Page 2,914«..1020..2,9132,9142,9152,916..2,9202,930..»

Apple’s Find My network can be used to steal data here’s how – Tom’s Guide

You can use Apple's Find My network to steal data from devices that aren't connected to the internet, a German researcher says.

Positive Security's Fabian Brunlein found he could take data out of a device that had only a Bluetooth connection essentially a homemade AirTag and use iPhones and Macs to get the data all the way up into Apple's iCloud servers. From there, Braunlein could access the data from his own Mac.

The whole process works very slowly. Brunlein was getting a transmission rate of about 3 bytes per second, and each chunk of data is a maximum of 16 bytes. But over time, you could get a respectable amount of text transmitted. He's calling his system "Send My."

The data theft works because each Bluetooth device on the Find My network sends out a public encryption key to all nearby receiving Apple devices. Those devices mark their own locations, bundle it with the Bluetooth device's public encryption key, and send the resulting "location report" up to Apple's cloud.

Brunlein found a way to embed messages in the encryption keys in the location reports and hence communicate very short secret messages from his homemade AirTag through Apple's Find My network to his Mac.

The implications of Brunlein's research aren't purely theoretical. Millions of computers worldwide are disconnected from the internet for safety reasons because the computers hold highly sensitive data or run critically important processes, such as coordinating the movements of trains or running power plants.

"Such a technique could be employed by small sensors in uncontrolled environments to avoid the cost and power-consumption of mobile internet," Brunlein wrote in a blog post, echoing what Amazon is already doing with its Sidewalk low-energy mesh network. "It could also be interesting for exfiltrating data from Faraday-shielded sites that are occasionally visited by iPhone users."

If some of those computers could be made to communicate via Bluetooth with iPhones that come near, then data might be snuck out of or snuck into those machines.

Brunlein didn't mention it, but it's already clear that AirTags can be used to secretly track people for up to three days before the AirTags will emit a chirp to reveal themselves. A homemade AirTag might be able to track someone indefinitely without revealing its existence.

Apple's Find My network is a giant mesh network made up of hundreds of millions of iPhones worldwide. Each iPhone listens for Bluetooth connections from other devices on the network, and if a Bluetooth-only device is sending out a broadcast message, nearby iPhones will pick up the message and use their cellular or Wi-Fi connections to relay the message to Apple's cloud servers.

This system was originally meant to locate lost iPhones, iPads and MacBooks, but it's since been expanded to include other devices such as Belkin earbuds and VanMoof electric bikes.

Earlier this year, a bunch of German researchers (not including Brunlein) figured out how to get other Bluetooth devices ones not approved by Apple onto the Find My network. Basically, they created their own AirTags before AirTags were announced. (The same researchers also demonstrated privacy flaws in AirDrop, which uses many of the same network protocols as Find My.)

They created a tool called OpenHaystack that piggybacks on the Find My network. One part is firmware that is loaded onto a tiny single-board computer such as a Raspberry Pi or something similar, which becomes the homemade AirTag. The other part is a Mac desktop application and a Mail plugin that's necessary for the whole thing to work.

Brunlein modified the OpenHaystack board firmware onto an ESP2 tiny single-board computer his homemade AirTag and the corresponding software onto his Mac. Using those tools, Brunlein was able to not only track the ESP2 using the Find My network, but also use the Find My encryption protocol and location reports to transmit messages.

Oddly enough, Apple may not be able to stop this kind of use, or abuse, of its Find My network. That's because Find My messages are encrypted end-to-end, and Apple can neither see what's in those messages or what kind of devices are sending them.

"Apple does not know which public keys belong to your AirTag, and therefore which location reports were intended for you," Brunlein wrote in his blog post. "It would be hard for Apple to defend against this kind of misuse in case they wanted to."

Tom's Guide has reached out to Apple for comment, and we will update this story when we get a response.

Today's best Tile Pro Series deals

Read more:
Apple's Find My network can be used to steal data here's how - Tom's Guide

Read More..

Sanctioning The Cloud: SAP Settlement Illustrates Increasing Trade Sanctions On The Global Flow Of Data – International Law – United States – Mondaq…

14 May 2021

Arnold & Porter

To print this article, all you need is to be registered or login on Mondaq.com.

The US government is increasingly prioritizing trade enforcementof the tech industry's global data services. This is reflectedin SAP SE's global resolution with DOJ, Commerce and Treasuryof allegations that the company provided software to users in Iranin violation of export and sanctions regulations.

SAP, a multinational software company based in Germany, enteredinto anon-prosecution agreement(NPA) with DOJand two administrative agreements with theBureau of Industry and Security(BIS) andtheOffice of Foreign Assets Control(OFAC) onApril 29, 2021, after making voluntarily disclosures to all threeagencies, acknowledging years of violations of the ExportAdministration Regulations (EAR) and the Iranian Transactions andSanctions Regulations (ITSR).

SAP's apparent EAR and ITSR violations came about in twoways. First, SAP and third-party resellers allowed users in Iran toaccess software by downloading it directly from SAP servers in theUnited States or through SAP's US-headquartered contentdelivery provider. Second, SAP provided cloud-based softwaresubscription services that were accessed remotely by Iranian usersthrough SAP's cloud businesses in the United States.

The US government's NPA with SAP is part of a largerpattern. In the past 18 months, the US government has begun tofocus on the tech industry's sanctions compliance and hasbrought enforcement actions against companies of allsizesincludingAppleandAmazonfor providing services tosanctioned parties. For instance, in early 2020, OFAC took actionagainstSITA, a Swiss telecommunications company,settling apparent violations involving the provision of messagingservices that were routed through hardware located in the UnitedStates. In December 2020, OFAC announced a settlement agreementwithBitGoas a result of BitGo's similarfailure to filter out users with IP address in sanctioned countriesand territories. The global resolution with SAP represents acontinuation of the growing interest on the part of regulators toassert jurisdiction over the activities of techcompanieseven where the main jurisdictional hook is thepresence of information on US servers.

The SAP action highlights the great importance of risk-basedsanctions compliance programs for global companies providingsoftware products online, including cloud-based services. Just asthe US government expects banks to monitor global money flows andto prevent prohibited transactions, these recent cases demonstratethat companies are similarly expected to monitor and ensurecompliance throughout the global flow of data.

The content of this article is intended to provide a generalguide to the subject matter. Specialist advice should be soughtabout your specific circumstances.

POPULAR ARTICLES ON: International Law from United States

Link:
Sanctioning The Cloud: SAP Settlement Illustrates Increasing Trade Sanctions On The Global Flow Of Data - International Law - United States - Mondaq...

Read More..

Bare Metal Cloud Market Valued At Approximately US$ 870 MN, and Will Exhibit 20% CAGR Through 2029 The Courier – The Courier

The global bare metal cloud market was valued at approximatelyUS$ 870 Mnin2018, and is expected to expand at a healthy CAGR of over20%during the forecast period of20192029. However, end users are facing difficulties related to security while migrating toward cloud storage, which, in turn, might restrict the adoption of bare metal cloud solutions and services to some extent.

In the coming years, it is expected that, small and medium enterprises will be the top adopters of bare metal cloud servers and services, as incorporation of the same will enable such enterprises enhance business functionality by improving productivity and minimizing operating costs.

Investments made for the procurement of bare metal cloud servers and services are witnessing considerable growth. These factors are contributing to the growth of the globalbare metal cloud market.

To Get Sample Copy of Report Visit @https://www.researchmoz.us/enquiry.php?type=S&repid=2680442

The market overview provides the growth scenario and market potential with maximum precision, which is adjudged with suitable assumptions. The report features unique and relevant factors that are expected to create a significant impact on the bare metal cloud market during the forecast period. This report includes a detailed and considerable amount of information, which will help new solution providers in the most comprehensive manner for better understanding.

Several stakeholders in the bare metal cloud market can rely on the data offered in this research study and delve into pragmatic decision-making. Moreover, the information offered in the bare metal cloud market report also helps new market entrants expand their bases in the bare metal cloud market.

The report elaborates historical and current trends molding the growth of the bare metal cloud market. The performance journey of the bare metal cloud market has been drawn and analyzed in such a way that the lucrative side of the market is evident to readers. The competitive landscape presented in the bare metal cloud market report gives a detailed outlook of the profiles of key companies operating in the market, along with their differential strategies and key focus areas.

Grab Maximum Discount on This Market Research Report [Single User | Multi User | Corporate Users] @https://www.researchmoz.us/enquiry.php?type=D&repid=2680442

Bare Metal Cloud Market: Key Questions Answered in the Report

The research study on the bare metal cloud market offers inclusive insights about the growth of the market in the most comprehensible manner for the better understanding of users. Various insights offered in the report answer some salient questions that assist stakeholders in gauging all the emerging possibilities in the market.

Bare Metal Cloud Market: Research Methodology

A unique and promising research methodology forms the base of the bare metal cloud market report. The report has been prepared after a comprehensive analysis of market happenings, and riveting insights have been compiled meticulously. The research methodology of the bare metal cloud market has been a two-step process, which comprises primary and secondary research. Key stakeholders, which include bare metal cloud solution & service providers and network service providers, experts of several designations, including executive vice presidents, directors, service engineers, technical advisors, GM marketing professionals, and sales professionals, have been interviewed.

Secondary sources referred to garner report findings include investor presentations of top players, World Bank, government websites, press releases, and many other credible sources.

Have Any Query? Ask to Our Industry Expert @https://www.researchmoz.us/enquiry.php?type=E&repid=2680442

Key Pointers of Bare Metal Cloud Market Study

Buy this Premium Research Report:https://www.researchmoz.com/checkout?rep_id=2680442&licType=S

Top Trending Reports:

For More Information Kindly Contact:

ResearchMozTel:+1-518-621-2074USA-Canada Toll Free: 866-997-4948Email:sales@researchmoz.usFollow us on LinkedIn:https://bit.ly/1TBmnVGFollow us on Twitter:https://twitter.com/researchmozMedia Release:https://www.researchmoz.us/pressreleaseBrowse More Reports Visit @http://marketresearchlatestreports.blogspot.com/

Originally posted here:
Bare Metal Cloud Market Valued At Approximately US$ 870 MN, and Will Exhibit 20% CAGR Through 2029 The Courier - The Courier

Read More..

India $2.71 Billion Server Markets, Competition, Forecast & Opportunities, 2016-2019 & 2020-2026 – Yahoo Finance UK

Dublin, May 12, 2021 (GLOBE NEWSWIRE) -- The "India Server Market, By Hardware (Rack, Blade, Tower), By Operating System (Linux, Windows, IOS, Others), By End User (IT & ITES, Government, Telecommunications, BFSI, Others), By Region, Competition, Forecast & Opportunities, FY2027" report has been added to ResearchAndMarkets.com's offering.

The Indian Server Market was valued USD 2712.49 million in FY 2020 and is anticipated to grow at 10.27% CAGR in the next 5 years. Growing IT sector, digitalization and emergence of data centers are the factors favoring the growth of the server market in India.

Growth in adoption of newer and continuous innovations like big data or cloud are having a great impact on the market growth. The emergence of start-ups in India is adding a fuel to the demand for servers in various sectors. New apps that work on back end specialized computing needs are utilizing cloud servers in order to have a smooth functioning from both the ends. Along with that the advanced technologies like virtualization and flash storage are surging the growth of sever market.

Policies of the government in India are in favor of promoting digitalization and therefore the shift to online portals for different government activities is fueling the emergence of IT infrastructure. For the government to connect with people and for the people to connect with government, IT infrastructure is crucial. Through these e-portals people of the country can save their time on tedious work. This will produce lots of data, consequently driving the demand for data storage for analysis. Hence there will be growing demand for servers in the upcoming years.

The Indian Server Market is segmented based on hardware, operating system, end-user and region. Based on hardware the market is sub segmented into rack server, blade server and tower server. Among this, blade and rack servers are almost on a tie and are bought on specifically customer's preference. Tower servers are mostly used in data centers and are having comparatively less share of value 31.62% in FY 2020.

Major players operating in the Indian Server Market are Dell Computer India Private Ltd., Hewlett-Packard India Pvt. Ltd., Cisco Systems India Pvt. Ltd., Lenovo India Pvt. Ltd., Super Micro, Oracle India Private Limited, IBM India Private Limited., Acer (India) Pvt. Ltd., Microsoft Corporation (India) Pvt. Ltd., Fujitsu India Pvt. Ltd., among others.

Years considered for this report:

Story continues

Key Topics Covered:

1. Introduction

2. Research Methodology

3. Executive Summary

4. Impact of COVID-19 on India Server Market

5. India Server Market Overview

6. India Server Market Outlook6.1. Market Size & Forecast6.1.1. By Value (USD Million)6.2. Market Share & Forecast6.2.1. By Hardware (Rack, Blade, Tower)6.2.2. By Operating System (Linux, Windows, IOS, Others)6.2.3. By End User (Telecommunication, IT & ITES, Government, BFSI, Others)6.2.4. By Region (South, West, East, North)6.2.5. By Company (FY2020)6.3. Product Market Map (By Hardware, By Operating System, By End User, By Region)

7. North India Server Market Outlook7.1. Market Size & Forecast7.1.1. By Value (USD Million)7.2. Market Share & Forecast7.2.1. By Hardware7.2.2. By Operating System7.2.3. By End User

8. South India Server Market Outlook

9. West India Server Market Outlook

10. East India Server Market Outlook

11. Market Dynamics11.1. Drivers/Opportunities11.2. Challenges/Restraints

12. Market Trends & Developments

13. Value Chain Analysis

14. Policy & Regulatory Landscape

15. India Economic Profile

16. Competitive Landscape16.1. Competition Outlook16.2. Company Profiles16.2.1. Dell Computer India Private Ltd16.2.2. Hewlett-Packard India Sales Pvt. Ltd.16.2.3. Cisco Systems India Pvt. Ltd.16.2.4. Lenovo India Pvt. Ltd.16.2.5. Super Micro16.2.6. Oracle India Private Limited16.2.7. IBM India Private Limited16.2.8. Acer (India) Pvt. Ltd.16.2.9. Microsoft Corporation (India) Pvt. Ltd.16.2.10. Fujitsu India Pvt. Ltd.

17. Strategic Recommendations

For more information about this report visit https://www.researchandmarkets.com/r/t2n0ev

Read the original here:
India $2.71 Billion Server Markets, Competition, Forecast & Opportunities, 2016-2019 & 2020-2026 - Yahoo Finance UK

Read More..

How to Mitigate Cyberattacks from the Supply Chain – Supply and Demand Chain Executive

In December 2020, the SolarWinds Orion attack resulted in more than 18,000 customers unwittingly installing malicious code as part of a run-of-the-mill software update, compromising global companies critical supply chains and costing cyber insurance firms upwards of $90 million. Similarly, the recent Coronavirus disease (COVID-19) Vaccine Cold Chain Global Phishing campaign was a cyberattack against the key organizations running the COVID-19 cold chain. These phishing attacks tried to gain credentials for accessing sensitive information about the vaccine distribution, which in all likelihood, led to significant information leaks.

According to The Economists recent survey of 400 executives at U.S. and European companies, more than one-third (36%) reported cyberattacks significantly disrupted their supply chains in the last three years. In fact, cyberattacks were second only to COVID-19 as the force wreaking havoc with the worlds supply chains in 2020. With an average cyberattack costing approximately $3.9 million due to system downtime, damaged reputation, lost business or other factors, it is imperative that we bolster efforts to secure our supply chains.

The first thing to understand is that the number of security breaches is directly proportional to the level of supply chain automation. Specifically, the improper implementation of automation is what increases the susceptibility of a supply chain. So, breaches will grow exponentially as we hurriedly move toward a fully automated supply chain, with statistics projecting damages directly driven by cybercrimes to reach $6 trillion by the end of this year.

GEP

Here are steps you can take to protect supply chains from cyberattacks.

1. Identifying where the risk lies. The most common causes of supply chain breaches are weak and stolen credentials, application vulnerabilities, malware, excess permissions, insider threats and user error. So, conduct a thorough evaluation of your supply chain partners and understand what data is being shared with whom. Ensure maximum security and limit your data exposure by establishing where unnecessary data is being shared. Minimize access to cloud servers storing important information.

2. Secure supplier contracts. Instead of thinking about security after completing contract negotiation, incorporate it into the contract from the very start and be clear about what information is required and by whom. Ensure only limited access to third-party vendors (with third-party vendor misuse being one of the biggest security threats today).

3. Conduct vulnerability mitigation and testing. By running vulnerability scans, you can identify various security concerns such as poor password choices or bad database configurations and mitigate the level of risk for various fragments of the supply chain.

4. Encrypt data. All protected customer information should be contained in encrypted and secure files that are constantly updated to keep pace with the newest technologies.

5. Establish incident response protocols. While supply chains should mitigate the risks of security breaches, you must be ready to respond to such incidents by having a plan in place. By preparing a handy template to record all key aspects of an incident to ensure consistency, readily available forensic imaging tools and the contact details of all key stakeholders to ensure quick outreach, you can minimize the damage from an attack.

Supply chain attacks will continue to increase costs and in propensity. In fact, the greatest threat to supply chains going forward is not pandemics, trade wars or tariffs; its cyberattacks. While we automate our supply chains, we must simultaneously harden our security to protect, track and respond.

Follow this link:
How to Mitigate Cyberattacks from the Supply Chain - Supply and Demand Chain Executive

Read More..

Cloud Application Security & Vulnerability Management Market 2021-2027: Trends, Opportunities and Industry Projections KSU | The Sentinel…

Cyber Security Issues amidst COVID-19 Crisis Lead to Downtime in Organizations

Cloud computing has taken the center stage during the ongoing COVID-19 (coronavirus) pandemic. However, companies in the cloud applicationsecurity & vulnerability managementmarket need to address security issues such as malware injection and hijacking of accounts to safeguard organizational information. Hence, users are investing in secure cloud platforms to avoid issues associated with cyber security.

Remote working with the help of cloud software has become increasingly mainstream in the past couple of months. However, phishing and social engineering attacks are on the rise during the ongoing COVID-19 era. Hence, companies in the cloud application security & vulnerability management market are becoming more equipped in tackling cyber threats. This is helping organizations to minimize downtime and meet optimum productivity levels. Companies are recommending organizations to use distributed cloud IT systems to address issues pertaining to cyber security.

Request a sample to get extensive insights into the Cloud Application Security & Vulnerability Management Markethttps://www.transparencymarketresearch.com/sample/sample.php?flag=S&rep_id=78751

Cloud computing offers greater flexibility to enterprises in handling their work with the help of software, servers, and databases. However,cloud platformsare susceptible to unauthorized access by individuals who misuse employee credentials, resulting in a threat to confidential information in an organization. Hence, companies in the cloud application security & vulnerability management market should increase their R&D to develop platforms that enable secure login of employee credentials to avoid risks of security threats.

Intelligence-led security company FireEye Inc. has announced the launch of new cloud security innovations within its FireEye Helix platform, which supports collaboration via Microsoft Teams and Slack. It has been found that increasing number of organizations are now operating within the multi-cloud environment. This trend has created revenue opportunities for companies in the cloud application security & vulnerability management market, where the market is expected to cross the value ofUS$ 7.5 Bnby 2030.

Digitalization is becoming rampant in almost all end markets. Continuous digital evolution has become possible withcloud computing, thus creating an agile and hyper-connected network for offices operating in different parts of the world. However, in order to achieve this, users are demanding a secure architecture to efficiently handle supply and distribution chains via cloud computing. Hence, companies in the cloud application security & vulnerability management market are increasing efforts to minimize the complexities associated with security measures in software and applications.

Unhindered secure application access has become the need of the hour. Users are demanding system access from any part of the world and from any device to ease their business activities. Hence, companies in the cloud application security & vulnerability management market are introducing behavioral analysis and predictive analytics in systems to avoid security issues.

Stuck in a neck-to-neck competition with other brands? Request a custom report on Cloud Application Security & Vulnerability Management Markethttps://www.transparencymarketresearch.com/sample/sample.php?flag=CR&rep_id=78751

Organizations that have a security-first mindset are better prepared to handle security threats. The democratization of cloud computing has helped startups to scale their business up to new heights with the help of fewer resources. Companies in the cloud application security & vulnerability management market are innovating in cloud architectures that offer world-class security measures to avoid risks of cyber threats. They are using security scripts to build new virtual servers that adapt to varying processing loads.

Since development teams have become the first line of defense in cloud computing, they are using pre-determined and pre-hardened standards to develop servers that swiftly and safely manage varying processing loads. Such innovations have led to a robust growth of the cloud application security & vulnerability management market, which is predicted to advance at a striking CAGR of ~14%during the assessment period.

IT leaders are realizing the importance of cloud platforms, which are found to be more secure as compared to on-premise setups. In order to improve customer experience, organizations are racing against time to innovate in their business practices with the aid of cloud computing. Hence, companies in the cloud application security & vulnerability management market are offering homogenous cloud architectures to make public cloud platforms more secure than traditional data centers.

Companies in the cloud application security & vulnerability management market are increasing efforts to develop public cloud platforms that can accommodate new security capabilities in order to keep pace with new threat vectors. As such, cloud providers are using their own public crowd platforms to host core business services such as SaaS or PaaS services. In addition, companies are investing to improve the cyber-resilience of platforms to offer future-proof cloud applications to users.

Compliance assurance and consistent security management are becoming important focus points for companies in the cloud application security & vulnerability management market. It has been found that organizations suffer sudden breach of security, thus leaving cloud applications with vulnerabilities. Hence, companies are recommending public cloud platforms that are integrated with centralized mechanisms and help to avoid events of security breach. Patching is another technique used by cloud providers to seal the vulnerabilities of platforms.

Various market drivers such as 5G mobile technology and IT-OT convergence are contributing toward the growth of the market. The proliferation of cloud computing in various end markets is anticipated to make intelligence on demand for cyber security within enterprises. Serverless cloud computing and hybrid cloud solutions are creating lucrative opportunities for companies in the cloud application security & vulnerability management market.

More here:
Cloud Application Security & Vulnerability Management Market 2021-2027: Trends, Opportunities and Industry Projections KSU | The Sentinel...

Read More..

AMD Finally Breaks The 10 Percent Server Share Barrier – The Next Platform

History doesnt really repeat itself, but it surely does use a lot of synonyms and rhymes, and sometimes, if you listen very closely, you can catch it muttering to itself.

It is with this in mind that we contemplate the recent data coming out of Mercury Research, which is the touchstone tracker of market share data for X86 processors for mobile and desktop PCs and when AMD launched itself into the server racket in 2003, it became the arbiter of official server share stats for the X86 server space.

After a six-year fight to get back into the datacenter, with an 11.5 percent shipment share of X86 processors sold into the datacenter in the first quarter of 2021 and a solid and credible roadmap against a staggering but recovering rival Intel, it is once again safe to bet on AMD processors in the datacenter with the Epyc line. And now we will see if AMD can meet the high water mark it set in the mid-2000s when it had 2.3X the market share that it currently is enjoying.

The Opteron chips set a very high bar for AMD to leap. The Sledgehammer Opteron processors were announced in the fall of 1999 and delivered in the spring of 2003 to great fanfare and a certain amount of resistance from server OEMs who were afraid of crossing Intel, which was nowhere as dominant as it is today, or rather was three years ago. The original Opterons were innovative in many ways, including having 64-bit processing and memory access, multicore designs from the get-go, HyperTransport interconnects, integrated DDR memory controllers, and integrated caches that sat on a ring instead of the frontside bus a bandwidth limiter and therefore a performance limiter employed by Intel.

When the Opterons launched, X86 servers comprised about half of server revenues, and the shipments of X86 server CPUs were considerably smaller than they are today. Take a look at this historical chart based on more than two decades of data from Mercury Research to see just how much the server world has changed thanks in large part to hyperscalers and public clouds:

This data runs from the first quarter of 2000, which marks the beginning of the dot-com bust, more or less, and back then, well shy of 1 million server CPUs per quarter were shipping. Shortly after the Opterons launched in early 2003, thanks to the aggressive pushes by IBM and Sun Microsystems and Cray, particularly in the HPC arena that was so hungry for cheaper 64-bit compute (RISC and proprietary CPUs were relatively expensive), memory capacity, memory bandwidth, and I/O bandwidth, AMD quickly rose to 5 percent share of server shipments. Intel fought back as best it could between 2003 and 2009, when its Opteron-alike Nehalem Xeon E5500 processors launched into the gaping maw of the Great Recession, which made OEMs and now ODMs as well as their hyperscaler and public cloud customers a bit skittish at the same time that the Opteron line ran into some bugs and some architectural issues. The Xeon server revamp and the steady cadence of architectural advances and manufacturing advances from Intel essentially forced AMD from the datacenter, and the company walked away about a decade after the Opterons launched. The server shipments just kept rolling faster and fast, eventually compelling AMD to re-enter the server arena.

If you look at that chart above, the question you have to ask is what kind of curve are we going to get for AMDs market share in the future? Is a new spike forming that will be as steep as we saw in the early years of the Opteron? In the second quarter of 2006 which was nearly three years before the Nehalem Xeon revamp AMD peaked at 26.2 percent share of server CPU sockets sold in a quarter. The rise was very fast, but the decline was about as steady and deadly. The climb during the three Epyc server chip generations, the first of which launched in the spring of 2017, has been a little more rapid than the Opteron decline, which is good. But it is nothing like the spike the Opterons saw as Intel hung on to 32-bit processing for Xeons as it tried to force people onto the 64-bit Itanium processors for servers.

Intel made a set of architectural blunders that gave AMD the opening for the Opterons and, as it turned out, it made a set of chip manufacturing blunders that would have also beset AMD if it had kept its foundry instead of spinning it out as GlobalFoundries and allowing itself to choose Taiwan Semiconductor Manufacturing Corp as its foundry. Think about that bullet AMD dodged. Imagine if it was trying to pick up the tab for a 7 nanometer EUV foundry, and then had to spike it as GlobalFoundries did back in August 2018. The mind reels. . . .

As it is, AMD has a very good partner in TSMC and has put very good processors into the field. If current trends persist, in about a year, AMD will be at around 25 percent market share, which is no doubt its goal even though Lisa Su, AMD president and chief executive officer, will never say that. Su pointed to the lower deck of 10 percent when the Naples Epyc 7001s launched four years ago, and there is no way she is going to point to the 25 percent upper deck for the Genoa Epyc 7004 or Turin Epyc 7005 processors due around 2022 and 2023, respectively. And for good reason. AMDs share of the desktop and mobile PC market hovers between 15 percent and 20 percent most of the time.

It is almost as if markets like 80-20 distributions for major and minor players, but the server market may not play out quite this way. Intel may, as bullies say in elementary school, get two for flinching. Like this:

It is entirely possible that Intels server decline will be similar in shape and slope as its rise over the past decade, especially if the big public clouds and HPC centers of the world embrace the Arm architecture and do custom chips and AMD also keeps the heat on Intel, too, in the X86 arena. Markets also like 65 percent, 25 percent, 10 percent stratifications or even 60 percent, 20 percent, 20 percent when there are three players competing. And, and, and if Arm architectures start being a conundrum for AMD, it may even have to dust off its own Arm server chip efforts or pick up some Neoverse tech and take on Nvidia in the high-end Arm CPU sector for HPC and AI applications.

Stranger things have happened, and history keeps whispering about them.

Featuring highlights, analysis, and stories from the week directly from us to your inbox with nothing in between.Subscribe now

Excerpt from:
AMD Finally Breaks The 10 Percent Server Share Barrier - The Next Platform

Read More..

Microsoft’s Python extension for VS Code just added the fast-coding Pylance language server – ZDNet

Microsoft has released a new version of its hit Python extension for its cross-platform code editor Visual Studio Code (VS Code) that makes its Pylance language server the default.

Microsoft started work on Pylance last June and promised it had "the ability to supercharge your Python IntelliSense experience with rich type information, helping you write better code faster."

IntelliSense is Microsoft's answer to automatic code completion to help developers skip through repetitive coding tasks and boost productivity.

SEE: Hiring Kit: Python developer (TechRepublic Premium)

The Python extension for VS Code is by far the most popular extension for the Microsoft code editor and speaks to the language's admiration when it comes to machine learning and data science, as well as the popularity of VS Code among developers.

"We're thrilled to announce that Pylance is now the default language server for Python and is bundled with the core Python extension as an optional extension starting with this release," said Savannah Ostrowski, a program manager for the Pylance Python Language Server and Python in Visual Studio.

The Pylance extension works alongside the Python extensions in VS Code to boost performance. It's powered by Microsoft's static type checking tool, Pyright.

"We've been making dramatic improvements to Python language support via the Pylance extension," says Ostrowski in a blogpost.

"As of this release, we've included the Pylance extension as an optional dependency for the core Python extension. This means that you'll get the latest and greatest language support right out of the box with the Python extension (no separate install needed!)," says Ostrowski.

Microsoft is recommending VS Code users to try the Pylance language server for a faster experience but notes that developers can configure the development environment to use other language servers, like open-source Jedi.

"We are committed to maintaining open-source language support options for our users in the future," she notes.

SEE: Programming languages: JavaScript has most developers but Rust is the fastest growing

VS Code users can uninstall or disable the Pylance extension at will and, once it's uninstalled, it won't re-install when the Python extension updates.

Microsoft also boasts that the Python extension it develops for VS Code now loads 10% faster for Windows and macOS systems, and 20% faster for Linux systems.

Ostrowski says the Python extension now has better debugging, building on its existing support for the web-focussed Django and Flask frameworks for Python.

Read the rest here:
Microsoft's Python extension for VS Code just added the fast-coding Pylance language server - ZDNet

Read More..

The business benefits of using an open source cloud – IT-Online

Even before the pandemic led to increased remote work migration, many organisations were becoming increasingly reliant on cloud solutions to streamline systems and workflow.

By Danie Thom, hybrid cloud platform specialist at Red Hat

But as with any enterprise technology, implementing cloud solutions comes with questions about the best way for individual businesses to harness their benefits.

By now, were realising that using a single cloud vendor can lead to limitation, and that a flexible, multi-vendor strategy is better for innovation. Although using a variety of cloud environments gives businesses the ability to adapt to changing business requirements, it also requires integration.

Open source gives organisations an answer to this: it offers unmatched flexibility while also cutting the costs of software acquisition.

A lot of the cloud is already built on open source

Open source vs proprietary software conversations may lead one to believe that open source is the exception rather than the rule, but Linux, the open source operating system that revolutionised data centre operations, enables almost all of the major public clouds being used today.

It continues to power new cloud-native technologies. Kubernetes, an open source container-orchestration platform, has also become the industry standard for managing cloud-native workloads. It automates the deployment, scaling, and management of application containers and allows you to move workloads effortlessly between on-premise, private, or public cloud infrastructure.

Its clear that open source cloud shouldnt be treated as some kind of strange new tech, but what exactly are the business benefits of using an open source cloud in a hybrid environment?

Agility in a hybrid cloud environment

The public cloud is the best way for organisations to access IT resources that can easily be increased or decreased as needed, offering flexibility, scalability and cost-savings (if used correctly). Internal private clouds, with their on-premise servers, give companies some of the benefits of the cloud with added security and without having to sacrifice control of their environment.

To take advantage of the best of both the public and private cloud, many businesses implement hybrid cloud environments.

Historically, organisations have managed their public and private clouds separately, but an open source hybrid cloud approach allows them to integrate these different environments into a single, comprehensive platform. This means on-premise services can have the same agility, functionalities and seamless experiences of a versatile public cloud.

If businesses want the same flexibility from their on-premise data centres that they experience with the public cloud, they can no longer manage them in traditional and siloed ways. You must be prepared to adapt your technology, people, and processes to gain any advantage.

When computing demands fluctuate, businesses should be able to divert their workloads in a way that is both optimal for performance and for usage costs. Open source technology and methodologies enable this, and they mean that a business is less likely to be constrained by the functionalities of its cloud solution.

Compared to proprietary solutions that are rarely cross-compatible, open source cloud infrastructure is also designed for interoperability, allowing different apps, servers or containers to work in harmony on different public cloud providers platforms. You could even duplicate your infrastructure from one cloud to another without a significant amount of modification, meaning less time wasted and increased productivity.

With the convergence of virtualisation (running multiple virtual machines on a single server) and containerisation (ways of running multiple applications on a single virtual machine) helping businesses run more by using fewer resources, open source hybrid cloud approaches become even more beneficial.

An open source hybrid cloud platform allows you to containerise apps into their individual functions and develop and manage them all in one place regardless of what platform they come from. Theres no need to worry about the underlying tech; open source gives you a portable, stable, and secure way of running your applications. Developers also become more productive and operations more efficient.

Freedom of choice

Proprietary cloud solutions create vendor lock-in, often limiting businesses to standardised solutions that can result in walled software gardens and dependency on one providers suite of products or services. This limits a business options when they need added functionality, platform integration or simply want to change cloud providers.

With an open source cloud, youre never tied to functionalities or one particular platform, instead giving you the ability to choose from whichever cloud services best suit your needs.

Businesses that use open source cloud services can also integrate them into one cohesive ecosystem and customise them to their specific needs. This allows them to use a vast ecosystem of technology and services creating a digital platform that fits their unique requirements, with secure, automated application runtimes.

Rich integration, business process automation, and automatic decisioning can be used to create immersive customer engagement anywhere.

An open ecosystem

We shouldnt be thinking about the cloud as the location of workloads and resources, but rather how we run them. The key to unlocking the power of the cloud is to treat it like an ecosystem, fostering interconnectedness, openness, and standardisation across cloud architectures.

An open source cloud strategy is made for this as it increases code quality, flexibility and the availability of features, improves visibility over every layer of infrastructure, and gives businesses the ability to move between platforms.

Because of its interoperability, going the open source route also doesnt have to mean businesses need to move away from their existing proprietary cloud architecture. Rather, it allows them to gain independence and create custom solutions where they most need them.

With collaboration and openness being the future of software and the future of cloud, if businesses want to remain both integrated and innovative, an open source cloud strategy is essential.

Related

Go here to read the rest:
The business benefits of using an open source cloud - IT-Online

Read More..

Samsung is increasing its semiconductor chip investment to $151 billion – SamMobile

Samsung is among the worlds leading semiconductor chip brands, and it had announced in 2019 that it will invest more than $115 billion by 2030 into its logic chip businesses. Now, the South Korean tech giant has announced that it is raising the investment target to a whopping $151 billion. This development comes amid the worst global chip shortage in decades.

The company announced earlier today that it has decided to invest an additional KRW 38 trillion (around $33.5 billion) into its logic chip businesses, increasing its target to KRW 171 trillion (around $151). This capital will be used in the development of advanced technologies and the expansion of its chip production capacity. The company has two logic chip businesses: Samsung Foundry (designs logic chips) and System LSI (contract manufactures chips for other brands). Samsung is investing in System LSI to accelerate its growth in new-age technologies like 5G, AI, and autonomous driving.

It also announced that it has started the construction of a new chip plant called P3 inPyeongtaek, South Korea. The new plant will start the mass production of 14nm DRAM chips and 5nm EUV-based processors by the second half of 2022. It is being reported that the P3 plant will open six months ahead of the original schedule, which means that the company will be flexible in terms of what it will fabricate at the facility.

Dr. Kinam Kim, Vice Chairman and Head of Device Solutions Division at Samsung Electronics, said, The entire semiconductor industry is facing a watershed moment and now is the time to chart out a plan for long-term strategy and investment. For the memory business, where Samsung has maintained its undisputed leadership position, the Company will continue to make preemptive investments to lead the industry.

Samsung is the worlds largest memory chip maker by revenue and market share, and it often launches the industrys best and newest technologies. A few days ago, it unveiled the industrys first CXL-based DRAM units that will be used in AI and cloud servers by various brands. However, in the foundry segment, it is the second-biggest brand after TSMC. TSMC usually beats Samsung in launching more advanced chip fabrication processes and the South Korean firms target is to defeat TSMC by the end of 2030.

Read more:
Samsung is increasing its semiconductor chip investment to $151 billion - SamMobile

Read More..