Home Blog Page 56

Intel Unveils New Details About AI-Focused VPU Silicon for Next-Gen Meteor Lake Chips

Intel Meteor Lake VPU Silicon

Intel has provided a sneak peek into its upcoming Meteor Lake chips, shedding light on their AI processing capabilities. The company aims to leverage AI acceleration to enhance power efficiency and performance for local AI workloads, and the chips are expected to debut in laptops before making their way to desktop PCs.

With competitors like Apple and AMD already incorporating powerful AI acceleration engines into their silicon, Intel is determined not to be left behind. Recognizing the growing demand for AI capabilities in PCs, Intel has developed a custom acceleration block for its consumer PC chips. The focus of their latest endeavour is the VPU unit, an integral component of the Meteor Lake system-on-a-chip tile.

Intel’s Meteor Lake chips employ a blended chipset-based design, which combines Intel and TSMC technologies within a single package. The VPU, along with other features such as I/O, GNA cores, and memory controllers, contributes to the overall performance of the chip. Utilizing TSMC’s N6 process for fabrication, Intel allocates approximately 30% of the die area for the VPU, even though it may take time for developers to fully exploit its potential.

The chip’s block diagram believed to reflect Meteor Lake’s design, reveals the inclusion of Intel’s low-power AI acceleration block, the Gaussian Neural Acceleration (GNA) 3.5. Furthermore, the new VPU block, based on Movidius technology, is also present. The VPU, designed for sustained AI workloads, works in conjunction with CPUs, GPUs, and GNA engines, enabling a wide range of AI tasks to be executed efficiently.

Intel emphasizes that the VPU primarily handles background tasks, with the GPU taking charge of more parallelized workloads. The CPU, on the other hand, focuses on low-latency inference work. Intel has implemented a mechanism that allows developers to target different compute layers depending on the specific requirements of the application, resulting in improved performance and reduced power consumption — an essential objective in AI acceleration.

Although Intel’s chips currently employ GNA blocks for low-power AI inference in audio and video processing, the company has already started running GNA-specific code on the VPU with promising results. This development raises the possibility of Intel fully transitioning to the VPU in future chips and discontinuing the GNA engine.

Moreover, Intel has disclosed that Meteor Lake will incorporate a coherent fabric, facilitating a unified memory subsystem and seamless data sharing between compute elements. This feature aligns with the strategies of competitors like Apple and AMD in the AI CPU space, exemplified by Apple’s M-series and AMD’s Ryzen 7040 chips.

To showcase the benefits of the VPU, Intel has presented a demo. In which the onboard VPU showcased a significant reduction in power consumption during Advanced Blur processing. In another demonstration, the VPU accelerated Stable Diffusion, an AI model generating images from text, resulting in faster artwork processing compared to running the AI model without the VPU.

The Intel chip used in the Computex 2023 demo boasts 16 cores and 22 threads. It features a base clock 3.1GHz, with an idle state of 0.37GHz. The processor is equipped with 1.6MB of L1 cache, 18MB of L2 cache, and 24MB of L3 cache.

Additionally, Intel has hinted at an embedded GPU in the Meteor Lake chips, which is anticipated to be a version of the company’s Arc graphics chip. The embedded GPU is expected to support features like DX12 Ultimate, ray tracing, and XeSS. However, the GPU’s performance in ray tracing might not match that of discrete GPUs in the market.

What is a Typical Working Day for Ethical Hackers?

Working Day for Ethical Hackers

Have you ever wondered how does an ethical hacker’s job look like? Well, it is more of the all-time access to networks and systems and ensuring security measures for the organizations that they work for. In this piece, we’ll highlight the typical working day of an ethical hacker.

Ethical Hackers: Where Do They Begin?

An expert in computers and networks who uses their knowledge to test the integrity of systems for flaws and weaknesses is known as an ethical hacker. Companies engage ethical hackers to do penetration tests on their networks to verify that these systems resist attacks directed by outside entities. 

You must know that the profession of a certified ethical hacker does not exist in its current form. Instead, an accredited ethical hacker is a term that may be obtained by passing a certification exam, specifically the Certified Ethical Hacker (CEH) certification exam that is made available by the EC-Council.

On the other hand, ethical hackers get a certification to pursue careers in a wide array of businesses and sectors, such as the government, medical care, financial services, and commerce, CyberGhost reveals.

A Thorough Look into the Typical Day Job of an Ethical Hacker

The company, an ethical hacker, works for will determine when they commence their work day. The precise list of jobs they’re required to do will rely on the company and the task they are working on. But there are specific jobs that all responsible hackers do, no matter what business they work in or where they work.

As an ethical hacker, here are some things you might have to do daily.

Performing Security Checks

It is one of the most important things an ethical hacker must do. A safety audit is a thorough look at how secure a company is. The company’s protection, including its computing networks, systems, and programs, must be examined.

A safety audit aims to find any holes or defects in a company’s safety measures. Once these factors have been found, the ethical hacker must notify the organization’s leaders about them so they can be fixed.

Attending Meetings

Ethical hackers must interact with their crew (if they have one), their bosses, or their clients daily. At these sorts of conferences, individuals can discuss how a project is going, review the outcomes of a security check, or plan for future endeavors.

Tests are decided at team conferences. According to the system ethical hackers work on, they do different evaluations.

Trying To Get Inside of Computers

One of the most significant (and interesting) things an ethical hacker will have to do is try to breach into the computer networks they protect. This method, called “pen testing” or “penetration testing,” is used to find any weak spots in an infrastructure that an attacker might utilize.

Ethical hackers are going to employ a variety of instruments and approaches in an attempt to break into a system to do this. Once they are in, they will try to raise their rights within the framework so they have access to private information or do things that, if done by an evil hacker, could hurt the system’s integrity.

If an ethical hacker can break into an infrastructure, they must inform the team what they found so that they can patch the holes.

Keeping Track of Their Duties

Ethical hackers must also keep records of their activities, which is crucial. This entails maintaining a record of security checks and penetration testing outcomes and the equipment and techniques they employ to break into systems.

This paperwork has significance because it may assist a company in improving its protection in the years to come. It can also show clients or bosses that an ethical hacker’s efforts are helpful and have assisted in making the systems safer.

Learning & Improvisation

To be successful, a cybersecurity worker who does ethical hacking ought to stay informed on the most recent security risks and holes. They must also acquire new hacking methods to be applied in future initiatives.

There are many ways to do this study and training, such as reviewing security blogs and watching security experts on social media. Ethical hackers are also required to attend security workshops and training classes to stay current on the most current cybersecurity details.

Conclusion

In a nutshell, an ethical hacker’s normal life is filled with never-ending interest, a desire to learn, and unwavering honesty. Ethical hackers have the authority to defend and safeguard. They solve difficult problems, take advantage of weaknesses well, and perform a key role in keeping the digital world secure for a better future.

NVIDIA Unveils Grace Hopper Superchip, DGX GH200 Supercomputer, and AI-Optimized Networking at Computex 2023

Grace Hopper Superchip

NVIDIA CEO Jensen Huang made some groundbreaking announcements at Computex 2023 in Taipei, Taiwan, revealing the company’s latest advancements in the field of artificial intelligence and supercomputing. The most notable announcement was the full production launch of NVIDIA’s Grace Hopper Superchip, a powerful chip that will drive systems running complex AI programs.

The Grace Hopper Superchip represents a significant leap forward in AI computing. It combines the Arm-based NVIDIA Grace CPU and Hopper GPU architecture using NVLink-C2C interconnect technology. With a staggering 200 billion transistors, the chip integrates a Grace 72-core CPU, Hopper GPU, 96GB of HBM3, and 512GB of LPDDR5X memory in a single package. This integration enables exceptional data bandwidth of up to 1TB/s between the CPU and GPU, providing substantial advantages for memory-bound workloads.

Building upon the Grace Hopper Superchip’s capabilities, NVIDIA also unveiled the new DGX GH200 supercomputer. The DGX series has become the gold standard for demanding AI and high-performance computing (HPC) workloads. While the current DGX A100 systems are limited to eight A100 GPUs, the DGX GH200 overcomes this limitation by leveraging a new NVLink switch system. This system incorporates 36 NVLink switches, enabling the combination of 256 GH200 Grace Hopper chips and 144TB of shared memory, effectively behaving like a massive, unified GPU. The third-generation NVLink switch system provides up to 10 times the GPU-to-GPU bandwidth compared to previous-generation systems, while the CPU-to-GPU bandwidth is boosted by a factor of seven. It also offers 5 times greater interconnect power efficiency and supports up to 128TB/s of bisection bandwidth.

In addition to the hardware advancements, NVIDIA introduced the MGX reference architecture, aimed at empowering original equipment manufacturers (OEMs) to develop AI supercomputers more efficiently. The modular design of MGX systems allows for the integration of various NVIDIA components, including CPUs, GPUs, data processing units (DPUs), and networking systems based on both x86 and Arm-based processors commonly found in today’s servers. This flexibility and scalability streamline the design and deployment process for AI-centric server solutions.

Moreover, NVIDIA showcased its new Spectrum-X Ethernet networking platform, a product of its acquisition of Mellanox. This platform highlights NVIDIA’s ability to optimize and fine-tune networking components and software to meet the demands of AI-centric environments. Marketed as “the world’s first high-performance Ethernet for AI networking platform,” Spectrum-X is specially designed to cater to AI servers and supercomputing clusters, offering superior performance and efficiency.

NVIDIA’s commitment to advancing supercomputing with the Grace Hopper Superchip is already yielding remarkable results. For instance, ASUS, a prominent computing vendor, has partnered with NVIDIA to build the Taiwania 4 supercomputer for Taiwan’s National High-Performance Computing Center. Equipped with 44 Grace CPU nodes, this supercomputer is expected to be one of Asia’s most energy-efficient when operational.

NVIDIA’s announcements at Computex 2023 showcased the company’s relentless pursuit of innovation in AI and supercomputing. The Grace Hopper Superchip, DGX GH200 supercomputer, MGX reference architecture, and Spectrum-X networking platform collectively demonstrate NVIDIA’s commitment to driving the future of AI computing and enabling groundbreaking advancements in various industries.

NVIDIA Unveils Avatar Cloud Engine (ACE) for Games, Revolutionizing NPC Interactions with Generative AI

NVIDIA ACE for Games

NVIDIA has made an exciting announcement during its presentation at Computex 2023. They introduced the Avatar Cloud Engine (ACE) for Games service, which aims to enhance non-player characters (NPCs) in video games, making them smarter and more realistic. With this new service, developers will have the ability to create their own AI models to generate natural speech and movements for NPCs, including dialogues.

Powered by NVIDIA Omniverse, ACE for Games provides optimized core AI models for speech, conversation, and character animation. It includes NVIDIA NeMo, which enables developers to create, configure, and deploy language models based on their own datasets. This allows for customization of larger language models to suit characters’ stories and backstories while ensuring safe and productive conversations with NeMo Guardrails. 

NVIDIA Riva, another component, offers automatic speech recognition and text-to-speech capabilities, enabling natural real-time conversations in games. Additionally, NVIDIA Omniverse Audio2Face enables the instant creation of expressive facial animations for game characters based on speech tracks. It integrates seamlessly with Unreal Engine 5 through Omniverse connectors, facilitating the addition of facial animation to MetaHuman characters.

Developers have the flexibility to integrate the entire ACE for Games solution or selectively use the components that best suit their needs. NVIDIA has partnered with Convai, a startup focused on developing advanced conversational AI for virtual game worlds, to showcase the capabilities of ACE for Games. Convai has integrated ACE modules into its real-time avatar platform, and in a demo called Kairos, players interact with Jin, the NPC cafe owner. Jin responds realistically to natural language queries, aligning with the game’s storyline, thanks to the power of generative AI.

NVIDIA ACE for Games offers neural networks optimized for various requirements, including size, performance, and quality. It empowers developers to fine-tune models for their games and deploy them via NVIDIA DGX cloud systems or directly to GeForce RTX PCs with real-time feedback.

With NVIDIA’s ACE for Games service and its partnerships with innovative companies, the future of NPCs in video games looks promising. The enhanced realism and interaction provided by generative AI will undoubtedly elevate the gaming experience and push the boundaries of virtual worlds.

Unmasking the Dark Side of QR Codes: How Fraudsters are Exploiting a Convenient Technology

Dark Side of QR Codes

In our constantly improving digital era, QR codes have emerged as a ubiquitous tool, seamlessly integrating into our daily lives. These black-and-white patterns provide a quick and efficient way to access information, make payments, and interact with businesses. However, ExpressVPN’s study shows that alongside their convenience, fraudsters have found innovative ways to exploit QR codes for their nefarious activities. This article delves into the depths of QR code exploitation, shedding light on the tactics employed by fraudsters and empowering readers with the knowledge to protect themselves from falling victim to these digital scams.

QR Codes: A Gateway to Convenience and Vulnerability 

QR codes, short for Quick Response codes, are two-dimensional barcodes scanned using a smartphone camera or a dedicated scanning app. Their versatility and ease of use have propelled their adoption in various sectors, including retail, marketing, and ticketing. However, the very features that make QR codes popular—quick access to information and seamless transactions—also create vulnerabilities that fraudsters exploit. By understanding the potential risks associated with QR codes, users can securely arm themselves with the necessary precautions to navigate this digital landscape.

Unveiling the Tactics of QR Code Exploitation

Fake QR Codes: 

Fraudsters create counterfeit QR codes that redirect users to malicious websites or apps designed to steal sensitive information.

Phishing Attacks: 

Fraudsters leverage QR codes to lead unsuspecting users to fake login pages, capturing their credentials for unauthorized access.

Malware Distribution: 

QR codes can be weaponized as a delivery mechanism for malware, infecting users’ devices and compromising their security.

Unauthorized Transactions: 

Scammers exploit QR codes to initiate unauthorized payments, transferring funds from unsuspecting victims.

Social Engineering: 

Fraudsters manipulate user trust by employing QR codes in schemes that extract personal information or initiate fraudulent activities.

Recognizing the Warning Signs 

Suspicious URLs or domains: 

Users should be wary of QR codes containing unfamiliar or suspicious web addresses.

Poorly designed or unusual QR codes: 

Fraudsters often create QR codes that deviate from the norm regarding appearance or structure.

Unexpected or unsolicited QR codes: 

Users should exercise caution when encountering QR codes sent via email, text messages, or social media from unknown sources.

Requests for personal or financial information: 

QR codes should never prompt users to enter sensitive data without a legitimate and trustworthy reason.

Shielding Yourself from QR Code Scams 

Use Trusted QR Code Scanning Apps: 

Download reputable scanning apps from official app stores to ensure the authenticity and security of the scanning process.

Verify the Destination Before Scanning: 

Double-check the URL or web address associated with the QR code to confirm its legitimacy before scanning.

Be Mindful of Personal Information: 

Avoid providing unnecessary personal or financial details when prompted by QR codes, especially from unfamiliar sources.

Stay Updated with Security Measures: 

Regularly update your smartphone’s operating system and scanning apps to benefit from the latest security patches and features.

Educate Yourself and Others: 

Stay informed about QR code scams and share your knowledge with friends, family, and colleagues to collectively combat fraud.

Reporting QR Code Scams

Reporting to Local Authorities: 

Notify local law enforcement agencies or cybercrime divisions about any incidents involving QR code scams.

Contacting the Business or Organization: 

Inform the legitimate business or organization associated with the fraudulent QR code to alert them of the scam.

Reporting to Cybersecurity Agencies and Organizations: 

Reach out to relevant cybersecurity agencies, consumer protection organizations, or antifraud bodies to report QR code scams and provide them with the necessary details for investigation and potential action.

Staying Vigilant: Best Practices for QR Code Safety 

Scrutinize QR Codes: 

Before scanning a QR code, examine it carefully for any signs of tampering or unusual elements.

Avoid Unknown Sources: 

Only scan QR codes from trusted sources, such as reputable businesses, official websites, or verified marketing materials.

Check for HTTPS: 

Ensure that the destination website or app indicated by the QR code has a secure HTTPS connection, denoted by a padlock symbol.

Use QR Code Generators Wisely: 

If you are a business or organization generating QR codes, employ secure QR code generation platforms and safeguard the codes from unauthorized access.

Permit Two-Factor Verification: 

Implementing two-factor confirmation is necessary; it is possible to enhance the security of your accounts and transactions.

Educating Employees and Customers 

Employee Training: 

Businesses should provide comprehensive training to their employees, educating them about QR code scams, their implications, and best practices for safe scanning.

Customer Awareness: 

Companies should actively communicate with their customers, raising awareness about QR code fraud and offering guidance on how to avoid falling victim to scams.

Industry Collaboration and Regulation 

Collaboration among Businesses: 

Companies operating in various industries can collaborate to share information and insights on QR code scams, enabling a collective response against fraudsters.

Regulatory Measures: 

Governments and regulatory bodies should establish guidelines and standards for QR code security, encouraging businesses to adopt best practices and ensuring the protection of consumer interests.

Conclusion:

QR codes have undeniably transformed the way we interact with the digital world, offering convenience and efficiency. However, it is crucial to remain vigilant and proactive in protecting ourselves from QR code exploitation. By understanding the tactics employed by fraudsters, recognizing warning signs, and implementing best practices for QR code safety, we can mitigate the risks and enjoy the benefits of this technology without compromising our security. Furthermore, we can collectively combat QR code scams and create a safer digital ecosystem through collaboration, education, and regulatory efforts. Stay informed, stay cautious, and protect yourself from the dark side of QR codes.

Arm announces the latest generation big core “Cortex-A720” and highly efficient small core “Cortex-A520”

Cortex-A720 and Cortex-A520

Arm, the leading semiconductor and software design company, has unveiled its latest generation processors, including the Cortex-A720 big core and Cortex-A520 small core. These cores offer significant advancements in performance, energy efficiency, and architectural improvements, solidifying Arm’s position as a leader in processor technology.

The Cortex-A720, codenamed “Hunter,” is Arm’s most versatile performance core, often paired with the Cortex-A500 series of little cores in DSU configurations. It delivers a remarkable 20% improvement in power efficiency compared to its predecessor, the Cortex-A715. 

Arm’s annual updates alternate between large pipeline improvements and energy efficiency and area enhancements. While the Cortex-A715 focused on larger decoding due to the discontinuation of 32-bit support, the Cortex-A720 maintains a large depth and width while prioritizing power efficiency.

In the Cortex-A720, Arm has made significant improvements to the front end, reducing mispredict penalties and improving branch prediction. These enhancements lead to better real-world application performance and improved power efficiency without sacrificing performance.

The Cortex-A720’s back end also sees improvements. Arm has connected the FDIV/FSQRT unit to the pipeline, resulting in a notable performance boost. Data transfers between FP/Vector units and integer units have been optimized, and the core features improved store data latency. These enhancements contribute to improved overall performance and efficiency.

Memory improvements include reducing the L2 cache hit latency from 10 cycles to 9 cycles. Arm has introduced a new L2 spatial prefetch engine, enhancing overall performance. The Cortex-A720 demonstrates cross-generation accuracy and coverage improvements over existing prefetchers.

An interesting feature of the Cortex-A720 is its dual configuration capability. It offers both an area-optimized configuration and a full configuration. In the area-optimized configuration, the Cortex-A720 achieves a 10% improvement over the Cortex-A78. In the full configuration, it delivers up to 20% more energy efficient than the Cortex-A715, albeit at a higher area cost.

Alongside the Cortex-A720, Arm introduced the Cortex-A520, a highly efficient small core. The Cortex-A520 builds upon the success of its predecessor, the Cortex-A510, with microarchitectural improvements and optimizations. It is designed to be combined with the Cortex-A720 in various configurations using the DSU-120, making it suitable for area-constrained devices.

The Cortex-A520 fully supports Armv9 and has an updated underlying ISA support level of version 9.2. It also supports expanding the PAC functionality and implements the QARMA3 algorithm for address authentication, reducing PAC overhead and latency.

Arm has prioritized energy and area efficiency in the Cortex-A520 by removing or scaling back certain components. Notably, one ALU has been removed, resulting in power savings throughout the pipeline. The memory system has also been rebuilt for improved efficiency.

Arm claims that the Cortex-A520 offers a 22% power reduction at the same performance level or approximately 8% more performance at the same power level.

Arm Unveils Cortex-X4: The Most Powerful and Advanced Flagship Performance Core Yet

Arm Cortex-X4

Arm has unveiled the Cortex-X4, its latest flagship performance core and the most powerful Arm core ever developed. This fourth-generation Cortex-X series core offers a significant 15% performance improvement over its predecessor, the Cortex-X3, which is used in devices like the Snapdragon 8 Gen 2.

The Cortex-X4 introduces major changes to its front end, including a redesigned instruction fetch delivery system. It eliminates the macro-operation cache and expands the pipeline to support up to 10 instructions, resulting in improved bandwidth. Arm has also enhanced the accuracy of the branch predictor, reducing stalls during real-world workloads.

In the back end, the Cortex-X4 features upgrades to its out-of-order execution capabilities. It includes two integer MAC units, a third branch unit, and eight integer ALUs, enhancing processing power. The core’s out-of-order buffers have increased by 20%, providing more efficient execution. Although it falls short of the Golden Cove core’s ROB, the Cortex-X4’s 384-entry ROB surpasses the Sunny Cove core’s performance.

The Cortex-X4 incorporates improvements in its memory subsystem. It rebalances the pipes, featuring one general-purpose AGU, two load AGUs, and one store AGU. The data prefetcher and the L1 temporal data prefetcher have been enhanced to improve memory performance. The core’s private L2 cache has been expanded to allow up to 2MiB, doubling the capacity compared to the previous generation.

Arm emphasizes a 13% improvement in IPC for the Cortex-X4, showcasing its commitment to performance. Manufactured using advanced processes like TSMC’s N3E 3nm, the Cortex-X4 demonstrates its high-end positioning. It can be integrated into systems using the DSU-120, supporting up to 32MB of shared L3 cache. The DSU-120 introduces a power mode to reduce leakage power and enhance efficiency.

The DSU-120 offers flexible core configuration, allowing system designers to combine Cortex-X4, Cortex-A720, and Cortex-A520 cores as needed. This versatility benefits laptops, where a combination of 10 Cortex-X4 cores and 4 Cortex-A720 cores optimizes performance. The Cortex-X4’s compatibility with the DSU-120 enables adaptable and efficient high-performance computing systems.

The Cortex-X4’s arrival promises to revolutionize various industries, including mobile devices, laptops, servers, and embedded systems. Its remarkable performance enhancements and architectural improvements set new standards for processing power and efficiency. Arm’s dedication to innovation and its collaboration with leading manufacturers reaffirm its commitment to pushing the boundaries of technology.

Blizzard Entertainment Unveils Blizzard Diffusion: An AI-Powered Graphics Tool

Blizzard Entertainment

Blizzard Entertainment, the renowned game development company behind titles like World of Warcraft and Diablo, is embracing the power of artificial intelligence with the introduction of its latest tool, ‘Blizzard Diffusion.’ This auto-generated graphics tool is set to revolutionize the art concept design process used in game development sessions.

In an internal letter obtained by The New York Times, Blizzard Entertainment’s chief of design, Allen Adham, expressed his excitement about the upcoming transformation in game development. He stated, “We are on the verge of a major evolution in how games are made and managed,” highlighting the significant impact that AI technology will have on the industry.

Blizzard Diffusion is designed to enable the rapid creation of art concepts for game environments, characters, and props during the development process. By harnessing AI capabilities, Blizzard Entertainment aims to streamline the creation of visual assets, accelerating the overall game development timeline. The tool will leverage data from Blizzard Entertainment’s extensive content library to generate immersive art concepts that align with the company’s renowned gaming universes.

This innovative tool represents just the beginning of Blizzard Entertainment’s foray into AI-driven development. The company plans to release additional AI tools in the future, including features that enhance interactivity with non-playable characters (NPCs) and enable more efficient game content management. With these tools, Blizzard Entertainment seeks to empower its development team to focus more on content creation, allowing them to craft rich and engaging gaming experiences.

The integration of AI technology in game development is poised to bring about significant changes for Blizzard Entertainment. By automating certain aspects of the development process, the company aims to expedite the creation of captivating worlds while maintaining its commitment to quality and player satisfaction.

As the gaming industry continues to evolve, Blizzard Entertainment’s embrace of AI technology signals a promising future where game developers can leverage intelligent tools to push creative boundaries and deliver immersive experiences to players worldwide.