AI Without GPUs – Harnessing CPU Power for AI Workloads

At VMware Explore EU 2024, the session “AI Without GPUs: Using Your Existing CPU Resources to Run AI Workloads” showcased innovative approaches to AI and machine learning using CPUs. Presented by Earl Ruby from Broadcom and Keith Bradley from Nature Fresh Farms, this session emphasized the potential of leveraging Intel Xeon CPUs with Advanced Matrix Extensions (AMX) to run AI workloads efficiently without the need for GPUs.

Key Highlights:

  1. Introduction to AMX:
    • AMX (Advanced Matrix Extensions), available in Intel’s Sapphire Rapids processors, enables high-performance matrix computations directly on CPUs, making them more capable of handling AI/ML tasks traditionally reserved for GPUs.
  2. Why Use CPUs for AI?:
    • Cost Efficiency: Lower operating costs compared to GPUs.
    • Energy Efficiency: Ideal for environments where power consumption is a concern.
    • Sufficient Performance for Specific Use Cases: CPUs can efficiently handle tasks like inferencing and batch-processing ML workloads with models under 15-20 billion parameters.
  3. Software Stack:
    • OpenVINO Toolkit: Optimizes AI/ML workloads on CPUs by compressing neural networks, improving inference performance with minimal accuracy loss.
    • Intel oneAPI: Provides a unified software environment for both CPU and GPU workloads.
  4. Real-World Application:
    • Nature Fresh Farms: Demonstrated how AI-driven automation using CPUs effectively manages complex agricultural processes, including plant lifecycle control in greenhouses.

When to Choose CPUs Over GPUs:

  • Inferencing and Batch Processing: When real-time responses are not critical.
  • Sustainability Goals: Lower power consumption makes CPUs a viable option.
  • Cost-Conscious Environments: For scenarios where reducing operational costs is a priority.

Unlocking Your Data with VMware by Broadcom and NVIDIA — RAG Deep Dive

At VMware Explore EU 2024, the session “Unlocking Your Data with VMware by Broadcom and NVIDIA — RAG Deep Dive” delivered fascinating insights into the power of Retrieval Augmented Generation (RAG). Led by Frank Denneman and Shawn Kelly, this session explored how combining large language models (LLMs) with proprietary organizational data can revolutionize data utilization in enterprises.

What is RAG?

RAG combines the strengths of LLMs with a Vector Database to enhance AI applications by integrating them with an organization’s proprietary data. This synergy allows for more precise and context-aware responses, crucial for business-critical operations.

Why RAG Matters:

  • Enhanced Accuracy: Unlike traditional LLMs prone to “hallucinations” or inaccuracies, RAG provides validated, up-to-date answers by sourcing information directly from relevant databases.
  • Contextual Relevance: It seamlessly blends general knowledge from LLMs with specific proprietary data, delivering highly relevant insights.
  • Traceability and Transparency: RAG solutions can cite the documents used to generate responses, addressing one of the significant limitations of traditional LLMs.

How RAG Works:

  1. Data Indexing: Proprietary data is pre-processed and stored in a vector database.
  2. Question Processing: When a query is made, it is semantically embedded and matched against the vector database.
  3. Answer Generation: The most relevant data is retrieved and used to generate a precise answer.

Integration with NVIDIA:

NVIDIA’s Inference Microservice (NIM) accelerates this process by optimizing LLMs for rapid inference, leveraging GPU-accelerated infrastructure to enhance throughput and reduce latency.

VMware vSAN ESA – Your Storage Platform for VMware Cloud Foundation

At VMware Explore 2024, the session “VMware vSAN ESA: Your Storage Platform for VMware Cloud Foundation” provided a comprehensive look into how vSAN Express Storage Architecture (ESA) is transforming storage solutions for modern data centers. Led by Duncan Epping and Pete Koehler, this session highlighted the capabilities and benefits of vSAN ESA within VMware Cloud Foundation (VCF).

Key Features of vSAN ESA:

  1. Next-Generation Storage Architecture:
    • Designed to handle today’s and tomorrow’s workloads with efficiency and resilience.
    • Offers both aggregated and disaggregated configurations for flexible deployment options.
  2. Performance and Efficiency:
    • Erasure Coding with RAID-5/6: Delivers the performance of RAID-1 with the space efficiency of RAID-5/6, optimizing capacity while maintaining performance.
    • Granular Snapshotting: vSAN ESA integrates snapshots at the VM level without impacting performance, unlike traditional LUN-based snapshots.
  3. Data Protection and Management:
    • Integrated Data Protection: Includes scalable snapshots and simplified recovery options, making it easier to protect and recover VMs.
    • Protection Groups: Offers flexible and easy-to-manage options for snapshot frequency, retention, and immutability, supporting dynamic VM assignments.
  4. Flexible Deployment:
    • vSAN Max: Enables disaggregated storage for independent scaling of compute and storage resources, enhancing cost efficiency and operational flexibility.

Demystifying Distributed Security in VMware Cloud Foundation

In today’s evolving IT landscape, securing distributed environments is crucial. VMware Cloud Foundation (VCF) addresses these challenges head-on with its Distributed Security model. During the VMware Explore EU 2024 session titled “Demystifying Distributed Security in VMware Cloud Foundation,” experts Chris McCain, Tim Burkard explored the nuances of enhancing security within VCF environments.

Key NOTES:

  1. vDefend Distributed Protection:
    • This is VMware’s approach to ensuring secure communication between virtual machines (VMs) by enforcing strict security rules. The Distributed Firewall (DFW) policies, integral to vDefend, apply a Zero Trust model, allowing only authorized traffic and rejecting any unauthorized attempts.
  2. Granular Security Policies:
    • VCF’s Distributed Firewall offers granular control over security policies, allowing IT teams to define rules at both policy and individual VM levels. This flexibility ensures that security is tightly integrated into every layer of the infrastructure.
  3. Intrusion Detection and Prevention:
    • VMware’s Distributed Intrusion Detection and Prevention (IDP) system proactively monitors and prevents unauthorized activities. The IDP uses an extensive signature database to alert or block threats, ensuring real-time protection across the data center.
  4. Built-in Tools for Validation and Troubleshooting:
    • Tools like Traceflow and Live Traffic Analysis are pivotal for monitoring and validating security rules. These tools help IT professionals ensure that the DFW is functioning as intended and that traffic flow complies with security policies.

ESXi Hosts: The Data Plane

ESXi hosts, where VMs reside, are integral to enforcing NSX DFW rules. The following CLI commands can be run on ESXi hosts to manage and troubleshoot DFW settings at the host level:

  • List All the VMs dvFilter Names: Use summarize-dvfilter to list all dvFilters associated with VMs. dvFilters are kernel modules that apply firewall rules to VMs’ network traffic.
  • View IP and MAC Addresses for a dvFilter: To see the IP and MAC addresses related to a specific dvFilter, the command is
    vsipioctl getaddrsets -f <dvfilter-name>
  • List the Firewall Rules Applied on DvFilter: Retrieve the set of firewall rules applied to a dvFilter by executing
    vsipioctl getrules -f <dvfilter-name>
  • View Firewall Configuration for a dvFilter: To inspect the firewall configuration for a specific dvFilter, the command is
    vsipioctl getfwconfig -f <dvfilter-name>

NSX-T CLI on my blog.

Attend Sessions at VMware Explore 2024 – Plan Your Journey

VMware Explore 2024 is just around the corner, and it’s packed with insightful sessions and opportunities to learn from industry experts. With so much to explore, it’s crucial to plan your schedule, stay comfortable, and stay hydrated throughout the event. Here are my top session picks to make the most of your time at the conference.

Quick Tips for Attending:

  1. Wear Comfortable Shoes: You’ll be walking a lot between sessions, so good shoes are a must.
  2. Use the Event App: The VMware Explore app is a great tool for tracking your sessions, finding rooms, and staying updated with event news.
  3. Plan Your Sessions: Take some time to map out the sessions you want to attend so you can maximize your learning.
  4. Drink Plenty of Water: Keep yourself hydrated to stay energized throughout the day.

Recommended Sessions

VMware Explore Recap with William Lam

VMware Explore Recap with William Lam

In this episode of the Virtually Speaking Podcast, we catch up with William Lam from VMware by Broadcom to recap VMware Explore 2024 in Las Vegas. William breaks down exciting announcements, including advancements in VMware Cloud Foundation (VCF), the introduction of the Private Cloud […]


Broadcom Social Media Advocacy

Private AI: One Year Later with Chris Wolf

Private AI: One Year Later with Chris Wolf

Private AI: One Year Later with Chris Wolf

On this episode of the Virtually Speaking Podcast we welcome Chris Wolf, Global Head of AI and Advanced Services, VMware Cloud Foundation Division, Broadcom to discuss Private AI and what has changed since the announcement last year.


Broadcom Social Media Advocacy