cross pond high tech
159.9K views | +7 today
cross pond high tech
light views on high tech in both Europe and US
Your new post is loading...
Your new post is loading...
Scooped by Philippe J DEWOST
Scoop.it!

Amazon, Verizon partner on new 5G WaveLength product

Amazon, Verizon partner on new 5G WaveLength product | cross pond high tech | Scoop.it

Amazon is using next-generation 5G wireless networks to help businesses download data from the cloud faster.

At Amazon Web Services’ annual re:Invent conference on Tuesday, AWS CEO Andy Jassy said the company is introducing a new service, called WaveLength, which puts technology from AWS “at the edge of the 5G network,” or closer to users’ devices. It has the potential to deliver single-digit millisecond latencies to users, according to Amazon.

At launch, Amazon is partnering with Verizon to incorporate WaveLength technology into parts of its wireless network. Amazon is also working with other global partners, such as Vodafone, KDDI and SK Telecom.

Lower latency is one of the big benefits that’s expected to arrive with 5G networks. This means it doesn’t take as long for devices to communicate with each other. For users, it results in fewer disruptions and shorter lag times when streaming videos, among other applications. 5G has the potential for many business-to-business applications, such as improving connectivity of IoT devices in manufacturing, self-driving, health care and other areas, in addition to consumer applications, such as faster streaming on phones.

“The connectivity and the speed is just two things,” Verizon CEO Hans Vestberg said on stage Tuesday at AWS’ re:Invent conference. “We can with 5G now bring the processing out to the edge because we have a virtualized network.”

With the partnership, AWS’ compute, storage, database and analytics tools are all “embedded” at the edge of 5G networks, Jassy said in an interview with CNBC’s Jon Fortt that aired Tuesday.

“That means now you only go from the device to the metro aggregation site, which is where the 5G tower is, where AWS is embedded there, and you get AWS,” Jassy said. “So it totally changes the response rates and the latency and what you can get done.”

Amazon is launching WaveLength at a time when excitement is ramping up around 5G networks. The technology is expected to be used more broadly by device makers, carriers and cable companies in 2020.

Philippe J DEWOST's insight:

Interesting announcement made by Amazon about an AWS technology being embedded in 5G towers, rather than an offering announced by Verizon with Amazon as a pioneer customer...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

AWS launches its custom Inferentia AI chips

AWS launches its custom Inferentia AI chips | cross pond high tech | Scoop.it

At its re:Invent conference, AWS today announced the launch of its Inferentia chips, which it initially announced last year. These new chips promise to make inferencing, that is, using the machine learning models you pre-trained earlier, significantly faster and cost effective.

As AWS CEO Andy Jassy noted, a lot of companies are focusing on custom chips that let you train models (though Google and others would surely disagree there). Inferencing tends to work well on regular CPUs, but custom chips are obviously going to be faster. With Inferentia, AWS offers lower latency and three times the throughput at 40% lower cost per inference compared to a regular G4 instance on EC4.

The new Inf1 instances promise up to 2,000 TOPS and feature integrations with TensorFlow, PyTorch and MXNet, as well as the ONNX format for moving models between frameworks. For now, it’s only available in the EC2 compute service, but it will come to AWS’s container services and its SageMaker machine learning service soon, too.

Philippe J DEWOST's insight:

Amazon continues going vertical with custom AI chip design made available in its cloud offerings.

Philippe J DEWOST's curator insight, December 9, 2019 4:04 AM

La puissance de calcul est un des leviers de la puissance tout court - suite : même les libraires se mettent au design propriétaire de processeurs (et celui-ci est dédié à l'IA). On attend toujours le processeur de la FNAC ou le GPU de Cdiscount ... 

Scooped by Philippe J DEWOST
Scoop.it!

Amazon Web Services introduces its own custom-designed Arm server processor, promises 45 percent lower costs for some workloads –

Amazon Web Services introduces its own custom-designed Arm server processor, promises 45 percent lower costs for some workloads – | cross pond high tech | Scoop.it
After years of waiting for someone to design an Arm server processor that could work at scale on the cloud, Amazon Web Services just went ahead and designed its own. Vice president of infrastructure Peter DeSantis introduced the AWS Graviton Processor Monday night, adding a third chip option for cloud customers alongside instances that use processors from Intel and AMD. The company did not provide a lot of details about the processor itself, but DeSantis said that it was designed for scale-out workloads that benefit from a lot of servers chipping away at a problem.
Philippe J DEWOST's insight:
If you can’t find it, just design it and build it ! Hardware Is Not Dead
No comment yet.
Rescooped by Philippe J DEWOST from Digital Sovereignty & Cyber Security
Scoop.it!

Supermicro stock fell 50 percent after a bombshell Bloomberg report on How China Used a Tiny Chip to Infiltrate nearly 30 U.S. Companies

Supermicro stock fell 50 percent after a bombshell Bloomberg report on How China Used a Tiny Chip to Infiltrate nearly 30 U.S. Companies | cross pond high tech | Scoop.it

The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.

(from Bloomberg Business Week through Clément Epié)

-----------How the Hack Worked, According to U.S. Officials

① A Chinese military unit designed and manufactured microchips as small as a sharpened pencil tip. Some of the chips were built to look like signal conditioning couplers, and they incorporated memory, networking capability, and sufficient processing power for an attack.

② The microchips were inserted at Chinese factories that supplied Supermicro, one of the world’s biggest sellers of server motherboards.

③ The compromised motherboards were built into servers assembled by Supermicro.

④ The sabotaged servers made their way inside data centers operated by dozens of companies.

⑤ When a server was installed and switched on, the microchip altered the operating system’s core so it could accept modifications. The chip could also contact computers controlled by the attackers in search of further instructions and code.
-------------------------------------------

"In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA.

To help with due diligence, AWS, which was overseeing the prospective acquisition, hired a third-party company to scrutinize Elemental’s security, according to one person familiar with the process. The first pass uncovered troubling issues, prompting AWS to take a closer look at Elemental’s main product: the expensive servers that customers installed in their networks to handle the video compression. These servers were assembled for Elemental by Super Micro Computer Inc., a San Jose-based company (commonly known as Supermicro) that’s also one of the world’s biggest suppliers of server motherboards, the fiberglass-mounted clusters of chips and capacitors that act as the neurons of data centers large and small. In late spring of 2015, Elemental’s staff boxed up several servers and sent them to Ontario, Canada, for the third-party security company to test, the person says.

Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.

During the ensuing top-secret probe, which remains open more than three years later, investigators determined that the chips allowed the attackers to create a stealth doorway into any network that included the altered machines. Multiple people familiar with the matter say investigators found that the chips had been inserted at factories run by manufacturing subcontractors in China.

This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.

There are two ways for spies to alter the guts of computer equipment. One, known as interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.

One country in particular has an advantage executing this kind of attack: China, which by some estimates makes 75 percent of the world’s mobile phones and 90 percent of its PCs. Still, to actually accomplish a seeding attack would mean developing a deep understanding of a product’s design, manipulating components at the factory, and ensuring that the doctored devices made it through the global logistics chain to the desired location—a feat akin to throwing a stick in the Yangtze River upstream from Shanghai and ensuring that it washes ashore in Seattle. “Having a well-done, nation-state-level hardware implant surface would be like witnessing a unicorn jumping over a rainbow,” says Joe Grand, a hardware hacker and the founder of Grand Idea Studio Inc. “Hardware is just so far off the radar, it’s almost treated like black magic.”

But that’s just what U.S. investigators found: The chips had been inserted during the manufacturing process, two officials say, by operatives from a unit of the People’s Liberation Army. In Supermicro, China’s spies appear to have found a perfect conduit for what U.S. officials now describe as the most significant supply chain attack known to have been carried out against American companies.

One official says investigators found that it eventually affected almost 30 companies, including a major bank, government contractors, and the world’s most valuable company, Apple Inc. Apple was an important Supermicro customer and had planned to order more than 30,000 of its servers in two years for a new global network of data centers. Three senior insiders at Apple say that in the summer of 2015, it, too, found malicious chips on Supermicro motherboards. Apple severed ties with Supermicro the following year, for what it described as unrelated reasons.

In emailed statements, Amazon (which announced its acquisition of Elemental in September 2015), Apple, and Supermicro disputed summaries of Bloomberg Businessweek’s reporting. “It’s untrue that AWS knew about a supply chain compromise, an issue with malicious chips, or hardware modifications when acquiring Elemental,” Amazon wrote. “On this we can be very clear: Apple has never found malicious chips, ‘hardware manipulations’ or vulnerabilities purposely planted in any server,” Apple wrote. “We remain unaware of any such investigation,” wrote a spokesman for Supermicro, Perry Hayes. The Chinese government didn’t directly address questions about manipulation of Supermicro servers, issuing a statement that read, in part, “Supply chain safety in cyberspace is an issue of common concern, and China is also a victim.” The FBI and the Office of the Director of National Intelligence, representing the CIA and NSA, declined to comment.

The companies’ denials are countered by six current and former senior national security officials, who—in conversations that began during the Obama administration and continued under the Trump administration—detailed the discovery of the chips and the government’s investigation. One of those officials and two people inside AWS provided extensive information on how the attack played out at Elemental and Amazon; the official and one of the insiders also described Amazon’s cooperation with the government investigation. In addition to the three Apple insiders, four of the six U.S. officials confirmed that Apple was a victim. In all, 17 people confirmed the manipulation of Supermicro’s hardware and other elements of the attacks. The sources were granted anonymity because of the sensitive, and in some cases classified, nature of the information.

One government official says China’s goal was long-term access to high-value corporate secrets and sensitive government networks. No consumer data is known to have been stolen.

The ramifications of the attack continue to play out. The Trump administration has made computer and networking hardware, including motherboards, a focus of its latest round of trade sanctions against China, and White House officials have made it clear they think companies will begin shifting their supply chains to other countries as a result. Such a shift might assuage officials who have been warning for years about the security of the supply chain—even though they’ve never disclosed a major reason for their concerns.

Back in 2006, three engineers in Oregon had a clever idea. Demand for mobile video was about to explode, and they predicted that broadcasters would be desperate to transform programs designed to fit TV screens into the various formats needed for viewing on smartphones, laptops, and other devices. To meet the anticipated demand, the engineers started Elemental Technologies, assembling what one former adviser to the company calls a genius team to write code that would adapt the superfast graphics chips being produced for high-end video-gaming machines. The resulting software dramatically reduced the time it took to process large video files. Elemental then loaded the software onto custom-built servers emblazoned with its leprechaun-green logos.

Elemental servers sold for as much as $100,000 each, at profit margins of as high as 70 percent, according to a former adviser to the company. Two of Elemental’s biggest early clients were the Mormon church, which used the technology to beam sermons to congregations around the world, and the adult film industry, which did not.

Elemental also started working with American spy agencies. In 2009 the company announced a development partnership with In-Q-Tel Inc., the CIA’s investment arm, a deal that paved the way for Elemental servers to be used in national security missions across the U.S. government. Public documents, including the company’s own promotional materials, show that the servers have been used inside Department of Defense data centers to process drone and surveillance-camera footage, on Navy warships to transmit feeds of airborne missions, and inside government buildings to enable secure videoconferencing. NASA, both houses of Congress, and the Department of Homeland Security have also been customers. This portfolio made Elemental a target for foreign adversaries.

Supermicro had been an obvious choice to build Elemental’s servers. Headquartered north of San Jose’s airport, up a smoggy stretch of Interstate 880, the company was founded by Charles Liang, a Taiwanese engineer who attended graduate school in Texas and then moved west to start Supermicro with his wife in 1993. Silicon Valley was then embracing outsourcing, forging a pathway from Taiwanese, and later Chinese, factories to American consumers, and Liang added a comforting advantage: Supermicro’s motherboards would be engineered mostly in San Jose, close to the company’s biggest clients, even if the products were manufactured overseas.

Today, Supermicro sells more server motherboards than almost anyone else. It also dominates the $1 billion market for boards used in special-purpose computers, from MRI machines to weapons systems. Its motherboards can be found in made-to-order server setups at banks, hedge funds, cloud computing providers, and web-hosting services, among other places. Supermicro has assembly facilities in California, the Netherlands, and Taiwan, but its motherboards—its core product—are nearly all manufactured by contractors in China.

The company’s pitch to customers hinges on unmatched customization, made possible by hundreds of full-time engineers and a catalog encompassing more than 600 designs. The majority of its workforce in San Jose is Taiwanese or Chinese, and Mandarin is the preferred language, with hanzi filling the whiteboards, according to six former employees. Chinese pastries are delivered every week, and many routine calls are done twice, once for English-only workers and again in Mandarin. The latter are more productive, according to people who’ve been on both. These overseas ties, especially the widespread use of Mandarin, would have made it easier for China to gain an understanding of Supermicro’s operations and potentially to infiltrate the company. (A U.S. official says the government’s probe is still examining whether spies were planted inside Supermicro or other American companies to aid the attack.)

With more than 900 customers in 100 countries by 2015, Supermicro offered inroads to a bountiful collection of sensitive targets. “Think of Supermicro as the Microsoft of the hardware world,” says a former U.S. intelligence official who’s studied Supermicro and its business model. “Attacking Supermicro motherboards is like attacking Windows. It’s like attacking the whole world.”

Well before evidence of the attack surfaced inside the networks of U.S. companies, American intelligence sources were reporting that China’s spies had plans to introduce malicious microchips into the supply chain. The sources weren’t specific, according to a person familiar with the information they provided, and millions of motherboards are shipped into the U.S. annually. But in the first half of 2014, a different person briefed on high-level discussions says, intelligence officials went to the White House with something more concrete: China’s military was preparing to insert the chips into Supermicro motherboards bound for U.S. companies.

The specificity of the information was remarkable, but so were the challenges it posed. Issuing a broad warning to Supermicro’s customers could have crippled the company, a major American hardware maker, and it wasn’t clear from the intelligence whom the operation was targeting or what its ultimate aims were. Plus, without confirmation that anyone had been attacked, the FBI was limited in how it could respond. The White House requested periodic updates as information came in, the person familiar with the discussions says.

Apple made its discovery of suspicious chips inside Supermicro servers around May 2015, after detecting odd network activity and firmware problems, according to a person familiar with the timeline. Two of the senior Apple insiders say the company reported the incident to the FBI but kept details about what it had detected tightly held, even internally. Government investigators were still chasing clues on their own when Amazon made its discovery and gave them access to sabotaged hardware, according to one U.S. official. This created an invaluable opportunity for intelligence agencies and the FBI—by then running a full investigation led by its cyber- and counterintelligence teams—to see what the chips looked like and how they worked.

The chips on Elemental servers were designed to be as inconspicuous as possible, according to one person who saw a detailed report prepared for Amazon by its third-party security contractor, as well as a second person who saw digital photos and X-ray images of the chips incorporated into a later report prepared by Amazon’s security team. Gray or off-white in color, they looked more like signal conditioning couplers, another common motherboard component, than microchips, and so they were unlikely to be detectable without specialized equipment. Depending on the board model, the chips varied slightly in size, suggesting that the attackers had supplied different factories with different batches.

Officials familiar with the investigation say the primary role of implants such as these is to open doors that other attackers can go through. “Hardware attacks are about access,” as one former senior official puts it. In simplified terms, the implants on Supermicro hardware manipulated the core operating instructions that tell the server what to do as data move across a motherboard, two people familiar with the chips’ operation say. This happened at a crucial moment, as small bits of the operating system were being stored in the board’s temporary memory en route to the server’s central processor, the CPU. The implant was placed on the board in a way that allowed it to effectively edit this information queue, injecting its own code or altering the order of the instructions the CPU was meant to follow. Deviously small changes could create disastrous effects.

Since the implants were small, the amount of code they contained was small as well. But they were capable of doing two very important things: telling the device to communicate with one of several anonymous computers elsewhere on the internet that were loaded with more complex code; and preparing the device’s operating system to accept this new code. The illicit chips could do all this because they were connected to the baseboard management controller, a kind of superchip that administrators use to remotely log in to problematic servers, giving them access to the most sensitive code even on machines that have crashed or are turned off.

This system could let the attackers alter how the device functioned, line by line, however they wanted, leaving no one the wiser. To understand the power that would give them, take this hypothetical example: Somewhere in the Linux operating system, which runs in many servers, is code that authorizes a user by verifying a typed password against a stored encrypted one. An implanted chip can alter part of that code so the server won’t check for a password—and presto! A secure machine is open to any and all users. A chip can also steal encryption keys for secure communications, block security updates that would neutralize the attack, and open up new pathways to the internet. Should some anomaly be noticed, it would likely be cast as an unexplained oddity. “The hardware opens whatever door it wants,” says Joe FitzPatrick, founder of Hardware Security Resources LLC, a company that trains cybersecurity professionals in hardware hacking techniques.

U.S. officials had caught China experimenting with hardware tampering before, but they’d never seen anything of this scale and ambition. The security of the global technology supply chain had been compromised, even if consumers and most companies didn’t know it yet. What remained for investigators to learn was how the attackers had so thoroughly infiltrated Supermicro’s production process—and how many doors they’d opened into American targets.

Unlike software-based hacks, hardware manipulation creates a real-world trail. Components leave a wake of shipping manifests and invoices. Boards have serial numbers that trace to specific factories. To track the corrupted chips to their source, U.S. intelligence agencies began following Supermicro’s serpentine supply chain in reverse, a person briefed on evidence gathered during the probe says.

As recently as 2016, according to DigiTimes, a news site specializing in supply chain research, Supermicro had three primary manufacturers constructing its motherboards, two headquartered in Taiwan and one in Shanghai. When such suppliers are choked with big orders, they sometimes parcel out work to subcontractors. In order to get further down the trail, U.S. spy agencies drew on the prodigious tools at their disposal. They sifted through communications intercepts, tapped informants in Taiwan and China, even tracked key individuals through their phones, according to the person briefed on evidence gathered during the probe. Eventually, that person says, they traced the malicious chips to four subcontracting factories that had been building Supermicro motherboards for at least two years.

As the agents monitored interactions among Chinese officials, motherboard manufacturers, and middlemen, they glimpsed how the seeding process worked. In some cases, plant managers were approached by people who claimed to represent Supermicro or who held positions suggesting a connection to the government. The middlemen would request changes to the motherboards’ original designs, initially offering bribes in conjunction with their unusual requests. If that didn’t work, they threatened factory managers with inspections that could shut down their plants. Once arrangements were in place, the middlemen would organize delivery of the chips to the factories.

The investigators concluded that this intricate scheme was the work of a People’s Liberation Army unit specializing in hardware attacks, according to two people briefed on its activities. The existence of this group has never been revealed before, but one official says, “We’ve been tracking these guys for longer than we’d like to admit.” The unit is believed to focus on high-priority targets, including advanced commercial technology and the computers of rival militaries. In past attacks, it targeted the designs for high-performance computer chips and computing systems of large U.S. internet providers.

Provided details of Businessweek’s reporting, China’s Ministry of Foreign Affairs sent a statement that said “China is a resolute defender of cybersecurity.” The ministry added that in 2011, China proposed international guarantees on hardware security along with other members of the Shanghai Cooperation Organization, a regional security body. The statement concluded, “We hope parties make less gratuitous accusations and suspicions but conduct more constructive talk and collaboration so that we can work together in building a peaceful, safe, open, cooperative and orderly cyberspace.”

The Supermicro attack was on another order entirely from earlier episodes attributed to the PLA. It threatened to have reached a dizzying array of end users, with some vital ones in the mix. Apple, for its part, has used Supermicro hardware in its data centers sporadically for years, but the relationship intensified after 2013, when Apple acquired a startup called Topsy Labs, which created superfast technology for indexing and searching vast troves of internet content. By 2014, the startup was put to work building small data centers in or near major global cities. This project, known internally as Ledbelly, was designed to make the search function for Apple’s voice assistant, Siri, faster, according to the three senior Apple insiders.

Documents seen by Businessweek show that in 2014, Apple planned to order more than 6,000 Supermicro servers for installation in 17 locations, including Amsterdam, Chicago, Hong Kong, Los Angeles, New York, San Jose, Singapore, and Tokyo, plus 4,000 servers for its existing North Carolina and Oregon data centers. Those orders were supposed to double, to 20,000, by 2015. Ledbelly made Apple an important Supermicro customer at the exact same time the PLA was found to be manipulating the vendor’s hardware.

Project delays and early performance problems meant that around 7,000 Supermicro servers were humming in Apple’s network by the time the company’s security team found the added chips. Because Apple didn’t, according to a U.S. official, provide government investigators with access to its facilities or the tampered hardware, the extent of the attack there remained outside their view.

American investigators eventually figured out who else had been hit. Since the implanted chips were designed to ping anonymous computers on the internet for further instructions, operatives could hack those computers to identify others who’d been affected. Although the investigators couldn’t be sure they’d found every victim, a person familiar with the U.S. probe says they ultimately concluded that the number was almost 30 companies.

That left the question of whom to notify and how. U.S. officials had been warning for years that hardware made by two Chinese telecommunications giants, Huawei Corp. and ZTE Corp., was subject to Chinese government manipulation. (Both Huawei and ZTE have said no such tampering has occurred.) But a similar public alert regarding a U.S. company was out of the question. Instead, officials reached out to a small number of important Supermicro customers. One executive of a large web-hosting company says the message he took away from the exchange was clear: Supermicro’s hardware couldn’t be trusted. “That’s been the nudge to everyone—get that crap out,” the person says.

Amazon, for its part, began acquisition talks with an Elemental competitor, but according to one person familiar with Amazon’s deliberations, it reversed course in the summer of 2015 after learning that Elemental’s board was nearing a deal with another buyer. Amazon announced its acquisition of Elemental in September 2015, in a transaction whose value one person familiar with the deal places at $350 million. Multiple sources say that Amazon intended to move Elemental’s software to AWS’s cloud, whose chips, motherboards, and servers are typically designed in-house and built by factories that Amazon contracts from directly.

A notable exception was AWS’s data centers inside China, which were filled with Supermicro-built servers, according to two people with knowledge of AWS’s operations there. Mindful of the Elemental findings, Amazon’s security team conducted its own investigation into AWS’s Beijing facilities and found altered motherboards there as well, including more sophisticated designs than they’d previously encountered. In one case, the malicious chips were thin enough that they’d been embedded between the layers of fiberglass onto which the other components were attached, according to one person who saw pictures of the chips. That generation of chips was smaller than a sharpened pencil tip, the person says. (Amazon denies that AWS knew of servers found in China containing malicious chips.)

China has long been known to monitor banks, manufacturers, and ordinary citizens on its own soil, and the main customers of AWS’s China cloud were domestic companies or foreign entities with operations there. Still, the fact that the country appeared to be conducting those operations inside Amazon’s cloud presented the company with a Gordian knot. Its security team determined that it would be difficult to quietly remove the equipment and that, even if they could devise a way, doing so would alert the attackers that the chips had been found, according to a person familiar with the company’s probe. Instead, the team developed a method of monitoring the chips. In the ensuing months, they detected brief check-in communications between the attackers and the sabotaged servers but didn’t see any attempts to remove data. That likely meant either that the attackers were saving the chips for a later operation or that they’d infiltrated other parts of the network before the monitoring began. Neither possibility was reassuring.

When in 2016 the Chinese government was about to pass a new cybersecurity law—seen by many outside the country as a pretext to give authorities wider access to sensitive data—Amazon decided to act, the person familiar with the company’s probe says. In August it transferred operational control of its Beijing data center to its local partner, Beijing Sinnet, a move the companies said was needed to comply with the incoming law. The following November, Amazon sold the entire infrastructure to Beijing Sinnet for about $300 million. The person familiar with Amazon’s probe casts the sale as a choice to “hack off the diseased limb.”

As for Apple, one of the three senior insiders says that in the summer of 2015, a few weeks after it identified the malicious chips, the company started removing all Supermicro servers from its data centers, a process Apple referred to internally as “going to zero.” Every Supermicro server, all 7,000 or so, was replaced in a matter of weeks, the senior insider says. (Apple denies that any servers were removed.) In 2016, Apple informed Supermicro that it was severing their relationship entirely—a decision a spokesman for Apple ascribed in response to Businessweek’s questions to an unrelated and relatively minor security incident.

That August, Supermicro’s CEO, Liang, revealed that the company had lost two major customers. Although he didn’t name them, one was later identified in news reports as Apple. He blamed competition, but his explanation was vague. “When customers asked for lower price, our people did not respond quickly enough,” he said on a conference call with analysts. Hayes, the Supermicro spokesman, says the company has never been notified of the existence of malicious chips on its motherboards by either customers or U.S. law enforcement.

Concurrent with the illicit chips’ discovery in 2015 and the unfolding investigation, Supermicro has been plagued by an accounting problem, which the company characterizes as an issue related to the timing of certain revenue recognition. After missing two deadlines to file quarterly and annual reports required by regulators, Supermicro was delisted from the Nasdaq on Aug. 23 of this year. It marked an extraordinary stumble for a company whose annual revenue had risen sharply in the previous four years, from a reported $1.5 billion in 2014 to a projected $3.2 billion this year.

One Friday in late September 2015, President Barack Obama and Chinese President Xi Jinping appeared together at the White House for an hourlong press conference headlined by a landmark deal on cybersecurity. After months of negotiations, the U.S. had extracted from China a grand promise: It would no longer support the theft by hackers of U.S. intellectual property to benefit Chinese companies. Left out of those pronouncements, according to a person familiar with discussions among senior officials across the U.S. government, was the White House’s deep concern that China was willing to offer this concession because it was already developing far more advanced and surreptitious forms of hacking founded on its near monopoly of the technology supply chain.

In the weeks after the agreement was announced, the U.S. government quietly raised the alarm with several dozen tech executives and investors at a small, invite-only meeting in McLean, Va., organized by the Pentagon. According to someone who was present, Defense Department officials briefed the technologists on a recent attack and asked them to think about creating commercial products that could detect hardware implants. Attendees weren’t told the name of the hardware maker involved, but it was clear to at least some in the room that it was Supermicro, the person says.

The problem under discussion wasn’t just technological. It spoke to decisions made decades ago to send advanced production work to Southeast Asia. In the intervening years, low-cost Chinese manufacturing had come to underpin the business models of many of America’s largest technology companies. Early on, Apple, for instance, made many of its most sophisticated electronics domestically. Then in 1992, it closed a state-of-the-art plant for motherboard and computer assembly in Fremont, Calif., and sent much of that work overseas.

Over the decades, the security of the supply chain became an article of faith despite repeated warnings by Western officials. A belief formed that China was unlikely to jeopardize its position as workshop to the world by letting its spies meddle in its factories. That left the decision about where to build commercial systems resting largely on where capacity was greatest and cheapest. “You end up with a classic Satan’s bargain,” one former U.S. official says. “You can have less supply than you want and guarantee it’s secure, or you can have the supply you need, but there will be risk. Every organization has accepted the second proposition.”

In the three years since the briefing in McLean, no commercially viable way to detect attacks like the one on Supermicro’s motherboards has emerged—or has looked likely to emerge. Few companies have the resources of Apple and Amazon, and it took some luck even for them to spot the problem. “This stuff is at the cutting edge of the cutting edge, and there is no easy technological solution,” one of the people present in McLean says. “You have to invest in things that the world wants. You cannot invest in things that the world is not ready to accept yet.”

Bloomberg LP has been a Supermicro customer. According to a Bloomberg LP spokesperson, the company has found no evidence to suggest that it has been affected by the hardware issues raised in the article."

Philippe J DEWOST's insight:

Though the story is apparently still developing, a few conclusions may already be drawned :

 

1/ We (re)discover that China makes 90% of the world's PC

2/ As they learn fast and well, they gain not only understanding on how what they manufacture works, but also how to make it work differently by designing their own components (including processors in order to lower their dependency to Intel and US Tech)

3/ This revalidates that hardware design is a core industrial sovereignty constituent

4/ Europe has retreated very early from the field so we have absolutely no clue about what the technology we import actually does (beyond what it is supposed to do)

 

The only way out is to open source hardware and firmware excactly as it happened to Operating Systems. The proof that such option is viable came from Europe ; we need a Linus for hardware !

Philippe J DEWOST's curator insight, October 5, 2018 3:24 AM

Though the story is apparently still developing, a few conclusions may already be drawned :

 

1/ We (re)discover that China makes 90% of the world's PC

2/ As they learn fast and well, they gain not only understanding on how what they manufacture works, but also how to make it work differently by designing their own components (including processors in order to lower their dependency to Intel and US Tech)

3/ This revalidates that hardware design is a core industrial sovereignty constituent

4/ Europe has retreated very early from the field so we have absolutely no clue about what the technology we import actually does (beyond what it is supposed to do)

 

The only way out is to open source hardware and firmware excactly as it happened to Operating Systems. The proof that such option is viable came from Europe ; we need a Linus for hardware ! 

Scooped by Philippe J DEWOST
Scoop.it!

Alexa, Stop Making Life Miserable for Anyone With a Similar Name!

Alexa, Stop Making Life Miserable for Anyone With a Similar Name! | cross pond high tech | Scoop.it
Amazon’s voice-controlled personal assistant is creating chaos for people called Alexis, Alex and Alexa; TV sitcom tried to order milk — Life has been complicated ever since Alexa Sussman and her parents started using Amazon's Echo and its built-in ‘Alexa’ assistant.“Alexa, stop!” Joanne Sussman screamed in her living room.Immediately, the computer living inside her Amazon Echo speaker stopped playing her favorite music station. Simultaneously, Mrs. Sussman’s 24-year-old daughter, Alexa, froze on the stairs.
Philippe J DEWOST's insight:
AI first collaterals : girls named "Alexa", "Siri", or "Cortana". Unless we (or the IA giants) do something, these names will disappear from the charts soon while existing humans wearing these names will experience a nightmare.The short term winner ? "OK Google" as no child has been given such name... yet.
No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Google and Facebook Team Up to Open Source the Gear Behind Their Empires

Google and Facebook Team Up to Open Source the Gear Behind Their Empires | cross pond high tech | Scoop.it

Half a decade ago, Jonathan Heiliger compared the world of Internet data centers to Fight Club.

It was the spring of 2011, and the giants of the Internet—including Google, Amazon, and Microsoft—were erecting a new kind of data center. Their online empires had grown so large that they could no longer rely on typical hardware from the likes of Dell, HP, and IBM. They needed hardware that was cheaper, more streamlined, and more malleable. So, behind the scenes, they designed this hardware from scratch and had it manufactured through little-known companies in Asia.

This shadow hardware market was rarely discussed in public. Companies like Google saw their latest data center hardware as a competitive advantage best kept secret from rivals. But then Facebook tore off the veil. It open sourced its latest server and data center designs, freely sharing them with the world under the aegis of a new organization called the Open Compute Project. “It’s time to stop treating data center design like Fight Club and demystify the way these things are built,” said Heiliger, then the vice president of technical operations at Facebook. 

Google was the first company to rethink data center design for the modern age.

With the Open Compute Project, Facebook aimed to create a whole community of companies that would freely share their data center designs, hoping to accelerate the evolution of Internet hardware and, thanks to the economies of scale, drive down the cost of this hardware. That, among other things, boosts the Facebook bottom line. It worked—in a very big way. Microsoft soon shared its designs too. Companies like HP and Quanta began selling this new breed of streamlined gear. And businesses as diverse as Rackspace and Goldman Sachs used this hardware to expand their own massive online operations. Even Apple—that bastion of secrecy—eventually joined the project.

Two big holdouts remained: Google and Amazon. But today, that number dropped to one. At the annual Open Compute Summit in San Jose, California, Google announced that it too has joined the project. And it’s already working with Facebook on a new piece of open source hardware.

Philippe J DEWOST's insight:

Open Compute has been transformative since day 1, and with Google finally joining, the number of missing elephants in the room has dramatically reduced.

What still puzzles me is the loud silence of European players in the field although we have a tremendous breed of companies and talent in that space. #HardwareIsNotDead

Aedanf Zane's curator insight, March 10, 2016 6:21 AM

Open Compute has been transformative since day 1, and with Google finally joining, the number of missing elephants in the room has dramatically reduced.

What still puzzles me is the loud silence of European players in the field although we have a tremendous breed of companies and talent in that space. #HardwareIsNotDead

Gerald Black's curator insight, March 10, 2016 9:27 AM

Open Compute has been transformative since day 1, and with Google finally joining, the number of missing elephants in the room has dramatically reduced.

What still puzzles me is the loud silence of European players in the field although we have a tremendous breed of companies and talent in that space. #HardwareIsNotDead

Agra hotal's curator insight, March 10, 2016 11:27 AM

Book Now Hotel with cheap rate near Tajmahal on http://www.hotelatagra.com

Scooped by Philippe J DEWOST
Scoop.it!

Amazon undercuts Google's cloud prices - providing you can pay up front

Amazon undercuts Google's cloud prices - providing you can pay up front | cross pond high tech | Scoop.it

Amazon has introduced a way to pay for cloud infrastructure that undercuts Google – provided you're willing to shell out up front towards at least one year of use.

Amazon Web Services (AWS) has changed the way it charges for its Reserved Instance (RI) compute infrastructure on its Elastic Compute Cloud (EC2). EC2 customers pay for Reserved Instance infrastructure whether they use it or not, unlike EC2's On Demand Instances.

The charges for Reserved Instances are no longer split into light, medium and heavy usage but instead reflect how much a user is willing to pay up front.

Users can chose to pay no up-front costs, or some or all of the costs up front, and must commit to paying for one or three years of usage. A table produced by the cloud portfolio management company RightScale summarises the available payment options below.

Philippe J DEWOST's insight:

Cash is king and Amazon as a Bank

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Nobody Can Win The Cloud Pricing Wars

Nobody Can Win The Cloud Pricing Wars | cross pond high tech | Scoop.it

Earlier this week, Google lowered prices 10 percent across the board on their Google Compute Engine cloud platform . The cost is getting so low, it’s almost trivial for anyone to absorb the costs of running infrastructure in the cloud, but you have to wonder as the cloud pricing wars continue, how low can they go and if it’s a war anyone can win.

 

The end game is obviously zero, but these companies have overhead and while the Big Three cloud computing companies –Google, Amazon and Microsoft –run their Infrastructure as a Service as a side business, chances are their stock holders don’t want to see them giving it away for nothing, a point we seem to be approaching quickly.

 

Just this week, Oracle shocked the world (or at least me) when it announced it would lower its Database as a Service pricing to match Amazon’s. This is Oracle we’re talking about, a company known for its high prices joining the pricing wars. It’s one thing for the Big Three to engage in this type of activity, but for a traditional enterprise software (and hardware) company used to high profits, it’s startling.

Philippe J DEWOST's insight:

Time to (re)assess the real value of sovereignty ?

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

How Facebook Moved 20 Billion Instagram Photos Without Anybody Noticing

How Facebook Moved 20 Billion Instagram Photos Without Anybody Noticing | cross pond high tech | Scoop.it

This spring, even as some 200 million people were using Instagram on their smartphones, a small team of engineers moved the photo sharing service from Amazon’s cloud computing service—where it was built in 2010—into a data center operated by Facebook, which bought Instagram in 2012. “The users are still in the same car they were in at the beginning of the journey,” says Instagram founder Mike Krieger, “but we’ve swapped out every single part without them noticing.”

Facebook calls it the “Instagration,” and it was an unprecedented undertaking for Mark Zuckerberg and company. Facebook has moved other acquired properties like FriendFeed into its data centers, but typically, they were small projects that involved shutting a service down before moving it into the Facebook universe. The Instagram switch was the live migration of an enormous—and enormously popular—operation. “The service couldn’t take any disruption,” says Facebook engineer George Cabrera. Facebook won’t say how many virtual machines were needed to run Instagram on Amazon, but it was in “the thousands.” And the service now stores over 20 billion digitals photos.

 

For Instagram, the move was a way of more effectively plugging into a wide range of computing tools that have long helped drive Facebook’s vast online empire. And for the engineers overseeing Facebook’s worldwide network of data centers, it’s a template for merging their operation with applications the company may acquire in the years to come. “We were patient zero,” Krieger says. But the “Instagration” also provides a lesson or two for the broader tech community as it builds more and more apps atop cloud computing services like Amazon—apps they might one day migrate to private data centers. The key to the migration was a specialized Amazon service known as the Virtual Private Cloud.

Philippe J DEWOST's insight:

fascinating article about #Instagration — "The users are still in the same car they were in at the beginning of the journey, but we’ve swapped out every single part without them noticing." 

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Amazon joins other web giants trying to design its own chips

Amazon joins other web giants trying to design its own chips | cross pond high tech | Scoop.it

As demand for its cloud computing services continues to grow, sources say Amazon is trying to design its own server chips. Based on a job listing and a series of LinkedIn updates, it looks like it could be eyeing the ARM architecture for those chips.

The online retailer and cloud giant has hired several chip engineers who used to work at Calxeda, the former ARM-based server startup out of Austin, Texas that shut down last year, including the former Calxeda CTO. It also has a few job listings for its Silicon Optimization team based in Austin, Texas that call for microprocessor design expertise, including one for a “CPU Architect / Micro-Architect.”

Amazon declined to comment on its plans; actually, a spokeswoman said, “We don’t comment on rumors or speculation.” Don’t worry, we’ll make sure to ask Amazon’s CTO Werner Vogels (pictured) about these plans at our Structure event in June. However, several sources in the Austin chip community have been discussing the impact of Amazon’s decision to swoop in and recruit engineers after Calxeda shut down in December, curious about whether or not Amazon planned to follow other webscale businesses Google and Facebook in trying to build their own silicon.

 
Philippe J DEWOST's insight:

Hardware is not dead... Entering the hardware race yet requires muscles and above all talent. And as I pointed as early as 2 years ago, ARM is still an interesting option.

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Visualizing 15 Years Of Acquisitions By Apple, Google, Yahoo, Amazon, And Facebook

Visualizing 15 Years Of Acquisitions By Apple, Google, Yahoo, Amazon, And Facebook | cross pond high tech | Scoop.it

You grow old, you slow down, and you die. That is, unless you can inject some fresh blood. After watching the last generation of tech giants wither or..

Philippe J DEWOST's insight:

Proud to be somewhere in this GAFAY shopping spree. This chart would be even more interesting in % of market cap...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Barnes & Noble Puts Google’s Play Store and Apps on the Nook

Barnes & Noble Puts Google’s Play Store and Apps on the Nook | cross pond high tech | Scoop.it

The walls around Barnes & Noble‘s Nook walled garden are tumbling down.

 

The company’s Nook HD and Nook HD+ are credible content-consumption tablets — remarkably credible, actually, considering that they come from a 127-year-old bookseller. But they sold so poorly over the holiday season that it raised questions about whether B&N would end up being forced to de-emphasize its hardware business in favor of selling content on other platforms.

The Nooks use Barnes & Noble’s own custom version of Android and provide its own stores for books, magazines, newspapers and apps. And therein lies an oft-raised argument against buying a Nook: the Barnes & Noble application store has had only 10,000 pieces of software — mostly for-pay ones — vs. the hundreds of thousands of choices in Google’s Google Play.


So with one fell swoop, in the form of a software update being rolled out today, B&N is eliminating that downside. It’s giving both Nooks the Google Play stores for apps, music, movies and books, plus key Google apps which the tablets have lacked until now: Chrome, Gmail and YouTube. (Google’s policies for its apps are an all-or-nothing proposition for device makers — if they want Google Play, they also have to pre-install Google’s apps.) New Nooks sold at Barnes & Noble’s bookstores and elsewhere will also carry the updated software.

Philippe J DEWOST's insight:

Slightly tricky as this brings to market a dirt cheap great Android tablet that can run the Kindle app and indirectly sponsored by MSFT...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

How Apple, Amazon & Google Make So Much Money

How Apple, Amazon & Google Make So Much Money | cross pond high tech | Scoop.it

Lots of chatter about "the Apple Tax" these days including @gassee 's excellent Monday Note; here is the other side of the Apple Tax...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

AWS Graviton2: What it means for Arm in the data center, cloud, enterprise, AWS

AWS Graviton2: What it means for Arm in the data center, cloud, enterprise, AWS | cross pond high tech | Scoop.it

With Graviton2, AWS is making it clear that it is serious about Arm processors in the data center as well as moving cloud infrastructure innovation at its pace.

 

Amazon Web Services launched its Graviton2 processors, which promise up to 40% better performance from comparable x86-based instances for 20% less. Graviton2, based on the Arm architectuare, may have a big impact on cloud workloads, AWS' cost structure, and Arm in the data center.

 

Graviton2 was unveiled at AWS' re:Invent 2019 conference and ZDNet was debriefed by the EC2 team in an exclusive. Unlike the Graviton effort and A1 instances unveiled a year ago, Graviton2 ups the ante for processor makers such as Intel and AMD. With Graviton2, AWS is making it clear that it is serious about Arm processors in the data center as well as moving cloud infrastructure innovation at its pace.

"We're going big for our customers and our internal workloads," said Raj Pai, vice president of AWS EC2. AWS is launching new Arm-based versions of Amazon EC2 M, R, and C instance families.

Indeed, Graviton2, which is optimized for cloud-native applications, is based on 64-bit Arm Neoverse cores and a custom system on a chip designed by AWS. Graviton2 boasts 2x faster floating-point performance per core for scientific and high-performance workloads, support for up to 64 virtual CPUs, 25Gbps of networking, and 18Gbps of EBS Bandwidth.

AWS CEO Andy Jassy said the new Graviton2 instances illustrate the benefits of designing your own chips. "We decided that we were going to design chips to give you more capabilities. While lots of companies have been working with x86 for a long time, we wanted to push the price to performance ratio for you," said Jassy during his keynote. Jassy added that Intel and AMD remain key partners to AWS.

Philippe J DEWOST's insight:

Amazon Web Services is so serious about chip design that it has updated its Graviton ARM processor line along with launching a dedicated Inference Chip.

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Amazon Alexa scientists find ways to improve speech and sound recognition

Amazon Alexa scientists find ways to improve speech and sound recognition | cross pond high tech | Scoop.it

How do assistants like Alexa discern sound? The answer lies in two Amazon research papers scheduled to be presented at this year’s International Conference on Acoustics, Speech, and Signal Processing in Aachen, Germany. Ming Sun, a senior speech scientist in the Alexa Speech group, detailed them this morning in a blog post.

“We develop[ed] a way to better characterize media audio by examining longer-duration audio streams versus merely classifying short audio snippets,” he said, “[and] we used semisupervised learning to train a system developed from an external dataset to do audio event detection.”

 

The first paper addresses the problem of media detection — that is, recognizing when voices captured from an assistant originate from a TV or radio rather than a human speaker. To tackle this, Sun and colleagues devised a machine learning model that identifies certain characteristics common to media sound, regardless of content, to delineate it from speech.

 

Philippe J DEWOST's insight:

Alexa, listen to me, not the TV !

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Amazon patents new Alexa feature that knows when you're ill and offers you medicine

Amazon patents new Alexa feature that knows when you're ill and offers you medicine | cross pond high tech | Scoop.it

Amazon has patented a new version of its virtual assistant Alexa which can automatically detect when you’re ill and offer to sell you medicine.

The proposed feature would analyse speech and identify other signs of illness or emotion.

One example given in the patent is a woman coughing and sniffling while she speaks to her Amazon Echo device. Alexa first suggests some chicken soup to cure her cold, and then offers to order cough drops on Amazon.

If Amazon were to introduce this technology, it could compete with a service planned by the NHS. Health Secretary Matt Hancock said earlier this year that the NHS was working on making information from its NHS Choices online service available through Alexa.

Amazon’s system, however, doesn’t need to ask people whether they’re ill - it would just know automatically by analysing their speech.

Amazon's new patent filing shows an Amazon Echo device which knows when you're ill CREDIT: AMAZON
Adverts for sore throat products could be automatically played to people who sound like they have a sore throat, Amazon’s patent suggests.

The patent filing also covers the tracking of emotions using Alexa. Amazon describes a system where Alexa can tell by your voice if you’re feeling bored and tired, and then it would suggest things to do for those moods.

This futuristic version of Alexa would listen out for if users are crying and then class them as experiencing an “emotional abnormality.”

Philippe J DEWOST's insight:

This insanely smart move will help Amazon enter the healthcare and pharmacy markets and - maybe some day - the personal psycho market. Woody Allen, meet your therapist Alexa...

No comment yet.
Rescooped by Philippe J DEWOST from Leonard
Scoop.it!

Amazon makes its first investment into a home builder

Amazon makes its first investment into a home builder | cross pond high tech | Scoop.it
Amazon made its first investment in a homebuilding start-up Tuesday, furthering its commitment to the smart home space.
Philippe J DEWOST's insight:

Katerra was the first one ; looks like Deep Pockets are preparing a hold-up on wood and mortar.

Philippe J DEWOST's curator insight, September 26, 2018 1:21 AM

Katerra was the first one ; looks like Deep Pockets are preparing a hold-up on wood and mortar.

Scooped by Philippe J DEWOST
Scoop.it!

17 charts that show just how scary Amazon's $275 billion business really is

17 charts that show just how scary Amazon's $275 billion business really is | cross pond high tech | Scoop.it

Most people think of Amazon as an online shopping store, but it's actually much more than that.

Over the past 22 years, Amazon has turned itself into a $275 billion juggernaut that sells everything from cloud-computing services to its own hardware gadgets.

It will even be making approx $10 Bn in revenue this year from its cloud computing enterprise services.

These 17 charts show just how scary its business really is.

Philippe J DEWOST's insight:

Which of these charts is the most surprising / amazing to you ?

(I picked and display #13 as the growth of AWS is to me absolutely astounding and beyond imaginable proportions)

Agrupa Consultores's curator insight, March 31, 2016 3:23 AM

Which of these charts is the most surprising / amazing to you ?

(I picked and display #13 as the growth of AWS is to me absolutely astounding and beyond imaginable proportions)

Daphne L Kinzig's curator insight, March 31, 2016 1:17 PM
Considering the way I purchase from Amazon, it's no surprise how big the company has grown.  It is my go to for most everything if I can wait two days for prime shipping.    Cloud computing growth - interesting...

Considering the way I purchase from Amazon, it's no surprise how big the company has grown.  It is my go to for most everything if I can wait two days for prime shipping but must be most economical as well.   Cloud computing growth - interesting & amazing! 

 
Daphne L Kinzig's curator insight, March 31, 2016 1:21 PM
Considering the way I purchase from Amazon, it's no surprise how big the company has grown.  It is my go to for most everything if I can wait two days for prime shipping.    Cloud computing growth - interesting...

Considering the way I purchase from Amazon, it's no surprise how big the company has grown.  It is my go to for most everything if I can wait two days for prime shipping but must be most economical as well.   Cloud computing growth - interesting & amazing! 

 
Scooped by Philippe J DEWOST
Scoop.it!

Of Amazon's Cloud Monopoly by I, Cringely

Of Amazon's Cloud Monopoly by I, Cringely | cross pond high tech | Scoop.it

Amazon has monopoly power over the public cloud because it clearly sets the price (ever downward) and has the capacity to enforce that price. Amazon is the OPEC of cloud computing and both studies actually show that because both show Amazon gaining share in a market that is simply exploding.

The way you gain share in an exploding market is by exploding more than all the other guys and we can see that at work by comparing IBM’s statement that it would (notice they are speaking about future events) invest $1 billion in cloud infrastructure in the current fiscal year, versus Amazon’s statement that it had (notice they are speaking of events that had already happened) spent $5 billion on cloud infrastructure in the past fiscal year. 

Maybe $1 billion against definitely $5 billion isn’t even a contest. At this rate Amazon’s cloud will continue to grow faster than IBM’s cloud.

Wait, there’s more! Only Amazon can really claim they have a graphical cloud. While not all Amazon servers are equipped with GPUs, enough of them are to support millions of simultaneous seats running graphical apps. No other cloud vendor can claim that.

Having a graphical cloud is important because it is one of those computing milestones we see come along every decade or so to determine who are the real leaders. Think about it. There were mainframes with punched cards (batch systems) then with terminals (interactive systems), then interactive minicomputers, then personal workstations and computers, then graphical computers, mobile computers, networked computers, Internet computers and now cloud computers. Each step established a new hierarchy of vendors and service providers. And it is clear to me that right here, right now Amazon is absolutely dominant in both cloud and graphical cloud computing. They set the price, they set the terms, they have the capacity, and everyone else just plays along or goes out of business.

Philippe J DEWOST's insight:

Stop 1 second thinking of Amazon from the user / developer point of view and reflect about this :

"But there is an important question here and that’s at what point Amazon will be in a position to use lethal cloud force? It’s a market doubling or more in size every year. How many more doubles will it take for Amazon to gain such lethal business power? I’d say five more years will do it.

And when I say do it, think about the company we are talking about. Amazon is unique. No large company in the industry right now has a more effective CEO than Jeff Bezos. No large company has a bigger appetite for calculated risk than does Amazon. No company is more disciplined. And — most importantly — no large company has the ear of Wall Street the way Bezos and Amazon do. They can try and fail in any number of areas (mobile phones, anyone?) and not be punished for it in the market. And in this case that’s because the market is smart, relying on Bezos’ innate ruthlessness."

youngcelery's comment, November 6, 2015 11:16 PM
Its cool :)
Scooped by Philippe J DEWOST
Scoop.it!

Amazon Web Services wants to run your world | ZDNet

Amazon Web Services wants to run your world | ZDNet | cross pond high tech | Scoop.it

The rapid growth of cloud services like AWS will have a big impact on hardware, in particular on servers and other gear in data centers, but also on how we use PCs and mobile devices. Here are my takeaways from re:Invent.

Philippe J DEWOST's insight:

A very good wrapup of AWS re:Invent conference held last week in Vegas. And a must read if you want to seize the speed, depth, power and future of the online book store that happened to invent Cloud Computing.

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Talking the Cloud Business with Amazon CTO Werner Vogels

Talking the Cloud Business with Amazon CTO Werner Vogels | cross pond high tech | Scoop.it

In its relatively short eight-year life-span, there’s a lot we’ve come to know — and yet a lot more that we don’t — about Amazon Web Services.

When it launched in 2006, the idea of renting computing capacity on a pay-as-you-go basis was a new one. Fast-growing startup companies who might have struggled to keep their systems running if they launched a popular new Web service could suddenly have all the capacity they needed in minutes instead of months. AWS fundamentally changed how companies think about their computing infrastructure needs.

And while Amazon won’t say exactly how big a business it is as a percentage of its $74.5 billion in annual revenue, there have been many educated guesses. A new one out yesterday from Pacific Crest Securities — and noticed by Bloomberg Businessweek — estimates it’s a $5 billion business annually and on its way to approaching $7 billion next year.

If that estimate is accurate, and if we thought of AWS as a separate company, its growth rate after passing the $1 billion revenue mark would be second only to that of Google, and would have exceeded that of Microsoft, Oracle and Salesforce.com.

Against this backdrop, Re/code sat down recently with Amazon CTO Werner Vogels while he was visiting New York. Werner, along with Andy Jassy, is among the executives continuing the shakeup that AWS started in the enterprise IT world.

Another data point from the Businessweek story: If Amazon sold traditional hardware servers, it would rank number four by revenue behind Dell, IBM and Hewlett-Packard. In response at least two of those companies, IBM and HP have built up their own cloud computing services to try to take on Amazon.

IBM has been the most vocal about its response in recent months. Last year it spent $2 billion to acquire SoftLayer. It has since pledged to spend big to build out its data center footprint and is running most of its software applications. This week Big Blue said its combined public cloud services and cloud software business is on track to book $7 billion in revenue next year, which make it about as big as Amazon, though it’s an apples-to-oranges comparison.

When we spoke, Amazon had just announced Zocalo, a new document-sharing and collaboration service meant to complement its WorkSpace virtual desktop product and to compete with similar offerings from DropBox (notably an AWS customer) and IPO-bound Box.

Philippe J DEWOST's insight:

Amazon's cloud business may be 2nd fastest software company after Google, as - per @Werner - they are "in the business of pain management for enterprises."

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Amazon teleports 'AWS Connector for vCenter' into rival VMware data centers

Amazon teleports 'AWS Connector for vCenter' into rival VMware data centers | cross pond high tech | Scoop.it

Amazon announced on Friday afternoon that it was making available an "AWS Connector for vCenter", which lets admins import management tools for Amazon's cloud directly into an on-premise data center software package made by one of Amazon's rivals.

The AWS Connector for vCenter tech gives VMware administrators a way to buy, manage, and migrate VMs into AWS cloud resources from within VMware's vCenter management console.

vCenter is a widely used piece of software from VMware that lets admins manage large numbers of virtual machines, typically within enterprise data centers.

"If you are already using VMware vCenter to manage your virtualized environment, you will be comfortable in this new environment right away, even if you are new to AWS, starting with the integrated sign-on process, which is integrated with your existing Active Directory," Amazon explains.

"The look-and-feel and the workflow that you use to create new AWS resources will be familiar," they continue, "and you will be launching EC2 instances before too long. You can even import your existing 'golden' VMware images to EC2 through the portal (this feature makes use of VM Import)."

Philippe J DEWOST's insight:

Trojan Horse 2.0 . This is the beauty of APIs...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Microsoft Joins Amazon and Google in Cloud Price War

Microsoft Joins Amazon and Google in Cloud Price War | cross pond high tech | Scoop.it

Microsoft slashed prices on several of its cloud computing services the company announced on Monday, following through on a standing promise to match Amazon Web Services, which made similar cuts last week.

The software giant made the announcement in a blog post by Windows Azure general manager Steven Martin, saying it will slash prices on various services by 27 percent to 65 percent. “We recognize that economics are a primary driver for some customers adopting cloud, and stand by our commitment to match prices and be best-in-class on price performance,” Martin wrote. The move coincided with Microsoft’s Build conference taking place this week in San Francisco.

It’s the latest move in what’s turning out to be a brisk price war for cloud computing services. Last week, Amazon announced a broad-based price cut on many portions of its Amazon Web Services by 36 percent to 65 percent. That came a day after Google slashed prices for its Google Cloud Platform from 32 percent to 85 percent.

Philippe J DEWOST's insight:

This is still very foggy : would this mean they have been "overcharging customers from Day 1" as DigitalOcean complains ?

Inbetween, one clear spot in the sky is the confirmed rise of OpenStack. It may soon be followed by an industrial, hardware based revolution with Open Compute yet this is another story... yet.

Emmanuel HAVET's curator insight, April 2, 2014 3:52 AM

I agree with Philippe Dewost :

" one clear spot in the sky is the confirmed rise of OpenStack. It may soon be followed by an industrial, hardware based revolution with Open Compute yet this is another story... yet."

Scooped by Philippe J DEWOST
Scoop.it!

Tablet Market Share By Platform Infographic Reveals Android Rise - Yet iPad Still Rules in Usage Share

Tablet Market Share By Platform Infographic Reveals Android Rise - Yet iPad Still Rules in Usage Share | cross pond high tech | Scoop.it

The iPad family accounted for 81% of tablet use in the U.S. and Canada during April, up slightly from a few months ago. Kindle Fires accounted for the second largest share, followed by Samsung Galaxy tablets. In other words, even though Android took its first lead in global tablet market share last quarter (see chart, right), that's not showing up in North American usage patterns. It's likely that Android tablets are filling out the low-end of the tablet market in the emerging world.

Philippe J DEWOST's insight:

Usage reality field distorsion? looks also like Windows8 is catching up on Kindle...

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

Amazon in talks to buy Texas Instruments’ smartphone & tablet OMAP chip activity: Report

Amazon in talks to buy Texas Instruments’ smartphone & tablet OMAP chip activity: Report | cross pond high tech | Scoop.it
Texas Instruments (TI), which recently announced that it will wind down its operations in smartphone and tablet oriented OMAP chips and instead focus on embedded platforms, is engaged in ‘advanced negotiations’ to sell that particular line of business to one of its largest customers: Amazon.com.

Such a deal would be worth ‘billions of dollars’.

The news was reported by Assaf Gilad from Calcalist.co.il (in Hebrew), but hasn’t been confirmed by either company at this point. Gilad has a track record of getting stories like this exactly right, by the way. He was first to report Apple’s interest in Israeli fabless semiconductor company and flash storage solutions provider Anobit, for example, and we know what happened next.

According to the report, Amazon.com is looking to acquire TI’s high-end processor activity so it can exert more control over the chips running its Kindle Fire tablets and the accompanying smartphones it probably has in the works.
No comment yet.