CISA Releases Four Industrial Control Systems Advisories
This article is contributed. See the original author and article here.
This article is contributed. See the original author and article here.
This article is contributed. See the original author and article here.
Azure is pleased to share results from our MLPerf Inference v2.1 submission. For this submission, we benchmarked our NC A100 v4-series, NDm A100 v4-series, and NVads A10 v5-series. They are powered by the latest NVIDIA A100 PCIe Tensor Core GPUs, NVIDIA A100 SXM Tensor Core GPUs and NVIDIA A10 Tensor Core GPUs respectively. These offerings are our flagship virtual machine (VM) types for AI inference and training and enable our customers to address their inferencing needs, ranging from 1/6 of a GPU to eight GPUs. These series are all available making AI inference accessible to all. We are excited to see what new breakthroughs our customers will make using these VMs.
In this document, we share outstanding AI benchmark results MLPerf Inference v2.1 and the best practices and configuration details you need to be able to replicate them. And as a result, not only do we show that Azure is committed to providing our customers with the latest GPU offerings, but that are also in line with on-premises performance and available on-demand in the cloud, and scales to adapt to all sizes of AI workloads and needs.
MLCommons® is an open engineering consortium of AI leaders from academia, research labs, and industry where the mission is to “build fair and useful benchmarks” that provide unbiased evaluations of training and inference performance for hardware, software, and services—all conducted under prescribed conditions. MLPerf™ Inference benchmarks consist of real-world compute-intensive AI workloads to best simulate customer’s needs. MLPerf™ tests are transparent and objective, so technology decision makers can rely on the results to make informed buying decisions.
The highlights of results obtained with MLPerf Inference v2.1 benchmarks exercise are shown below.
Full results on MLCommons® website.
Pre-requisites:
Deploy and set up a virtual machine on Azure by following Getting started with the NC A100 v4-series.
Set up the environment:
Once your machine is deployed and configured, create a folder for the scripts and get the scripts from MLPerf Inference v2.1 repository.
cd /mnt/resource_nvme
git clone https://github.com/mlcommons/inference_results_v2.1.git
cd inference_results_v2.1/closed/Azure
Create folders for the data and get the ResNet50 data:
export MLPERF_SCRATCH_PATH=/mnt/resource_nvme/scratch
mkdir -p $MLPERF_SCRATCH_PATH
mkdir $MLPERF_SCRATCH_PATH/data $MLPERF_SCRATCH_PATH/models $MLPERF_SCRATCH_PATH/preprocessed_data
cd $MLPERF_SCRATCH_PATH/data && mkdir imagenet && cd imagenet
In this imagenet folder download ImageNet Data available online and go back to the script.
cd /mnt/resource_nvme/inference_results_v2.1/closed/Azure
Get the rest of the datasets from inside the container:
make prebuild
make download_data BENCHMARKS=”resnet50 bert rnnt 3d-unet”
make download_model BENCHMARKS=”resnet50 bert rnnt 3d-unet”
make preprocess_data BENCHMARKS=”resnet50 bert rnnt 3d-unet”
make build
Run the benchmark
Finally, run the benchmark with the make run command, an example is given below. The value is only correct if the result is “VALID”, modify the value in the config files if the result is “INVALID”.
make run RUN_ARGS=”–benchmarks=bert –scenarios=offline –config_ver=default,high_accuracy,triton,high_accuracy_triton”
This article is contributed. See the original author and article here.
Cisco has released security updates to address vulnerabilities in multiple Cisco products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security Advisories page.
CISA encourages users and administrators to review the following advisories and apply the necessary updates:
• Cisco SD-WAN vManage Software Unauthenticated Access to Messaging Services cisco-sa-vmanage-msg-serv-AqTup7vs
• Vulnerability in NVIDIA Data Plane Development Kit Affecting Cisco Products: August 2022 cisco-sa-mlx5-jbPCrqD8
This article is contributed. See the original author and article here.
CISA has added twelve new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column, which will sort by descending dates.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known CVEs that carry significant risk to the federal enterprise. BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the Catalog that meet the specified criteria.
This article is contributed. See the original author and article here.
It’s been a while since our last MEC, and a lot has changed since then.
The MEC Technical Airlift is a free, digital event for IT professionals who work with Exchange Online and/or Exchange Server day-to-day, and ISVs and developers who make solutions that integrate with Exchange.
MEC will be THE place for the Exchange community to come together to explore new innovations and information. It features a variety of learning opportunities, deep technical breakout sessions, and time with members of our passionate engineering teams. You’ll also hear from some of the best-known names in Exchange around the world and get engaged in the community.
First and foremost, MEC is about fostering the Exchange community. MEC is the best place to engage directly with the engineering teams that build Exchange Online and Exchange Server and your peers in the community.
Security is of paramount importance to all organizations, and a big goal for MEC is to help customers secure their Exchange environment. The accelerated rate of digital transformation we have seen these past years presents both challenges and opportunities. Now more than ever it is critical to keep your infrastructure secure, including your Exchange infrastructure and data.
At MEC, we want to help all of you modernize your infrastructure. Whether you run Exchange in the cloud, on-premises, or both, we want to help you move forward successfully and at the same time get your feedback and input on how we can improve our products and services. Join us for two jam-packed days of all things Exchange.
Register now at aka.ms/MECAirlift
We’re looking forward to reconnecting with all of you!
Recent Comments