Is the notion of water in a server, much less directly on the CPU, sending you into a panic? To ease concerns, Dell has done an inordinate amount of testing and has developed a host of leak detection and protection methods to virtually eliminate any added risk during operation. Come back next week to learn more about the precautions we take with Dell ‘Triton’ technology. —————————–(1) Based on testing by Dell Labs in May 2016, using the Linpack benchmark test, comparing the Intel® Xeon® processor E5 v4 found in ‘Triton’ (3.3 GHz Turbo, 20C, 200W TDP) versus the Intel® Xeon® E5-2680 v4 (3.3 GHz, 14C, 120W) and Intel Xeon E5-2699 v4 (3.6 GHz, 22C, 145W). Actual performance will vary.(2) Based on Dell internal analysis, May 2016.(3) Based on Dell internal analysis, May 2016, where the average data center PUE is 1.7, ‘Triton’ PUE is 1.023, and HPE Apollo 8000 PUE is 1.06. A Closer Look at ‘Triton’Because water can transport heat 25 times more efficiently than air, ‘Triton’ can run high performing components faster and more efficiently than traditional air-cooled systems. Its ability to sub-cool the processor and operate at higher frequencies means that ‘Triton’ can deliver up to 59% greater performance than the popular Intel Xeon processor E5-2680v4 for similar costs. The combination of ‘Triton’ and a customized 200W Intel Xeon processor E5 v4 can also provide double digit performance increases over the highest performing Intel Xeon processor on the market today(1).“We worked closely with Dell to develop a customized server solution which utilizes an innovative approach of liquid cooling 200W CPUs to deliver large performance and efficiency gains,” said Nick Whyte, Vice President, Fellow Search Technology, eBay. “By collaborating with Dell and Intel our search servers achieved an increase of 70% in throughput (QPS – queries per second) with the new Intel Xeon processor E5-2679 v4 versus the previous generation Intel Xeon processor E5-2680 v3 in the ‘Triton’ proof of concept.”“Pushing the thermal design power (TDP) boundary to provide a highly dense compute platform provides excellent TCO benefits by efficiently utilizing resources as well as providing an option for high top-end CPU performance,” said Raejeanne Skillern, Vice President and General Manager, Cloud Provider Group, Intel. “Our collaboration with Dell on ‘Triton’ exemplifies this point and provides the increased performance, efficiency and TCO savings many organizations are looking for to address specific workload and infrastructure needs.”So how does ‘Triton’ do this? For starters, we’ve removed the need for more costly and less efficient liquid-to-liquid heat exchangers, cooling loops or pumping systems that most cooling solutions require. Dell is the first major vendor to safely bring facility water directly in each server sled to cool the CPU, which brings unparalleled cooling efficiencies along with the lowest water consumption of any liquid cooled solution on the market today(2). In fact, this approach uses 97% less datacenter cooling power than the average air-cooled datacenter, up to 62% less power consumption than HPE Apollo 8000, and has a power usage effectiveness (PUE) as low as 1.02 to 1.03(3). Such efficiencies translates into major operational cost savings while also increasing performance for demanding applications.The future of liquid cooling in the datacenter‘Triton’ is just the latest example of Dell’s commitment to increase datacenter efficiency and drive customer-centric innovation. While this liquid cooling technology can bring big advantages to large scale-out environments – especially where CPU frequency is a key driver for overall performance such as high performance computing, financial trading and related high-performance workloads – it’s important to stress that liquid cooling is not for everyone. In many cases, traditional air-cooled solutions will continue to make the most sense from a TCO perspective.While we’re excited to be showcasing ‘Triton’ to you today, this won’t be the last time you hear from ESI on liquid cooling in the datacenter. We’re currently evaluating a “closed loop” version of ‘Triton’ that offers the same liquid cooling technology and CPU support, but removes the need for datacenters to have facility water at the rack. This has the potential to bring liquid cooling to an even broader set of scale-out customers.To learn more, please watch the below video from Austin Shelnutt, our lead thermal architect on ‘Triton’ and download this report from Moor Insights & Strategy. The evolving needs of our customers shape the way we at Dell’s Extreme Scale Infrastructure (ESI) group innovate and develop industry-leading technology for the hyperscale and near-hyperscale market.For eBay, a global commerce leader, meeting their needs meant building a completely new datacenter cooling solution from the ground up to improve performance during peak times while reducing their total cost of ownership (TCO). Leveraging our deep hyperscale roots, we designed a unique approach to liquid cooling that’s built on our rack-scale infrastructure.‘Triton’ in the labToday, we are taking this technology from behind closed doors as proof of concept work for eBay and unveiling it under the codename of ‘Triton.’
“I don’t know who you are. I don’t know what you want. If you are looking for ransom, I can tell you I don’t have money. But what I do have is a very particular set of skills, skills I have acquired over a very long career. Skills that make me a nightmare for people like you.” Fine words from Bryan Mills in Taken. Of course, for Bryan, it’s his daughter who is being ransomed. But, in the 21st Century, it’s increasingly data that’s being taken captive, with hackers gaining access to corporate networks and threatening to delete business-critical information unless their demands for money are met.According to the EMC Global Data Protection Index 2016, more than a quarter of global businesses have lost data in the last year as a result of an external security breach and the average cost of lost data in that time was $914k. Ransomware is a growing threat, and businesses need to rapidly acquire the ‘very particular set of skills’ they need to protect themselves.The hackers casebook Taken, of course, was famously a EuropaCorp production, but its rivals at Sony are, perhaps, more familiar with the impact of data breaches. The notorious hacking of Sony in 2014 returned the media company to the working practices of the 80s, forcing employees to communicate through faxes and post-it notes. The 7,000 employees who were paid with paper checks weren’t too thrilled either.But it could have been worse…Code Spaces, a cloud hosting provider and development platform, faced a devastating security breach that happened over a span of 12 hours in an attempt by hackers to extort money from it. The company was ultimately forced to shut down operations indefinitely after the hacker deleted customer data, including most of the company’s backups. Paying the ransom, huge as it might have been, would have probably had less impact on the company – but is that a viable strategy for businesses?Some valuable data According to the Verizon Data Breach Investigation Reports from 2015 and 2016 we know that:6 minutes is all it takes for attackers to compromise an organization, 60% of the timeLess than 25% of breaches are discovered in a matter of days$1,258,670 is the average cost of 1M breached recordsOf the 174 million stolen records it tracked in 2011, Hacktivists groups took 100 million. A very particular set of skills So what is ‘the very particular set of skills’ that businesses need to protect themselves? The key to surviving a ransomware attack is to ensure that there is a copy of your data that remains beyond the reach of attackers. But that’s easier said than done. Protection data, even if offsite, is, by necessity, network connected. So, even with best practices for backup in place, when businesses come to restore their data, they’ll find that hackers have destroyed that too. What businesses really need, is a virtual panic room for their business-critical data where a copy can be secured and made inaccessible from the network.Isolated Recovery Solutions Isolated Recovery Solutions, like the ones offered by EMC, lock hackers out from the most critical data sets by putting an ‘air gap’ between the storage that holds the protection copy and the rest of the network. They also ensure a rapid path to business recovery when needed. Good Isolated Recovery Solutions should feature four key elements:Planning and Design – companies need to determine which business-critical systems to protect and how to protect them.Isolation – an isolated and protected environment within the customer data center is recommended. Measures such as locking down systems and ‘air gapping’ limit exposure to authorized individuals.Validation – trusted copies can be created at the isolated target site to provide restore points for business-critical systems. Validation tools and methods are applied to ensure the incoming copies have not been compromised.Recovery and Remediation – restore / recovery procedures to bring their business-critical systems back on track.The world of cyber crime is evolving rapidly, and businesses need to respond quickly and resolutely if they don’t want their data to be ‘taken’. Isolated Recovery Solutions give organizations a refuge for their data, enabling them to bounce back quickly in the event that their networks are compromised. To find out how EMC can help deliver Isolated Recovery Solutions, visit our microsite – or, to see more of Liam Neeson’s ‘particular skills’ in action, head over to Netflix.
By now you are likely looking at or already planning your migration to Windows 10. Each new Windows transition ushers in a unique set of challenges and opportunities, and this final transition to Windows 10 is no different. I’m excited to share what we’ve learned in helping customers through the process. This first post in a series provides an overview; watch for additional blog posts where I’ll dig into the details of each topic.Windows 10 brings with it a different set of challenges which are, in reality, great opportunities. There are three main areas I want to focus on: key new security features, automating deployment and preparing for regular Windows as a Service (WaaS) updates.New Levels of SecurityWindows 10 has a whole host of new security features, some of which are more relevant than others. The two most important features are Secure Boot and Credential Guard. In brief, Secure Boot protects the firmware from malware attacks while Credential Guard protects the operating system (OS) from pass the hash attacks. Both require upgrading legacy BIOS to UEFI.That’s not a problem for new computers which come with UEFI, but what about older computers still running BIOS that aren’t old enough to warrant replacement? You can update to UEFI manually or you can automate part or all of that updating process. In the next blog I’ll provide details on these options and my recommendation for how to proceed.Increased Automation for Easier MigrationThere are four issues to consider during the migration process: BIOS/UEFI settings, applying your IT standards, installing user-specific applications and data migration.First, you need to apply your custom BIOS/UEFI settings using OEM-provided tools. Dell recommends applying those BIOS settings during manufacturing for new computers and integrating the BIOS tools into an automated task sequence for in-place upgrades.Then, you need to apply your standard image, including the OS, drivers, customization settings and core applications. In today’s multi-device world we see more customers adopting cross-platform imaging technologies like Dell ImageAssist and Microsoft Deployment Toolkit (MDT) that allow a single image to work across multiple computer models which dramatically simplifies this task. Dell can help build and factory install static, ImageAssist or MDT images.Microsoft’s new Windows Image and Configuration Designer (ICD) tool takes a totally different approach. It applies your standards on top of the OEM OS load and drivers. This enables a much smaller “image” (provisioning package in ICD terms) that works on any system and can simplify the process.Next you will have to address applications and data migration. Dell recommends using discovery tools (like Lakeside Systrack) to determine which applications users need, then packaging your common applications for automated deployment through tools like KACE, System Center Configuration Manager (SCCM) and MDT. Data migration is often the most time consuming step for both your IT staff and end users. Dell automates this process using Dell Migration Tool (DMT), which is Microsoft’s free User State Migration Tool wrapped with our own technology to make it much easier to use.Dell has spent the last decade developing our ability to automate PC and OS deployment. We now help customers deploy over 11M computers every year. We are the industry leader in this area and, not to brag (ok, it’s a brag), but in each of the last six years we have won a variety of Microsoft Partner of the Year awards, largely due to our expertise on Windows client deployments. Most recently, in July 2016, we were named worldwide Windows 10 Deployment Partner of the Year by the Microsoft Enterprise Partner team. So, if you are still looking at this and need help, Dell is ready.Planning for Windows as a Service UpdatesWe’ve talked about how to migrate to Windows 10, what’s next? This last one is a big deal. Windows 10 will be the last full OS upgrade from Microsoft. Yes, really. There won’t be a Windows 11. Instead, Microsoft is releasing new features on a regular semi-annual update schedule. This means no more expensive mass Windows migrations every few years, and this turns migration into a predictable and continual process. But it also introduces new issues that you need to plan for, including implementing a lab testing program of critical applications in advance of updates and piloting these updates on systems before pushing them out to your users.Our recommendation is to identify critical applications and begin lab testing (with tools like Dell ChangeBASE) as soon as updates are released to Insider Preview. I will go into greater detail on this and what you need to know to be ready and be successful in my follow up piece. For now you should know that Dell’s WaaS Planning Services can help you with testing, organizational planning, network readiness and SCCM readiness.There’s more to comeI trust I piqued your interest in learning more about each of these areas! Watch this space for the next blog in the series: a deep dive into security. I’ll also be discussing Win10 at Dell EMC World session MT-113, “Migration Doesn’t Have to Hurt: When Win-10 Wins.” Please join me if you are attending. It would be great to meet you and discuss these issues real time.Dell can help plan and train your IT team to meet these challenges and support you as Windows 10 updates come out. To learn more about how we can help, talk to your Dell representative or visit this website.
What truly drives us is learning about the innovative ways that customers use PowerEdge servers to succeed in a continuously evolving digital world. At Dell EMC, we love to learn first-hand how they’re modernizing their infrastructure, rolling out new services and experiencing an IT Transformation across so many different industries.These are a few of the most innovative PowerEdge customers we’ve visited this year.RyanairRyanair has experienced unprecedented growth over the past few years to become the largest airline in Europe. Their goal is to become the main destination for end-to-end travel planning, offering flights, hotel rooms or holiday packages for business and pleasure. To build an infrastructure that could keep pace with the convenience of one-stop travel sites, they underwent a multi-year IT transformation impacting all facets of the business.To capture revenue beyond commoditized ticket sales, the company built an entirely new production website. Using a PowerEdge-based platform, developers are able to quickly build and roll out new applications and services for an entirely new customer experience. The improved Ryanair site now provides rapid response times, 100 percent uptime, and drives 98 percent of annual revenue.OTTO Motors OTTO Motors is building autonomous self-driving vehicles to handle some of the world’s deadliest, dirtiest, and dullest jobs.In their Ontario testing lab, OTTO self-driving vehicles independently move around the floor to generate internal maps — often while carrying and delivering heavy loads throughout the facility. Programmers can change code on the fly to direct OTTO to a new route based on real-time analytics. In the real world, you can find OTTO self-driving vehicles helping repair centers to improve material flow, and keeping workers safer by doing the heavy lifting for them.OTTO Motors uses Dell EMC PowerEdge servers as the foundation for their design, testing, and production environments, allowing them to keep up with the company’s rapid growth. PowerEdge servers are especially useful for OTTO’s custom-built data analytics platform, which processes and analyzes massive amounts of data. The system can detect a problem, automatically align it with every other known occurrence, and push an automated workflow to a developer’s desktop within seconds.Hampshire Fire and RescueNeil Moore, Head of Digital Technologies, for Hampshire Fire and Rescue sat down with us at VMworld Barcelona to discuss their IT Transformation. As first responders, Hampshire Fire and Rescue needs to connect more people in more places easily and quickly. That’s why they needed a smart, always-on infrastructure that can easily support new services, and respond to multiple calls while pulling detailed location data within seconds. With Dell EMC PowerEdge as the bedrock of their data center, they’ve met all of these challenges and can take on new services with ease. This resilient infrastructure allows Hampshire Fire and Rescue to focus on their main goal: keeping their community safe.https://www.youtube.com/watch?v=oEOZ-7VpNKYTo learn about how PowerEdge can power your IT transformation, visit DellEMC.com/Servers.For more customer stories, and to share your own, connect with us on Twitter @DellEMCServers.
5G is emerging. Industrial IoT is growing. Everyone has heard the phrase, it’s the next ‘big thing’. It’s faster internet, but what does it really mean for you? Our recent Not Just Another G blog series will help you understand exactly what 5G means.This blog will focus on a popular 5G application and use case: Industrial IoT (“Internet Of Things”). Consumers use of IoT has exploded in recent years – much to the extent that now, most folks using IoT don’t even realize they are utilizing it. It’s their smartwatch. Their smart meter. Their smart thermostat. All these ‘smart things’ that are saving our planet for future generations are actually part of IoT.Industrial IoT is much less talked about, because it’s much less seen by the public at large. Yet, it is everywhere around us. It is in roadside monitoring equipment. It is in our power distribution networks. It is in the drilling equipment that produces energy wealth booms for nations. It is in nuclear and hydel-power generation stations. It is in the planes that zip us around the world. It is submarines that let our armies protect us, unbeknownst to the enemy. Industrial IoT devices are everywhere, and they are constantly working to meet the lifestyle demands of the human race.What is it about 5G and industrial IoT?The scale and the complexity of existing and future industrial IoT applications is expected to rise significantly. Current connectivity methods are going to be inadequate for future IoT applications. The promise of 5G, with its mMTC (massive machine-type communication), and URLLC (ultra-reliable low-latency communication) network “slices” is seen to hold enormous promise. The network slice architecture will support the scaling of IoT in the future, and deliver IoT services in a reliable and timely manner. It will guarantee the delivery of that power plant status indicator to the central control system. It will guarantee the scale of millions of pollution monitors spread in sensitive natural ecosystems to work with known turnaround times, so that corrective actions can be initiated instantly and automatically.How will this play out?The 5G standards are being published as we speak, although equipment vendors have begun creating product implementations, and field-trials (and even a few commercial deployments) are skyrocketing. New IoT devices which can speak 5G are being created. Limitations of the compute (often less than desired), storage (often tiny), and methods for command/control of the devices are being studied & addressed. Software (middleware) layers such as the VMware Pulse platform which are designed to manage the plethora of devices, are being adopted. Companies like Intel are solving important fundamental problems such as how to securely deploy and provision the devices with platforms such as Intel SDO.When can we expect results from 5G and IoT?Expect that the IoT capabilities of 5G network equipment, software, and IoT device ecosystems will fully evolve and converge in the next 12-18 months. Initial deployments will be in non-critical applications, soon to be followed by adoption in national critical infrastructure. IoT over 5G is truly a journey and will not happen overnight.Where will it all be deployed?Everywhere. Expect it to be mostly invisible. You will see that your local utility company will begin to reap the rewards of the resulting automation and management efficiencies, and pass along those savings to you, the consumer. In the end, we call it the Internet of Things, but it’s really made of things that serve people. And it will be global. The scale of industrial IoT revolution will reduce the cost and time difficult problems for all of mankind, not just the advanced economies of the world.At Dell Technologies, we are diligently working to make this revolution a reality. Our servers are optimized, long-lasting, and proven to operate in industrial spaces. Our client tech has been and continues to be at the heart of many IoT devices. Our networking and storage boxes may be invisible to you, the consumer, but rest assured that they already play a market share-leading role in most of these applications. Lastly, the software platforms, like the Pulse platform from VMware, will continue to solve scale, efficiency, and security problems posed by this revolution. To boot, we bring along strong ecosystem partnerships with industry leaders such as Intel to this space.Dell Technologies is making a mark on human progress enabled by the emerging 5G and Industrial IoT applications with our robust portfolio of telecommunication solutions to bring 5G to life.
SAVANNAH, Ga. (AP) — A woman who championed the preservation of one of Georgia’s largest barrier islands has died at age 108. Eleanor “Sandy” Torrey West’s family owned wild Ossabaw Island for more than five decades before she sold it to the state of Georgia for $8 million. The deal required that the island remain undeveloped and used only for study, research, education and conservation. The Savannah Morning News reports that West’s grandson, Beryl Gilothwest, confirmed she died Jan. 17 on her 108th birthday. Before selling the island, West used it to host artist retreats with guests including writers Ralph Ellison and Alice Walker and composer Aaron Copland. West lived on the island for nearly three decades until 2016.
Johnson & Johnson says its vaccine appears to protect against COVID-19 with just one shot. It’s not as strong as some two-shot rivals, but it’s still potentially helpful for a world in dire need of more doses. In Washington, the Biden administration says it’s taking “creative steps” to build broader public support for its $1.9 trillion COVID-19 rescue plan. President Joe Biden and his new treasury secretary say the cost of doing too little is much greater than the cost of doing and spending too much. Meanwhile, cities and states are enlisting nontraditional people in the nation’s vaccination efforts, including event organizers and other logistics experts.
It’s one of the great Hollywood ironies that Christopher Plummer didn’t like the film that made him a legend. He was an actor’s actor and had cut his teeth doing Shakespeare. “The Sound of Music,” he thought, was sentimental shlock. And he wasn’t alone — reviews at the time were famously terrible. Then, like a personal curse, it would go on to become a universally beloved classic. Associated Press Film Writer Lindsey Bahr remembers the wildly versatile Plummer, who died at 91 on Friday. Plummer not only softened on “The Sound of Music” later in life, he also got to enjoy something that so few actors do: A genuine third act.