Gartner: Top strategic technology trends for 2024

AI and intelligent application-development trends will impact the enterprise the most in 2024, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.“A lot of the trends are around AI development, but also in protecting the investment that organizations have already made. For example, they’ve invested in machine learning, natural language. And there's a ramp up in software engineering right now where people are building more things because they have access to that data and the development tools are getting better,” said Chris Howard, distinguished vice president analyst and chief of research, during his presentation of this year's trends list at Gartner’s flagship IT Symposium/Xpo conference in Orlando, Florida.To read this article in full, please click here

Tech Bytes: Secure Hybrid Workers Without Compromising User Experience (Sponsored)

Today on the Tech Bytes podcast we talk about techniques to improve user experience and application performance while also securing end users, applications, and devices. Our sponsor is Palo Alto Networks and we’ll talk about how Palo Alto Networks is integrating technologies such as Remote Browser Isolation and application acceleration into Prisma Access, their cloud-delivered security offering.

Tech Bytes: Secure Hybrid Workers Without Compromising User Experience (Sponsored)

Today on the Tech Bytes podcast we talk about techniques to improve user experience and application performance while also securing end users, applications, and devices. Our sponsor is Palo Alto Networks and we’ll talk about how Palo Alto Networks is integrating technologies such as Remote Browser Isolation and application acceleration into Prisma Access, their cloud-delivered security offering.

The post Tech Bytes: Secure Hybrid Workers Without Compromising User Experience (Sponsored) appeared first on Packet Pushers.

Colocation provider plans to use modular nuclear reactors to power its data centers

It’s no secret that data centers are facing power shortage issues, especially in high density areas. One colocation provider has come up with a unique solution: It’s building small nuclear power plants for itself.Data center provider Standard Power specializes in high-performance computing, such as blockchain mining and AI workloads. These kinds of workloads demand a lot of compute power, which equals a very large electric bill.The company was concerned about the ability of local electric providers to deliver the capacity needed for such demanding workloads. So, rather than rely on the local electrical grid, Standard is partnering with NuScale Power Corporation, a maker of small modular nuclear-powered plants, for its Ohio and Pennsylvania facilities.To read this article in full, please click here

Colocation provider plans to use modular nuclear reactors to power its data centers

It’s no secret that data centers are facing power shortage issues, especially in high density areas. One colocation provider has come up with a unique solution: It’s building small nuclear power plants for itself.Data center provider Standard Power specializes in high-performance computing, such as blockchain mining and AI workloads. These kinds of workloads demand a lot of compute power, which equals a very large electric bill.The company was concerned about the ability of local electric providers to deliver the capacity needed for such demanding workloads. So, rather than rely on the local electrical grid, Standard is partnering with NuScale Power Corporation, a maker of small modular nuclear-powered plants, for its Ohio and Pennsylvania facilities.To read this article in full, please click here

Introducing the Project Argus Datacenter-ready Secure Control Module design specification

Introducing the Project Argus Datacenter-ready Secure Control Module design specification
Introducing the Project Argus Datacenter-ready Secure Control Module design specification

Historically, data center servers have used motherboards that included all key components on a single circuit board. The DC-SCM (Datacenter-ready Secure Control Module) decouples server management and security functions from a traditional server motherboard, enabling development of server management and security solutions independent of server architecture. It also provides opportunities for reducing server printed circuit board (PCB) material cost, and allows unified firmware images to be developed.

Today, Cloudflare is announcing that it has partnered with Lenovo to design a DC-SCM for our next-generation servers. The design specification has been published to the OCP (Open Compute Project) contribution database under the name Project Argus.

A brief introduction to baseboard management controllers

A baseboard management controller (BMC) is a specialized processor that can be found in virtually every server product. It allows remote access to the server through a network connection, and provides a rich set of server management features. Some of the commonly used BMC features include server power management, device discovery, sensor monitoring, remote firmware update, system event logging, and error reporting.

In a typical server design, the BMC resides on the server motherboard, along with other key components such as the processor, memory, CPLD and so on. This Continue reading

Displaying dates and times on Linux

Linux provides a lot of ways to display date and time information and not just for the current date and time. You can get information on dates way in the past or in the far future. You can also limit the data provided to just the current weekday or month. This post explains many of these options and provides examples of what you can expect to see.Displaying the current date Typing “date” on the Linux command line results in quite a bit more data than just the date. It also includes the day of the week, the current time and the time zone.$ date Mon Oct 16 11:24:44 AM EDT 2023 The command shown below gives displays the date in the shorthand month/day/year format.To read this article in full, please click here

Displaying dates and times on Linux

Linux provides a lot of ways to display date and time information and not just for the current date and time. You can get information on dates way in the past or in the far future. You can also limit the data provided to just the current weekday or month. This post explains many of these options and provides examples of what you can expect to see.Displaying the current date Typing “date” on the Linux command line results in quite a bit more data than just the date. It also includes the day of the week, the current time and the time zone.$ date Mon Oct 16 11:24:44 AM EDT 2023 The command shown below gives displays the date in the shorthand month/day/year format.To read this article in full, please click here

Network Break 451: Making A Ruckus About Wi-Fi 7; Arista Announces 25G Layer 1 Switches; AWS To Require MFA

This week's Network Break covers a new set of Layer 1 switches from Arista for high-frequency trading, Ruckus announcing a (pre-ratified) Wi-Fi 7 AP, and AWS planning to require multi-factor authentication starting in mid-2024. MGM Resorts says it will take a $100 million hit due to a security breach, the UK finally fines Equifax for a 2017 breach, and Broadcom may have cleared a China hurdle to its VMware acquisition.

Network Break 451: Making A Ruckus About Wi-Fi 7; Arista Announces 25G Layer 1 Switches; AWS To Require MFA

This week's Network Break covers a new set of Layer 1 switches from Arista for high-frequency trading, Ruckus announcing a (pre-ratified) Wi-Fi 7 AP, and AWS planning to require multi-factor authentication starting in mid-2024. MGM Resorts says it will take a $100 million hit due to a security breach, the UK finally fines Equifax for a 2017 breach, and Broadcom may have cleared a China hurdle to its VMware acquisition.

The post Network Break 451: Making A Ruckus About Wi-Fi 7; Arista Announces 25G Layer 1 Switches; AWS To Require MFA appeared first on Packet Pushers.

Worth Reading: AI Risks

Bruce Schneier wrote a thoughtful article on the various perceptions of AI Risks including this gem:

As the science-fiction author Ted Chiang has said, fears about the existential risks of AI are really fears about the threat of uncontrolled capitalism, and dystopias like the paper clip maximizer are just caricatures of every start-up’s business plan.

Enjoy!

RustRadio, and Roast My Rust

I’m learning Rust. And I like playing with software defined radio (SDR). So the natural project to take on to learn Rust is to write a crate for making SDR applications. I call it RustRadio.

I have something that works, and seems pretty OK. But before marking a 1.0.0 release I want to see if I can get some opinions on my use of the Rust language. Both in terms of design, and more clippy-like suggestions.

Hence: Roast My Rust. File a github issue, email me, or tweet at me. Tell me I’m doing it wrong.

  • RustRadio code: https://github.com/ThomasHabets/rustradio
  • RustRadio docs: https://docs.rs/rustradio/latest/rustradio/
  • The first application: https://github.com/ThomasHabets/sparslog

What my priorities are

There are two API surfaces in RustRadio; the Block API (for writing blocks), and the Application API (for writing applications that use blocks). I want them to be good, and future proof, so that I don’t have to change every block and every application, after adding a feature or improving the API.

The blocks will need to be thread safe, even though the scheduler is currently single threaded.

For the streams between blocks I’ll eventually want to make a more fancy, but unsafe circular Continue reading

Malicious “RedAlert – Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information

Malicious “RedAlert - Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information
Malicious “RedAlert - Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information

On October 13, 2023, Cloudflare’s Cloudforce One Threat Operations Team became aware of a website hosting a Google Android Application (APK) impersonating the legitimate RedAlert - Rocket Alerts application (https://play.google.com/store/apps/details?id=com.red.alert&hl=en&pli=1).  More than 5,000 rockets have been launched into Israel since the attacks from Hamas began on October 7th 2023.  RedAlert - Rocket Alerts developed by Elad Nava allows individuals to receive timely and precise alerts about incoming airstrikes. Many people living in Israel rely on these alerts to seek safety - a service which has become increasingly important given the newest escalations in the region.

Applications alerting of incoming airstrikes have become targets as only days ago, Pro-Palestinian hacktivist group AnonGhost exploited a vulnerability in another application, “Red Alert: Israel” by Kobi Snir. (https://cybernews.com/cyber-war/israel-redalert-breached-anonghost-hamas/) Their exploit allowed them to intercept requests, expose servers and APIs, and send fake alerts to some app users, including a message that a “nuclear bomb is coming”. AnonGhost also claimed they attacked other rocket alert applications, including RedAlert by Elad Nava. As of October 11, 2023, the RedAlert app was reportedly functioning normally.

In the last two days, a new malicious website (hxxps://redalerts[.]me) has Continue reading

Everyone Is Chasing What Nvidia Already Has

Transitions in the datacenter take time.

It took Unix servers a decade, from 1985 through 1995, to supplant proprietary minicomputers and a lot of mainframe capacity that would have otherwise been bought.

The post Everyone Is Chasing What Nvidia Already Has first appeared on The Next Platform.

Everyone Is Chasing What Nvidia Already Has was written by Timothy Prickett Morgan at The Next Platform.

Heavy Networking 705: Evolving From Python To Platforms For Network Automation (Sponsored)

Today on Heavy Networking we talk about how to get from a handful of Python scripts to a network automation platform that enables a self-service environment and incorporates the checks and governance required to make sure the automation doesn't blow up the network. Our sponsor today is Itential. Itential offers just such a network automation platform. We talk about how Itential makes it happen, including simple and more complex examples.

Heavy Networking 705: Evolving From Python To Platforms For Network Automation (Sponsored)

Today on Heavy Networking we talk about how to get from a handful of Python scripts to a network automation platform that enables a self-service environment and incorporates the checks and governance required to make sure the automation doesn't blow up the network. Our sponsor today is Itential. Itential offers just such a network automation platform. We talk about how Itential makes it happen, including simple and more complex examples.

The post Heavy Networking 705: Evolving From Python To Platforms For Network Automation (Sponsored) appeared first on Packet Pushers.