The Data Centre is the New Unit of Computing

A revisit on Nvidia GTC 2021. A worthwhile thought to think through.

NVIDIA BlueField-3 DPU, the most powerful software-defined, hardware-accelerated data center on a chip. The #datacenter is the new unit of computing and the BlueField-2 DPU is now available to offload and accelerate the networking, storage, and security tasks within overtaxed data centers.

The MLPERF Benchmark Is Good For AI

Commissioned In just about any situation where you are making capital investments in equipment, you are worried about three things: performance, price/performance, and total cost of ownership. Without some sort of benchmark on which to gauge performance and without some sense of relative pricing, it is impossible to calculate total cost of ownership, and therefore, it is impossible to try to figure out what to invest the budget in.

This is why the MLPerf benchmark suite is so important. MLPerf was created only three and a half years ago by researchers and engineers from Baidu, Google, Harvard University, Stanford University, and the University of California Berkeley and it is now administered by the MLCommons consortium, formed in December 2020. Very quickly, it has become a key suite of tests that hardware and software vendors use to demonstrate the performance of their AI systems and that end user customers depend on to help them make architectural choices for their AI systems.

Next Platform “Why the MLPerf Benchmark is good for AI, and good for you.”

The MLPerf site can be found at https://mlcommons.org/en/

NVIDIA Special Address at SIGGRAPH 2021

NVIDIA and SIGGRAPH share a long history of innovation and discovery. Over the last 25 years our community has seen giant leaps forward, driven by brilliant minds and curious explorers. We are now upon the opening moments of an AI-powered revolution in computer graphics with massive advancements in rendering, AI, simulation, and compute technologies across every industry. With open standards and connected ecosystems, we are on the cusp of achieving a new way to interact and exist with graphics in shared virtual worlds.

NVIDIA Special Address | MWC Barcelona 2021

In a special address at MWC Barcelona 2021, NVIDIA announced its partnership with Google Cloud to create the industry’s first AI-on-5G open innovation lab that will speed AI application development for 5G network operators.

Additional announcements included: ● Extending the 5G ecosystem with Arm CPU cores on NVIDIA BlueField-3 DPUs ● Launching NVIDIA CloudXR 3.0 with bidirectional audio for remote collaboration

Address Blockchain’s Biggest Problem with Supercomputing

Producing digital coins is not environmentally friendly, to say the least. Bitcoin mining – one of the best-known implementations of blockchain – consumes around 110 Terawatt Hours per year, which is more than the annual consumption of countries such as Sweden or Argentina.

The project involves running open-source simulations to study how the speed of transactions on the blockchain could be increased using various techniques, such as sharding.

Sharding implies splitting a blockchain network into smaller partitions called ‘shards’ that work in parallel to increase its transactional throughput. In other words, it’s like spreading out the workload of a network to allow more transactions to be processed, a technique similar to that used in supercomputing.

In the world of high-performance computers, ways to parallelize computation have been developed for decades to increase scalability. This point is where lessons learned from supercomputing come in handy.

“A blockchain like Ethereum is something like a global state machine, or in less technical words, a global computer. This global computer has been running for over five years on a single core, more specifically a single chain,” Bautista tells ZDNet.

“The efforts of the Ethereum community are focused on making this global computer into a multi-core computer, more specifically a multi-chain computer. The objective is to effectively parallelize computation into multiple computing cores called ‘shards’ – hence the name of this technology.”

ZDNet “Supercomputing can help address blockchain’s biggest problem. Here’s how”

For further read, do take a look at Supercomputing can help address blockchain’s biggest problem. Here’s how

Creating a Self-Signed Certificate on RHEL

You can create your own self-signed certificate. Note that a self-signed certificate does not provide the security guarantees of a CA-signed certificate.

Generating a Key

Taken from RHEL Administration Guide 25.6. GENERATING A KEY and Creating a Self-Signed Certificate

Step 1: Clean up fake key and certificate

Go to /etc/httpd/conf/ directory. Remove the fake key and certificate that were generated during the installation

# cd /etc/httpd/conf/
# rm ssl.key/server.keyrm ssl.crt/server.crt

Step 2: Create your own Random Key

Go to usr/share/ssl/certs/ and generate key

# cd /usr/share/ssl/certs/
# make genkey

Your system displays a message similar to the following:

mask 77 ; \
/usr/bin/openssl genrsa -des3 1024 > /etc/httpd/conf/ssl.key/server.key
Generating RSA private key, 1024 bit long modulus
.......++++++
................................................................++++++
e is 65537 (0x10001)
Enter pass phrase:

You now must enter in a passphrase. For security reason, it should contain at least eight characters, include numbers and/or punctuation, and it should not be a word in a dictionary.

Re-type the passphrase to verify that it is correct. Once you have typed it in correctly, /etc/httpd/conf/ssl.key/server.key, the file containing your key, is created.

Note that if you do not want to type in a passphrase every time you start your secure server, you must use the following two commands instead of make genkey to create the key.

# /usr/bin/openssl genrsa 1024 > /etc/httpd/conf/ssl.key/server.key

Then, use the following command to make sure the permissions are set correctly for the file:

# chmod go-rwx /etc/httpd/conf/ssl.key/server.key

After you use the above commands to create your key, you do not need to use a passphrase to start your secure server.

* The server.key file should be owned by the root user on your system and should not be accessible to any other user. Make a backup copy of this file and keep the backup copy in a safe, secure place. You need the backup copy because if you ever lose the server.key file after using it to create your certificate request, your certificate no longer works and the CA is not able to help you. Your only option is to request (and pay for) a new certificate.

Creating a Self-Signed Certificate

Once you have a key, make sure you are in the /usr/share/ssl/certs/ directory, and type the following command:

# /usr/share/ssl/certs/make testcert

The following output is shown and you are prompted for your passphrase (unless you generated a key without a passphrase):

umask 77 ; \
/usr/bin/openssl req -new -key -set_serial num /etc/httpd/conf/ssl.key/server.key  
-x509 -days 365 -out /etc/httpd/conf/ssl.crt/server.crt
Using configuration from /usr/share/ssl/openssl.cnf
Enter pass phrase:

Next, you are asked for more information. The computer’s output and a set of inputs looks like the following (provide the correct information for your organization and host):

You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a
DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [GB]:SG

After you provide the correct information, a self-signed certificate is created in /etc/httpd/conf/ssl.crt/server.crt. Restart the secure server after generating the certificate with following the command:

# /sbin/service httpd restart