Microsoft のクラウド サービスをご利用いただくときは、お客様の最も貴重な資産、つまりデータを預けられていることを私たちは理解しています。 Microsoft はプライバシーを尊重し、保護し、防御します。私たちは透明性を重視しています。人と組織がそれぞれのデータをコントロールでき、その使用方法について意味のある選択ができるようにするためです。私たちは Microsoft の製品とサービスを使用するすべての人のデータ プライバシー選択を可能にするとともに、その選択を擁護します。
Microsoft Azure and Microsoft Research take giant step towards eliminating network downtime Published October 31, 2017 By Victor Bahl , Technical Fellow & Chief Technology Officer, Azure for Operators At the 26th ACM Annual Symposium on Operating Systems and Principles, better known as SOSP 2017 (opens in new tab), my colleagues described a new technology called CrystalNet (opens in new tab) – a h
Translate to English You are shopping Microsoft Store in: {0}
First, Project Brainwave leverages the massive FPGA infrastructure (opens in new tab)that Microsoft has been deploying over the past few years. By attaching high-performance FPGAs directly to our datacenter network, we can serve DNNs as hardware microservices (opens in new tab), where a DNN can be mapped to a pool of remote FPGAs and called by a server with no software in the loop. This system a
Although we have seen large improvements in the accuracy of recognition as a result of Deep Neural Networks (DNNs), deep learning approaches have two well-known challenges: they require large amounts of labelled data for training, and they require a type of compute that is not amenable to current general purpose processor/memory architectures. Some companies have responded with architectures desig
How often have you had a hard time locating that new café inside in a bustling shopping center where you were supposed to meet your friends? How often have you wandered the hallways of some office building trying desperately to find that meeting room you were supposed to be in? How convenient would it be to have an app, similar to the ones used outdoors, that works indoors? We at Microsoft Researc
The programming model in P is based on concurrently executing state machines communicating via events, with each event accompanied by a typed payload value. A memory management system based on linear typing and unique pointers provides safe memory management and data-race-free concurrent execution. In this respect, P is similar to modern systems programming languages such as Rust (opens in new tab
Job scheduling in Big Data clusters is crucial both for the cluster operators’ return on investment and for the user experience. In this context, we observe several anomalies in how modern cluster schedulers manage queues, and argue that maintaining queues of tasks at the worker nodes has significant benefits. On one hand, centralized approaches do not use worker-side queues. Given the inherent fe
In data centers, caches work both to provide low IO latencies and to reduce the load on the back-end network and storage. But they are not designed for multi-tenancy; system-level caches today cannot be configured to match tenant or provider objectives. Exacerbating the problemis the increasing number of un-coordinated caches on the IO data plane. The lack of global visibility on the control plane
Troubleshooting large operational networks is extremely difficult due to the extensive usage of multipath routing. We present NetSonar, a system that localizes performance problems in such networks. It uses planned tomography, whose input comes from a novel test technique that maximizes component coverage while minimizing probing overhead. Earlier techniques are either white box (assuming complete
The release of hardware transactional memory (HTM) in commodity CPUs has major implications on the design and implementation of main-memory databases, especially on the architecture of highperformance lock-free indexing methods at the core of several of these systems. This paper studies the interplay of HTM and lockfree indexing methods. First, we evaluate whether HTM will obviate the need for cra
Many cloud applications can benefit from guaranteed latency for their network messages, however providing such predictability is hard, especially in multi-tenant datacenters. We identify three key requirements for such predictability: guaranteed network bandwidth, guaranteed packet delay and guaranteed burst allowance. We present Silo, a system that offers these guarantees in multi-tenant datacent
The gold standard for online retrieval evaluation is AB testing. Rooted in the idea of a controlled experiment, AB tests compare the performance of an experimental system (treatment) on one sample of the user population, to that of a baseline system (control) on another sample. Given an online evaluation metric that accurately reflects user satisfaction, these tests enjoy high validity. However, d
The ubiquitous growth in the popularity of public cloud computing platforms as seen today entails an inherent risk: the shared nature of data center networks (DCNs) renders co-hosted tenants susceptible to attacks from within the network. In this paper, we discuss the security mechanisms offered by popular cloud service providers at present, and explore the extent to which existing data center net
Jian Huang , Anirudh Badam , Moinuddin K. Qureshi , Karsten Schwann International Symposium on Computer Architecture (ISCA'15) | June 2015 Published by IEEE - Institute of Electrical and Electronics Engineers IEEE Micro TopPicks'16 Honorable Mention Applications can map data on SSDs into virtual memory to transparently scale beyond DRAM capacity, permitting them to leverage high SSD capacities wit
Gaming on phones, tablets and laptops is very popular. Cloud gaming — where remote servers perform game execution and rendering on behalf of thin clients that simply send input and display output frames — promises any device the ability to play any game any time. Unfortunately, the reality is that wide-area network latencies are often prohibitive; cellular, Wi-Fi and even wired residential end hos
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く