructure requirements are diversifying, with certain workloads requiring performance measures beyond just cores and watts," said Danny Hsu, General Manager of Enterprise Platform Solutions. "To better cater to today's evolving compute demands, data centers must achieve consistent performance even during peak loads. MSI's new server platforms, built around Intel Xeon 6 processor, drive density and power efficiency, making them ideal for cloud-scale workloads."

"Intel Xeon 6 processors are designed to deliver high performance for the widest range of workloads. With high core density and exceptional performance per watt, servers featuring our new processors offer improved performance per watt and TCO for targeted workloads, helping data centers achieve higher throughput for workloads where power, space, and cooling are limited," said Ryan Tabrah, Vice President, and General Manager of Intel Xeon E-Core products, at Intel.

Catering to cloud service providers, MSI has introduced three server platforms powered by Intel Xeon 6. These platforms, the CX170-S5062 and CX270-S5062, share the same DC-MHS form factor motherboard with a DC-SCM2 module. They support dual-socket processors, 32 DDR5-DIMM slots, and one PCIe 5.0 x16 OCP NIC 3.0 mezzanine slot.

The 1U CX170-S5062 platform accommodates two PCIe 5.0 expansion slots and offers options of eight or twelve 2.5-inch PCIe 5.0 U.2 NVMe drive bays. The CX270-S5062 is a 2U platform that supports up to six PCIe 5.0 expansion slots, with two double-wide slots for GPU cards. This system can house up to 24 2.5-inch PCIe 5.0 U.2 NVMe drive bays to accelerate processing speeds and deliver top-tier performance across applications, such as AI inferencing.

Additionally, the CX271-S3066 is a 2U single-socket mainstream server that provides up to 24 2.5-inch U.2 NVMe drive bays. The system supports 16 DDR5 DIMM slots, three PCIe 5.0 x16 slots, two OCP NIC 3.0 mezzanine slots, and two NVMe M.2 ports. The CX271-S3066 serves as an ideal platform for flash storage applications and general-purpose workloads. These new systems all feature support for the DC-SCM2 Server Management Module with Aspeed AST2600 BMC, ensuring server management flexibility.

Photo - https://mma.prnewswire.com/media/2423049/MSI_s_New_Server_Platforms_with_Intel_Xeon_6_Boost_Performance_and_Efficiency_for_Cloud_Scale_Worklo.jpg

Original post:
MSI New Server Platforms Drive Cloud-Scale Efficiency with Intel Xeon 6 Processor - PR Newswire UK

Read More..

Multilingual RAG, Algorithmic Thinking, Outlier Detection, and Other Problem-Solving Highlights – Towards Data Science

4 min read

Feeling inspired to write your first TDS post? Were always open to contributions from new authors.

When we think about problem-solving, our focus tends to be on the solving part: the powerful hack, a new magical tool, a few lines of code that make everything click into place. In reality, a lot has to happen for these final touches to workfrom developing a solid understanding of what the problem actually is, to sketching out a workable process that ensures we find consistent success rather than just a temporary band-aid.

Our weekly highlights this week stand out for their holistic approach to finding effective solutions to occasionally thorny challenges. They offer a glimpse into practitioners mindset as they explore their available resources (data, tools, and time, to name a few) and weigh the pros and cons of different workflows. We think they might just inspire you to view whatever project youre working on at the moment from a new perspective. Enjoy your reading!

Read more from the original source:

Multilingual RAG, Algorithmic Thinking, Outlier Detection, and Other Problem-Solving Highlights - Towards Data Science

Read More..

Computers and chemistry | UDaily – University of Delaware

Soham Jariwala has a unique perspective: He took the Hackathon course in 2022 and this spring is a project mentor alongside Vasu Venkateshwaran from W. L. Gore. & Associates. Jariwala, a doctoral alumnus from the chemical and biomolecular engineering department and now a modeling and simulation scientist at Gore, was not officially part of the NRT program but took the course to gain hands-on experience with using machine learning tools for industry projects, an experience that he said was formative in helping him succeed in his current role.

In a traditional classroom, you have a limited perspective on how projects are conducted in industry, Jariwala said. In the Hackathon class, you have a problem that even the industry experts don't know the answer to. As a team, you bring your own expertise, brainstorm ideas, find the best approach, and learn about other areas in order to reach a decision.

The summer after completing the Hackathon course, students in the NRT-MIDAS program have the option of either completing a summer internship or a two-week teaching workshop.

Alison Shapiro, a chemical engineering doctoral candidate working in the lab of Allan & Myra Ferguson Distinguished ProfessorThomas H. Epps, III, worked at Dow last summer as part of the companys cable and wire department. During her time at Dow, she looked for ways to recycle and more sustainably fabricate the insulating, protective polymers that coat electrical wires and conducted life cycle assessments for candidate materials.

Shapiro said that understanding the vernacular used to talk about chemicals during the Hackathon course was extremely helpful in completing her internship projects.

At Dow, they had the same way of talking about [formulations] as we did in the Hackathon class, which is different from how most academic research was done, she said. That was one of the things that translated over the most, and I initially had no idea that it was going to be so helpful.

Sean Farrington, who is also part of the first NRT cohort, is a doctoral candidate working under Unidel Robert L. Pigford ChairNorman Wagner and Arthur B. Metzner ProfessorAntony Beris. Last summer he completed a teaching workshop developed by NRT core faculty member and associate professorJoshua Enszer, which involved presentations about class preparation and teaching strategies followed by each student delivering a mock lecture and receiving constructive feedback.

Farrington, who is currently a TA in the chemical engineering department, regularly uses a list of action verbs provided by Enszer when preparing to teach. He said that the workshop was invaluable, not only for his current career plans of working in academia but because no matter what job you have, you are always going to have to teach people something, and to do so you need to figure out exactly what your learning outcomes are, he said.

Outside of the programs coursework and professional development activities, NRT-MIDAS also fosters a strong sense of community that reaches across multiple departments.

This includes a biweekly NRT community hour organized by Johnston and Jayaraman, where all members of the NRT-MIDAS community get together during the lunch hour. Along with socializing over pizza, students get to hear invited speakers discuss their research in academic and national laboratories, learn about various STEM careers in industry, publishing, and teaching, and attend professional development workshops on topics such as data ethics, responsible conduct of research, and science communication.

As NRT program coordinator, Johnston plays a key role in helping foster this sense of community, from helping students become comfortable with public speaking and communication during their outreach activities to hosting monthly individual advising meetings with all of the trainees, which Johnston said is the highlight of her week.

Not only do I enjoy getting to know our students, but they also provide valuable information on what they need from us as a program, Johnston said. These meetings have helped influence our professional skill community hour topics and have given us the ability to really cater to the needs of the students in our program.

During the summer, students work in teams to complete an outreach activity that showcases STEM research and data science concepts for a variety of non-scientific audiences.

In the summer of 2022, the first cohort createdvideos to help explain their research and pique other students interest in science.

Read more from the original source:

Computers and chemistry | UDaily - University of Delaware

Read More..