This Internet Of Things Hardware Kit May Be A Maker’s Best Friend

first_imglauren orsini Tags:#ARM#developer tools#IBM#Internet of Things#prototyping Growing Phone Scams: 5 Tips To Avoid Related Posts Two leading technology companies have joined forces to concoct a speedier way of building Internet of Things prototype or test devices. Chip designer ARM and IT giant IBM devised a kit for testing out connected gadgets that lets hardware developers get started in just five minutes. The idea is to speed up the process of building prototypes for connected gadgets. It may also help software development, giving app and feature makers hardware for testing purposes, and offer tinkerers, hackers and makers a way to create their own connected devices. As Zach Shelby, ARM’s vice president of marketing, told the BBC: [It’s for] anybody who is into making products, whether they are makers who have a Kickstarter idea … all the way up to the device engineers for the big companies.Here’s a closer look at the kit. The Nuts And BoltsThe Internet of Things Mbed Device Platform kit consists of two boards: a microcontroller development board with an ARM Cortex-M4 processor, and a sensor expansion board. Mbed refers to the ARM software that acts as the operating system, which will chiefly rely on open standards. The units connect to IBM’s Bluemix cloud platform. The sensor expansion board is designed to capture readings in any way connected devices might need. It contains a thermometer to measure temperature, an accelerometer for motion, two potentiometers (or rotating dimmer knobs) for light-related gadgets, a buzzer, a small joystick, an LED light that can be adjusted to show up to three different colors, and a rectangular black-and-white LCD display. See also: The Internet Of Things Will Be A Hotel California For Your DataThe two boards are compatible, and can connect to the Internet via ethernet cable or to other hardware components through USB. While some companies are already actively testing prototypes, others who just hitting the crucial starting point of hardware development could find the kit very useful—and affordable. The price will run between $50 and $200 retail, depending on the options. Connecting Developers And Tinkerers While the kit is being marketed primarily to technology companies, everything from the lower price to the advertised five-minute install makes it seem like a great choice for hobbyists. This kit is just the latest in what looks like a concerted push to help would-be makers create Internet-of-Things technologies. Other companies also offer kits for would-be makers, some of which are even less expensive—Broadcom’s compact little WICED Sense kit costs just $20. The ARM Mbed bundle is not yet available for sale, but both ARM and IBM said in a statement that they expect the first products developed with it to enter the consumer market this year.Photo via IBMcenter_img How to Write a Welcome Email to New Employees? 7 Types of Video that will Make a Massive Impac… Why You Love Online Quizzeslast_img read more

Engineers Bring A New Open-Source Siri To Life

first_imgClarity Lab engineers review their work on SiriusGoogle has Google Now, Apple has Siri and Microsoft has Cortana—these personal digital assistants are playing an increasingly dominant role on mobile and desktop. Now researchers from the University of Michigan have unveiled an open-source alternative called Sirius, the latest of several similar open-source efforts along the same line.Mobile phone makers, wearable startups and app developers could all potentially use Sirius to bring some instant smarts to their projects in the not-too-distant future, Jason Mars, one of the co-directors at U-M’s Clarity Lab where the system has been developed, said in a video:Unlike Google Now, Siri and Cortana, Sirius is free to use and can be customized as required by anyone interested in the technology. “Now the core technology is out of the bag, and we all have access to it,” says Mars in a press statement. “Instead of making an app to run on the Apple Watch, for example, maybe I could make my own watch. We’re very excited to see what the world comes together to build and learn with Sirius as a starting point.”The Sirius system comprises speech recognition, image matching, natural language processing and a question-and-answer mechanism powered by the cloud. It could, for example, answer the question “when does this place close?” when shown an image of a restaurant.Being able to ask questions about what you’re seeing is one of the unique features of Sirius, according to Clarity Lab doctoral student Johann Hauswald, and helps to differentiate it from similar open-source projects in the same area.Those projects include Jasper, which can bring voice control to almost any device (such as the Raspberry Pi), and JuliusJS, which focuses on adding Siri-style commands to Web apps. Sirius goes further than both though, building on the basics of voice control to add natural language interpretation, intelligent responses and image recognition.Data Center ArchitectureUnlike Jasper or JuliusJS, Sirius does more than identify a voice command and act accordingly. It’s also designed to push the boundaries of data center system architecture, providing an open source approach that other digital assistants can make use of in the years ahead as they become more knowledgeable, more capable, and more widespread.The demo version of Sirius, which the team will show off on March 14 at an international technology conference, is based around a static version of Wikipedia. Users can ask factual questions and get answers back. The researchers will release the software code shortly after.That database of Wikipedia entries could be swapped out for anything else a company likes: Academic research, auto repair manuals, cooking tips, a database of medicines, and so on.The system was built by stitching together open source projects from various institutions and companies, including Microsoft Research and Qualcomm. Other firms and agencies—among them Google, ARM, the Defense Advanced Research Projects Agency (DARPA) and the National Science Foundation—provided funding, Although Linux may not have much of the desktop PC market, it has the honor of running many of the world’s servers and mainframes, and it’s the foundation of Android. In the same way, the team behind Sirius wants their project to act as the bedrock of the digital assistants of the future.Photo by Joseph Xu, Michigan Engineering, Communications & Marketing, University of Michigan Role of Mobile App Analytics In-App Engagement Why IoT Apps are Eating Device Interfaces Related Posts Tags:#Cortana#digital assistants#Google Now#mobile#Siri center_img david nield What it Takes to Build a Highly Secure FinTech … The Rise and Rise of Mobile Payment Technologylast_img read more

CBO Report on House-Passed Health Care Bill Indicates 23 Million Would Lose Coverage

first_imgCCH Tax Day ReportRoughly 23-million fewer individual would have health insurance and the deficit would be cut by $119 billion over the next 10 year if the House-passed American Health Care Act of 2017 (HR 1628) (TAXDAY, 2017/05/05, C.1) becomes law, according to much-anticipated analysis released by the Congressional Budget Office (CBO) and the staff of the Joint Committee on Taxation (JCT). The question remains how this data will affect efforts by the Senate to move forward with a version of HR 1628 that could eventually find its way to the president’s desk.The non-partisan CBO and JCT estimate that 14-million more people than under current law would become uninsured under the House version of HR 1628, gradually rising to 23-million more in 2026. Those forecasts mirror estimates made by the CBO in connection with the earlier version of HR 1628 that, on March 24, was pulled by GOP leadership from House consideration (TAXDAY, 2017/03/27, C.1).The CBO and the JCT also estimate, however, that, over the 2017-2026 period, HR 1628 would reduce direct spending by $1,111 billion and reduce revenues by $992 billion, for a net reduction of $119 billion in the deficit. That net figure may allow HR 1628 to move forward in the Senate under a budget-reconciliation process requiring only a majority vote. The reports show that the largest savings would come from reductions in outlays for Medicaid and from the replacement of Patient Protection and Affordable Care Act (ACA) (P.L. 111-148) subsidies for nongroup health insurance with new tax credits. They also indicate that there would be a $664-billion revenue loss from the repeal or delay of taxes on higher-income individuals, such as the net investment income tax, fees on manufacturers of medical equipment, and ACA excise taxes, as well as the modification of various tax preferences for medical care.Following the CBO release of its cost estimates, Rep. Lloyd Doggett, D-Tex., ranking Democrat on the House Ways and Means Tax Policy Subcommittee, said, “CBO confirms that the Republican repeal bill remains a real loser, with millions still losing their access to a family physician while costs soar.” Ways and Means Committee ranking member Rep. Richard Neal, D-Mass., stated, “Today’s updated CBO score reaffirms the disturbing reality of Trumpcare: tens of millions of Americans would lose their health insurance and millions more would be forced to pay dramatically more for less coverage—all to pay for tax cuts for millionaires and corporations.”At press time, GOP House and Senate leadership were expected to coordinate their response to these latest numbers, as well as a revised strategy on how to reconcile competing factions among GOP members.By George Jones, Wolters Kluwer News StaffCBO Cost Estimate on HR 1628, the American Health Care Act of 2017JCT Estimated Revenue Effects of the Tax Provisions Contained in Title II of the HR 1628, the American Health Care Act of 2017, as Passed by the House, JCX-27-17last_img read more

California EDD Extends Payroll Tax Deadlines for Employers Affected by Wildfires in Mariposa and Santa Barbara Counties

first_imgThe California Employment Development Department (EDD) is extending deadlines for employers in Mariposa and Santa Barbara Counties who were directly affected by the wildfires that began on July 16, 2017, and July 6, 2017, respectively. Qualifying employers may request up to a 60-day extension of time from the EDD to file their state payroll reports and/or deposit state payroll taxes without penalty or interest. Written requests for extension must be received within 60 days from the original delinquent date of the return or payment. Details are available on the EDD’s website at http://www.edd.ca.gov/Payroll_Taxes/Emergency_and_Disaster_Assistance_for_Employers.htm.Emergency and Disaster Assistance for Employers, California Employment Development Department, July 2017last_img read more

Mizzou women stun No. 5 Mississippi State

first_imgMizzou women’s basketball upset No. 5 Mississippi State 75-67 on the road on Thursday night.The Bulldogs (22-2, 10-1) had won 30 straight home games, and 26 straight SEC regular season games overall.Despite dealing with illness, Sophie Cunningham scored 24 points. She became the third Tiger ever with 2,000 points in her career. She also set the all-time record for career free throws made during the contest.The Tigers (19-7, 8-4) next head into a home showdown with Tennessee on Sunday afternoon.last_img read more

Hong Kong airport shuts down amid pro-democracy protest

first_img(AP) — One of the world’s busiest airports canceled all flights after thousands of Hong Kong pro-democracy protesters crowded into the main terminal Monday afternoon.Hong Kong International Airport said in a statement that the demonstration “seriously disrupted” airport operations.Hong Kong has experienced more than two months of mass protests calling for democratic reforms and an independent inquiry into police conduct, with both the protesters and police adopting ever-more extreme tactics.In Beijing, the Cabinet’s Hong Kong and Macao Affairs Office issued a statement saying the situation in Hong Kong was “beginning to show the sprouts of terrorism” and constituted an “existential threat” to the population of Hong Kong.“One must take resolute action toward this violent criminality, showing no leniency or mercy,” said the statement, attributed to spokesman Yang Guang. “Hong Kong has reached an inflection point where all those who are concerned about Hong Kong’s future must say ‘no,’ to law breakers and ‘no’ to those engaged in violence.”Only flights that had already begun boarding or those cleared for landing were allowed to use runways at the airport.“All other flights have been canceled for the rest of today,” the airport statement said.A massive traffic jam soon formed on the highway leading back to Hong Kong’s city center. Some protesters were seen walking toward the airport amid the stifling heat.Earlier Monday, Hong Kong police showed off water cannons that could be deployed in the case of future demonstrations, a development which Amnesty International has warned could lead to serious injuries if misused within the densely-populated city’s confined spaces.Legislators and journalists were invited to witness the display of extreme crowd control tactics, which came after a weekend of protests at the airport and on the streets of one of the city’s main shopping districts.During the weekend protests, website Hong Kong Free Press showed footage of one arrest that appeared to include officers in plain clothes pinning a demonstrator pressed to the ground. The young man, who said his name was Chow Ka-lok and asked for a lawyer, was shown with a bleeding head wound and said he had a broken tooth.Police have also reported injuries among their ranks, including eye irritation from laser pointers, burns from petrol bombs and bruises and cuts from flying .Protesters hurled bricks at officers and ignored warnings to leave before tear gas was deployed in the Sham Shui Po area, police said, calling a march there an “unauthorized assembly.”Tear gas was also deployed in central Hong Kong on both sides of Victoria Harbour, in the Tsim Sha Tsui area on the Kowloon side and in Wan Chai on Hong Kong Island. At one point, protesters blocked the entrance to a plaza to prevent police from entering.A train station in Kwai Fong filled with smoke after about a dozen police officers fired tear gas inside. It was not clear how many protesters were inside the station at the time, but it has been rare for officers to fire tear gas indoors.Earlier, a large group of mostly young protesters marched down the middle of Hennessey Road, a main shopping drag in the Causeway Bay area, as a rally was held in nearby Victoria Park. Many wore face masks to shield their identities, and a few had helmets. Others just carried backpacks over the black T-shirts that have become their uniform.The protest movement’s demands include the resignation of the Chinese territory’s leader, Carrie Lam, democratic elections for her successor, the release of those arrested in earlier protests and an investigation into police use of force.A former British colony, Hong Kong was returned to China in 1997 under the principle of “one country, two systems,” which promises the city certain democratic rights not afforded to people on the mainland. But in recent years, some have accused the Communist Party-ruled central government of steadily chipping away at their freedoms.Banners at the rally in Victoria Park read “Give Hong Kong back to us” and “Withdraw the evil law,” the latter a reference to an extradition bill that was the original spark for the protests. A large crowd sat under umbrellas, which are both a protest symbol in Hong Kong and protection from the summer heat.At the airport, a flight attendant protesting on his day off, who gave only his surname, Lau, to avoid repercussions from his employer, said heavy-handed police tactics had alienated some people.“The police have told a lot of lies to Hong Kong people. We cannot believe them anymore. We have to come here to protest,” Lau said. China has reportedly threatened to bar air crew who take part in protests from its air space.Another protester, who identified herself only as Bea, said she took the day off from work to express her outrage.“I feel that I have to do something. … It’s just too sad to see what has happened. The police action has gone totally nonsensical,” she said.last_img read more

Columbia men sentenced on separate meth charges

first_imgTwo Columbia men get their prison sentences in federal court for meth related charges Thursday.Travis Hall got 10 years for intent to distribute meth, while Elfonta Stevens is going away for 7 and a half years.Stevens was facing both intent to distribute meth and illegal gun possession charges.last_img

Jefferson City police investigate homicide on Rolling Hills Dr.

first_imgJefferson City police are investigating an early morning murder.Investigators say they got several reports of gunshots at about 3 a.m. Thursday on Rolling Hills Dr. near Highway 179 and Route C. Officers found someone shot to death when they got there.We don’t know the name of the victim yet. No info on suspects right now either.last_img

Virtualization 2.0 and Data Center Architectures – what can IT expect?

first_imgLicensing in Virtual environments:  Licensing rules for applications, development tools, data management tools and operating systems often make a completely virtual environment more costly than the organization expects.   Most all ISVs are looking at ‘virtualization’ friendly licensing models, but they are far from being there.  Example:  With Oracle database servers, if you have a 16core server as your host, it doesn’t matter if you database VM uses 4 vCPUs, you would still need the license for 16 cores.  If you would “Live Migrate” the VM, you would need the license on each of the host… This gets prohibitively expensive and impractical. 10G Networks and Converged Fabrics: The Compute power on the servers has increased dramatically, and with the advent of 8 core processors, the bottleneck clearly moves out of the server, and on to the network and storage bandwidths and throughput.  Virtualization 2.0 will require the consolidation of network traffic and will also increase the need for more bandwidth to the server, both of which will be possible as enterprises make the move to converge and consolidate data, storage, and inter process traffic on 10GbE networks.  10GbE and the converged networks need new switches, access cards, and also a rethink of how applications view the network I/O.   Virtualization 1.0 is yesterday’s news; the days of virtualization being used only as a tactical tool to drive consolidation and higher system utilization are quickly ending. For the most part, companies have figured out how to get improved utilization, and are using server virtualization in a wide range of usage models across development, testing and some rather interesting production/mission-critical scenarios.   Its use is gradually maturing from simple partitioning and encapsulation to leveraging the mobility of virtual machines to improve management and operations of IT environments. This is allowing the change in deployment models for virtualization from typical scale-up approach (SMP with large Memory servers) to a scale-out model.Virtualization 2.0 includes a host of new use cases (shouldn’t be surprising to anyone) that include:·         Load-balancing for SLA Mgt·         Power-optimization·         High availability (no downtimes)·         Disaster recovery and business continuity·         Hosted clients·         SOA & Utility computing.I see three key foundational tenets as the underpinnings for these usages.  First are the “abstraction” and the “convergence” of compute servers, storage and networks. It has been happening, but virtualization 2.0++ is driving (and will continue to drive) a seismic rethink in how Data centers are architected, and the data center would be a “Fungible” pool of infrastructural resources, for a wide variety of services that IT provides to run the businesses.   I will get deep into the implications of this to IT operations, etc, in a follow on blog, but will leave you with this thought.  The new control point in the data center, both architecturally and operationally, would be the integration of compute, storage and network virtualization architectures.  Key industry players like IBM, HP, Cisco, EMC, VMWare and Microsoft are introducing integrated solution architectures targeted at positioning themselves as the first vendor of choice for this emerging direction.  This foundational tenet, coupled with the merits of Service-Oriented Architectures (SOA), is providing an infrastructure for ‘Cloud Computing’.The Second core tenet is the mobility of Virtual machines – The migrate-ability of the ‘encapsulated’ Virtual machines on this abstracted infrastructure for the best performance, operational cost and SLA management.  They are no longer tied to a server or a set of servers. In some cases they are not tied to a datacenter; hybrid models are emerging where these VMs would execute in the ‘enterprise’ data center, or on external clouds – the optimal place for the best TCO, and SLA management  (Yes, yes, there are security, compliance, accounting, performance concerns… I agree)The third core aspect is Manageability.  The abstraction and the mobility, coupled with IT’s job of ensuring security, reliability and compliance brings a totally new set of requirements for Manageability.   If done right, the benefits of Virtualization 2.0 (and 2.0++) to IT shops would be in the form of reduced administrative costs, improve productivity even as demand goes, reduce energy and cooling costs, etc,   however, there are quite a few challenges with the adoption of Virtualization 2.0.  Let us briefly look at these.Challenges with Virtualization 2.01.      There is a significant challenge in the management of large scale virtual infrastructures. There are no clear boundaries and responsibilities in terms network, storage and datacenter management teams.  The emphasis on monitoring and management in Virtualization 2.0 is shifting from virtual machine (VM) management to service management; i.e., knowing how a business service is performing and which components of the Data Center (network, server, VM, applications) are working properly and which are not. Hence, it’s no longer sufficient to just monitor the uptime or resource usage levels of virtual machines and physical servers and conclude that the entire IT infrastructure is working right.   More granular monitoring and management of resources would be needed to provide precise QoS and SLA management.2.      VM Mobility – The Mobility of Virtual machines puts requirements on the underlying server CPU architectures, and has challenges with networks and storage.  Such mobility occurs via either a cold migration – which simply copies the virtual machine and restarts a copy somewhere else. Or a live migration, which moves a live running virtual machine, while maintaining state.  There are clear cases where cold migration is sufficient, but the flexibility and agility that is inherent with the virtualization 2.0 use-models requires the ‘live migration’ of VMs. ·         VM Mobility and the ‘Compatible CPU Architecture’ requirements: Successful migration relies on compatibility between the processors of the host servers within a cluster. For live migration to take place, the source and destination servers must be in the same cluster and must have processors that expose the same instruction set., In the past, it has not been possible to mix servers based on different processor generations, each of which support different instruction sets, within the same cluster without sacrificing the ability to live migrate VMs across hosts supporting different instruction sets. As a result, IT organizations have needed to create separate clusters for different server generations. This has limited our ability to provide an agile data center environment because it creates islands of compute capacity, resulting in data center fragmentation.  Intel’s VT FlexMigration assist, together with VMWare’s Enhanced VMotion, provide a solution. These products are designed to allow IT to maximize flexibility by creating a single pool of compute and memory resources using multiple generations of Intel processor-based servers within the same cluster.  This can reduce the number of pools, increase the efficiency and utilization of servers.·         VM Mobility & networks: Today, when Virtual machines move on the virtual infrastructure, its network properties and policies are not retained.  Connection state, ACL, Port Security properties, ACL Redirect, Qos Marking, etc are lost as these VMs move across hosts.   Technologies like the VMWare distributed switch, and Cisco’s Nexus 1000v are specifically targeted to address the ‘Network and Security’ aspects of VM Mobility. Security and Isolation guarantees – The hosting of multiple ‘services’ on an abstracted virtualized infrastructure has very specific needs on Security and isolation, multi-tenancy isolation, compliance and audit requirements..  In addition to providing these on a server (for a given service), the infrastructure has to guarantee these across the infrastructure – doesn’t matter on which server (and where) the service and data reside/execute, they need to be secure and isolated. center_img In conclusion, Virtualization 2.0 would have a dramatic impact on the architecture of the data center, and also IT architectures and operations.  IT shops will use virtualization for administrative cost reduction, better resource allocation, and more flexibility in a mobile world.   Coupled with Service Oriented Architectures,, the promise of true service-oriented/utility computing might be closer than it has ever been with Virtualization. Would love to hear your thoughts and views on this..last_img read more

Can a house have too much tech?

first_imgI was wandering around the house last night listening to the persistent hum of technology all around me. I realized that I might possibly have more technology in my house than pieces of furniture, so I started to add it all up to see what in the world had happened to my once peaceful and quiet life.Starting from the fibre coming in I’ve got a Netgear* switch. Attached to that is a linux server that faces the world, and a Netgear Wireless-N router that manages the internal house network. The Wireless-N supports a Vista* 64 desktop, Vista 32 notebook, XP* Notebook, my iPhone*, and a Linksys* Wireless-G router in another room.Off the Wireless-G router we’ve got a Vista 32 notebook, XP desktop, two Apple* Airport Express* devices (for music streaming to living room and back yard), and a Dell* Wireless-G access point.Off the Wireless-G access point we’ve got the Xbox* 360, Nintendo Wii*, DVD player, and DVR connected (for on-demand downloads).It’s actually more complex than it needs to be, but only because I haven’t finished upgrading the house to Wireless-N, and because I still haven’t got around to building a media center PC in the living room which could replace the DVR, DVD, and one of the Airport devices. (by the way, I’m going to be building my own Core i7* based system in the next couple of months – so stay tuned for a play-by-play)I’m actually amazed at all the tech that is required to do some very simple things that I want to do – like streaming music from my computer across the house into the stereo in the living room. Right now we’re using an Airport Express to do that (along with iTunes* and AirFoil*), but why can’t my stereo have a network plug so I can send to it directly?Which begs the question, why isn’t EVERYTHING in the house network aware at this point, I mean it’s 2009 right? My TV should be wireless or bluetooth at a minimum, so should the stereo. And while I’m at it, why not the refrigerator so that I can constantly pull an inventory based on RFID tagging of products…and the thermostat so I can remotely manage it…and the alarm system…and the outdoor sprinkler system…the list goes on.But can it be too much? Even if I close the office doors at night I can still hear the hum of hard drives, CPU fans, router fans – it echos all over the house (not to mention heats up the house quite a bit). I really don’t want my house to become a data center, I just want to be able to do what I want to do! I want music no matter where I am, I want to watch movies on any system in the house, I want to be able to access every computer from every other computer…my demands aren’t that big are they? 🙂So I want to hear about YOUR home network. What gadgets are you using to techify your life, and what recommendations do you have for others who are designing their home? I’m ready to learn how I can simplify!* Product and vendor names are copyrights/trademarks of their respective companies.last_img read more

Cloud Media Hosting: Streaming Media Hosting Offers Video at a Screaming Pace

first_imgDownload Now Streaming Media Hosting (SMH) provides content delivery services for thousands of businesses and consumers worldwide. The number of video applications is growing fast, due in part to more use of handheld devices to view video. SMH needed to upgrade its data center to increase performance and consolidate its server infrastructure. With Intel® Xeon® processor 5600 series-based servers, SMH uses half as many servers as with its previous-generation platform. This refresh lets the company host and manage more customers’ servers while it develops and delivers media application content.“We’re fortunate to work so closely with Intel so we can move forward, defining the future for our industry while maintaining a philosophy of award-winning service, speed, and reliability, with a 100 percent service level of what we offer in the cloud,” said Robert Klug, CEO of SMH.Read all about it in our new Streaming Media Hosting business success story.last_img read more

Cloud Conversations: Cloud On-Boarding Demo with Citrix

first_imgGot integration headaches? Try this cloud-bridging solution.When one company acquires another, an IT organization is left with the unenviable job of quickly integrating two existing IT infrastructures. This is an activity that is fraught with security risks, technical challenges, and—most of all—management headaches.Intel and Citrix have developed a solution that helps your organization take the pain out of integration challenges of this type. With this cloud on-boarding solution, you can move front-end application servers to the cloud while keeping sensitive back-end database servers secure in your data center.I don’t know about you, but while this is easy to say, it is much more powerful to see it work. You can demo of the cloud resource sharing and on-boarding solution on YouTube. This animated presentation demonstrates how to configure a cloud on-boarding solution on servers equipped with Intel® Xeon® processors running Citrix XenServer® and VMware® vSphere™.I won’t walk you through the configuration details here. The quick version of the story is that the lab spanned two locations connected via a wide area network—a simulated data center in California and a Citrix XenServer cloud in Oregon. This solution relied on Citrix® NetScaler®, with the Citix® CloudBridge® feature enabled, to securely bridge the data center and cloud networks.While I can’t promise you that this cloud-bridging solution will alleviate all the challenges and headaches that come with a major integration initiative, it ought to make things easier on you.For a firsthand look at the solution, check out Hybrid Cloud Computing with Intel and Citrix® NetScaler® on YouTube. Or download the reference architecture for more details.Follow @IntelITS for more on Intel® Cloud Builders, cloud computing, and more!last_img read more

Rumblings at BriForum Chicago 2012: BYO, Security, Ultrabooks, and FUIT Were All the Buzz

first_imgBriForum is a desktop virtualization engineer’s dream. This is definitely not a marketing conference.  In fact, independent speakers are not allowed to discuss their companys’ products.  They are to present only on the concepts and issues they came to talk about.  Some of the best minds on the subject are present.  The sessions range from broad philosophy about how virtualization fits into enterprise organizations, to technical deep dives into how page tables are modified by vendors, such as MokaFive, to provide layering of OS, App and User layers, and the problems that can result from doing it wrong.  Our friends running their products on Ultrabooks. Intel had a strong presence at BriForum. We had our own booth, where we showed demos of MokaFive Suite,Citrix XenClient Enterprise, and Wanova Mirage all running on Ultrabooks™ from Asus, Acer, and Toshiba.  The idea was to show how these solutions each address a different aspect of the Consumerization of IT.  But it didn’t stop there!  Several desktop management ISVs,such as MokaFive, RES Software, Citrix, Wanova,AppSense, and Scense, also ran their demos on Ultrabooks™.   Speaking of Ultrabooks, for many attendees (and even exhibitors), it was the first time they had ever seen or held an Ultrabook in person, which elicited many comments about its weight, size and performance. Some compared it to an iPad, saying that it was lighter than their iPad with the cover on it. Another commented that his employees were leaving their iPads and MacBooks at home and bringing their Ultrabooks to work. One attendee who owned an Ultrabook said that his favorite thing about the Ultrabook is its 6 – 8 hour battery life and that MacBook Air only gives him 2 – 3. Watch the videos of ISVs talking about their favorite features of the Ultrabook here, here, here and here.As for Intel’s session, it was very well received.  In fact, other presenters referenced things from our presentation when they were making a point—in a good way, not as an example of how to do it wrong. Of particular interest were the workspace composition architecture and the idea of Trust Levels.  Some others had hinted at both of these, but I don’t think anyone presented it with the clarity we did, and with the work in progress to make it a reality. The Intel booth Bob Ludwig (right) showing off our Ultrabooks to a captivated BriForum attendeecenter_img Ryan Ettl, Intel (left);   Roy Ubry, Intel, (right) giving the Intel session presentation Good attendance at the Intel session! There was a lot of conversation around FUIT (if you don’t know what that is, just spell out the letters and it will become clear).  The clear message is that if IT doesn’t deliver what the users want and/or need,  users will go around IT controls, sometimes in creative ways, to get things done.  One such example was a company where there were very solid firewalls between development, pre-prod and prod environments.  No connectionsallowed.  So the guys in the lab took EoP (Ethernet over Power) adapters that give you a wireless connection from the power in your house, and created a bridge between the production and development environments. Pretty ingenious, and very cheap.Another subject that came up often is how virtualization in general, and VDI specifically, may have a negative ROI, but has definite “value.” You can’t try to justify these solutions based on hard ROI.  They are justified based on the value to the user, and ultimately to the company.  Things like employee retention, work flexibility and industry leadership become more important than the dollars being spent to implement the solution.  It is also clear that, like we see, VDI and virtualization are for niche use cases, and not a broad solution for every user.  It is important to understand your use cases then build solutions that fit those use cases.  I think Intel IT does this very well.Of course, BYO was a big topic, and the general consensus—fromlarge organizations to SMBs—is that we all need to do it, but any way we do it is going to suck.  The controls IT has to put in place make the user experience frustrating, but without that, we create too much risk.  Things like remote-wiping the entire device when we should just be able to wipe the work-related apps and data, making users switch back and forthbetween work/home environments, and requiring complex passwords on SFF devices are killing us!Security was also a big concern.  It was postulated in one session that security on VDI is not only as bad as a native environment; in some cases it is even worse.  For example, we separate the environments by putting the corporate workspace in the data center.  “Smart thinking,” they say – put your clients, where users can install apps, including viruses, in the data center where you have the ability to infect production servers, and where you have them all concentrated to make a DoS attack easier.What was really interesting was hearing from the audience about how they were doing, how implementations were going, what capabilities they had enabled, etc.  I would say that Intel IT is very much ahead of most of the companies represented.Overall, BriForum is a great conference for those who want to hear the latest, cutting edge, independent thinking on desktop management.last_img read more

3 Opportunities to Get Value from Health IT Big Data

first_imgBelow is a guest blog from Terri Kennedy, Director of Product Management at Allscripts. In his keynote address at the Allscripts Client Experience (see video below), Dr. Rasu Shrestha from University of Pittsburgh Medical Center said, “He who tames the data wins.”As healthcare organizations manage evolving delivery and payment models, an analytics strategy is top of mind for many. Big Data is the next frontier for analytics and offers them access to rich data they can use for population health, research and consumer marketing and satisfaction.Quickly emerging Big Data technologies augment traditional business intelligence technologies by efficiently and affordably acquiring and storing enormous amounts of data. Providers can query and re-query information without retooling the data model every time. This capability is particularly important with the mountains of data we have access to today.3 opportunities to get value from Big DataWith so much data coming from so many different places, how can healthcare providers tame Big Data? There are different opportunities, depending on the type of information:1. Join the conversations happening on the Internet – Patients are posting status updates in Facebook, Twitter and other social media that give valuable information about their own health. They’re also talking about their experience with their hospitals and clinics.Monitor these status updates to find out if patients are unhappy with wait times, how they were treated by staff, or overall condition of facilities. Chances are good that patients are “hash-tagging” your organization. Do you know what they are saying?2. Mine clinical documentation for critical nuggets of information – Even with the heavy adoption of electronic health record (EHR) technology, a significant amount of clinical documentation is still unstructured. Clinical notes and reports hold valuable information that providers can use to better measure quality, support research and feed predictive models.Use Big Data technology to manage volumes of unstructured documentation in various formats. If you apply text mining techniques, you can drive near real-time clinical decision support. You can also use predictive algorithms to help understand what might indicate an adverse event before it occurs.3. Harness and analyze device data – Medical devices and smartphone applications are capturing a wealth of healthcare data that could easily become overwhelming. But think about the possibilities of capturing this data and applying analytics improve clinical interventions.What if monitoring streaming device data in the hospital such as heart rate and respirations could feed predictive models for detecting sepsis? Or caregivers could monitor populations of diabetics using smartphone apps to report weight, glucose levels and blood pressure so that care teams can easily identify patients that may be trending out of control?Health care is not lacking for data. But we must tame it to recognize its true value. Big Data technology and our partnership with Intel can help transform enormous amounts of data into insight that can ultimately result in better quality of care and more rapid interventions.What do you think about health IT Big Data?last_img read more

Intel DC P3608 SSD: Intel’s new x8 NVMe SSD takes on billions of SQL Server 2014 data rows

first_imgIntel today unveiled the Intel® Solid State Drive (SSD) DC P3608 Series, its highest performing SSD for the Data Center to eliminate bottlenecks in HPC workflows, accelerate databases, and gain business insights through real time analytics.Intel is already shipping the Intel® SSD DC P3608 Series in high volume to top OEMs, including Cray, who issued the following statement.“For Cray, Intel® Solid State Drives (SSDs) are an outstanding solution for our high-performance computing customers running high-density, high-speed data applications, and workflows. Cray has a long history of incorporating the latest Intel technologies into our supercomputing solutions, and the DC P3608 Series is another example of how we can jointly address our customers’ most challenging problems.”The Intel® SSD DC P3608 Series delivers high-performance and low latency with NVMe and 8 lanes of PCIe 3.0. Here is an example of a study Intel is conducting on a database application.One thing most DBA’s know that is that column-based us better than row-based when it comes to index compression efficiency and much less IO on disk. Pulling together much faster analytics queries against very large databases into the Terabyte class. These indexes are extremely efficient. Well does this all pair well with better hardware?The answer is yes. Better hardware always matters just like better engineering wins in automotive, for safety, efficiency and fun to drive.The same is true with NVMe technology which is standards based PCIe Solid State Drive technology. NVMe-based SSDs are the only kind of PCIe based SSD that Intel provides. We did a lot to invent it.  Is it fun to run very large TPC-H like queries against this type of drive? Well let me show you.Here is some data that we put together where we show the Maximum Throughput of our new x8 P3608 against our best x4 card, the P3700. Also to put this into perspective I share the SATA versus PCIe run time of the entire 22 queries that exist within the TPC-H specification that is within HammerDB.At the bottom of the blog is the link to the entire data sheet of our testing.PCIe x8 and 4TB’s of usable capacity from Intel is now here. On September 23, 2015 we have released the new P3608. So how many Terabytes of SQL Server Warehouse you want to deploy with this technology? With 4 x8 cards, and 16TB, you’d be able to support over 40TB of compressed SQL Server data using the Fast Track Data Warehouse architectures, because of the excellent compression available with this architecture.Here’s the data comparing our new x8 and x4 Intel PCIe drives and giving you some perspective on how much faster PCIe is over SATA, I am including a graph of the entire suite of queries on PCIe (P3700) over SATA. (S3710).Here we compare the P3608 to the P3700 for maximum throughput.Here we compare the P3608 versus the P3700 for query time on the most IO intensive queries.Finally to give you some perspective here is what a SATA drive could do with this kind of SQL Server Database. This graph consists of all 22 queries , not just the IO intensive ones as above, and it’s the total time to run all queries within HammerDB.Lower is better.You can see all the data here.last_img read more

Roundup 10/27: Powerful Passages Edition

first_imgA hearing tomorrow will scrutinize the issue of brain injuries and the National Football League, but medical scientists who have questioned the link between the two are conspicuously absent. Scientists and policymakers from several federal agencies will meet tomorrow to analyze procedures for assessing outcomes of federally funded research.Eight panels of witnesses remain for 2 days of wall-to-wall hearings for the Senate Environment and Public Works Committee on the Senate version of the climate bill.President Barack Obama is promoting the use of $3.4 billion in federal funding to launch a variety of projects to modernize the power grid.Sign up for our daily newsletterGet more great content like this delivered right to you!Country *AfghanistanAland IslandsAlbaniaAlgeriaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBolivia, Plurinational State ofBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongoCongo, The Democratic Republic of theCook IslandsCosta RicaCote D’IvoireCroatiaCubaCuraçaoCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaFalkland Islands (Malvinas)Faroe IslandsFijiFinlandFranceFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuatemalaGuernseyGuineaGuinea-BissauGuyanaHaitiHeard Island and Mcdonald IslandsHoly See (Vatican City State)HondurasHong KongHungaryIcelandIndiaIndonesiaIran, Islamic Republic ofIraqIrelandIsle of ManIsraelItalyJamaicaJapanJerseyJordanKazakhstanKenyaKiribatiKorea, Democratic People’s Republic ofKorea, Republic ofKuwaitKyrgyzstanLao People’s Democratic RepublicLatviaLebanonLesothoLiberiaLibyan Arab JamahiriyaLiechtensteinLithuaniaLuxembourgMacaoMacedonia, The Former Yugoslav Republic ofMadagascarMalawiMalaysiaMaldivesMaliMaltaMartiniqueMauritaniaMauritiusMayotteMexicoMoldova, Republic ofMonacoMongoliaMontenegroMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorwayOmanPakistanPalestinianPanamaPapua New GuineaParaguayPeruPhilippinesPitcairnPolandPortugalQatarReunionRomaniaRussian FederationRWANDASaint Barthélemy Saint Helena, Ascension and Tristan da CunhaSaint Kitts and NevisSaint LuciaSaint Martin (French part)Saint Pierre and MiquelonSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSint Maarten (Dutch part)SlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth Georgia and the South Sandwich IslandsSouth SudanSpainSri LankaSudanSurinameSvalbard and Jan MayenSwazilandSwedenSwitzerlandSyrian Arab RepublicTaiwanTajikistanTanzania, United Republic ofThailandTimor-LesteTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUnited StatesUruguayUzbekistanVanuatuVenezuela, Bolivarian Republic ofVietnamVirgin Islands, BritishWallis and FutunaWestern SaharaYemenZambiaZimbabweI also wish to receive emails from AAAS/Science and Science advertisers, including information on products, services and special offers which may include but are not limited to news, careers information & upcoming events.Required fields are included by an asterisk(*)Photo Credit: http://www.flickr.com/photos/jonathangill/ / CC BY 2.0last_img read more

Climate Hack Scandal Roundup

first_imgThe drama surrounding leaked e-mails belonging to the University of East Anglia’s (UES’s) Climatic Research Unit (CRU) continued over the weekend. The e-mails show how researchers battled skeptics—and one another—over climate data included in the consensus report of the Intergovernmental Panel on Climate Change.Greenhouse skeptics are now claiming the e-mails show a vast conspiracy to fabricate data. Science historian Spencer Weart tells The Washington Post’s Capital Weather Gang that such charges are unprecedented. “Even the tobacco companies never tried to slander legitimate cancer researchers.”Sign up for our daily newsletterGet more great content like this delivered right to you!Country *AfghanistanAland IslandsAlbaniaAlgeriaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBolivia, Plurinational State ofBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongoCongo, The Democratic Republic of theCook IslandsCosta RicaCote D’IvoireCroatiaCubaCuraçaoCyprusCzech RepublicDenmarkDjiboutiDominicaDominican RepublicEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaFalkland Islands (Malvinas)Faroe IslandsFijiFinlandFranceFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGermanyGhanaGibraltarGreeceGreenlandGrenadaGuadeloupeGuatemalaGuernseyGuineaGuinea-BissauGuyanaHaitiHeard Island and Mcdonald IslandsHoly See (Vatican City State)HondurasHong KongHungaryIcelandIndiaIndonesiaIran, Islamic Republic ofIraqIrelandIsle of ManIsraelItalyJamaicaJapanJerseyJordanKazakhstanKenyaKiribatiKorea, Democratic People’s Republic ofKorea, Republic ofKuwaitKyrgyzstanLao People’s Democratic RepublicLatviaLebanonLesothoLiberiaLibyan Arab JamahiriyaLiechtensteinLithuaniaLuxembourgMacaoMacedonia, The Former Yugoslav Republic ofMadagascarMalawiMalaysiaMaldivesMaliMaltaMartiniqueMauritaniaMauritiusMayotteMexicoMoldova, Republic ofMonacoMongoliaMontenegroMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorwayOmanPakistanPalestinianPanamaPapua New GuineaParaguayPeruPhilippinesPitcairnPolandPortugalQatarReunionRomaniaRussian FederationRWANDASaint Barthélemy Saint Helena, Ascension and Tristan da CunhaSaint Kitts and NevisSaint LuciaSaint Martin (French part)Saint Pierre and MiquelonSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSaudi ArabiaSenegalSerbiaSeychellesSierra LeoneSingaporeSint Maarten (Dutch part)SlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSouth Georgia and the South Sandwich IslandsSouth SudanSpainSri LankaSudanSurinameSvalbard and Jan MayenSwazilandSwedenSwitzerlandSyrian Arab RepublicTaiwanTajikistanTanzania, United Republic ofThailandTimor-LesteTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluUgandaUkraineUnited Arab EmiratesUnited KingdomUnited StatesUruguayUzbekistanVanuatuVenezuela, Bolivarian Republic ofVietnamVirgin Islands, BritishWallis and FutunaWestern SaharaYemenZambiaZimbabweI also wish to receive emails from AAAS/Science and Science advertisers, including information on products, services and special offers which may include but are not limited to news, careers information & upcoming events.Required fields are included by an asterisk(*)Also in the Post, Geologist Thomas Crowley of the University of Edinburgh in the United Kingdom defended colleagues, saying skeptics are “desperate to discredit global warming” and “there is no need to do anything differently by the scientists.” But top climate researchers remain under scrutiny for dodging Freedom of Information (FOI) Act requests filed by skeptics and for strong-arming journal editors. * The U.K. Information Commissioner’s Office released this statement to ScienceInsider: Following a number of complaints and media reports suggesting the University of East Anglia intentionally withheld information requested under the Freedom of Information Act, we will be contacting the University to find out the facts of the matter and to ascertain whether a full investigation is needed. * CRU said it would publicly release additional surface station temperature data subject to FOI requests by skeptics. “We are quite clearly not hiding information which seems to be the speculation on some blogs and by some media commentators,” said UEA Pro-Vice-Chancellor Trevor Davies.* Pennsylvania State University said e-mails by professor Michael Mann had raised questions and it would be “looking into this matter further.” An inquiry will be carried out under the school’s research ethics policy.* Mann published a new historical reconstruction of global temperature history in Science. Recent high temperatures are still unprecedented in 1500 years, he reports.The e-mail leak is also sparking a broader debate about the Intergovernmental Panel on Climate Change, with sharply differing views about the body’s effectiveness. * IPCC Chairman Rajendra K. Pachauri released a statement defending the body’s conclusions. He called IPCC an “impartial, open and objective assessment of every aspect of climate change carried out with complete transparency.”*UEA climatologist Mike Hulme disagreed, telling The New York Times that the IPCC’s “structural tendency to politicize climate change science, has perhaps helped to foster a more authoritarian and exclusive form of knowledge.”* Some climate scientists say that heads should roll. Eduardo Zorita, at Germany’s GKSS, called for Mann and CRU Director Phil Jones to be barred from IPCC. Junior researchers have been “bullied and subtly blackmailed” by senior IPCC authors “to tweak their data so as to fit the ‘politically correct picture,’ ” Zorita writes.Overall, it appears the e-mail leak has had little effect on IPCC’s conclusions. But investigations into climate scientists’ behavior loom as a big distraction. ScienceInsider spoke to a senior U.S. science official about the climate e-mails. The official, who requested anonymity, had this to say:What you see in the emails is scientists grappling with not the best data and trying to make sense of it, which is a normal thing to see. And these same folks feeling like they are under siege by the skeptics. But you also see a set of behaviors that I don’t recognize as normal; trying to keep people out of the peer-review literature, and avoiding FOI requests. This doesn’t change anything about the scientific conclusions. But we want as full and open a discussion as possible.last_img read more

‘A Democratic Society Needs Republican Scientists’

first_imgOr so argues Arizona State University science policy expert Daniel Sarewitz in Slate, who says that the country’s scientific corps is too left-leaning: During the Bush administration, Democrats discovered that they could score political points by accusing Bush of being anti-science. In the process, they seem to have convinced themselves that they are the keepers of the Enlightenment spirit, and that those who disagree with them on issues like climate change are fundamentally irrational. Meanwhile, many Republicans have come to believe that mainstream science is corrupted by ideology and amounts to no more than politics by another name. Attracted to fringe scientists like the small and vocal group of climate skeptics, Republicans appear to be alienated from a mainstream scientific community that by and large doesn’t share their political beliefs. The climate debacle is only the most conspicuous example of these debilitating tendencies, which play out in issues as diverse as nuclear waste disposal, protection of endangered species, and regulation of pharmaceuticals. How would a more politically diverse scientific community improve this situation? First, it could foster greater confidence among Republican politicians about the legitimacy of mainstream science. Second, it would cultivate more informed, creative, and challenging debates about the policy implications of scientific knowledge. This could help keep difficult problems like climate change from getting prematurely straitjacketed by ideology. A more politically diverse scientific community would, overall, support a healthier relationship between science and politics.last_img read more