This is an Arm heavy show, with our opening discussion concerning the Arm system at Sandia and a talk given by Sandia’s Michael Aguilar at the recent HPC Advisory Council’s Stanford Conference. The new system, dubbed Astra, was built by HPE and is the biggest Arm-based super on the Top500 list at 2.3 PFlop/s.
The guys discuss how quickly the system was brought up and how Sandia didn’t run into any major problems along the way – which is unusual for a system utilizing a new processor. We take a tangent into a discussion of new chip architectures and how this is leading to more options for customers.
Keeping with the Arm theme, the conversation moves to the new Arm Neoverse 128 core server processor. The guys are a bit agog over the 7nm size of the processor, wondering who is fabbing the chip, guessing TSMC. The new chip is 2.5x faster than previous Arm server processors and, according to Arm, also uses 30% less power.
The conversation moves to RISC V and whether it will be used as an accelerator or a CPU – eventually agreeing that it can be both. We discuss how the chip can be used in various ways and how it can potentially replace a lot of things, including ASICs, which is pretty mind blowing.
Catch of the Week
Henry’s Catch of the Week concerns a new hardware hack that allows miscreants to capture payment info from a phone at the gas station. The bad guy uses a Bluetooth based skimmer to send payment info from contactless payment cards (or phones assumedly) via SMS message to the miscreant. You can read the frightening details at the link above, which goes to Krebs on Security – a great site if you want to scare yourself senseless.Shahin chimes in with something even scarier – the Evil USB Cable: a USB patch cable that has an embedded wifi transmitter that can send all of the data flowing through that cable to a bad guy. Yikes!
Dan attempts to put minds at ease by exposing the truth behind a hacking myth: can a hacker easily get control of your laptop’s webcam? The answer? Nope, they can’t. A Wall Street Journal writer worked with a highly qualified white hat hacker to see just what it would take for a hacker to gain control of a Windows or Mac embedded camera.
It turns out that penetrating a laptop camera is pretty difficult and not really possible unless the user cooperates to make it work. On the Windows side, the writer had to disable Microsoft’s anti-virus and real time virus checking in order to get the hacker payload into her system. The file was also flagged as dangerous by Microsoft Word, so she had to dismiss that warning as well.
The Mac OS was even more difficult for the hacker to penetrate. First, the user had to install LibreOffice, meaning she had to disable Mac security settings that prevent unverified software from installing on her system. She also had to disable the security inside LibreOffice.
Take a look at the article and see if you agree with Dan, who believes that laptop cameras can’t be hacked by outsiders unless you essentially invite them in by disabling your OS and application security.
Subscribe on iTunes or Download this week’s edition of Radio Free HPC for a chance of winning out eternal gratitude and respect!
Download the MP3 * Subscribe on iTunes * RSS Feed
Sign up for our insideHPC Newsletter
No comments:
Post a Comment