The world was rocked after the recent disclosure of the Meltdown and Spectre vulnerabilities that literally affect almost all software ever developed. Both issues are related to the way all modern CPUs are designed and this is why they have opened unprecedented security breaches -- making the software, including GridGain, vulnerable to hacker attacks.
In-Memory Computing Blogs and Events
Let me say at the outset, I am not a gambler! But at my 2nd daughter’s request (she turned 30 on Jan 1), on New Year’s Eve I found myself seated next to her husband, playing black jack at the Biltmore Casino in North Lake Tahoe. And lo and behold, 2018 started out great – we both beat the dealer and walked away winners…
In early December of 2017, the SAP Cloud Platform team also made a big bet – we wanted to make the customer experience exponentially better on the Cloud Platform website in 2018! We worked through the holidays and I am happy to introduce for 2018 a…
Intel Corporation considers how the business side of the house can think about its maturity with respect to advanced analytics.
Whatever your organization is looking to achieve from analytics, its ability to be data-driven depends largely on the stage it is at in its analytics journey. In Getting Started with Advanced Analytics, we map out five steps to maturity, each of which builds upon the one before. As organizations evolve, they move from a focus on historical “what happened and why” questions to more forward-looking outcomes, as follows:
- Descriptive – answers questions about what happened in the past
- Diagnostic – offers insight into why things happened
- Predictive – provides insight into what could happen in the future
- Prescriptive –…
MySQL is a widely used open-source relational database management system (RDBMS) and is an excellent solution for many applications, including web-scale applications. However, its architecture has limitations when it comes to big data analytics.
A closer look at the strengths and weaknesses of MySQL reveals several use cases where the RDBMS, powerful though it is, can benefit from some assistance. The following are the five limitations of MySQL in this area:
The case for learned index structures Kraska et al., arXiv Dec. 2017
Welcome to another year of papers on The Morning Paper. With the rate of progress in our field at the moment, I can’t wait to see what 2018 has in store for us!
Two years ago, I started 2016 with a series of papers from the ‘Techniques everyone should know’ chapter of the newly revised ‘Readings in Database Systems.’ So much can happen in two years! I hope it doesn’t take another ten years for us to reach the sixth edition of the ‘Red Book,’ but if it does, in today’s paper choice Kraska et al., are making a strong case for the inclusion of applied machine learning in a future list of essential techniques for database systems. I can’t think of a better way to start the year than wondering about this blend of old and new…
The internet is ablaze with articles and talk about hardware security flaws found recently in most modern processors, including chips from Intel and AMD – that is, in the processors used by everyone who runs software to provide a service. In other words, all of VoltDB’s customers. We are actively working on tests of our own and will share more information as we learn about these vulnerabilities and the effects of patching them on VoltDB software.
The vulnerabilities are known as Meltdown and Spectre. In the National Vulnerability Database, they are covered by 3 CVEs:
- Security Advisory CVE-2017-5753 — Spectre variant 1
- Security Advisory CVE-2017-5715 — Spectre variant 2
- Security Advisory CVE-2017-5754 — Meltdown
All Operating System…
In a recently published article1, there are unsubstantiated claims about Intel® Omni-Path Architecture (Intel® OPA) application performance vs Mellanox EDR InfiniBand*. This post is an effort to be completely transparent with regards to Intel OPA performance numbers and to correct some of the claims made in that article. To do so, we will provide the Intel-validated and substantiated performance of Intel OPA for ANSYS Fluent*, LS-DYNA and VASP. The article states that “Mellanox hauled out some benchmarks ran by Intel”1. Although we are not aware of the source, we will provide some data here on the test cases that were cited in the article.
The ANSYS Fluent application is a memory bandwidth sensitive application. This means each core benefits from having a larger share of the system memory bandwidth. So if you run the application on one system with 32 cores per node and one system with 36…
Traditional data warehouses and databases were built for workloads that manifested 20 years ago. They are sufficient for what they were built to do, but these systems are struggling to meet the demands of modern business with the volume, velocity, and user demand of data. IT departments are being challenged from both ends. On one side, companies want to analyze the deluge of data in real time, or near real time. On the other side, on the consumption end, the need to analyze and get value out of data is increasing exponentially. A decade ago, companies had a handful of analysts who ran reports and a few dashboards. Today, enterprises have armies of data scientists, analysts, and savvy business users wanting to slice and dice the latest data.
The “Flying Car” Dilemma
Companies have invested millions of dollars in procuring and customizing legacy systems. In addition to the capital expense, these companies have spent years hiring and training resources to support and…
Kubernetes is an open-source container orchestration system used to deploy, scale and manage containerized applications. Kubernetes is a project hosted by the Cloud Native Computing Foundation (CNCF). At a very high level, it contains two types of resources: a master node (which is the cluster coordinator) and nodes, which are the workers that run containerized applications.
Minikube is a tool used to run a Kubernetes cluster on a local machine. Minikube is a single-node Kubernetes cluster inside a VM on your laptop. Minikube can be used to try out Kubernetes and or develop with it day-to-day.
The Redis Enterprise offering extends Redis, the most popular database used with Docker containers. Redis Enterprise delivers high performance, low latency and high availability to organizations. This blog post will show you the basics steps needed to setup Minikube and run a 3-node Redis Enterprise cluster…
Happy New Year from the Database In-Memory team! We're going to jump right into the new year with lots of new information about Database In-Memory. You can join us at several upcoming events:
I will be in Irving, TX on January 17th for an Oracle Master Class. I will be presenting a Database In-Memory Deep Dive session and then a By Example session where you can see Database In-Memory in action. If you're in the Dallas area please plan on coming and saying hello. Registration is available here.
Next up will be the RMOUG Training Days 2018 conference (#TD2018) in Denver, CO on February 20-22. Hurry and register, the early bird deadline is January 12th, and this is a really great conference. One of the largest independent Oracle user group conferences in the US and Denver is a great place to visit.
I will then head to Norway for the…
Wi-Fi is the life force of connectivity. This is true in my home, where my family connects more and more devices each year — and not a single one is connected with a wire. My two boys are the heavy-bandwidth consumers; they game and stream A LOT of YouTube and Netflix content.
When Wi-Fi works smarter, consumers — my family included — get faster, smoother content streaming, online gaming, video calls and Internet browsing. In short, they get more fulfilling and productive experiences, and I get fewer complaints as the go-to home IT guy. That’s why Intel has always committed our technical and commercial expertise to the development of Wi-Fi standards and to offering leading Wi-Fi products.
The newest — and most exciting — IEEE standard for Wi-Fi, 802.11ax, is coming soon. In 2018, Intel will expand its home Wi-Fi portfolio with new 802.11ax chipsets for mainstream 2x2 and 4x4 home routers and gateways for cable, xDSL, fiber and consumer retail devices.
Intel Corporation considers how best to evaluate analytics projects to meet enterprise goals and grow business trust.
Wherever you are on the analytics journey, shifting up a gear can be a challenge. Many organizations we work with find that success comes incrementally, using a series of projects to develop capabilities, experience, and trust with lines of business.
Increasing business interest can create its own challenges as expectations increase and more project requests come your way, not all of which will be suitable. So, how do you avoid being swamped with requests and decide which projects should be prioritized? Which lines of business would benefit the most, or is most able to adapt to the insights you provide?
Since we set up Intel’s Advanced Analytics group in 2011, we have learned to prioritize projects based on criteria that maximize our chances of success. Alongside the level of potential impact, we have found that criteria such as…
My colleague Denis Magda, director of product management here at GridGain Systems, will be presenting a talk Jan. 17 on the architectural decisions behind distributed in-memory systems. The live webinar is free and you can participate by registering now to reserve your spot.
At the core of every digital transformation is mobile analytics. More than ever, businesses are focused on delivering growth and profitability with faster, better-informed decision making. And with enterprise mobility solutions, we can intelligently integrate strategic data assets to provide actionable insight with agility and innovation.
Mobile analytics represents the last mile in delivering actionable insight—the final bridge that connects decision to action.
While rapid growth in technologies such as cloud, big data, predictive analytics, the Internet of Things, and machine learning are all feeding a deluge of data, we are no longer short of information. And yet, we still long for insight, which is propelling businesses of all sizes—not just the Fortune 500—to find ways to harness the power of mobile analytics.
“I’m doing daily backups of my Spectrum Protect database, but is this enough to secure my Spectrum Protect server?”
It’s a question I hear frequently.
In my present job role in IBM Systems Lab Services, I do health checks on various IBM Spectrum Protect environments, and the number one recommendation in 9 out of 10 reviews has to do with disaster recovery implementations that are either nonexistent or don’t complete in a timely manner. Even though backup administrators understand the need to implement their disaster recovery solution correctly, it’s hard for them to convince upper management that it’s worth the cost.
The need for a reliable data protection solution is well known. It can:
- Protect against machine failure: If your backup server fails, how long can your business operate…