Product, Monetization, and CUDA – Arnon’s blog

  • Nvidia GTX 1080 vs Nvidia Tesla K40 – Installing a GTX1080 in a Dell R720

    At SQream Technologies, we use Nvidia graphics cards in order to perform a lot of the heavy database operations. With SQream DB, we usually recommend using a Tesla K40 or K80 card. While a Tesla K40 is designed to operate inside a server enclosure (it has no onboard fan), standard Nvidia cards like the GTX…

  • X crashes after installing Nvidia driver on CentOS or RHEL

    Recently I’ve been having trouble with the Nvidia driver on CentOS 6. Opening any kind of app that uses the GPU like Google Chrome, Firefox or even Nvidia’s own nvidia-settings causes X to crash and restart. Luckily, I’ve found the solution, and it has to do with libglx.so. Navigate to < pre>/usr/lib64/xorg/modules/extensions/ < pre> and…

  • Haskell programmers

    Dropping so many $ while earning so few $

  • Overheard (6)

    A: You must make an animal sacrifice before every attempt to install new cabal packages B: We could light some incense at the very least

  • Overheard (5)

    A: fold is the most difficult function B: … why? A: ARE YOU FUCKING WITH ME??

  • Where are the GPU based SQL databases?

    The following is a blog post I wrote for the SQream Technologies blog.

  • Backing up and restoring a Jetson TK1 – or how our first Jetson TK1 just died….

    Unfortunately, our first Jetson TK1 board just died. Overnight, the board shut down at some point and in the morning it wouldn’t boot up. No SSH access, no ping and no output over HDMI. While a lot of the data was saved on an external hard-drive, some data was saved on the on-board eMMC, due to…

  • How do you write good error messages?

    How do you write good error messages?

    Developing software in a start up has exposed me to some pretty bad error messages. Back when the company had little to no customers, this wasn’t a big deal. However, our recent influx of new customers requires a little more attention in curating proper error messages. I gathered all of our developers and we did…

  • Overheard (4)

    ♫ Functors flowing out ♫ ♫ Like endless rain into a paper cup ♫ ♫ They slither wildly as they slip away ♫ ♫ Across the uniplate ♫

  • Malicious traffic detection using traffic fingerprints and machine learning

    Malicious traffic detection using traffic fingerprints and machine learning

    Over the past year, we’ve worked on a machine learning project at Ben Gurion University of the Negev. The project attempted to find out if we can identify malicious underlying traffic (viruses, botnets, command and control channels) hiding interspersed in ‘normal’ network traffic, without using advanced heuristics or deep packet inspection – but by using…