On today's Heavy Wireless episode, Keith Parsons speaks with UMass Amherst CTO Jim Mileski on the history of Wi-Fi at the school. They discuss initial challenges of rolling out wireless, strategic placements of access points, ensuring a good student experience across a myriad of devices, and more. They also discuss how Jim and his team tested their incumbent vendor against a possible replacement, how the replacement won out, and how the transition is going.
Liquid cooling in data centers is gaining greater interest because has clear advantages over air cooling, enabling greater server density per rack and higher compute performance.
Cloud computing, hybrid work, and remote connectivity are amplifying the need for networking and security teams to be in lockstep. Increasingly, enterprises are considering consolidating the two groups – or at least boosting collaboration between teams, according to research from Cato Networks.In a recent survey of 1,694 IT leaders worldwide, 44% of respondents said networking and security teams “must work together,” and another 30% said they “must have shared processes.” Another 8% said they’re working to create one networking and security group.The goal of shared processes could be a hefty challenge for some organizations. In the Cato Networks survey, 12% of respondents reported that their networking and security teams either have “turf wars or struggle working together,” and another 34% said they “occasionally have problems working together.” The remaining 54% reported that the two teams work well together now.To read this article in full, please click here
Cloud computing, hybrid work, and remote connectivity are amplifying the need for networking and security teams to be in lockstep. Increasingly, enterprises are considering consolidating the two groups – or at least boosting collaboration between teams, according to research from Cato Networks.In a recent survey of 1,694 IT leaders worldwide, 44% of respondents said networking and security teams “must work together,” and another 30% said they “must have shared processes.” Another 8% said they’re working to create one networking and security group.The goal of shared processes could be a hefty challenge for some organizations. In the Cato Networks survey, 12% of respondents reported that their networking and security teams either have “turf wars or struggle working together,” and another 34% said they “occasionally have problems working together.” The remaining 54% reported that the two teams work well together now.To read this article in full, please click here
It all started with the following observation by Minh Ha left as a comment to my previous BGP session security blog post:
I’d think it’d be obvious for BGP routers to only accept incoming sessions from configured BGP neighbors, right? Because BGP is the most critical infrastructure, the backbone of the Internet, why would you want your router to accept incoming session from anyone but KNOWN sources?
Following my “opinions are good, facts are better” mantra, I decided to run a few tests before opinionating1.
It all started with the following observation by Minh Ha left as a comment to my previous BGP session security blog post:
I’d think it’d be obvious for BGP routers to only accept incoming sessions from configured BGP neighbors, right? Because BGP is the most critical infrastructure, the backbone of the Internet, why would you want your router to accept incoming session from anyone but KNOWN sources?
Following my “opinions are good, facts are better” mantra, I decided to run a few tests before opinionating1.
AI and intelligent application-development trends will impact the enterprise the most in 2024, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.“A lot of the trends are around AI development, but also in protecting the investment that organizations have already made. For example, they’ve invested in machine learning, natural language. And there's a ramp up in software engineering right now where people are building more things because they have access to that data and the development tools are getting better,” said Chris Howard, distinguished vice president analyst and chief of research, during his presentation of this year's trends list at Gartner’s flagship IT Symposium/Xpo conference in Orlando, Florida.To read this article in full, please click here
AI and intelligent application-development trends will impact the enterprise the most in 2024, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.“A lot of the trends are around AI development, but also in protecting the investment that organizations have already made. For example, they’ve invested in machine learning, natural language. And there's a ramp up in software engineering right now where people are building more things because they have access to that data and the development tools are getting better,” said Chris Howard, distinguished vice president analyst and chief of research, during his presentation of this year's trends list at Gartner’s flagship IT Symposium/Xpo conference in Orlando, Florida.To read this article in full, please click here
AI and intelligent application-development trends will impact the enterprise the most in 2024, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.“A lot of the trends are around AI development, but also in protecting the investment that organizations have already made. For example, they’ve invested in machine learning, natural language. And there's a ramp up in software engineering right now where people are building more things because they have access to that data and the development tools are getting better,” said Chris Howard, distinguished vice president analyst and chief of research, during his presentation of this year's trends list at Gartner’s flagship IT Symposium/Xpo conference in Orlando, Florida.To read this article in full, please click here
.In a cloud computing world, the right protection strategies and solutions must span the entire digital infrastructure, dynamically scale as application resources grows, and automatically adapt to new infrastructure requirements.
Today on the Tech Bytes podcast we talk about techniques to improve user experience and application performance while also securing end users, applications, and devices. Our sponsor is Palo Alto Networks and we’ll talk about how Palo Alto Networks is integrating technologies such as Remote Browser Isolation and application acceleration into Prisma Access, their cloud-delivered security offering.
Today on the Tech Bytes podcast we talk about techniques to improve user experience and application performance while also securing end users, applications, and devices. Our sponsor is Palo Alto Networks and we’ll talk about how Palo Alto Networks is integrating technologies such as Remote Browser Isolation and application acceleration into Prisma Access, their cloud-delivered security offering.
It’s no secret that data centers are facing power shortage issues, especially in high density areas. One colocation provider has come up with a unique solution: It’s building small nuclear power plants for itself.Data center provider Standard Power specializes in high-performance computing, such as blockchain mining and AI workloads. These kinds of workloads demand a lot of compute power, which equals a very large electric bill.The company was concerned about the ability of local electric providers to deliver the capacity needed for such demanding workloads. So, rather than rely on the local electrical grid, Standard is partnering with NuScale Power Corporation, a maker of small modular nuclear-powered plants, for its Ohio and Pennsylvania facilities.To read this article in full, please click here
It’s no secret that data centers are facing power shortage issues, especially in high density areas. One colocation provider has come up with a unique solution: It’s building small nuclear power plants for itself.Data center provider Standard Power specializes in high-performance computing, such as blockchain mining and AI workloads. These kinds of workloads demand a lot of compute power, which equals a very large electric bill.The company was concerned about the ability of local electric providers to deliver the capacity needed for such demanding workloads. So, rather than rely on the local electrical grid, Standard is partnering with NuScale Power Corporation, a maker of small modular nuclear-powered plants, for its Ohio and Pennsylvania facilities.To read this article in full, please click here
Historically, data center servers have used motherboards that included all key components on a single circuit board. The DC-SCM (Datacenter-ready Secure Control Module) decouples server management and security functions from a traditional server motherboard, enabling development of server management and security solutions independent of server architecture. It also provides opportunities for reducing server printed circuit board (PCB) material cost, and allows unified firmware images to be developed.
Today, Cloudflare is announcing that it has partnered with Lenovo to design a DC-SCM for our next-generation servers. The design specification has been published to the OCP (Open Compute Project) contribution database under the name Project Argus.
A brief introduction to baseboard management controllers
A baseboard management controller (BMC) is a specialized processor that can be found in virtually every server product. It allows remote access to the server through a network connection, and provides a rich set of server management features. Some of the commonly used BMC features include server power management, device discovery, sensor monitoring, remote firmware update, system event logging, and error reporting.
In a typical server design, the BMC resides on the server motherboard, along with other key components such as the processor, memory, CPLD and so on. This Continue reading
Linux provides a lot of ways to display date and time information and not just for the current date and time. You can get information on dates way in the past or in the far future. You can also limit the data provided to just the current weekday or month. This post explains many of these options and provides examples of what you can expect to see.Displaying the current date
Typing “date” on the Linux command line results in quite a bit more data than just the date. It also includes the day of the week, the current time and the time zone.$ date
Mon Oct 16 11:24:44 AM EDT 2023
The command shown below gives displays the date in the shorthand month/day/year format.To read this article in full, please click here
Linux provides a lot of ways to display date and time information and not just for the current date and time. You can get information on dates way in the past or in the far future. You can also limit the data provided to just the current weekday or month. This post explains many of these options and provides examples of what you can expect to see.Displaying the current date
Typing “date” on the Linux command line results in quite a bit more data than just the date. It also includes the day of the week, the current time and the time zone.$ date
Mon Oct 16 11:24:44 AM EDT 2023
The command shown below gives displays the date in the shorthand month/day/year format.To read this article in full, please click here
This week's Network Break covers a new set of Layer 1 switches from Arista for high-frequency trading, Ruckus announcing a (pre-ratified) Wi-Fi 7 AP, and AWS planning to require multi-factor authentication starting in mid-2024. MGM Resorts says it will take a $100 million hit due to a security breach, the UK finally fines Equifax for a 2017 breach, and Broadcom may have cleared a China hurdle to its VMware acquisition.
This week's Network Break covers a new set of Layer 1 switches from Arista for high-frequency trading, Ruckus announcing a (pre-ratified) Wi-Fi 7 AP, and AWS planning to require multi-factor authentication starting in mid-2024. MGM Resorts says it will take a $100 million hit due to a security breach, the UK finally fines Equifax for a 2017 breach, and Broadcom may have cleared a China hurdle to its VMware acquisition.
As the science-fiction author Ted Chiang has said, fears about the existential risks of AI are really fears about the threat of uncontrolled capitalism, and dystopias like the paper clip maximizer are just caricatures of every start-up’s business plan.