Product, Monetization, and CUDA – Arnon’s blog
-
Nvidia GTX 1080 vs Nvidia Tesla K40 – Installing a GTX1080 in a Dell R720
At SQream Technologies, we use Nvidia graphics cards in order to perform a lot of the heavy database operations. With SQream DB, we usually recommend using a Tesla K40 or K80 card. While a Tesla K40 is designed to operate inside a server enclosure (it has no onboard fan), standard Nvidia cards like the GTX…
-
X crashes after installing Nvidia driver on CentOS or RHEL
Recently I’ve been having trouble with the Nvidia driver on CentOS 6. Opening any kind of app that uses the GPU like Google Chrome, Firefox or even Nvidia’s own nvidia-settings causes X to crash and restart. Luckily, I’ve found the solution, and it has to do with libglx.so. Navigate to < pre>/usr/lib64/xorg/modules/extensions/ < pre> and…
-
Haskell programmers
Dropping so many $ while earning so few $
-
Overheard (6)
A: You must make an animal sacrifice before every attempt to install new cabal packages B: We could light some incense at the very least
-
Overheard (5)
A: fold is the most difficult function B: … why? A: ARE YOU FUCKING WITH ME??
-
Where are the GPU based SQL databases?
The following is a blog post I wrote for the SQream Technologies blog.
-
Backing up and restoring a Jetson TK1 – or how our first Jetson TK1 just died….
Unfortunately, our first Jetson TK1 board just died. Overnight, the board shut down at some point and in the morning it wouldn’t boot up. No SSH access, no ping and no output over HDMI. While a lot of the data was saved on an external hard-drive, some data was saved on the on-board eMMC, due to…
-
Overheard (4)
♫ Functors flowing out ♫ ♫ Like endless rain into a paper cup ♫ ♫ They slither wildly as they slip away ♫ ♫ Across the uniplate ♫
-
Malicious traffic detection using traffic fingerprints and machine learning
Over the past year, we’ve worked on a machine learning project at Ben Gurion University of the Negev. The project attempted to find out if we can identify malicious underlying traffic (viruses, botnets, command and control channels) hiding interspersed in ‘normal’ network traffic, without using advanced heuristics or deep packet inspection – but by using…