Vanessa May, Author at Techbest - Top Tech Reviews In Australia - Page 3 of 8

APRA Seeks a Replacement for Chief Information Security Officer


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

APRA on the Quest for a New Chief Information Security Officer

APRA looks for new CISO to strengthen cybersecurity

Brief Overview

  • APRA is in the active pursuit of a new Chief Information Security Officer (CISO) to enhance its cybersecurity framework.
  • This CISO will oversee both strategic initiatives and ongoing security operations.
  • The move follows a significant $130 million funding increase for cybersecurity projects, shared with ASIC.
  • The previous CISO, Mikhail Lopushanski, exited APRA in May 2022 to take a position at Heritage Bank.
  • The incoming CISO will collaborate closely with APRA’s CIO and Chief Data Officer.
  • Key collaborators for this role will include the Australian Cyber Security Centre, the Department of Home Affairs, ASIC, and the Reserve Bank of Australia.

Background Information

The Australian Prudential Regulation Authority (APRA) has recently begun the search for a new Chief Information Security Officer (CISO). This essential position will be central to managing and strengthening cybersecurity practices at the regulatory body, addressing both strategic and operational objectives. This initiative highlights the growing significance of cybersecurity within the financial sector, especially as cyber threats evolve and increase in frequency.

APRA’s Cybersecurity Evolution

APRA, together with the Australian Securities and Investments Commission (ASIC), has recently secured around $130 million in funding to enhance its cybersecurity capacities over the next four years. This financial commitment reflects the increasing demand for strong cybersecurity systems within Australia’s financial regulatory environment.

Notably, this recruitment marks the first time APRA has sought a C-level security leader since May 2022, when the former Chief Security Officer (CSO) Mikhail Lopushanski moved on to Heritage Bank. During Lopushanski’s time, the CSO role was part of APRA’s organizational structure, but it has since been missing from recent organizational layouts. This absence raises concerns regarding the leadership and management of cybersecurity efforts during the interim.

Position and Duties

The new CISO will hold substantial responsibilities, including improving security governance, information security protocols, and staff vetting processes. This role also encompasses the monitoring and response to cybersecurity threats and incidents through APRA’s Security Operations Centre.

The CISO will collaborate closely with APRA’s Chief Information Officer (CIO) Rogier Roelofs and Chief Data Officer (CDO) Andy Robertson. The job listing specifies that the role requires “significant leadership capability to connect and collaborate with key stakeholders, driving transformational change and enhancing team and external capabilities.” These stakeholders include leading agencies such as the Australian Cyber Security Centre, the Department of Home Affairs, ASIC, and the Reserve Bank of Australia.

Importance of This Development

Cybersecurity remains a vital concern for financial regulators like APRA, given the sensitive data they manage. The recent $130 million funding indicates the Australian government’s dedication to protecting the financial sector from cyber threats. As cyberattacks grow more prevalent and complex, the role of the CISO will be essential in ensuring APRA’s defenses against potential breaches.

Additionally, the new CISO is expected to be instrumental in influencing the future of Australia’s cybersecurity environment. By working in tandem with various government agencies and financial institutions, the CISO will contribute to the establishment of best practices and protocols that may impact the broader industry.

Conclusion

APRA is actively in search of a new Chief Information Security Officer to oversee its cybersecurity strategies and processes. This initiative follows a significant $130 million investment into cybersecurity by APRA and ASIC, highlighting the increasing importance of effective cybersecurity measures in Australia’s financial ecosystem. The CISO will work alongside key stakeholders, including government entities, to maintain APRA’s resilience against cyber threats.

Q: Why is APRA looking for a new CISO at this time?

A: APRA is seeking a new CISO to strengthen its cybersecurity framework following a $130 million investment in cybersecurity projects. This decision also comes after a period without a C-level security leader since May 2022.

Q: What will be the new CISO’s responsibilities?

A: The new CISO will be charged with upholding and advancing APRA’s cybersecurity policies on both strategic and operational levels. This encompasses security governance, information protection, staff vetting processes, and monitoring/responding to security threats.

Q: With whom will the CISO collaborate?

A: The CISO will coordinate closely with APRA’s CIO Rogier Roelofs and Chief Data Officer Andy Robertson. Additionally, they will engage with key stakeholders such as the Australian Cyber Security Centre, the Department of Home Affairs, ASIC, and the Reserve Bank of Australia.

Q: What is the significance of the $130 million funding?

A: The $130 million funding obtained by APRA and ASIC represents a significant investment intended to strengthen cybersecurity capabilities over the next four years. This financial support emphasizes the critical role of cybersecurity in the financial sector and the government’s commitment to protecting it from evolving cyber threats.

APRA Searching for a New Chief Information Security Officer


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

APRA Seeks New Chief Information Security Officer

APRA seeks new CISO

Brief Overview:

  • The Australian Prudential Regulation Authority (APRA) is on the hunt for a new Chief Information Security Officer (CISO).
  • This recruitment comes after a $130 million commitment to enhancing cyber security, in collaboration with ASIC.
  • The CISO will spearhead APRA’s initiatives in cyber security from both strategic and operational perspectives.
  • This position requires exceptional leadership, teamwork with essential stakeholders, and extensive experience in security governance.
  • Important stakeholders encompass the Australian Cyber Security Centre, the Department of Home Affairs, ASIC, and the Reserve Bank of Australia.
  • The incoming CISO will oversee threat monitoring and responses via APRA’s security operations centre.

APRA’s Tactical Move in Cyber Security

The Australian Prudential Regulation Authority (APRA) is actively searching for a new Chief Information Security Officer (CISO) to strengthen its cyber security framework. This initiative forms part of a comprehensive strategy to enhance security across the agency, following a significant $130 million allocation for cyber security upgrades over the forthcoming four years. This funding, secured jointly with the Australian Securities and Investments Commission (ASIC), highlights the critical need for a robust cyber security infrastructure to protect Australia’s financial system.

Fulfilling a Vital Role in Cyber Security

The CISO position at APRA has been unfilled since May 2022, when the former Chief Security Officer (CSO) Mikhail Lopushanski departed to join Heritage Bank. Since that time, the role has not appeared in APRA’s organizational charts, indicating a transitional phase within the agency’s security leadership. The new CISO will be tasked with navigating this environment, collaborating closely with APRA’s Chief Information Officer (CIO) Rogier Roelofs and Chief Data Officer (CDO) Andy Robertson.

The CISO’s Duties

As outlined in the job announcement, the CISO will be responsible for overseeing APRA’s security efforts at both strategic and operational levels. Responsibilities encompass security governance, information security management, and personnel vetting processes. The CISO will also manage APRA’s security operations centre, which is responsible for the monitoring and handling of security threats and incidents. This role necessitates substantial leadership capabilities, especially in establishing connections and partnerships with critical stakeholders while fostering transformational change and building competencies within the team and beyond.

Engaging with Key Stakeholders

The CISO will not operate independently, but will engage with several essential stakeholders, including the Australian Cyber Security Centre, the Department of Home Affairs, ASIC, and the Reserve Bank of Australia. This collaboration is vital for ensuring a cohesive approach to cyber security throughout Australia’s financial regulatory ecosystem. The new CISO’s skill in effectively interacting with these stakeholders will be essential for advancing APRA’s cyber security priorities.

Conclusion

APRA’s pursuit of a new CISO underscores the growing significance of cyber security within Australia’s financial regulatory framework. With a $130 million commitment to security improvements and a strategic emphasis on partnerships with key stakeholders, the new CISO will be instrumental in safeguarding the integrity of Australia’s financial system. The ideal candidate will need to demonstrate strong leadership, strategic foresight, and the ability to navigate a complex regulatory landscape.

Q: Why is APRA hiring a new CISO?

A:

APRA is recruiting a new CISO to address a critical vacancy in its leadership and to advance its cyber security strategy after a $130 million investment in security improvements. This role is vital for sustaining and enhancing APRA’s security stance at both strategic and operational levels.

Q: What are the key responsibilities of the new CISO?

A:

The new CISO will oversee security governance, information security, personnel vetting, and the management of APRA’s security operations centre. They will also engage with key stakeholders, drive transformational changes, and develop necessary capabilities within the team.

Q: Who are the key stakeholders the CISO will collaborate with?

A:

The CISO will closely collaborate with the Australian Cyber Security Centre, the Department of Home Affairs, ASIC, and the Reserve Bank of Australia. Working with these entities is essential for a cohesive approach to cyber security in Australia’s financial regulatory landscape.

Q: How does this hiring decision align with APRA’s broader strategy?

A:

This hiring decision is part of APRA’s comprehensive strategy to strengthen its cyber security capabilities, especially following a substantial investment in this area. The CISO will play a pivotal role in executing this strategy and ensuring that APRA’s security protocols are robust and effective.

NBN Co Launches Bold New Five-Year Security Plan


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

NBN Co Introduces New Five-Year Security Framework for Strengthened Cyber Defense

NBN Co, the operator of Australia’s national broadband network, has launched a new five-year security framework with the objective of aligning with the Australian government’s cyber security initiatives while establishing security as a facilitator for business growth. This extensive strategy aims not just to safeguard essential infrastructure but also to enhance NBN Co’s business goals through effective security measures.

Quick Overview

  • The new five-year security framework from NBN Co corresponds with Australia’s 2023-2030 cyber security agenda.
  • The framework merges both physical and cyber security into an integrated security structure.
  • A primary emphasis is placed on risk quantification in monetary terms, aimed at clarifying security risks for executives and board members.
  • The strategy complies with government measures such as the Protective Security Policy Framework (PSPF), ASD’s Essential 8, and the NIST Cybersecurity Framework.
  • Management of third-party risks and workforce-related issues are also incorporated into the framework.

Aligning with National Cyber Security Objectives

NBN Co’s fresh five-year security framework emerges as Australia intensifies its endeavors to safeguard its digital infrastructure. This strategy closely correlates with the Australian Government’s 2023-2030 Cyber Security Strategy, which seeks to enhance the nation’s cyber resilience. Tasked with managing one of Australia’s most vital infrastructures, NBN Co is taking a forward-thinking stance to ensure alignment with national standards and laws, such as the Security of Critical Infrastructure (SoCI) Act.

Chief Security Officer Darren Kane has highlighted the strategy’s nature as a “living document,” which can adapt to new threats and opportunities. This level of adaptability is critical in a rapidly changing threat landscape, necessitating that security frameworks remain both comprehensive and flexible.

Unified Security: An Integrated Model

NBN Co is a front-runner in Australia, implementing a unified security model. This strategy consolidates physical, human resources (HR), and IT security under one executive leader. As Kane points out, this integrated oversight of all security dimensions allows for a fuller understanding of security threats and the optimal ways to mitigate them.

NBN Co introduces a new five-year security framework

Image credit: NBN Co.

“Having a single accountable leader for all security aspects allows us to have a transparent, detailed picture of possible risks and manage them effectively,” Kane stated. This framework streamlines risk management, resource distribution, and post-incident evaluations, easing the identification of failures in the case of a security breach.

Risk Quantification: Making Business Case for Security

A remarkable aspect of NBN Co’s updated strategy is its emphasis on risk quantification in economic terms. Kane has accentuated the necessity of conveying security risks in a manner that executives and board members readily comprehend—dollars and cents.

In a time where cyber threats can lead to considerable fiscal consequences, articulating risk in monetary terms permits executives to fully appreciate the gravity of potential risks and the significance of investing in security protocols. Kane strongly supports this perspective, observing that while technical jargon is commonplace in the industry, a more straightforward form of communication is vital for acquiring executive endorsement.

“Utilizing the language of business allows us to explain risks and necessary mitigating actions in a way that connects with the CEO, CFO, and other pivotal stakeholders,” Kane remarked. This strategy not only assists in securing requisite resources but also guarantees that every member of the organization recognizes the necessity of solid security practices.

Ensuring Adherence to Government Frameworks

NBN Co’s five-year framework is crafted to comply with several essential governmental frameworks, including the Protective Security Policy Framework (PSPF), the Australian Signals Directorate’s (ASD) Essential 8, and the National Institute of Standards and Technology (NIST) Cybersecurity Framework. These frameworks provide organizations with directives for safeguarding their critical assets and ensuring resilience against cyber threats.

Adhering to these frameworks is not merely a regulatory obligation but also a corporate necessity. As the guardian of Australia’s national broadband network, NBN Co is responsible for ensuring that its infrastructure remains secure and resilient, consequently enhancing the country’s cyber security stance.

Tackling Third-Party Risks and Human Issues

Another pivotal component of the strategy focuses on managing third-party risks and human-related challenges. In today’s interconnected environment, third-party vendors and associates can introduce considerable security risks if not adequately controlled. NBN Co’s strategy aims to reduce these risks through strict third-party security policies.

Moreover, the strategy acknowledges the importance of the human factor in security. Cybersecurity extends beyond just technology; it fundamentally involves people. Training, awareness, and fostering a robust security culture are vital to ensuring that employees and stakeholders are ready to confront potential threats.

Conclusion

NBN Co’s new five-year security framework is an all-encompassing plan intended to align with national cyber security aims, consolidate physical and cyber security efforts, and express risks in financial terms. The framework is designed for adaptability, enabling NBN Co to tackle emerging risks while ensuring adherence to government frameworks. By emphasizing third-party risk management and the human aspect of security, NBN Co aspires to establish a strong security foundation that not only protects essential infrastructure but also facilitates business advancement.

Q: What is the main goal of NBN Co’s new five-year security framework?

A:

The main goal of NBN Co’s new five-year security framework is to align with Australia’s 2023-2030 cyber security strategy while establishing security as a business facilitator. The framework also strives to protect the national broadband network and secure compliance with various governmental frameworks.

Q: What role does converged security play in NBN Co’s strategy?

A:

Converged security incorporates physical, HR, and IT security into a unified function led by a single executive. This strategy provides a thorough comprehension of security risks and enables more efficient management and mitigation of those risks.

Q: Why is risk quantification in economic terms essential?

A:

Quantifying risk in financial terms is vital as it converts security risks into a language that executives and board members can easily grasp—dollars and cents. This approach aids in securing vital resources and ensures that all stakeholders appreciate the significance of strong security practices.

Q: How does NBN Co’s strategy approach third-party risks?

A:

NBN Co’s strategy involves stringent third-party security measures to manage risks from vendors and partners. This is essential in the modern interconnected landscape where third-party relationships can introduce significant security vulnerabilities if not properly managed.

Q: Which frameworks does NBN Co’s strategy align with?

A:

The strategy aligns with several crucial government frameworks, including the Protective Security Policy Framework (PSPF), the Australian Signals Directorate’s (ASD) Essential 8, and the National Institute of Standards and Technology (NIST) Cybersecurity Framework.

RBA Engages NTT for Revamp of IT Infrastructure Architecture and Execution


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Reserve Bank of Australia Teams Up with NTT for a Comprehensive IT Infrastructure Revamp

RBA selects NTT to create and implement its new IT infrastructure

Overview:

  • The Reserve Bank of Australia (RBA) has contracted NTT Australia for a $12.7 million agreement to create and implement new IT infrastructure as part of the CoreMod initiative.
  • The CoreMod initiative encompasses setting up a new data center and transitioning critical workloads.
  • This project is projected to continue until 2027, featuring several vital milestones, such as the migration of business applications and the retirement of the existing data center.
  • RBA has previously invested substantially in its IT infrastructure, including agreements with Cisco and Hitachi Vantara Australia.
  • The intended IT infrastructure aims to bolster the resilience, security, and efficiency of Australia’s payments system.

CoreMod Initiative: A Tactical IT Transformation

The Reserve Bank of Australia (RBA) is embarking on a pivotal stage in its CoreMod initiative, signifying a tactical transformation of its IT infrastructure. The initiative has entered the design and implementation phase, with NTT Australia chosen to lead this crucial endeavor. The contract with NTT, valued at $12.7 million, is set to commence now and extend through October 2025.

What Does the CoreMod Initiative Entail?

Introduced at the end of the previous year, CoreMod is a multi-year initiative designed to develop a future-ready IT infrastructure for the RBA. The plan entails establishing a new data center at a CDC facility, followed by the transition of critical workloads into this newly built environment. This effort highlights RBA’s dedication to modernizing its IT capabilities, enhancing resilience, security, and operational efficiency.

Strategic Collaboration with NTT Australia

The alliance with NTT Australia is crucial for the effective execution of the CoreMod initiative. Janet Mengel, CoreMod Program Director, stated that this partnership will empower RBA to build a modern, secure infrastructure platform, vital for the future of Australia’s payments infrastructure. NTT will play an essential role in transitioning national critical applications to the new infrastructure, establishing a solid, efficient, and secure payments framework for Australians.

Major Investments and Upcoming Milestones

Notable Infrastructure Investments

Alongside the NTT agreement, RBA has made several significant infrastructure-related purchases this year. Noteworthy is the awarding of contracts to NTT Australia for Cisco hardware and software, totaling $67.5 million, and an extra $16.1 million for F5 load balancers. Furthermore, the central bank has established a $13.6 million “managed services” contract with Hitachi Vantara Australia.

Upcoming Milestones and Schedule

RBA has delineated a clear trajectory for the CoreMod initiative, presenting several critical milestones:

– **2025**: Finalization of infrastructure design and implementation.
– **2026**: Transition of business applications and rollout of an observability tool.
– **2027**: Retirement of the current head office data center.

This schedule reflects RBA’s enduring commitment to a smooth shift to an advanced IT infrastructure.

Conclusion

The Reserve Bank of Australia’s CoreMod initiative signifies a considerable investment in the future of the nation’s financial framework. By collaborating with NTT Australia, the RBA is undertaking essential measures to create a resilient, secure, and efficient IT platform that will underpin Australia’s payments infrastructure for years to come. With primary milestones established through 2027, the initiative is set to modernize the RBA’s operations, ensuring responsiveness to the challenges of a progressively digital economy.

Q&A: Clarifying the RBA’s CoreMod Initiative

Q: What is the CoreMod initiative?

A:

The CoreMod initiative is a multi-year effort by the Reserve Bank of Australia aimed at modernizing its IT infrastructure. It involves creating a new head office data center and migrating essential workloads, assuring a future-ready platform for the nation’s payment systems.

Q: Why was NTT Australia chosen for this initiative?

A:

NTT Australia was selected due to its proficiency in IT infrastructure design and implementation. The $12.7 million agreement highlights RBA’s confidence in NTT’s capabilities to deliver a secure and resilient platform that is critical for the success of the CoreMod initiative.

Q: What are the main milestones of the CoreMod initiative?

A:

The primary milestones consist of completing infrastructure design and implementation by 2025, migrating business applications and deploying an observability tool by 2026, and decommissioning the existing data center by 2027.

Q: How does the CoreMod initiative benefit Australia?

A:

The CoreMod initiative will strengthen the resilience, security, and efficiency of Australia’s payments framework, ensuring it can effectively meet future demands. This will benefit Australian businesses and consumers by offering a more dependable and secure financial infrastructure.

Q: What other investments have been made by RBA in IT infrastructure?

A:

RBA has made several noteworthy investments, such as contracts with NTT Australia for Cisco hardware and software ($67.5 million) and F5 load balancers ($16.1 million), in addition to a $13.6 million managed services agreement with Hitachi Vantara Australia.

Q: How long is the timeframe for the CoreMod initiative’s completion?

A:

The CoreMod initiative is anticipated to run until mid-to-late 2027, with various stages of implementation and migration outlined throughout this timeframe.

Queensland Police Struck by Data Access Interruptions After System Upgrade


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Queensland Police Confronts Data Access Challenges Following System Update

Following a recent system update, the Queensland Police Service (QPS) has encountered significant setbacks in accessing crucial data within its primary operational database system, QPRIME. This interruption has impacted the service across the board, affecting both on-ground officers and emergency response times.

Queensland Police faces data access challenges following system update

Image credit: Queensland Police Service.

Quick Overview

  • Queensland Police has encountered delays in data access due to a recent system update.
  • The core database QPRIME and QLITE devices utilized by officers were impacted.
  • The disruption also affected the Police Communication Centre, leading to prolonged processing times for Triple Zero calls.
  • The issue has since been resolved, with no noted effects on community safety or officer operations.
  • QPS is closely observing the situation, with further updates anticipated.

Exploring the QPRIME System

QPRIME, which stands for Queensland Police Records and Information Management Exchange, is a crucial database system introduced in the early-to-mid 2000s. It aimed to merge 234 distinct information systems into a unified platform, facilitating officers’ access to intelligence and data more effectively. The system is essential for the daily functions of the Queensland Police Service, backing everything from routine checks to urgent incident responses.

Effects of the Recent System Update

The latest system update, executed on Wednesday, resulted in unexpected delays in data access across all QPRIME applications and QLITE devices. QLITE comprises a fleet of iPad devices that officers use in the field to retrieve real-time information, perform checks, and report incidents. The disruption was significant enough to impact the Police Communication Centre, which saw slower processing times for Triple Zero emergency calls, particularly during high-demand periods.

Queensland Police Service’s Response

The Queensland Police Service has recognized the delays and announced that the issues have been resolved. “The Queensland Police Service has implemented changes to the systems, and these delays are no longer occurring,” the service communicated. They also reassured the public that there have been no effects on community safety or officer operations due to the disruption. Furthermore, QPS is closely watching the QPRIME system to ensure that any future concerns are addressed swiftly.

Potential Risks and Future Considerations

While the immediate disruption has been resolved, the episode underscores potential risks linked to dependence on complex digital systems for essential public services. While necessary for ongoing functionality and enhancements, system updates can create vulnerabilities or operational issues if not managed carefully. The Queensland Police Service’s prompt action in remedying the issue and ensuring public safety remained intact is commendable, yet it also emphasizes the importance of thorough testing and contingency planning in today’s digital landscape.

Conclusion

The Queensland Police Service confronted a considerable challenge when a recent system update led to delays in accessing crucial data within the QPRIME system. Although the issues have been rectified without reported effects on public safety or officer operations, the incident highlights the necessity for meticulous system management and ongoing vigilance in maintaining the dependability of digital infrastructure.

Q: What is QPRIME?

A:

QPRIME stands for Queensland Police Records and Information Management Exchange. It is a fundamental database system initiated in the early-to-mid 2000s to unify 234 separate information systems into a single platform that enhances access to intelligence and data for the Queensland Police Service.

Q: What caused the recent data access challenges?

A:

The challenges arose from unspecified system updates implemented on QPRIME on Wednesday. These updates resulted in delays in accessing data across all QPRIME applications and QLITE devices utilized by officers in the field.

Q: Was the public impacted by these delays?

A:

According to the Queensland Police Service, there have been no reported impacts on community safety or officer operations due to the delays. Emergency calls continued to be processed, albeit with some delays during peak times, but the situation has been resolved.

Q: How has the Queensland Police Service reacted to the issue?

A:

The Queensland Police Service implemented changes to the systems to eliminate the delays, and they are actively monitoring the QPRIME system to avert future issues. The service has also confirmed that service calls are still being managed and supported appropriately.

Q: What is QLITE, and how was it influenced?

A:

QLITE is a collection of iPad devices employed by Queensland Police officers in the field to access real-time data, execute checks, and document incidents. The recent system update induced delays in data access on these devices, affecting officers’ capability to gather and input vital information.

Q: What measures can be taken to avert similar issues in the future?

A:

To avoid comparable complications, it’s crucial to conduct comprehensive testing prior to implementing system updates, especially for critical infrastructure. Moreover, establishing a solid contingency plan can assist in mitigating the impact of any disruptions that do arise, ensuring the continuity of service and safeguarding public safety.

CrowdStrike Downtime Exacerbates California Fuel Storage Emergency


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview:

  • The CrowdStrike IT outage last month triggered a fuel storage dilemma in California.
  • California’s rigorous regulations and insufficient storage infrastructure worsened the predicament.
  • Jet fuel had to be stored on maritime tankers because land storage facilities were at capacity.
  • Storage expenses in California are twice those of other key hubs like New York Harbor and Houston.
  • This outage caused jet fuel reserves to hit historical highs of over 12 million barrels.
  • Establishing new storage tanks in California is a slow and complicated process.
  • Jet fuel imports to the West Coast have increased significantly this year, further straining storage resources.

Crisis in California’s Fuel Storage Amplified by CrowdStrike Outage

The recent CrowdStrike IT failure, which resulted in numerous flight cancellations, has escalated into a significant fuel storage crisis in California. The disturbance compelled US traders to place jet fuel intended for California onto maritime tankers, according to storage broker The Tank Tiger. This predicament highlights the limited petroleum storage capability in the state, where strict environmental laws and a laborious permitting procedure have hindered the development of new oil and gas facilities.

Consequences of Stringent Environmental Regulations

California has historically led the environmental charge, enacting stringent regulations designed to lessen reliance on fossil fuels. However, these ambitious initiatives have inadvertently resulted in a congestion of the state’s petroleum storage capacity. “For several years, there has been no space available for petroleum product storage in California,” stated Ernie Barsamian, the founder of The Tank Tiger, a clearinghouse for US terminal storage.

The state’s prime location on the US West Coast positions it as a vital petroleum trading center. Nevertheless, California’s restrictive approach to fossil fuel infrastructure has cultivated a scenario where demand is high yet storage capacity falls short. This mismatch renders the region particularly susceptible to fuel price fluctuations during disruptions like IT failures or refinery accidents.

The Burdensome Permitting Procedure

A primary obstacle for the industry in California is the challenging process for acquiring permits for new storage tanks. Despite clear demand, the permitting journey is slow and complicated, contributing to the already elevated operational costs in the state. “Obtaining permits for new storage tanks in California is a complex process,” Barsamian commented. Consequently, storage fees in California are reportedly double those in other prominent trading centers such as New York Harbor or Houston.

Maritime Tankers as an Emergency Measure

The CrowdStrike outage in July created a circumstance where unused jet fuel, originally slated for California, lacked available land storage and needed to be redirected to maritime tankers off the coasts of Houston and New Orleans. This storage approach, typically regarded as a last resort, carries its own challenges. Extending the use of these ships delays their journeys, tightening the market and raising operational costs.

Moreover, the outage triggered a notable increase in jet fuel reserves on the US West Coast. By the week ending July 26, jet fuel inventories in land tanks had surged to over 12 million barrels, a historic peak. This inventory increase was directly associated with the CrowdStrike outage, which commenced on July 19.

Rise in West Coast Imports

Adding to the storage crisis is the influx of West Coast imports, propelled by heightened demand for jet fuel. Analysts from the ship-tracking service Kpler report that West Coast imports averaged roughly 135,000 barrels per day (bpd) this year, roughly 25,000 bpd more than last year. This surge in imports has kept inventories elevated, further straining the already inadequate storage capacity.

As of last week, West Coast jet fuel supplies reached 11.8 million barrels, nearly 28 percent higher than the same time last year. This significant increase highlights the growing challenges in the region’s fuel market as it contends with both rising demand and limited storage capabilities.

Conclusion

The CrowdStrike IT outage has illuminated the vulnerable state of California’s fuel storage systems. With strict environmental regulations, a burdensome permitting process, and soaring storage costs, the state is poorly prepared to manage disruptions in its petroleum supply chain. The situation has worsened due to a surge in West Coast imports, resulting in record-high jet fuel inventories and compelling traders to turn to costly maritime storage options. California’s ongoing fuel storage crisis serves as a stark reminder of the difficulties inherent in reconciling environmental objectives with essential infrastructure requirements.

Q: What was the effect of the CrowdStrike outage on California’s fuel market?

A: The CrowdStrike outage caused many flights to be grounded, resulting in an oversupply of jet fuel that California’s limited storage capacity could not accommodate. This led traders to resort to maritime tankers for storage, driving up costs and tightening the market.

Q: What contributes to California’s constrained storage capacity?

A: Stringent environmental policies and a cumbersome permitting process in California have made it challenging to construct new oil and gas infrastructure, including storage tanks. Consequently, the state’s storage capabilities have not matched the demand, leading to frequent bottlenecks.

Q: How do California’s storage costs stack up against other areas?

A: Reportedly, storage costs in California are twice as high as those in other major trading hubs such as New York Harbor or Houston. This is attributed to the state’s stringent regulations and high demand for limited storage availability.

Q: What are the risks of relying on maritime tankers for storage?

A: Utilizing maritime tankers for storage is viewed as a last resort due to the associated high costs and logistical challenges. Prolonging the use of these vessels results in longer delays, tightening the market and increasing overall expenses.

Q: What has triggered the rise in jet fuel imports to the West Coast?

A: A robust demand for jet fuel has led to a marked uptick in imports to the West Coast this year. According to Kpler, imports have averaged around 135,000 barrels per day, 25,000 bpd higher than the previous year. This increase has further strained the region’s already limited storage resources.

Tesla’s Upcoming Perth Sales, Service, and Delivery Centre Opening This Weekend


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Tesla’s New Perth Sales, Service, and Delivery Centre: A Transformative Addition for Western Australia

Tesla's New Perth Sales, Service, and Delivery Centre Opening This Weekend

Quick Overview:

  • New Tesla Centre in Perth, positioned at 146 Carrington Street, O’Connor, WA, poised to launch this Saturday.
  • This centre will function as a focal point for vehicle sales, deliveries, and service requirements throughout Western Australia.
  • The grand opening event includes test drives, tech discussions, and fun activities for families.
  • Registration is essential for the event; it’s dog-friendly with activities such as “Paint a Tesla” for children.
  • Tesla Owners Club WA will be in attendance to discuss Novated Leasing and other topics.
  • The grand opening agenda features a ribbon-cutting ceremony and opportunities to win a Tesla Weekend experience.

Tesla’s Growth in Western Australia

Tesla is poised to make a notable impact in Western Australia with the launch of its new Sales, Service, and Delivery Centre in O’Connor, Perth. This new establishment is anticipated to be a transformative resource for local EV fans, offering a vital hub for Tesla services and sales in the area.

Situated at 146 Carrington Street, O’Connor, WA 6163, the new centre is ideally placed to cater to Tesla owners and potential buyers throughout Western Australia. This expansion underscores Tesla’s dedication to enhancing its presence in Australia, especially in regions that have been historically underserved.

A Comprehensive Service Centre for Western Australia

The new Tesla Centre will provide an extensive array of services, effectively turning it into a one-stop destination for all Tesla-related needs. Whether you wish to buy a new Tesla, need service for your existing vehicle, or are awaiting a delivery, this centre will cover all these bases.

Western Australia, noted for its expansive landscape and increasing enthusiasm for electric vehicles, has long required a dedicated Tesla centre. The establishment of this facility aims to fill that void, ensuring Tesla owners in the area have improved access to sales and service assistance.

Grand Opening Festivities: What to Anticipate

The grand opening festivities, scheduled for this Saturday, are crafted to celebrate community engagement. Tesla fans can expect a day filled with activities, tech discussions, and the opportunity to explore the new centre.

Event Itinerary

The events will commence at 9:00am, featuring coffee and pastries from the beloved local Big Loaf Bakery. Attendees can partake in test drives throughout the day, allowing them to experience Tesla’s innovative technology up close. Here’s a detailed breakdown of the day’s activities:

  • 9:00am: Coffee & pastries, along with all-day test drives.
  • 9:30am: Ribbon cutting ceremony.
  • 10:00am: Paint a Tesla – a fun, interactive activity for children.
  • 10:30am: Service Tech Talk – gain insights into Tesla’s cutting-edge service features.
  • 11:00am: Motors Tech Talk – explore the mechanics behind Tesla’s robust motors.
  • 11:30am: Energy Tech Talk – learn about Tesla’s energy solutions.
  • 12:00pm: Compete for a chance to win a Tesla Weekend experience.
  • 1:00pm: Event wraps up.

Activities for Families and Pets

This event is designed to cater to families as well; the “Paint a Tesla” activity at 10:00am will surely delight the kids, offering them a creative outlet while learning more about electric vehicles.

Furthermore, the event is dog-friendly, providing the unique opportunity to experience a test drive alongside your furry companion. This approach reflects Tesla’s commitment to fostering an inclusive atmosphere for all.

Tesla Owners Club WA Involvement

Representatives from the Tesla Owners Club WA will be present to share their experiences and provide insights into various topics, including Novated Leasing, a favored option for financing electric vehicles in Australia. Their involvement will be a valuable resource for both current and prospective Tesla owners.

The Importance of This Centre

This new centre’s opening represents a significant advancement for Tesla and the broader EV sector in Western Australia. It reflects a rising interest in electric vehicles across the region and Tesla’s dedication to fulfilling that demand. By offering a complete suite of services ranging from sales to maintenance, Tesla is simplifying the transition for Western Australians to electric vehicles.

Additionally, this launch could catalyze further infrastructure developments in the area. With heightened interest and support, the region may see an increase in charging stations, service centres, and other facilities that enhance the growth of electric vehicles.

Conclusion

Tesla’s new Sales, Service, and Delivery Centre in O’Connor, Perth, is set to throw open its doors this Saturday, marking a pivotal achievement for the electric vehicle community in Western Australia. The centre will supply a full spectrum of services, including sales, deliveries, and maintenance, establishing itself as an essential resource for Tesla owners in the area. The grand opening event promises a day filled with various entertaining activities, tech discussions, and opportunities to win exclusive Tesla experiences. As Tesla continues to broaden its reach in Australia, this new centre highlights the growing demand for electric vehicles in Western Australia.

Q: Where can the new Tesla Centre be found?

A:

The new Tesla Centre is located at 146 Carrington Street, O’Connor, Western Australia 6163.

Q: What services are available at the new Tesla Centre?

A:

The new Tesla Centre will provide a complete range of services, comprising new vehicle sales, deliveries, and maintenance services.

Q: Is the grand opening event accessible to the public?

A:

Yes, the event is open to the public, although registration is necessary. You can sign up on the official Tesla event page.

Q: Will there be any special activities during the grand opening?

A:

Certainly, the event will feature test drives, tech discussions, a “Paint a Tesla” activity for kids, and opportunities to win a Tesla Weekend experience. The event is also dog-friendly.

Dell Takes Further Steps to Divest SecureWorks


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read: Essential Insights

  • Dell Technologies is revisiting the prospect of selling SecureWorks after previous attempts did not succeed.
  • Investment bankers from Morgan Stanley and Piper Sandler have been brought in to investigate potential buyers, which may include private equity firms.
  • SecureWorks has an estimated market value of around US$800 million (A$1.17 billion).
  • Dell maintains a 79.2% ownership stake in SecureWorks and has control over 97.4% of its voting rights.
  • Following news regarding a potential sale, SecureWorks’ shares surged by as much as 34%.
  • Dell initially acquired SecureWorks in 2011 for US$612 million and took it public in 2016.
  • SecureWorks has encountered difficulties in distinguishing its services amidst larger cybersecurity rivals, resulting in a notable drop in its share price since its peak in 2021.
  • Dell has seen advantages from increasing investor interest in AI, with its shares climbing by 46% this year.

Dell Investigates Another Sale of SecureWorks

According to sources familiar with the situation, Dell Technologies is once again considering a potential sale of its cybersecurity division, SecureWorks. This is not the first instance where Dell has attempted to divest the US-based cybersecurity company. Previous efforts to find a buyer were unsuccessful, but Dell is making another attempt by engaging investment bankers at Morgan Stanley and Piper Sandler to assess interest from potential acquirers, including private equity firms.

Dell contemplates potential divestment of SecureWorks again

With a market value estimated at about US$800 million (A$1.17 billion), SecureWorks could attract private equity firms looking to invest within the cybersecurity sector. However, there is no certainty regarding a deal, and Dell may ultimately opt to keep ownership of the firm.

Dell’s Ownership in SecureWorks

Dell currently possesses a 79.2% stake in SecureWorks, primarily via Class B shares, which also grant it control over 97.4% of the voting stock. This controlling position allows Dell to be a key player in any potential sale, enabling it to influence the future direction of SecureWorks largely at its discretion.

Prior Efforts to Sell SecureWorks

This is not the first instance of Dell looking to sell SecureWorks. In 2019, Dell attempted to divest the company as part of its larger strategy to decrease debt. Nonetheless, that initiative did not culminate in a sale. The persistent challenges of differentiating SecureWorks’ offerings in a saturated cybersecurity market have likely fueled Dell’s renewed consideration of selling the business.

Challenges and Market Dynamics for SecureWorks

Established in 1998, SecureWorks has positioned itself as a cybersecurity provider with a suite of security solutions to safeguard businesses from cyber threats. Its cloud-based platform, Taegis, focuses on detecting advanced threats. Despite these capabilities, SecureWorks has found it challenging to compete with larger cybersecurity organizations, a situation reflected in its share price, which has diminished by over two-thirds from its apex in September 2021.

Impact on SecureWorks’ Valuation

The prospect of a potential sale positively affected SecureWorks’ share price, which soared as much as 34% following the announcement. Nevertheless, the stock later moderated its increases, signaling market uncertainty regarding the feasibility of a deal. The company is expected to disclose its second-quarter performance on September 5, which may offer additional clarity on its results and future outlook.

Dell’s Broader Strategic Focus and AI Growth

In recent years, Dell has been divesting non-core assets as a component of a wider strategy to optimize its operations and mitigate debt. Concurrently, Dell has capitalized on heightened investor enthusiasm for artificial intelligence (AI). The demand for the company’s AI-oriented servers has surged, leading to a 46% rise in Dell’s share price this year, significantly outperforming the S&P 500 index, which has climbed by 18%.

Conclusion

Dell Technologies is contemplating selling SecureWorks, a cybersecurity firm it initially purchased in 2011. Despite prior unsuccessful attempts to divest the company, Dell is re-examining the option of a sale through the expertise of investment bankers from Morgan Stanley and Piper Sandler. SecureWorks is currently valued at around US$800 million (A$1.17 billion) and has struggled to stand out in a competitive landscape. While a sale is not assured, the news has already influenced SecureWorks’ share price, which saw a substantial increase before retracting somewhat. Dell’s strategy of disposing of non-core assets and leveraging AI market trends has bolstered its performance this year.

Q: What prompts Dell to consider divesting SecureWorks?

A: Dell is reassessing the sale as part of a broader strategy to streamline operations and decrease debt. Previous attempts to sell SecureWorks did not come to fruition, but Dell is making another effort, likely due to ongoing difficulties faced by SecureWorks in distinguishing itself within a crowded cybersecurity market.

Q: What is the current market value of SecureWorks?

A: SecureWorks holds a market value of approximately US$800 million (A$1.17 billion).

Q: What are SecureWorks’ primary service offerings?

A: SecureWorks provides a cloud-based platform named Taegis, aimed at identifying advanced cyber threats and delivering security solutions for corporations against cyber intrusions.

Q: How much ownership does Dell have in SecureWorks?

A: Dell owns 79.2% of SecureWorks via its Class B shares, which confer control over 97.4% of the company’s voting rights.

Q: What effect did the sale news have on SecureWorks’ stock price?

A: The announcement led to a rise in SecureWorks’ share price by as much as 34% before moderating, highlighting market skepticism about the likelihood of a sale.

Q: How does artificial intelligence (AI) factor into Dell’s current business strategy?

A: Dell has seen gains from increasing investor focus on AI, which has driven strong demand for its AI-centric servers. This trend has led to a 46% rise in Dell’s share price this year, outpacing the broader S&P 500 index.

Discovering the Unexpected Benefits of Retaining Older Technology in Operation


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read: Essential Insights on the Advantages of Retaining Older Technology

  • Older tech frequently remains functional and dependable long after warranty periods end.
  • Organizations can realize considerable savings by prolonging the use of current technology assets.
  • Environmental advantages consist of decreased e-waste and resource conservation.
  • An increasing number of tech executives are reevaluating the urgency to upgrade, opting instead to concentrate on maintenance and performance.
  • Legacy systems can still provide strong security, particularly with regular updates and maintenance.

The Continuing Value of Older Technology

The Advantages of Sustaining Older Technology

In a time when the latest devices and software updates are heavily advertised, it’s simple to miss the significance of older technology. Nevertheless, many tech assets in organizations today are capable of operating effectively, even after their warranties are no longer valid. As James Burns, General Manager for Southern Region Sales at Interactive, has emphasized, numerous technology leaders are starting to raise essential inquiries about the need for continual upgrades.

Cost Benefits of Prolonged Use

One of the strongest arguments for maintaining older technology is the substantial cost savings it can provide. The financial strain of acquiring new hardware and software can be considerable, particularly for small to medium-sized enterprises (SMEs). By sustaining and enhancing current technology, businesses can sidestep these expenses and reallocate those funds to other vital sectors.

Environmental Considerations: Minimizing E-Waste

In addition to financial motivations, there is an increasing awareness of the environmental consequences of technology disposal. E-waste presents a considerable global issue, and Australia is no exception. By prolonging the lifespan of older tech, companies can help decrease the volume of electronic waste that ends up in landfills. This strategy also preserves the resources necessary for manufacturing new devices, aligning with broader sustainability objectives.

Security Aspects

While older systems may sometimes be more susceptible if not properly maintained, they can still deliver robust security when regularly updated. Numerous older systems have demonstrated remarkable resilience against cyber threats, especially when kept current with the latest security patches and best practices. Furthermore, the familiarity of legacy systems can make them simpler to manage and secure.

Dependability and Functionality

Older technology that has received proper upkeep usually continues to operate reliably. Many legacy systems were designed for longevity, allowing them to outlast newer, more delicate options. In mission-critical settings, where stability and reliability are crucial, older tech can still have an essential function.

Conclusion

The choice to retain older technology in service offers various advantages, from cost savings to eco-friendliness. As more organizations reconsider the haste to upgrade, it’s evident that older tech still holds a significant position in today’s digital world. By emphasizing maintenance, security, and performance, businesses can extend the lifespan of their tech assets and promote a more sustainable future.

Q: What are the main financial advantages of keeping older technology in service?

A: Extending the lifespan of existing technology assets can help businesses save significantly on costs related to acquiring new hardware and software. These savings can then be redirected towards other business areas, such as innovation or employee training.

Q: How does preserving older tech benefit environmental sustainability?

A: Maintaining older technology in service reduces the volume of electronic waste generated and conserves resources needed for new device production. This strategy aids in lessening the environmental effects associated with the rapid upgrade cycles common in the tech industry.

Q: Is it safe to keep utilizing older technology with regards to security?

A: Indeed, older technology can remain secure if it is consistently updated with the latest security patches and maintained according to best practices. Many legacy systems are resilient and can be effectively managed to guard against cyber threats.

Q: What are the possible disadvantages of using older technology?

A: Potential disadvantages may include compatibility challenges with newer software, the necessity for more frequent maintenance, and decreased vendor support. However, these issues can often be managed with a proactive system management approach.

“Introducing Tesla Cortex: The AI Supercluster Driving the Future of Self-Driving Vehicles and Robotics”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Introducing Tesla Cortex: The AI Supercluster Shaping the Future of Self-Driving Cars and Robotics

Elon Musk, the CEO of Tesla, has shared a new video on social media showcasing a look inside the Gigafactory located in Austin, Texas. This footage provides a unique perspective on Tesla’s freshly enhanced AI data center, which is home to tens of thousands of advanced AI chips. These components are anticipated to position Tesla’s AI supercluster among the most substantial compute clusters globally, vital for the evolution of autonomous cars and robots.

Quick Overview:

  • Tesla’s Gigafactory in Austin now features a large AI supercluster, which is expected to include between 85,000 and 100,000 H100 GPU equivalents by year-end.
  • This AI cluster will drive Tesla’s “real-world AI” projects, such as self-driving technology and humanoid robots.
  • Earlier this year, Musk diverted 12,000 Nvidia GPUs destined for Tesla to xAI, yet it appears Tesla’s infrastructure is primed for growth.
  • The video shows initial construction stages with vacant cable trays and ongoing work.
  • Tesla’s AI is heavily reliant on data-centric, end-to-end learning to cultivate driving behaviors that resemble human actions.
  • Scalability and generalization remain vital priorities for Tesla’s AI, allowing adaptation to new and unencountered scenarios.

Exploring Tesla’s Gigafactory in Austin

The fresh video from Elon Musk taken at Tesla’s Gigafactory in Austin, Texas, has generated considerable excitement among technology aficionados and industry specialists. The clip displays the latest expansion on the factory’s southern side, where tens of thousands of high-performance AI chips are being added. This advancement aligns with Tesla’s overarching strategy to establish one of the most formidable AI superclusters worldwide, essential to the company’s vision for self-driving cars and robotics.

From GPUs to AI Superclusters

This year, Tesla gained attention when Musk allocated 12,000 Nvidia H100 GPUs that were meant for Tesla to his other project, xAI. This move sparked a conversation about resource management amidst Musk’s various companies. Yet now it appears that Tesla’s AI setup is progressing, with plans to amass between 85,000 and 100,000 H100 GPU equivalents by the close of 2024. This will involve a combination of Nvidia GPUs and Tesla’s unique Dojo chips, both crucial for AI training and execution.

Tesla’s Strategy for “Real-World AI”

Tesla often describes its AI initiatives as “real-world AI,” a phrase that highlights the practical uses of artificial intelligence in daily life. In contrast to traditional AI systems that lean heavily on simulations, Tesla’s approach is rooted in actual data. The firm gathers extensive data from its fleet of vehicles, utilizing it to train its AI models. This data-led method enables Tesla’s AI systems to learn not merely from preset rules but from real-world encounters, enhancing adaptability and scalability.

End-to-End Learning for Self-Driving Technology

A notable aspect of Tesla’s AI is its end-to-end learning framework. Conventional AI systems typically depend on pre-established rules for decision-making, whereas Tesla’s AI is designed to convert raw input—such as camera images—straight into driving actions. This method parallels the way a human learns to operate a vehicle, minimizing the reliance on human-defined regulations and enhancing the AI system’s flexibility and responsiveness. This end-to-end learning is paramount for Tesla’s goal of fully autonomous cars, which must navigate an endless array of real-world circumstances.

Scalability and Generalization

Another fundamental element of Tesla’s AI approach is its emphasis on scalability and generalization. While many AI technologies thrive in controlled settings, Tesla’s AI must be equipped to generalize its training data to address new and unexpected scenarios. This capacity to adapt is especially critical for autonomous vehicles, which face numerous unpredictable conditions on the streets. Tesla’s AI is structured to learn from each interaction, progressively enhancing its operation over time.

Video Insights: A Glimpse Inside Tesla’s AI Supercluster

Though videos revealing such infrastructure are uncommon, Musk’s latest post provides a notable insight into the preliminary phases of building Tesla’s AI supercluster. Here’s what we can deduce from the visuals:

Under Construction

The video clearly illustrates that the AI supercluster is still in the construction phase. The cable trays atop the server cabinets remain mostly empty, with safety bollards, ladders, and workers donning safety vests throughout the footage. This suggests that the installation process is still active, with key components still forthcoming.

Power Requirements for AI

The clip also emphasizes the considerable power infrastructure necessary to sustain such a vast compute cluster. While the server racks now display high-capacity power cables, it’s evident that the complete power needs haven’t yet been fulfilled. Once fully functional, the power consumption from this supercluster is anticipated to be substantial, potentially affecting the nearby power grid.

Rows of GPUs

The footage showcases countless rows of server cabinets laden with GPUs, extending into the horizon. Counting the aisles becomes challenging after the eighth row, but it’s apparent that this is an immense installation. The scale of the arrangement highlights the extensive computational power Tesla is amassing to propel its AI aspirations.

Hot and Cold Aisles

Modern data centers must meticulously regulate temperature, and Tesla’s facility is no different. The design incorporates cold aisles where the front of the server blades face inward, optimizing cooling efficiency. Hot air is expelled from the rear into hot aisles, where it is extracted from the system. The floor seems engineered to catch dust, with a positive pressure system likely employed to keep dust away from sensitive components.

High-Tech Meets Low-Tech

In spite of the state-of-the-art technology showcased, the video also presents some grassroots solutions. One aisle features a simple cardboard sign secured by duct tape—a delightful contrast to the high-tech surroundings. This serves as a reminder that even within the most advanced environments, sometimes the simplest solutions prevail.

Introducing Tesla Cortex: The AI Supercluster Shaping the Future of Self-Driving Cars and Robotics

Conclusion

The revelation of Tesla’s AI supercluster at their Gigafactory in Austin signifies a crucial achievement in the company’s quest for autonomous driving technology and robotics. Combining Nvidia H100 GPUs with Tesla’s proprietary Dojo chips, this supercluster is poised to emerge as one of the most substantial AI compute clusters in the…