VMware acquires Bitfusion to virtualize hardware accelerators

dailyhostnews | July 22, 2019

VMware acquires Bitfusion to virtualize hardware accelerators
VMware has unveiled its plan to acquire the US-based startup Bitfusion to help enterprises more efficiently use artificial intelligence (AI) on-premises and in hybrid cloud environments.Founded in 2015, Bitfusion provides virtualization software for AI infrastructure, with a strong focus on GPU technology.Hardware accelerators like GPUs (graphic processor units), FPGAs (field-programmable gate arrays), and ASICs (application-specific integrated circuits) provide efficiency and flexibility into the AI space. But the hardware accelerators generally used are deployed with bare-metal practices, which aren’t much efficient. Virtualizing the hardware accelerators can speed up the sharing of resources and optimize costs.With Bitfusion acquisition, VMware will be well-positioned to support AI workloads by virtualizing hardware accelerators. Its solution brings more sophisticated management by “sharing of graphics card resources between isolated GPU workloads.

Spotlight

In this video, we’ll compare and contrast virtualization and container technologies, using Red Hat Enterprise Linux Atomic Host and Red Hat Enterprise Virtualization as our examples. We’ll detail a use-case map based on current and predicted feature sets of these technologies. You’ll see how, for many use cases, virtualization and container technologies often complement each other, leading to better performance, resilience, and flexibility.

Related News

Netmore Selects Affirmed Networks to Enable the Delivery of Private LTE Enterprise Networks for 4G, 5G and IoT Offerings

Affirmed Networks | August 19, 2020

Affirmed Networks, the leader in the virtualization of mobile networks, today announced that it has been selected by Netmore Group as the partner to deliver Private LTE Enterprise Networks and infrastructure. The partnership with Affirmed will enable Netmore to also deploy 5G enterprise services including IoT. Headquartered in Sweden, and with a presence in several European countries including the UK, Germany and Ireland, Netmore Group is a provider of IoT systems and services for properties, industries, cities and people. As part of their service offerings, Netmore delivers a range of communication technologies such as 2G, 3G, 4G, 5G, Wi-Fi and NB-IoT and is currently the leading LoRaWAN® supplier in the country.

Read More

Hitachi Vantara's Storage Platform Brings Large Enterprise Functions to Midsize Enterprise Customers

Hitachi | April 24, 2020

Hitachi Virtual Storage Platform E990 delivers enterprise features including high ratio deduplication and AI management. Hitachi's Storage Virtualization Operating System RF (SVOS RF) – the operating system used across its entire storage product line – so customers can manage. Hitachi is also getting into the pay-per-use sales model that other OEMs have embraced with a new program called EverFlex. Hitachi Vantara has introduced Hitachi Virtual Storage Platform (VSP) E990, the company's new storage platform aimed at bringing large enterprise functions to midsize enterprise customers. The E990 offers an NVMe-based, all-flash option with Hitachi's 100% data availability guarantee. It comes with Hitachi's Storage Virtualization Operating System RF (SVOS RF) – the operating system used across its entire storage product line – so customers can manage and replicate their data between SVOS RF systems and avoid creating silos of data. Read More: Best Practices to backup VMware vSphere Virtual Machines The E990 fits in between the high-end VSP 5000 product line and midrange E900, but it has all the enterprise capabilities of the VSP 5000. It comes in a 4U design with capacity for up to 24 NVMe SSDs, and it has a max raw internal capacity of 1.44PB when configured with 15TB of NVMe SSDs. In addition to its massive capacity, the E990 offers 5.79M IOPS of performance, allowing for massive consolidation of workloads, and Hitachi promises response times as low as 64 microseconds. The E990 is also powered by Hitachi's Ops Center, an artificial intelligence-driven management program that enables simplified storage provisioning for AI, machine learning (ML) and containerized applications. Hitachi claims the E990 with Hitachi Ops Center delivers 4:1 data de-duplication that's guaranteed to free up 75% of storage capacity. Ops Center's AI-enhanced management can streamline storage delivery by up to 90% for demanding applications and reduce manual storage provisioning tasks by up to 70%, the company says. Hitachi is also getting into the pay-per-use sales model that other OEMs have embraced with a new program called EverFlex. It provides consumption-based pricing models for the entire Hitachi Vantara portfolio, ranging from basic utility pricing to custom outcome-based services to Storage-as-a-Service. By enabling customers to pay only for what they use and align technology spending with business use, Hitachi claims customers can reduce costs by up to 20% and eliminate the need to pay for reserve capacity. Hitachi is introducing EverFlex with the E990 and plans to expand it to other products as well. Read More: Server Virtualization Benefits and Considerations About Hitachi Since its founding in 1910, Hitachi has responded to the expectations of society and its customers through technology and innovation. Our mission is to “Contribute to society through the development of superior, original technology and products.” Over the past 100+ years this commitment has led us to work towards creating a more sustainable society through our “Social Innovation Business”. We work to apply our expertise in information technology (IT), operational technology (OT), and a wide variety of products to advance social infrastructure systems and improve quality of life across the world.

Read More

SECURITY

Ransomware Study: Two Thirds of Security Professionals Believe Ransomware and Terrorism Threats are Equal

Venafi | December 27, 2021

Venafi, the inventor and leading provider of machine identity management, announced the findings of a global survey of more than 1,500 IT security decision makers that reveals that almost two-thirds (60%) of security almost two-thirds (60%) believe ransomware threats should be prioritized at the same level as terrorism. These opinions echo the U.S. Department of Justice, which raised the threat level of ransomware following the Colonial Pipeline attack earlier this year. The study also found that less than one-third of respondents have implemented basic security controls that break the ransomware kill chain. Other key findings include: Over two thirds (67%) of respondents from organizations with more than 500 employees experienced a ransomware attack over the last 12 months—a figure that rises to 80% for respondents from organizations with 3,000-4,999 employees. Over a third (37%) of respondents would pay the ransom but more than half of these (57%) would reverse that decision if they had to publicly report the payment, as required by the Ransomware Disclosure Act, a U.S. Senate bill that would require companies to report ransomware payments within 48 hours. Despite the rising number of ransomware attacks, more than three-quarters (77%) say they are confident the tools they have in place will protect them from ransomware attacks. Australian IT decision makers have the most confidence in their tools (88%), compared with 71% in the U.S. and 70% in Germany. Twenty two percent believe paying a ransom to be “morally wrong.” Seventeen percent of those breached admitted they paid the ransom, with U.S. respondents paying most often (25%) and Australian companies paying least often (9%). The fact that most IT security professionals consider terrorism and ransomware to be comparable threats tells you everything you need to know; these attacks are indiscriminate, debilitating and embarrassing. Unfortunately, our research shows that while most organizations are extremely concerned about ransomware, they also have a false sense of security about their ability to prevent these devastating attacks. Too many organizations say they rely on traditional security controls like VPNs and vulnerability scanning instead of modern security controls, like code signing that are built-in to security and development processes.” Kevin Bocek, Vice President ecosystem and threat intelligence at Venafi The study shows that most organizations are not using security controls that break the ransomware kill chain early in the attack cycle. Many ransomware attacks start with phishing emails that include a malicious attachment—but just 21% restrict the execution of all macros within Microsoft Office documents. Less than a fifth (18%) of companies restrict the use of PowerShell using group policy, and only 28% require all software to be digitally signed by their organization before employees are allowed to execute it. About the research Conducted by Sapio Research, Venafi’s survey evacuated the opinions of 1,506 IT security officers across the U.K., Australia, France, Germany, Benelux and the U.S. About Venafi Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted. With over 30 patents, Venafi delivers innovative solutions for the world's most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms; four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa.

Read More

Spotlight

In this video, we’ll compare and contrast virtualization and container technologies, using Red Hat Enterprise Linux Atomic Host and Red Hat Enterprise Virtualization as our examples. We’ll detail a use-case map based on current and predicted feature sets of these technologies. You’ll see how, for many use cases, virtualization and container technologies often complement each other, leading to better performance, resilience, and flexibility.