Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Amazon Web Services|Cloud Computing

What Are AWS Gravitron Processors?

Data centers are quickly becoming more diverse. For years, it was Intel or nothing and then AMD made inroads with its EPYC processors. But in the past few years, ARM has become a hot new commodity.

Along with ARM, large companies like Apple, Microsoft, Google and Amazon have been designing their own chips. And with ARM being easily accessible for these companies, it makes sense that they would use this architecture for their in-house designed chips.

Amazon’s Graviton processors fall right into this category and are built around Arm cores and are custom-built chips that the company says are designed for performance and cost. The ideal use-case for these processors are micro services, web servers, development environments, and caching fleets.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

Amazon has five sizes of a1 instances available and are EBS-Optimized by default:

If your application is written in one of the many scripting languages, there is a high probability that you can move over to these A1 instances and run your application without any additional coding required. It should be a simple drag and drop and off you go.

These instances are available now in the US and will spread out as demand is increased for these types of workloads. While not everything should be run on ARM-based servers, for those that need this functionality,

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: