Do Supercomputers Lead To Downtime?
As supercomputers grow more powerful, they’ll also become more susceptible to failure, thanks to the increased amount of built-in componentry. A few researchers at the recent SC12 conference, held last week in Salt Lake City, offered possible solutions to this growing problem.
Today’s high-performance computing (HPC) systems can have 100,000 nodes or more — with each node built from multiple components of memory, processors, buses and other circuitry. Statistically speaking, all these components will fail at some point, and they halt operations when they do so, said David Fiala, a Ph.D student at the North Carolina State University, during a talk at SC12.
The problem is not a new one, of course. When Lawrence Livermore National Laboratory’s 600-node ASCI (Accelerated Strategic Computing Initiative) White supercomputer went online in 2001, it had a mean time between failures (MTBF) of only five hours, thanks in part to component failures. Later tuning efforts had improved ASCI White’s MTBF to 55 hours, Fiala said.
But as the number of supercomputer nodes grows, so will the problem. “Something has to be done about this. It will get worse as we move to exascale,” Fiala said, referring to how supercomputers of the next decade are expected to have 10 times the computational power that today’s models do.
Today’s techniques for dealing with system failure may not scale very well, Fiala said. He cited checkpointing, in which a running program is temporarily halted and its state is saved to disk. Should the program then crash, the system is able to restart the job from the last checkpoint.
The problem with checkpointing, according to Fiala, is that as the number of nodes grows, the amount of system overhead needed to do checkpointing grows as well — and grows at an exponential rate. On a 100,000-node supercomputer, for example, only about 35 percent of the activity will be involved in conducting work. The rest will be taken up by checkpointing and — should a system fail — recovery operations, Fiala estimated.
Because of all the additional hardware needed for exascale systems, which could be built from a million or more components, system reliability will have to be improved by 100 times in order to keep to the same MTBF that today’s supercomputers enjoy, Fiala said.
Fiala presented technology that he and fellow researchers developed that may help improve reliability. The technology addresses the problem of silent data corruption, when systems make undetected errors writing data to disk.
IBM Beefs Up
IBM is unveiling a new version of its Connections enterprise social networking (ESN) software, which businesses use to give their employees social media capabilities adapted for workplace collaboration, such as employee profiles and blogging.
Enhancements in IBM Connections 4.0 include a more interactive activity stream, broader support for mobile devices, more granular usage analytics and integration with email and calendar systems, according to Heidi Ambler, director of product management for IBM Social Software. It is available immediately.
“This new release helps customers grasp the power of social analytics, gives them anytime-anywhere access to the software and provides cutting-edge capabilities,” she said.
Instead of a list-like news feed, the new software has an activity stream in employee profiles that users can filter for relevance, as well as act on the notifications right from the Connections interface.
For example, users can trigger pop-up boxes from the activity stream notifications and see the latest comments made about a file, see who posted the latest version of it and add tags to it.
An integration with IBM’s own Lotus Notes-Domino and with Microsoft’s Outlook-Exchange email and calendar systems lets users manage email messages through Connections.
Good Technology Updates Security
July 25, 2012 by admin
Filed under Uncategorized
Comments Off on Good Technology Updates Security
Good Technology today announced two updates to its mobile security software products across IOS, Android and Windows Phone devices.
Powering mobile security for major enterprises such as Barclays, Sainsbury’s and LOCOG, Good Technology claims the releases are the first of a kind for the industry and address security threats linked to the bring your own device (BYOD) procedures being used in most big companies.
The first update announced by the firm is the addition of what it calls “Appkinetics” to its Good Dynamics line, which aims to solve the problem of secure private corporate data leakage.
“Good’s patented AppKinetics technology builds on the company’s proven ‘containerization’ security model to enable business apps from Good, its Good Dynamics partner independent software vendors (ISV), and internal enterprise developers,” the firm said in a statement.
“This is to securely exchange information within and between applications and create seamless multi-app workflows without compromising security or employees’ privacy and personal experience.”
The firm’s second update is the addition of eight new partnered apps to its Good Dynamics ecosystem covering the areas of business intelligence, collaboration, document editing, document printing, file storage/content management, remote desktop management and mobile application development platforms (MADPs).
This update allows developers to integrate the Good Dynamics technology into apps so that companies can create secure end-to-end workflows of protected, mobile applications to drive business processes.
Good Technology’s EMEA GM Andy Jacques explained, “If you download the standard consumer document editing application you can copy and paste from that from that app into another app.”
He continued, “If you were to open a piece of corporate mission critical data you can copy and paste that and put it onto Hotmail for example.”
Skype Confirms Glitch
July 23, 2012 by admin
Filed under Around The Net
Comments Off on Skype Confirms Glitch
Skype, a division of Microsoft, confirmed on Monday that a bug in its software has led to instant messages being shared with unintended parties.
The company said it will provide an update to fix the problem in “the next few days.”
According to user reports, the unintended recipients have been connected to just one of the two users who exchanging messages. The problem could have harmful consequences. For example, two co-workers using Skype to exchange IMs (instant messages) could, as a result of the problem, share the message with another contact in one user’s address book — potentially a third co-worker being unfavorably described in their IM exchange.
According to Skype, the problem only arises in “rare circumstances.”
The issue first came to light last week in Skype’s user forums. It seems to stem from the update issued by the voice, video and text messaging service in June.
Is Iridium A Friend Of Cellular Phones?
June 13, 2012 by admin
Filed under Smartphones
Comments Off on Is Iridium A Friend Of Cellular Phones?
Cellular phones squashed Iridium once, but in its second coming the satellite phone maker and owner of the biggest satellite fleet is relying on them to resurrect their business.
For all their seeming ubiquity, cellular services cover only about 8 percent of the globe, leaving large regions where the only way to communicate is to use a satphone made by Iridium Communications Inc or one of its smaller competitors.
“The need for communication devices and services where terrestrial can’t be there is rising, and as bandwidth needs increase it’s surely helping Iridium,” Macquarie Research analyst Amy Yong said.
Investors have taken notice, pushing up the stock of the company nearly 50 percent over the past eight months.
“It’s a different company, with a prudent and successful financial model,” Raymond James analyst Chris Quilty said.
“They’re growing, they have extraordinarily high barriers to entry and some of the end markets and applications they’re targeting are vast and untapped,” he said.
Unlike its competitors, Iridium’s satellite constellation covers the entire globe, including the poles, and its array of 66 satellites dwarfs the fleets of its rivals. Inmarsat Plc has 11; GlobalStar has eight and is aiming to have 32 in orbit by the year-end; Thuraya has three, with one planned.
Twitter Wants To Email You
May 23, 2012 by admin
Filed under Around The Net
Comments Off on Twitter Wants To Email You
Twitter will begin delivering a weekly email digest to highlight for users of the micro-blogging site the tweets they are most likely to be interested in, the company stated on Monday.
The feature marks a departure for a social network that typically emphasizes real-time delivery of information.
How will Twitter determine which tweets a user may want to see? Twitter spokesman Robert Weeks said the digest will feature the tweets that the “people you’re connected to on Twitter are engaging with the most.”
From the email digest, users will be able to see the conversation about a particular tweet, follow shared links and send out their own tweets. The digest will include tweets not just from a user’s own feed but also from the feeds of people he or she follows.
Is Twitter Selling Your Tweets?
March 9, 2012 by admin
Filed under Around The Net
Comments Off on Is Twitter Selling Your Tweets?
Twitter users are about to become major marketing meat, as two research companies prepare to release information to clients who will pay for the rights to mine that data.
Boulder, Colorado-based Gnip Inc and DataSift Inc, based in the U.K. and San Francisco, are licensed by Twitter to analyze archived tweets and basic information about users, like geographic location. DataSift announced this week that it will release Twitter data in packages that will encompass the last two years of activity for its customers to mine, while Gnip can go back only 30 days.
“Harvesting what someone said a year or more ago is game-changing,” said Paul Stephens, director of policy and advocacy for the Privacy Rights Clearinghouse in San Diego. As details emerge on the kind of information being mined, he and other privacy rights experts are concerned about the implications of user information being released to businesses waiting to pore through it with a fine-tooth comb.
“As we see Twitter grow and social media evolve, this will become a bigger and bigger issue,” said Graham Cluley, senior technology consultant for British-based Internet security company Sophos Ltd. “Online companies know which websites we click on, which adverts catch our eye, and what we buy … increasingly, they’re also learning what we’re thinking. And that’s quite a spooky thought.”
Twitter opted not to comment on the sale and deferred questions to DataSift. In 2010, Twitter agreed to share all of its tweets with the U.S. Library of Congress. Details of how that information will be shared publicly are still in development, but there are some stated restrictions, including a six-month delay and a prohibition against using the information for commercial purposes.
Remote Access Tools Threatens Smartphones
March 7, 2012 by admin
Filed under Smartphones
Comments Off on Remote Access Tools Threatens Smartphones
Malware tools that allow attackers to gain complete remote control of smartphones have become a major threat to owners around the world, security researchers say.
In a demonstration at the RSA Conference 2012 here Wednesday, former McAfee executives George Kurtz and Dmitri Alperovitch, who recently founded security firm CrowdStrike, installed a remote access tool on an Android 2.2-powered smartphone by taking advantage of an unpatched flaw in WebKit, the default browser in the OS.
The researchers showed an overflow audience how the malware can be delivered on a smartphone via an innocuous looking SMS message and then be used to intercept and record phone conversations, capture video, steal text messages, track dialed numbers and pinpoint a user’s physical location.
The tools used in the attack were obtained from easily available underground sources, Kurtz said. The WebKit bug, for instance, was one of 20 tools purchased from hackers for a collective $1,400.
The remote access Trojan used in the attack was a modified version of Nickispy a well-known Chinese malware tool.
Learning how to exploit the WebKit vulnerability and to modify the Trojan for the attack, was harder than expected, said Kurtz. He estimated that CrowdStrike spent about $14,000 in all to develop the attack.
But the key issue is that similar attacks are possible against any smartphone, not just those running Android, he said.
WebKit for instance, is widely used as a default browser in other mobile operating systems including Apple’s iOS and the BlackBerry Tablet OS. WebKit is also is used in Apple’s Safari and Google’s Chrome browsers.
Several mobile remote access Trojans are already openly available from companies pitching them as tools that can be used to surreptitiously keep tabs on others.
Apple Goes Down In Court
Apple has lost a move in US District Court in San Francisco to keep some of its software ‘secrets’ out of view of the public.
It had asked Judge William Alsup to keep documents sealed that had surfaced in its lawsuit against Psystar, Bloomberg reports. The information about Apple’s Mac OS X operating system covers topics such as technological protection measures, system integrity checks and thermal management techniques.
The court turned down Apple’s request, however, noting that the company didn’t deny that the information was already public or claim that it had been misappropriated. Apple had argued that it still deserved trade secret protection because it didn’t release the information and had never confirmed it, but that didn’t convince Judge Alsup.
The information at issue is available on a web site about the Mac OS X operating system, the judge noted, adding that Apple’s decryption key haiku is available to any user that compiles and runs publicly available source code on a Macbook Air laptop.
.
Yahoo Messenger Flaw Exposed
December 10, 2011 by admin
Filed under Around The Net
Comments Off on Yahoo Messenger Flaw Exposed
An unpatched Yahoo Messenger vulnerability that allows hackers to change people’s status messages and possibly perform other unauthorized functons can be exploited to spam malicious links to a large number of users.
The flaw was discovered in the wild by security researchers from antivirus vendor BitDefender while investigating a customer’s report about unusual Yahoo Messenger behavior.
The flaw appears to be located in the application’s file transfer API (application programming interface) and allows attackers to send malformed requests that result in the execution of commands without any interaction from victims.
“An attacker can write a script in less than 50 lines of code to malform the message sent via the YIM protocol to the attacker,” said Bogdan Botezatu, an e-threats analysis & communication specialist at BitDefender.
“Status changing appears to be only one of the things the attacker can abuse. We’re currently investigating what other things they may achieve,” he added.
Victims are unlikely to realize that their status messages have changed and if they use version 11.5 of Yahoo Messenger, which supports tabbed conversations, they might not even spot the rogue requests, Botezatu said.
This vulnerability can be leveraged by attackers to earn money through affiliate marketing schemes by driving traffic to certain websites or to spam malicious links that point to drive-by download pages.