Home / Archive for Albert / Page 7

Author: Albert

nvidia H100

NVIDIA H100: Overview, Specs, & Release Date

The NVIDIA H100 is based on the Hopper architecture and serves as the “new engine of the world’s artificial intelligence infrastructures.” AI applications such as speech, conversation, customer service, and recommenders fundamentally reshape data center design. AI data centers process mountains of continuous data to train and refine AI models. Raw data is ingested, refined, …

Read more

epyc cpu

What is CPU, Cores, MT, vCPU

Even if you don’t know much about computers, you’ve probably heard the term CPU. The Central Processing Unit, or CPU, is an important component of every system, from your home laptop to the servers that host your company’s website. But what is a CPU, and what role does it play in your system’s infrastructure? Are …

Read more

icelake gold

Data Center GPU coupled with Ice Lake Xeon

Machine learning and data analytics are two examples of data-hungry workloads. Enterprises require accelerated servers that are optimized for high performance to handle these compute-intensive tasks. Intel’s new 3rd Gen Intel Xeon Scalable processors (code-named “Ice Lake”) are based on a new architecture that allows for a significant increase in performance and scalability. These new …

Read more

firewall

Types of Firewalls

Are you looking for the best way to protect your business from possible threats? When you know how firewalls work, you can figure out which is the best option for you. This article talks about the different types of firewalls, so you can make an informed choice. What is a Firewall? The simplest way to …

Read more

malware

What is Malware?

Malware, which stands for “malicious software,” is computer code that is intended to harm or exploit any programmable device, server, or network. Malware’s malicious intent can take many forms, including denying access, destroying or stealing data, stealing money, hijacking computer resources, spreading false information, spreading malware, and a variety of other harmful actions. Money, spying …

Read more

ubuntu debian

Ubuntu vs Debian

The most advanced open-source operating system for you may be hiding in plain sight. There are a plethora of Linux distributions to select from, so you’ve probably already figured that out. CentOS vs. Ubuntu has already been discussed. Therefore, we’ll now look at the differences between Debian and Ubuntu, both Linux distributions. Ubuntu and Debian …

Read more

wordpress

How to disable image attachment pages in WordPress

Image attachment pages give an impression of incomplete pages on your site. A visitor can have a poor impression of your site after visiting attachment pages that look like incomplete pages and show up to visitors. This article details the procedure to disable image attachment pages in WordPress and redirect to the parent page. Why …

Read more

minecraft

Minecraft Server Deployment Guide

You’ve defeated the Ender Dragon, conquered the Nether, and constructed your own pixelated King’s Landing. So, what’s next? Minecraft may be a game of limitless possibilities. Still, once you’ve experienced everything the standard game offers, you might wonder, “How do I replicate the magic I felt on my first play-through?” Building your own Minecraft dedicated …

Read more

Does LSF support A100 GPU

MIG is supported in Nvidia A100 build 600061. Build 600297 is compatible with DCGM 2.1.7 and CUDA 11.2. A100 also necessitates the use of CUDA 11. LSF build 600061 and LSF build 600297 must be installed to take advantage of all the features of A100.

Read more

iac

What Is Infrastructure as Code (IAC)?

Infrastructure as code (IaC) is a technique for defining and provisioning infrastructure through the use of definition files that contain code. IaC enables IT and development teams to automate and scale the provisioning and management of IT resources in a descriptive manner in accordance with application source-code releases. Important Q&A What business challenges drive IaC …

Read more

ai edge

What Is Edge AI and How Does It Work?

Recent advances in AI efficacy, IoT device adoption, and edge computing power have all combined to unlock the power of edge AI. This has opened up previously unimaginable possibilities for edge AI, such as assisting radiologists in identifying pathologies in the hospital, driving cars down the freeway, and pollinating plants. Edge computing, which dates back …

Read more

metaverse

What is the Metaverse?

What is the metaverse, and how does it work? The metaverse is a collection of interactive, immersive, and collaborative virtual 3D worlds. The metaverse can be conceived of as a collection of universes, similar to how the real universe is made up of worlds that are connected in space. Some components of the concept are …

Read more

fanotify

How to check if FANOTIFY is enabled in Kernel

Using the following command, you can verify if the FANOTIFY is enabled in the kernel. # cat /boot/config-$(uname -r) | grep FANOTIFYCONFIG_FANOTIFY=yCONFIG_FANOTIFY_ACCESS_PERMISSIONS=y FANOTIFY is built in the kernel, so there is no need to load other modules. It is enabled by default in CentOS 7,8 and AlmaLinux 8.

Read more

cloud computing

What are public, private, and hybrid clouds?

Hybrid Cloud Computing On-premises infrastructure (or a private cloud) is combined with a public cloud in a hybrid cloud. With hybrid clouds, data and programs may be moved back and forth between on-premises and the public cloud. Businesses often use this strategy to meet regulations, maximize on-premises investment, or address low latency difficulties. Edge workloads …

Read more

vSphere esxi

Enable SSH on ESXi Hosts in VCF

While connecting to ESXi hosts via ssh, you may encounter the following error. ssh: connect to host 192.168.0.10 port 22: Connection refused SSH is disabled on all ESXi hosts to lessen the security risk starting with VCF 4.4. If an external SSH dependency exists on ESXi hosts, the techniques below can be used to enable …

Read more