Error mitigation for quantum computers could ultimately lead to more reliable and useful systems, according to IBM, which recently demonstrated how its error-handling technology enabled a quantum computer to outperform a classical supercomputing approach.Quantum computing excels at solving large, data-heavy problems, and future applications are expected to significantly advance areas such as AI and machine-learning in industries including automotive, finance, and healthcare. But among the challenges developers face are the noisiness of today's quantum systems and the errors they generate.To read this article in full, please click here
AMD is coming for Nvidia’s AI crown in a big way with the launch of its new Instinct processor, which it claims can do the work of multiple GPUs.CEO Lisa Su called the Instinct MI300X “the most complex thing we’ve ever built.” She held up the chip, which is about the size of a drink coaster, at an event on Tuesday in San Francisco.Weighing in at 146 billion transistors, the MI300X comes with up to 192GB of high-bandwidth HBM3 memory shared by both the CPU and GPU. It has a total of 13 chiplets on the die. The chip also has a memory bandwidth of 5.2 TB/s, which is 60% faster than Nvidia’s H100.The chip consists of Zen CPU cores and AMD’s next-generation CDNA 3 GPU architecture. The enormous amount of memory is the real selling point, according to Su.To read this article in full, please click here
Amazon Web Services (AWS) on Tuesday said its North Virginia (US-East-1) region faced disruption in services for nearly four hours, affecting thousands of customers.“Between 11:49 AM PDT and 3:37 PM PDT, we experienced increased error rates and latencies for multiple AWS Services in the US-EAST-1 region,” AWS wrote on its health status page, adding that at least 104 of its services were affected during the outage.AWS services that were malfunctioning during these four hours included the likes of AWS Management Console, Amazon SageMaker, AWS Glue, Amazon Connect, AWS Fargate, and Amazon GuardDuty.To read this article in full, please click here
Keeping your files private from anyone but those with superuser (root) access is easy on Linux. File permissions provide everything you need. By default, you'll have a username and primary group assigned to your account, and you can use the chmod (change mode) command to control what anyone else can view or change.(If permissions like "750" and "rwxr-x---" don't ring any bells for you, check out these posts for insights into how file permissions work on Linux: A deeper dive into Linux permissions and Unix: beyond group and everyone else)To read this article in full, please click here
Cato Networks said today that it has successfully created an encrypted tunnel capable of 5Gbps of throughput, offering reassurance to network administrators worried about traffic overhead created by Secure Access Service Edge (SASE) platforms.The company’s announcement said that increasing uptake of SASE, particularly by large enterprises, has created a need for faster encrypted connections that still support the full array of security technologies present in SASE. The speed boost, Cato said, was made possible by improved performance in the company’s Single Pass Processing Engine, which is the umbrella of services that runs in its various points of presence.To read this article in full, please click here
Using aliases on Linux systems can save you a lot of trouble and help you work faster and smarter. This post examines the ways and reasons that many Linux users take advantage of aliases, shows how to set them up and use them, and provides a number of examples of how they can help you get your tasks done with less trouble.What are aliases?
Aliases are simply one-line commands that are assigned names and generally stored in a startup file (e.g., .bashrc) that is run when you log in using a tool like PuTTY or open a terminal window on your desktop. The syntax is easy. It follows this pattern:$ alias NAME = 'COMMAND'
As a simple example, typing a command like that shown below enables you to clear your screen simply by typing “c”.To read this article in full, please click here
OK, it’s not been a great first half for many companies, from end users to vendors and providers. The good news is that users sort of believe that many of the economic and political issues that have contributed to the problem have been at least held at bay.There’s still uncertainty in the tech world, but it's a bit less than before. Most of the companies I’ve talked with this year have stayed guardedly optimistic that things were going to improve. Over the last month, of the nearly 200 companies I’ve emailed with, only 21 were “pessimistic” about the outlook for their tech spending in the second half.Lack of pessimism doesn’t translate to optimism, though, and optimism is a bit non-specific for network and IT planners to build on. What are the user priorities for tech for the rest of the year? Do they think their budgets will shift, and if so from what to what? Are they looking to make major changes in their networks, change their vendors, be more or less open? I thought I knew some of the answers to these questions, but for some I was wrong.To read this article in full, please click here
Colocation provider Cyxtera Technologies has filed for Chapter 11 bankruptcy after spending the last few months trying to find a buyer or reduce its debt load. The company will now attempt to restructure through bankruptcy or perhaps a suitor will come along to buy out the company.Meanwhile, the company says it will be business as usual for its customers, but with the reorganization that comes with Chapter 11, it’s hard to say whether that will last, according to Bill Kleyman, an independent consultant to data-center companies.To read this article in full, please click here
Too many management tools that don’t integrate well and a lack of visibility into third-party systems are among the problems enterprise IT teams face when they try to manage multivendor, distributed environments.Cisco’s Full-Stack Observably Platform is designed to collect and correlate data from application, networking, infrastructure, security, and cloud domains to provide a clear view of what’s going on across the enterprise and make it easier for enterprises to spot anomalies, preempt and address performance problems, and improve threat mitigation.To read this article in full, please click here
Looking to harness a decade of AI/ML development Cisco this week previewed generative AI-based features it will soon bring to its Security Cloud service and Webex collaboration offerings.Cisco said it was looking meld the network and security intelligence it has amassed over the years with the large language models (LLMs) of generative AI to simplify enterprise operations and address threats with practical, effective techniques. The first fruits of this effort will be directed at the Cisco Security Cloud, the overarching, integrated-security platform that includes software such as Duo access control and Umbrella security as well as firewalls and Talos threat intelligence access all delivered via the cloud.To read this article in full, please click here
Semiconductors, especially CPUs, are immensely complex creations all done at the microscopic level. That there aren’t more bugs, for lack of a better word, is a testament to the efforts that these chipmakers put in to delivering solid products. But occasionally, something slips by.AMD has issued an alert that an older processor line has a minor error. The problem exists in its Epyc 7002 line, code-named Rome, which was released three years ago. The bug, first noted on a Reddit thread, says that servers running Rome-era chips will hang after 1,044 days of uptime or nearly three years.To read this article in full, please click here
Cisco this week took the wraps off a security service edge (SSE) offering that aims to help enterprises securely connect growing edge resources, including cloud, private and SAAS applications.Along with the SSE package, the vendor made two additional application security-related announcements at its Cisco Live! customer event. It unveiled Cisco Multicloud Defense, which is a new service designed to protect cloud service workloads, and it upgraded Panoptica, its cloud-native security application development software.To read this article in full, please click here
Software-defined networking (SDN) is a network management technique that centralizes control of network appliances in software. SDN makes network management easier in two ways: it allows networks to be administered as a whole, rather than on a device-by-device basis, and it allows for administrative work to be automated and conducted on the fly in response to changing network needs and conditions.The first SDN system to gain traction was the open source OpenFlow protocol, which rolled out in 2011. There are now a number of possible SDN models, each providing significant benefits when compared to traditional networking.To read this article in full, please click here
Cisco is taking the wraps off an overarching architecture it expects will let enterprise customers manage and control its vast arsenal of networking hardware and software for years to come.The Cisco Networking Cloud, unveiled at this week’s Cisco Live! customer event, will involve a broad range of software and cloud system integration and has as its ultimate, if somewhat vague, goal to converge networking platforms over time, culminating in a unified management platform that works on premises or cloud for improved visibility and enterprise automation, according to Jonathan Davidson, executive vice president and general manager of Cisco Networking.To read this article in full, please click here
Microsoft is launching its first cloud region in Italy, the company said on Monday.The new region, which will have three data centers, will be located in Lombardy — an administrative area in Northern Italy whose capital is Milan.Enterprises will be able to start using the new region using Microsoft Azure or Microsoft 365 in the coming weeks, the company said, adding that other services such as Dynamics 365 and Power Platform are expected to follow soon.To read this article in full, please click here
There are always things to wait for on a Linux system—upgrades to complete, processes to finish, coworkers to log in and help resolve problems, status reports to be ready.Fortunately, you don’t have to sit twiddling your thumbs. Instead, you can get Linux to do the waiting and let you know when the work is done. You can do this with a script or you can use the wait command, a bash built-in that watches for processes running in the background to complete.Crafting waiting within scripts
There are many ways to craft waiting within a script. Here’s a simple example of simply waiting for a period of time before moving on to the next task:To read this article in full, please click here
Telecom ministers from at least 18 EU countries have rejected a proposal by network operators to have major technology companies fund the rollout of 5G and broadband.The proposal, put forward by telecom lobbying groups GSMA and ETNO, which represent 160 operators across Europe, says that big tech companies that account for more than 5% of a provider’s peak average internet traffic should help foot the bill for rolling out the services across Europe.The EU launched a consultation on the issue in February 2022. According to a report by Reuters, telecom ministers met with EU Commissioner Thierry Breton to raise their objections, with those who are against the proposal saying there is a lack of analysis to prove the measure would actually work, with some citing concerns that tech companies would end up passing these costs onto the consumer.To read this article in full, please click here
IT organizations that apply artificial intelligence and machine learning (AI/ML) technology to network management are finding that AI/ML can make mistakes, but most organizations believe that AI-driven network management will improve their network operations.To realize these benefits, network managers must find a way to trust these AI solutions despite their foibles. Explainable AI tools could hold the key.A survey finds network engineers are skeptical.
In an Enterprise Management Associates (EMA) survey of 250 IT professionals who use AI/ML technology for network management, 96% said those solutions have produced false or mistaken insights and recommendations. Nearly 65% described these mistakes as somewhat to very rare, according to the recent EMA report “AI-Driven Networks: Leveling Up Network Management.” Overall, 44% percent of respondents said they have strong trust in their AI-driven network-management tools, and another 42% slightly trust these tools.To read this article in full, please click here
Data center developers are under pressure to expand their horizons when it comes to choosing sites for new construction. Land prices, availability of power and bandwidth, and pushbacks from neighbors are among the factors that are driving developers to seek new regions.Northern Virginia, for example, is home to more data centers than any other part of the world, with 275 and more on the way. But the region is running out of space and available power, and residents are running out of patience for these resource-intensive facilities that consume growing amounts of power and water, according to the Washington Post. To read this article in full, please click here