ADN Issue 13, May 2015


World News

Discussions & News

Upcoming Events

    Research & Scholarly Papers

    More Special Sections

    World News

    Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization

    Spear-phishing attacks were responsible for major data breaches and financial losses at Target, Home Depot and JPMorgan Chase in 2014.

    Get an inside look into these insidious attacks - how hackers dupe users into clicking seemingly friendly links, unleashing malware that could cost your company millions. In the US, the average cost of a breach is $12.6 million but it’s not uncommon for costs to be in the hundreds of millions.

    This whitepaper also highlights:

    • 91% of hacking begins with an email based attack, increasingly from a seemingly trusted source
    • How the average attack goes undetected for 229 days, playing out slowly over weeks and months
    • 67% of victims are notified by someone outside the company. You won’t know until it’s too late.

    Once you understand the timeline of an attack, you’ll be better prepared to protect unsuspecting employees and your network.

    Tags: Cybersecurity,
    CYBERCRIME 2015. An Inside Look at the Changing Threat Landscape
    EMC Corporation.

    The cybercrime landscape continues to evolve as criminals look to adopt more efficient and profitable attack tactics. At the same time, the market for cybercrime-asa- service is advancing rapidly, with competition among malware vendors leading to increased innovation. And as smartphone penetration reaches record levels globally, cybercriminals are starting to switch their focus to standalone attacks on mobile devices.

    RSA Research remains at the forefront of threat detection and cybercrime intelligence, protecting global organizations with the shutdown of over a million cybercrime attacks. In 2014 the RSA Anti- Fraud Command Center identified nearly 500,000 cyberattacks — an 11% increase year over year.

    Based on its insight into cybercriminal activity, recovery of over a million actionable findings in 2014 and analysis of around 400,000 unique malware variants each week, RSA Research has identified the top cybercrime trends it expects to see evolving over the coming year.

    Tags: Cybersecurity,
    Can TI Obsolete FPGAs?
    R. Colin Johnson
    EE Timas, May 7, 2015

    Texas Instruments (TI) has thrown down the gauntlet to the field programmable gate array (FPGA) community — mostly Altera and Xilinx — by starting a family of special-purpose processors that combine multicore ARM processors with multicore digital signal processors (DSPs) and multiple programmable hardware accelerators. Can they pull it off? An FPGA is like a blank-slate that can solve any high-speed computational problem, but at a high-price, difficult programming and a waste of resources (not every gate is used in the vast majority of FPGA designs).

    On the other hand, TI will have to create an expanding family of special-purpose chips to address all the niche markets that FPGAs address. Can it be done? We asked TI, Altera and a bevy of analysts what their opinions were and summarized them below.

    Tags: FPGA, Hardware, Architecture,
    FPGAs Ride HP’s Moonshot
    Rick Merritt
    EE Times, May 28, 2015

    SRC hopes to fuel Moonshot sales with its $20,000 4U card (pictured below) that hosts two Altera Stratix IV 530 FPGAs. The company claims the 45W board delivers 100 times the performance of an x86 server while using one percent of its power. The board also hosts a four-core Intel Atom chip for housekeeping duties and supports multiple Gbit Ethernet links to the Moonshot backplane.

    The company was co-founded in 1996 by supercomputer guru Seymour Cray. Its secret sauce is its Carte compiler that automatically turns users’ C-level code into FPGA-readable firmware, eliminating the need for often complex Verilog-level FPGA programming tools. The FPGA also lets users quickly change code as workloads shift.

    Tags: FPGA, Hardware, Architecture,
    A Deeper Look at POWER8 CAPI and Data Engine for NoSQL
    Brad L. Brech and Bruce Wile
    IBM Systems Magazine, May 2015

    NoSQL and CAPI create a new tier of memory by attaching up to 40 TB of auxiliary flash memory to the processor without the latency issues of traditional I/O storage.

    This article explains CAPI (Coherent Accelerator Processor Interface) technology and describes how it’s being used in the Data Engine for NoSQL, the first exploiter of the CAPI platform.

    IT organizations must provide increased system performance as their workloads grow with demands for big data analysis, social media applications, technical computing, continuous customer connectivity and business-specific applications. Increases in processor performance can no longer satisfy the workload demands, so solutions must also come from system-level advances such as hybrid computing, processing engine customization and open platform development that enables cross-company innovation.

    Many solutions will keep improving price-performance through specific function accelerators. These accelerators are delivered by GPU- and field-programmable gate array (FPGA)-based solutions. We already see these solutions today with I/O-attached acceleration engines, such as an NVIDIA GPU placed on a PCIe card.

    Tags: BigData, FPGA, Hardware, Architecture,
    Back to Contents
    Parlament, London

    London, United Kingdom

    ADN Editor in Chief
    Dr Toomas P Plaks

    Contact the Editor in Chief

    LinkedIn connection requests welcome

    E-mail Directory

    • General Inquiries:
    • Paper Submission:
      No inquiries
    • CFP are sent:
      Don't reply

    WEB Directory

    • ADN Journal:
    • ADN Issues:
    • ERSA News:
    • ERSA Conferences:
      where ## is 07, 08, 09, 10, 11, 12, 13
    • ERSA Archive: