Remove 2009 Remove Benchmarking Remove Traffic
article thumbnail

Protect your organization against zero-day vulnerabilities

Dynatrace

Typically, organizations might experience abnormal scanning activity or an unexpected traffic influx that is coming from one specific client. Operation Aurora was a series of cyberattacks in 2009 that specifically targeted major enterprises, including Google, Adobe Systems, Yahoo, and more.

Java 261
article thumbnail

The Surprising Effectiveness of Non-Overlapping, Sensitivity-Based Performance Models

John McCalpin

The presentation discusses a family of simple performance models that I developed over the last 20 years — originally in support of processor and system design at SGI (1996-1999), IBM (1999-2005), and AMD (2006-2008), but more recently in support of system procurements at The Texas Advanced Computing Center (TACC) (2009-present).

article thumbnail

The Surprising Effectiveness of Non-Overlapping, Sensitivity-Based Performance Models

John McCalpin

The presentation discusses a family of simple performance models that I developed over the last 20 years — originally in support of processor and system design at SGI (1996-1999), IBM (1999-2005), and AMD (2006-2008), but more recently in support of system procurements at The Texas Advanced Computing Center (TACC) (2009-present).