Cisco Blogs


Cisco Blog > High Performance Computing Networking

Unsung heros: MPI run time environments

September 7, 2014 at 4:39 am PST

Most people immediately think of short message latency, or perhaps large message bandwidth when thinking about MPI.

But have you ever thought about what your MPI implementation has to do before your application even calls MPI_INIT?

Hint: it’s pretty crazy complex, from an engineering perspective.

Think of it this way: operating systems natively provide a runtime system for individual processes.  You can launch, monitor, and terminate a process with that OS’s native tools.  But now think about extending all of those operating system services to gang-support N processes exactly the same way one process is managed.  And don’t forget that those N processes will be spread across M servers / operating system instances.

Read More »

Tags: ,

Why ISVs Must Transform In SMAC Environment

In today’s era of SMAC – Social, Mobile, Analytics and Cloud based solution, Pay-Per-Use licensing and Dev Ops software development methodology, Independent Software Vendors (ISV) are facing major challenges on many fronts. ISVs strive to differentiate from their competitors and gain new customers, as well as retain existing customers and generate additional revenue from them. This shift is happening throughout the software developer market and has surfaced technological and business changes for ISVs.

Read More »

Tags: , , , , , , , , , , , , , , ,

Danger at the Retail Point of Sale

This blog post was authored by Martin Lee and Jaeson Schultz.

With the announcement that yet another major retailer has allegedly been breached, it is important to review how attackers compromise retail systems and how such intrusions can be prevented. In this latest case, retailers are working to determine if a large cache of credit card information offered for sale on an underground trading forum originated as a result of a systems breach.

The presence of large amounts of financial and personal information within retail systems means that these companies are likely to remain attractive targets to attackers. Illicit markets exist for such information so that attackers are able to easily monetize stolen data. Although we don’t know the details of this specific attack, it may follow the same pattern as other major breaches in the retail sector. Incidents involving Point of Sale (POS) malware have been on the rise, affecting many large organizations.

In addition to the risk of fraud to the individuals affected, the consequences for the breached organizations are severe. News of customer data theft not only damages the brand, but recovering from the breach can also cost into the millions of dollars as systems are investigated, cleaned, repaired, and new processes are implemented to prevent future similar attacks.


POS Attack
Read More »

Tags: , , ,

Summary: Don’t be a networking Lizard

Who’s more intelligent a rocket scientist or a lizard?

Well it’s a matter of perspective. I’ll grant you that a lizard is less likely to design a spaceship capable of inter stellar flight, but if you put that same rocket scientist in the desert, I know who my money would be on to survive the longest, the point being that the lizard has exactly the right level of skills and knowledge that it requires for its particular environment.

Read the rest of Colin’s article, Don’t Be a Networking Lizard, on the UK & Ireland blog.

Tags:

CSR Partner Good World Solutions Wins Social Entrepreneurship Award

September 5, 2014 at 12:45 pm PST

One of the nonprofits we support through our Corporate Social Responsibility efforts, Good World Solutions, has won a Gratitude Award for its innovative Labor Link mobile platform.

LaborLink uses mobile technology to give a voice to global factory workers and farmers, and delivers real-time data to companies like Cisco and Patagonia to align sourcing practices with worker needs.

For example, companies can use Labor Link to give workers valuable information on health, financial literacy, and education. Workers can use it to report anonymously on working conditions and job satisfaction directly to decision-makers at distant companies that buy the products they make.

In India, Labor Link is being used to measure the effectiveness of financial literacy training at 11 garment and footwear factories

In India, Labor Link is being used to measure the effectiveness of financial literacy training at 11 garment and footwear factories

Read More »

Tags: , , ,