Here are documentation and release notes if you wish to have information whether you can use RHEL on DGX
- Delivering IT Manageability with Red Hat on Nvidia DGX-1
- DGX Software for Red Hat Enterprise Linux 7
Here are documentation and release notes if you wish to have information whether you can use RHEL on DGX
Mellanox’s Ethernet solutions enable cloud data centers to achieve the highest efficiency through a high-performance, low latency cloud network with rich network offload with acceleration and automation features.
Check out the attached Whitepaper from Mellanox and see how we can help you get it there!
See Mellanox Seamlessly Integrates with OpenStack, Increasing Efficiency and Reducing Operational Costs
DDN Past User Group Meetings and Customer Presentations, see https://www.ddn.com/company/events/user-group-sc/
The largest collection of breached data in history has been discovered, comprising more than 770m email addresses and passwords posted to a popular hacking forum in mid-December…..
For more information, do take a look at https://www.theguardian.com/technology/2019/jan/17/breached-data-largest-collection-ever-seen-email-password-hacking
You can check whether your account is compromised b Security Researcher Troy Hunt who runs the Have I Been Pwned breach-notification service.
This is a quick command to add nodes to a specific queue
# qmgr -c “set node node-name queue=queue-name”
To remove nodes from a specific queue
# qmgr -c “unset node node-name queue”
In summary the steps are:
– Install a piece of sw in the host/hypervisor to help virtualize GPUs
– Install the GPU drivers inside the guest OS of the VMs
– Install a license server (flex) for the licensing
– Configure license server and settings within the VM to connect to the license server
News from IBM on Quantum Computing
Quiskit
Quiskit – the “Quantum Information Science Kit” SDK is an open source platform that allows developers and coders familiar with Python and Jupyter Notebooks to program our quantum computers https://github.com/Qiskit
News about IBM Q
Quantum Computing in the NISQ era and beyond
http://quantum-journal.org/?s=Quantum%20Computing%20in%20the%20NISQ%20era%20and%20beyond&reason=title-click
https://quantum-journal.org/papers/q-2018-08-06-79/
For Full Details, see [SingCERT] Alert on DNS Flag Day
Background
Domain Name System (DNS) infrastructure operators and Internet service providers are taking part in the first DNS Flag Day [1] on 1 February 2019. This is a global initiative to promote the use of Extension Mechanism Protocol for DNS (EDNS) [2] where participants, software and service providers such as Google and Cloudflare, are going to remove non-standard DNS workarounds.
Affected
Authoritative nameservers that bypass and do not support the EDNS protocol and those with proprietary implementations of the DNS protocol, e.g. legacy load balancing appliances.
Impact
Internet users might experience slowness or inaccessibility issues when interacting with domains whose authoritative nameservers are affected, such as accessing websites or sending emails.

If you are rebuilding the ssh keys for a user who has accidentally destroyed their files inside .ssh directory
Step 1: Generate the Private Key
# ssh-keygen -t rsa
Step 2: Generate the Public Key from Private Key
# ssh-keygen -y -f ~/.ssh/id_rsa > ~/.ssh/id_rsa.pub
Step 3: Generate the Authorized Key
# cat .ssh/id_rsa.pub >> .ssh/authorized_keys
Step 4: Generate Config File
# touch ~/.ssh/config
StrictHostKeyChecking no