18 hours, $33K, and 156,314 cores: Amazon cloud HPC hits a “petaflop”

One point twenty-one petaflops?!
Universal Pictures

What do you do if you need more than 150,000 CPU cores but don’t have millions of dollars to spend on a supercomputer? Go to the Amazon cloud, of course.

For the past few years, HPC software company Cycle Computing has been helping researchers harness the power of Amazon Web Services when they need serious computing power for short bursts of time. The company has completed its biggest Amazon cloud run yet, creating a cluster that ran for 18 hours, hitting 156,314 cores at its largest point and a theoretical peak speed of 1.21 petaflops. (A petaflop is one quadrillion floating point operations per second, or a million billion.)

To get all those cores, Cycle’s cluster ran simultaneously in Amazon data centers across the world, in Virginia, Oregon, Northern California, Ireland, Singapore, Tokyo, Sydney, and São Paulo. The bill from Amazon ended up being $ 33,000.

Read 14 remaining paragraphs | Comments


    




Ars Technica » Technology Lab

Hoping to avert “collision” with disaster, Microsoft retires SHA1

udono

Microsoft is retiring two widely used cryptographic technologies that are growing increasingly vulnerable to attacks that seemed unlikely just a decade ago.

The company’s software will stop recognizing the validity of digital certificates that use the SHA1 cryptographic algorithm after 2016, officials said on Tuesday. SHA1 is widely used to underpin secure socket layer (SSL) and transport layer security (TLS) certificates that authenticate websites and encrypt traffic passing between their servers and end users. SHA1-based certificates are also used to digitally verify that specific software applications are legitimate and not imposter programs or programs that have been tampered with to include hidden backdoors.

The move comes as hardware improvements and research breakthroughs have made SHA1 and several other cryptographic hashing algorithms more susceptible to so-called collision attacks. Collisions occur when two distinct plaintext “messages” produce an identical hash or “digest.” The security of an algorithm rests on it producing unique hashes for each plaintext string or file. The growing ease of producing collisions makes it possible for attackers to create digital forgeries that completely undermine the security of systems that rely on the weak algorithms.

Read 7 remaining paragraphs | Comments


    




Ars Technica » Technology Lab

San Diego quietly slips facial recognition into the hands of law enforcers

Police and other authorities are using smartphones and tablets to snap photos in the field, without warrants or asking for subjects’ permission to run their images against criminal databases. The program was rolled out without public hearings or notice, and could represent the beginning of a national rollout.
Naked Security – Sophos

NYPD detective pleads guilty to hacking fellow police officers’ email and phone

Edwin Vargas was charged with using PayPal to hire someone to hack login details for at least 43 personal email accounts, including those of 20 current or former NYPD officers.
Naked Security – Sophos