Tag Archive for: processing

Intel’s 3rd-generation Xeon Scalable CPUs offer 16-bit FPU processing

Intel today announced its third-generation Xeon Scalable (meaning Gold and Platinum) processors, along with new generations of its Optane persistent memory (read: extremely low-latency, high-endurance SSD) and Stratix AI FPGA products.

The fact that AMD is currently beating Intel on just about every conceivable performance metric except hardware-accelerated AI isn’t news at this point. It’s clearly not news to Intel, either, since the company made no claims whatsoever about Xeon Scalable’s performance versus competing Epyc Rome processors. More interestingly, Intel hardly mentioned general-purpose computing workloads at all.

Finding an explanation of the only non-AI generation-on-generation improvement shown needed jumping through multiple footnotes. With sufficient determination, we eventually discovered that the “1.9X average performance gain” mentioned on the overview slide refers to “estimated or simulated” SPECrate 2017 benchmarks comparing a four-socket Platinum 8380H system to a five-year-old, four-socket E7-8890 v3.

Read 9 remaining paragraphs | Comments

Biz & IT – Ars Technica

Flaws in Oracle file processing SDKs affect major third-party products

Seventeen high-risk vulnerabilities out of the 276 flaws fixed by Oracle Tuesday affect products from third-party software vendors, including Microsoft.

The vulnerabilities were found by researchers from Cisco’s Talos team and are located in the Oracle Outside In Technology (OIT), a collection of software development kits (SDKs) that can be used to extract, normalize, scrub, convert and view some 600 unstructured file formats.

These SDKs, which are part of the Oracle Fusion Middleware, are licensed to other software developers who then use them in their own products. Such products include Microsoft Exchange, Novell Groupwise, IBM WebSphere Portal, Google Search Appliance, Avira AntiVir for Exchange, Raytheon SureView, Guidance Encase and Veritas Enterprise Vault.

To read this article in full or to leave a comment, please click here

Network World Security

North Korea is likely behind attacks exploiting a Korean word processing program

North Korea is likely behind cyberattacks that have focused on exploiting a word processing program widely used in South Korea, security firm FireEye said Thursday in a report.

The proprietary program, called Hangul Word Processor, is used primarily in the south by the government and public institutions.

The vulnerability, CVE-2015-6585, was patched three days ago by its developer Hancom.

FireEye’s conclusion is interesting because only a handful of attacks have been publicly attributed to the secretive nation, which is known to have well-developed cyber capabilities.

To read this article in full or to leave a comment, please click here

Network World Security

Up in a cloud for processing computer data – Jerusalem Post

Up in a cloud for processing computer data
Jerusalem Post
Brakerski, together with Dr. Vinod Vaikuntanathan (who was Goldwasser's student at MIT), surprised the computer security world earlier this year with two scientific papers in which they described several new ways of making fully homomorphic encryption

“computer security” – read more