Chris Nerney

Author Archives: Chris Nerney

When quantum computers forget: Overcoming decoherence

There’s no point in having a quantum computer if it’s not smokin’ fast; otherwise it’s way too much trouble, what with all the subzero temperatures and instability and such. So it’s always newsworthy when somebody sets a new standard for quantum computing processing speeds, even if quantum computers are far from common commercial use.In this case that somebody is IBM, which recently announced its newly developed quantum computing processor, called Eagle, has broken the 100-qubit barrier. IBM[Get regularly scheduled insights by signing up for Network World newsletters.] Fusion boldly (if clumsily) says it views Eagle “as a step in a technological revolution in the history of computation.” (It sounds like an algorithm wrote that sentence! Is this where you’re leading us, Big Blue? A quantum future of incoherent techspeak?)To read this article in full, please click here

When quantum computers forget: Overcoming decoherence

There’s no point in having a quantum computer if it’s not smokin’ fast; otherwise it’s way too much trouble, what with all the subzero temperatures and instability and such. So it’s always newsworthy when somebody sets a new standard for quantum computing processing speeds, even if quantum computers are far from common commercial use.In this case that somebody is IBM, which recently announced its newly developed quantum computing processor, called Eagle, has broken the 100-qubit barrier. IBM[Get regularly scheduled insights by signing up for Network World newsletters.] Fusion boldly (if clumsily) says it views Eagle “as a step in a technological revolution in the history of computation.” (It sounds like an algorithm wrote that sentence! Is this where you’re leading us, Big Blue? A quantum future of incoherent techspeak?)To read this article in full, please click here

LoRa takes a trip to the moon and back, chirping all the way

LoRa is living up to its name, literally.A shortened version of “long range” (ironic!), LoRa is a wide-area wireless modulation technique that encodes information on radio waves. LoRa, which has been around since 2015, is derived from Chirp Spread Spectrum (CSS) technology and uses chirp pulses to transmit small bits of data. It also uses very little power. The proprietary technology is owned by semiconductor supplier Semtech Corp[Get regularly scheduled insights by signing up for Network World newsletters.] LoRa’s value is in transmitting data for sensors and other connected devices that require little power to operate. Not only can LoRa withstand disturbances, it can transmit data at longer ranges than better known wireless technologies such as Wi-Fi and Bluetooth. So long, in fact, that demonstrations of LoRa’s transmission capabilities now must extend into near space.To read this article in full, please click here

Quantum primacy: Is it real (and if so, does it matter)?

The nexus of the ongoing competition among nations and corporations (such as   Google and IBM) to demonstrate quantum primacy has shifted to a university in China where not one, but two experimental quantum computers reportedly have shown that quantum primacy is attainable.Quantum primacy is when a quantum computer is able to solve computational problems that are beyond the ability of traditional “classical” computers, yoked as they are to their quaint system of ones and zeroes.Researchers show quantum computers can reason Don’t get me wrong; classical computers long have served with distinction. So did the abacus in its day. However, as society’s computational challenges became more complex--such as splitting a restaurant bill 11 ways among your cheap and quarrelsome family members--this ancient calculating device eventually gave way to the digital calculator.To read this article in full, please click here

Quantum primacy: Is it real (and if so, does it matter)?

The nexus of the ongoing competition among nations and corporations (such as   Google and IBM) to demonstrate quantum primacy has shifted to a university in China where not one, but two experimental quantum computers reportedly have shown that quantum primacy is attainable.Quantum primacy is when a quantum computer is able to solve computational problems that are beyond the ability of traditional “classical” computers, yoked as they are to their quaint system of ones and zeroes.Researchers show quantum computers can reason Don’t get me wrong; classical computers long have served with distinction. So did the abacus in its day. However, as society’s computational challenges became more complex--such as splitting a restaurant bill 11 ways among your cheap and quarrelsome family members--this ancient calculating device eventually gave way to the digital calculator.To read this article in full, please click here

Drone demo shows it’s possible to protect 5G-managed devices from DDoS, exfiltration attacks

A demonstration earlier this year at Stanford School of Engineering proved that a small fleet of computer-controlled drones can maintain their flight integrity in the face of continual cyberattacks on the 5G network used to manage the devices through the deployment of software-defined networking (SDN).For enterprise IT pros charged with securing devices wirelessly across a 5G network, the drone test results are promising evidence that SDN can help networks under cyberattack to recover almost instantaneously.To read this article in full, please click here

Drone demo shows it’s possible to protect 5G-managed devices from DDoS, exfiltration attacks

A demonstration earlier this year at Stanford School of Engineering proved that a small fleet of computer-controlled drones can maintain their flight integrity in the face of continual cyberattacks on the 5G network used to manage the devices through the deployment of software-defined networking (SDN).For enterprise IT pros charged with securing devices wirelessly across a 5G network, the drone test results are promising evidence that SDN can help networks under cyberattack to recover almost instantaneously.To read this article in full, please click here

For networking pros, every month is Cybersecurity Awareness Month

When National Cybersecurity Awareness Month (NCSAM) was launched in October 2004, it was a modest affair, offering anodyne advice to individual Americans and US businesses along the lines of making sure to update your antivirus software twice a year.Since then NCSAM has grown into an event-packed month with star-studded guest panels, annual launches in various cities (looking at you, Ypsilanti, Michigan!), the participation of federal cybersecurity officials, and weekly themes. This year, for example, the themes in each successive week are: Be Cyber Smart Phight the Phish! Experience. Share. (Cybersecurity Career Awareness Week) Cybersecurity First Linux security: Cmd provides visibility, control over user activity Not sure why the organizers didn’t make “Cybersecurity First” the theme of the month’s first week, but it is not for me to second-guess the federal Cybersecurity & Infrastructure Security Agency (CISA) and the public/private National Cyber Security Alliance (NCSA), organizers of the annual awareness month.To read this article in full, please click here

For networking pros, every month is Cybersecurity Awareness Month

When National Cybersecurity Awareness Month (NCSAM) was launched in October 2004, it was a modest affair, offering anodyne advice to individual Americans and US businesses along the lines of making sure to update your antivirus software twice a year.Since then NCSAM has grown into an event-packed month with star-studded guest panels, annual launches in various cities (looking at you, Ypsilanti, Michigan!), the participation of federal cybersecurity officials, and weekly themes. This year, for example, the themes in each successive week are: Be Cyber Smart Phight the Phish! Experience. Share. (Cybersecurity Career Awareness Week) Cybersecurity First Linux security: Cmd provides visibility, control over user activity Not sure why the organizers didn’t make “Cybersecurity First” the theme of the month’s first week, but it is not for me to second-guess the federal Cybersecurity & Infrastructure Security Agency (CISA) and the public/private National Cyber Security Alliance (NCSA), organizers of the annual awareness month.To read this article in full, please click here

The new internet speed record twice as fast as the old one

Everyone wants faster internet speeds. Even people who already have high-speed connections want faster internet, including enterprise workers and IT pros. More speed is what they need, or at least what they would strongly prefer, because the faster data is transmitted between two devices, the faster decisions can be made and actions taken. In the Darwinian digital economy, slow Internet speeds are for laggards and also-rans!So how fast is fast? Some might say the average US internet speed of 99.3 Mbps as measured earlier this year by HighSpeedInternet.com is more than adequate, while an enterprise with a sizable workforce and growing number of connected devices and edge networks would need far more bandwidth.To read this article in full, please click here

Are Tesla’s Dojo supercomputer claims valid?

Self-driving cars must possess the ability to recognize road conditions, make decisions and take appropriate action, all in real time. This requires on-board artificial intelligence (AI) that ensures vehicles are able to “learn,” along with super-fast processing power.Tesla unveiled a custom AI chip back in 2019 and soon began manufacturing cars with it. Now Tesla has unveiled a second internally designed semiconductor to power the company’s Dojo supercomputer.Chip shortage will hit hardware buyers for months to years The D1, according to Tesla, features 362teraFLOPS of processing power. This means it can perform 362 trillion floating-point operations per second (FLOPS), Tesla says.To read this article in full, please click here

Are Tesla’s Dojo supercomputer claims valid?

Self-driving cars must possess the ability to recognize road conditions, make decisions and take appropriate action, all in real time. This requires on-board artificial intelligence (AI) that ensures vehicles are able to “learn,” along with super-fast processing power.Tesla unveiled a custom AI chip back in 2019 and soon began manufacturing cars with it. Now Tesla has unveiled a second internally designed semiconductor to power the company’s Dojo supercomputer.Chip shortage will hit hardware buyers for months to years The D1, according to Tesla, features 362teraFLOPS of processing power. This means it can perform 362 trillion floating-point operations per second (FLOPS), Tesla says.To read this article in full, please click here

Wi-Fi 7 is coming, and Intel makes it sound great

Wi-Fi has been with us since 1997, predating Google, the iPhone, and robotic vacuum cleaners. It’s basically a legacy technology! Wi-Fi resources Test and review of 4 Wi-Fi 6 routers: Who’s the fastest? How to determine if Wi-Fi 6 is right for you Five questions to answer before deploying Wi-Fi 6 Wi-Fi 6E: When it’s coming and what it’s good for Despite its maturity, Wi-Fi is always evolving to meet the needs of consumers and enterprises. There have been eight versions of the Wi-Fi network protocol, with the latest (Wi-Fi 6 or, to use its “street name,” 802.11ax) being released in 2019. Each iteration has been faster and more reliable than its predecessor, a comforting trend. Three-and-a-half generations (Wi-Fi 4, Wi-Fi 5, and Wi-Fi 6 and 6E) currently are in use.To read this article in full, please click here

Don’t let subdomains sink your security

If your enterprise has a website (and one certainly would hope so in 2021!), it also has subdomains. These prefixes of your organization’s main domain name are essential for putting structural order to the content and services on your website, thus preventing online visitors from instantly fleeing in terror, disdain, or confusion.Large enterprises can have thousands of subdomains. IBM, for example, has roughly 60,000 subdomains, while Walmart.com has “only” 2,132 subdomains.What is DNS and how it works Whatever value subdomains bring to enterprises--and they bring plenty--they present more targets for bad actors. Why, just last year the subdomains of Chevron, 3M, Warner Brothers, Honeywell, and many other large organizations were hijacked by hackers who redirected visitors to sites featuring porn, malware, online gambling, and other activities of questionable propriety.To read this article in full, please click here

Don’t let subdomains sink your security

If your enterprise has a website (and one certainly would hope so in 2021!), it also has subdomains. These prefixes of your organization’s main domain name are essential for putting structural order to the content and services on your website, thus preventing online visitors from instantly fleeing in terror, disdain, or confusion.Large enterprises can have thousands of subdomains. IBM, for example, has roughly 60,000 subdomains, while Walmart.com has “only” 2,132 subdomains.What is DNS and how it works Whatever value subdomains bring to enterprises--and they bring plenty--they present more targets for bad actors. Why, just last year the subdomains of Chevron, 3M, Warner Brothers, Honeywell, and many other large organizations were hijacked by hackers who redirected visitors to sites featuring porn, malware, online gambling, and other activities of questionable propriety.To read this article in full, please click here

The Department of Defense, networking, and the speed of relevance

If yours is like most enterprises, it is under intense competitive pressure to understand faster, decide faster, and act faster in an increasingly dynamic environment.For businesses, that environment is the economy. But for the U.S. Department of Defense (DoD), the environment in which they must leverage technology and tactics against deadly adversaries is more like a battlefield. And all but the most self-aggrandizing sales directors would agree that the stakes on the battlefield are considerably higher than growing revenue and capturing market share. (Not that they are trivial!) Read more: Cisco tool taps telemetry for network, security analyticsTo read this article in full, please click here

Department of Defense works to integrate battlefield intel networks

If yours is like most enterprises, it is under intense competitive pressure to understand faster, decide faster, and act faster in an increasingly dynamic environment.For businesses, that environment is the economy. But for the U.S. Department of Defense (DoD), the environment in which they must leverage technology and tactics against deadly adversaries is more like a battlefield. And all but the most self-aggrandizing sales directors would agree that the stakes on the battlefield are considerably higher than growing revenue and capturing market share. (Not that they are trivial!) Read more: Cisco tool taps telemetry for network, security analyticsTo read this article in full, please click here

Department of Defense works to integrate battlefield intel networks

If yours is like most enterprises, it is under intense competitive pressure to understand faster, decide faster, and act faster in an increasingly dynamic environment.For businesses, that environment is the economy. But for the U.S. Department of Defense (DoD), the environment in which they must leverage technology and tactics against deadly adversaries is more like a battlefield. And all but the most self-aggrandizing sales directors would agree that the stakes on the battlefield are considerably higher than growing revenue and capturing market share. (Not that they are trivial!) Read more: Cisco tool taps telemetry for network, security analyticsTo read this article in full, please click here

The Department of Defense, networking, and the speed of relevance

If yours is like most enterprises, it is under intense competitive pressure to understand faster, decide faster, and act faster in an increasingly dynamic environment.For businesses, that environment is the economy. But for the U.S. Department of Defense (DoD), the environment in which they must leverage technology and tactics against deadly adversaries is more like a battlefield. And all but the most self-aggrandizing sales directors would agree that the stakes on the battlefield are considerably higher than growing revenue and capturing market share. (Not that they are trivial!) Read more: Cisco tool taps telemetry for network, security analyticsTo read this article in full, please click here

Experimental Morpheus CPU is ‘mind-bogglingly terrible’ to crack

To many of us, Morpheus is a character played by Laurence Fishburne in The Matrix movies. To others, Morpheus is the Greek god of sleep and dreams. To others still, Morpheus is a digital synthesizer from the early ‘90s that developed a cult following.The Morpheus we’re discussing today, however, is of far greater relevance to enterprise IT professionals who constantly are searching for ways to protect their networks from the ever-present threat of hackers.Developed by a team at the University of Michigan, this Morpheus is a CPU that ingeniously protects against hacking attempts by using encryption that changes every few milliseconds, which prevents intruders from getting a fix on how a system is set up. This makes cracking the encryption nearly impossible and is sure to drive hackers crazy.To read this article in full, please click here