Tag Archive for: arm

Arm, Microsoft say arch can be trusted with real server work • The Register


Arm is this week celebrating passing a few of its own self-set milestones in its long quest to compete against x86 stalwarts Intel and AMD in the server processor space.

One, we’re told, is that Microsoft Ampere Altra-based Azure servers are now Arm SystemReady SR certified, “the first cloud solution provider (CSP) server to do so,” said Arm Chief System Architect Andy Rose on Monday.

Another is that Azure VMs powered by Altra processors are the first of their kind to be certified as compliant with the SystemReady Virtual Environment standard. And the other breakthrough, according to Rose, is that there have been more than 50 certifications of SystemReady products since the launch of the program.

Introduced in late 2020 as part of Arm’s Project Cassini, SystemReady defines a set of firmware and hardware standards for things like servers and workstations, embedded electronics, and smartNICs, and is intended to ensure software runs without a hitch on compliant systems. If your application stack is designed for, say, the SystemReady SR set of requirements, you should be confident that it’ll run on products that are certified as SystemReady SR compliant.

This kind of validation is important because Arm lacks the luxury of decades of server and workstation software support enjoyed by its x86 competitors, Daniel Newman, principal analyst and founder of Futurum, told The Register. “I think the idea of change is somewhat daunting for many organizations,” he added.

Growing by degrees

SystemReady essentially provides software developers, original equipment vendors, and chipmakers a baseline for system development. The SystemReady Base System Architecture, for example, provided a minimum set of hardware requirements to boot an operating system.

Arm initially offered four certification tiers. SystemReady LS targeted hyperscaler-like server hardware running Linux-based operating systems and hypervisors, while…

Source…

Man shot in arm on Brazos Street, police say | News


JONESBORO — A 33-year-old Jonesboro man was shot in the right forearm while he was in his truck at about 5:43 p.m. Monday in the 2000 block of Brazos St., according to Jonesboro police.

The victim fled the scene and crashed his vehicle a short distance from the original scene. He was treated for his wounds and then transported to NEA Baptist Memorial Hospital, according to a Jonesboro police report. Police are searching for the suspect.

A 26-year-old Jonesboro woman told police that she was raped and her residence burglarized early Tuesday. Police arrested Dominique Sinclair, 35, homeless, on suspicion of rape and aggravated residential burglary. The victim said Sinclair had a sharp object when he entered her residence. The victim was taken to St. Bernards Medical Center for treatment.

A 29-year-old Jonesboro woman reported that her vehicle was broken into and a communications tablet was stolen early Tuesday. The tablet was valued at $2,500.

A 27-year-old Jonesboro woman reported that her boyfriend choked her Monday night in the 400 block of Melrose Street.

Police arrested Brian Osburn, 35, of 408 Melrose St., on suspicion of aggravated assault on a family or household member and third-degree domestic battery. He was being held Tuesday in the Craighead County Detention Center in lieu of a probable cause hearing.

A 25-year-old Jonesboro man reported that he got into a fight with his roommate, who pointed a firearm at him and broke a wine bottle over his head. The incident occurred Monday night in the 500 block of Paragould Road. No arrests had been made as of Tuesday.

Police arrested a Jonesboro man early Tuesday at the intersection of Belt and North Bridge streets after he fled from officers. Bobby Posey, 41, of 301 N. Main St., is being held on suspicion of possession of meth or cocaine with purpose to deliver greater than 10 grams but less than 200 grams, possession of drug paraphernalia, tampering with physical evidence, fleeing, driving on a suspended license, running a stop sign and possession of marijuana. He was being held Tuesday at the Craighead County Detention Center in lieu of a probable cause hearing.

A 49-year-old…

Source…

SUSE Linux Enterprise Server 15 SP2 is Now EAL 4+ Level Certified for IBM Z, Arm, and x86-64


SUSE has announced that its flagship Linux distribution has earned Common Criteria EAL 4+ certification. SUSE Linux Enterprise Server (SLES) 15 SP2 is now EAL 4+ level certified for IBM Z, Arm, and x86-64 architectures, signifying compliance with the demanding security requirements for mission-critical infrastructure. SUSE’s Common Criteria EAL 4+ software supply chain certification includes secure production, delivery of updates, and protection of critical digital assets.

“In today’s age of advanced hacking and service disruption, Common Criteria EAL 4+ level certification for SLES provides confidence to critical service providers such as governments, finance and banking companies, healthcare organizations, water and power companies, telecommunications providers, and others innovating at the edge,” said Thomas Di Giacomo, SUSE chief technology and product officer. “SUSE’s commitment to open interoperability means SLES 15 customers around the world can be certain their operating system conforms to the highest international standards for computer security within their chosen IT infrastructure.”

This latest certification, the highest level attainable for an open source operating system, for SUSE Linux Enterprise on IBM Z demonstrates a continued prioritization on security and reliability, said Kara Todd, director of Linux, IBM Z and LinuxONE at IBM. “We are seeing an ever-growing number of exciting new Linux workloads which are a great fit for the underlying scalability, reliability and security that the IBM Z platform provides.”

According to SUSE, the exponentially growing number of IoT and edge computing devices has increased risk to networks and required countries to raise their compliance requirements for infrastructure providers, particularly those involved in services essential to their economies, governments, and health and safety of citizens. SUSE’s Common Criteria EAL 4+ certified secure software supply chain enables the highest security standards for edge and IoT devices for critical infrastructure providers such as telecommunications companies and others innovating at the edge.

For more information, visit www.suse.com.


Source…

Corellium—The Startup Apple Is Suing—Joins Forces With ARM Security Genius To Build iPhone, Mac And Android Research Heaven


How do you bounce back from being sued by the world’s most valuable company? Ask Corellium CEO Amanda Gorton. After Apple launched a suit against her startup in 2019, alleging it had breached copyright in making virtual versions of iPhones for security testers, the company had to put much of its energy and focus into fending off the tech giant’s lawyers. In December, Corellium scored a significant win as one of Apple’s claims—that it infringed iOS copyright – was rejected by a judge. The other claim—that Corellium circumvented Apple security measures in violation of the Digital Millennium Copyright Act—is still to be decided on. The same month it got its victory in court, Corellium was named product of the year in the inaugural Forbes Cybersecurity Awards. “We’re in a better spot than we were a year ago,” Gorton says. “We’ve had a lot of momentum.”

Corellium is pressing onwards to build what it hopes will be a virtual paradise for researchers looking for security weaknesses in Apple iPhones or its new M1 Macs, or any other ARM-based system. The company had already created software that could quickly spin up virtual versions of iPhones, as well as some Android models, so benevolent hackers could try to find problems in the devices, without having to worry about crashes ruining their test device. And this week, Corellium is announcing it has bought Azeria Labs, run by Forbes 30 Under 30 alum Maria Markstedter, one of the world’s leading security researchers when it comes to ARM designs. Her focus has always been to train researchers in the art of ARM exploitation, finding flaws deep at the chip level, ideally so they can be disclosed to the manufacturer and fixed. Now, as chief product officer of Corellium, she’ll be bringing that training into the Corellium tool, making it that much easier to find bugs in not just…

Source…