Hub and Spoke: DoD Splits $238 Million Across Eight Semiconductor Centers

The U.S. Department of Defense has announced a slew of states are set to split $238 million in funding from the “Creating Helpful Incentives to Produce Semiconductors (CHIPS) and Science Act.”

The post Hub and Spoke: DoD Splits $238 Million Across Eight Semiconductor Centers first appeared on The Next Platform.

Hub and Spoke: DoD Splits $238 Million Across Eight Semiconductor Centers was written by Nicole Hemsoth Prickett at The Next Platform.

Cloudflare Email Security now works with CrowdStrike Falcon LogScale

Cloudflare Email Security now works with CrowdStrike Falcon LogScale
Cloudflare Email Security now works with CrowdStrike Falcon LogScale

We are excited to announce an extended partnership between CrowdStrike and Cloudflare to bring together Cloudflare Email Security and CrowdStrike Falcon® LogScale. With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard.

What is CrowdStrike Falcon LogScale?

CrowdStrike Falcon LogScale enables organizations to ingest, aggregate and analyze massive volumes of streaming log data from a wide array of sources at petabyte scale. It offers search and visualization capabilities, enabling users to easily query and explore their log data to gain valuable insights and identify security threats or anomalies.

Falcon LogScale helps customers by providing:

Log Ingestion It supports the collection of logs from diverse sources and can handle high volumes of log data in real time.

Real-Time Search Users can perform fast searches across their log data, enabling quick detection and investigation of security incidents or operational issues.

Dashboards and Visualizations Falcon LogScale offers customizable dashboards and visualizations to help teams gain insights from their log data.

All of these capabilities enable proactive threat hunting by leveraging advanced analytics. It helps security teams identify potential threats, detect anomalies, and quickly remediate Continue reading

How network security can save security dollars

For the last twelve years, 100% of CIOs have said that they expect to spend more on IT security, making security the only category that just keeps on absorbing investment. Every year in the last three years, over 80% of enterprises have said that their IT security still needed improvement. So, like death and taxes, is security spending growth inevitable? If we keep on the way we have, it sure seems like it. But what might change?Let’s start with what’s important to users. External threats, meaning hacking, are a problem for every CIO. Internal threats, from badly behaving employees, are a problem for three out of four. Data theft is a universal fear, and malware that interferes with applications and operations is an important problem for over 90% of CIOs. As far as approaches or targets are concerned, 100% say access security on applications and data is essential and so is regular malware scanning. If you ask CIOs to pick a single thing they think is essential for IT security, it’s access security.To read this article in full, please click here

How network security can save security dollars

For the last twelve years, 100% of CIOs have said that they expect to spend more on IT security, making security the only category that just keeps on absorbing investment. Every year in the last three years, over 80% of enterprises have said that their IT security still needed improvement. So, like death and taxes, is security spending growth inevitable? If we keep on the way we have, it sure seems like it. But what might change?Let’s start with what’s important to users. External threats, meaning hacking, are a problem for every CIO. Internal threats, from badly behaving employees, are a problem for three out of four. Data theft is a universal fear, and malware that interferes with applications and operations is an important problem for over 90% of CIOs. As far as approaches or targets are concerned, 100% say access security on applications and data is essential and so is regular malware scanning. If you ask CIOs to pick a single thing they think is essential for IT security, it’s access security.To read this article in full, please click here

HPE Aruba intros Wi-Fi 6 access point, stackable switch for SMBs

HPE's Aruba networking division announced a new access point and switch that are designed to enable faster speeds, increased capacity, and strengthened security for small and medium businesses that are grappling with bandwidth-intensive cloud applications.The Aruba Instant On AP22D is a Wi-Fi 6 access point, and the Aruba Instant On 1960 is a stackable switch with 2.5GB port capacity. Both are designed to optimize network performance for employees and customers.The combination is ideal for SMBs with high data demands and growing traffic. The two new products work together to provide increased throughput and improved security with minimal effort, according to HPE Aruba Networking.To read this article in full, please click here

BGP Labs: Protect EBGP Sessions

I published another BGP labs exercise a few days ago. You can use it to practice EBGP session protection, including Generalized TTL Security Mechanism (GTSM) and TCP MD5 checksums1.

I would strongly recommend to run BGP labs with netlab, but if you like extra work, feel free to use any system you like including physical hardware.


  1. I would love to add TCP-AO to the mix, but it’s not yet supported by the Linux kernel, and so cannot be used in Cumulus Linux or FRR containers. ↩︎

Seismic Data Processing on Waferscale Has Gordon Bell Prize Potential

Scientists from KAUST and engineers from Cerebras Systems have fine-tuned an existing algorithm, Tile Low-Rank Matrix-Vector Multiplications (TLR-MVM), to improve the speed and accuracy of seismic data processing.

The post Seismic Data Processing on Waferscale Has Gordon Bell Prize Potential first appeared on The Next Platform.

Seismic Data Processing on Waferscale Has Gordon Bell Prize Potential was written by Nicole Hemsoth Prickett at The Next Platform.

SambaNova Tackles Generative AI With New Chip And New Approach

If you have the entire corpus of the Internet scrubbed of nonsense plus whatever else you can scrounge up in whatever language all put into the right format so you can chew on that data one token at a time with trillions of parameters of interconnections between those tokens to build a large language model for generative AI applications, you have an enormous problem.

The post SambaNova Tackles Generative AI With New Chip And New Approach first appeared on The Next Platform.

SambaNova Tackles Generative AI With New Chip And New Approach was written by Timothy Prickett Morgan at The Next Platform.

New chip designs on display at Intel Innovation 2023

Intel took the wraps off a number of new chip designs during its Innovation 2023 event in San Jose, Calif. Among the highlights is a preview of fifth-generation Xeon processors, which gain performance improvements and faster memory while using the same amount of power as the current generation.Scheduled to launch beginning December 14 and going into 2024, the fifth generation of Xeon processors splits the structure into two different core designs: the P (for performance) core, codenamed Granite Rapids, and the E (for efficient) core, codenamed Sierra Forest. P cores are high-performance cores for maximum computing power, while E cores are smaller, much less power-hungry, and designed for simpler tasks.To read this article in full, please click here

New chip designs on display at Intel Innovation 2023

Intel took the wraps off a number of new chip designs during its Innovation 2023 event in San Jose, Calif. Among the highlights is a preview of fifth-generation Xeon processors, which gain performance improvements and faster memory while using the same amount of power as the current generation.Scheduled to launch beginning December 14 and going into 2024, the fifth generation of Xeon processors splits the structure into two different core designs: the P (for performance) core, codenamed Granite Rapids, and the E (for efficient) core, codenamed Sierra Forest. P cores are high-performance cores for maximum computing power, while E cores are smaller, much less power-hungry, and designed for simpler tasks.To read this article in full, please click here

New chip designs on display at Intel Innovation 2023

Intel took the wraps off a number of new chip designs during its Innovation 2023 event in San Jose, Calif. Among the highlights is a preview of fifth-generation Xeon processors, which gain performance improvements and faster memory while using the same amount of power as the current generation.Scheduled to launch beginning December 14 and going into 2024, the fifth generation of Xeon processors splits the structure into two different core designs: the P (for performance) core, codenamed Granite Rapids, and the E (for efficient) core, codenamed Sierra Forest. P cores are high-performance cores for maximum computing power, while E cores are smaller, much less power-hungry, and designed for simpler tasks.To read this article in full, please click here

Using curl and wget commands to download pages from web sites

One of the most versatile tools for collecting data from a server is curl. The “url” portion of the name properly suggests that the command is built to locate data through the URL (uniform resource locater) that you provide. And it doesn’t just communicate with web servers. It supports a wide variety of protocols. This includes HTTP, HTTPS, FTP, FTPS, SCP, SFTP and more. The wget command, though similar in some ways to curl, primarily supports HTTP and FTP protocols.Using the curl command You might use the curl command to: Download files from the internet Run tests to ensure that the remote server is doing what is expected Do some debugging on various problems Log errors for later analysis Back up important files from the server Probably the most obvious thing to do with the curl command is to download a page from a web site for review on the command line. To do this, just enter “curl” followed by the URL of the web site like this (the content below is truncated):To read this article in full, please click here

Using curl and wget commands to download pages from web sites

One of the most versatile tools for collecting data from a server is curl. The “url” portion of the name properly suggests that the command is built to locate data through the URL (uniform resource locater) that you provide. And it doesn’t just communicate with web servers. It supports a wide variety of protocols. This includes HTTP, HTTPS, FTP, FTPS, SCP, SFTP and more. The wget command, though similar in some ways to curl, primarily supports HTTP and FTP protocols.Using the curl command You might use the curl command to: Download files from the internet Run tests to ensure that the remote server is doing what is expected Do some debugging on various problems Log errors for later analysis Back up important files from the server Probably the most obvious thing to do with the curl command is to download a page from a web site for review on the command line. To do this, just enter “curl” followed by the URL of the web site like this (the content below is truncated):To read this article in full, please click here

Using curl and wget commands to download pages from web sites

One of the most versatile tools for collecting data from a server is curl. The “url” portion of the name properly suggests that the command is built to locate data through the URL (uniform resource locater) that you provide. And it doesn’t just communicate with web servers. It supports a wide variety of protocols. This includes HTTP, HTTPS, FTP, FTPS, SCP, SFTP and more. The wget command, though similar in some ways to curl, primarily supports HTTP and FTP protocols.Using the curl command You might use the curl command to: Download files from the internet Run tests to ensure that the remote server is doing what is expected Do some debugging on various problems Log errors for later analysis Back up important files from the server Probably the most obvious thing to do with the curl command is to download a page from a web site for review on the command line. To do this, just enter “curl” followed by the URL of the web site like this (the content below is truncated):To read this article in full, please click here

AMD introduces Epyc server processors for the edge

AMD has formally launched its new Epyc 8004 Series processors, the fourth generation of server processors developed under the Siena codename. They're specifically built for energy-efficient and differentiated platforms such as the intelligent edge, as well as for data center, cloud services, storage and other applications.The 8004 product family ranges from eight cores to 64 cores. The 8004 core design is known as Zen 4c, as in compact. It has fewer cores, fewer PCIe lanes and fewer memory channels, but the payoff is in much lower power requirements.In an era of ever-increasing power consumption, the 8004 series is going in the opposite direction. The product family has thermal design power (TDP) measurements ranging from about 70 to 225 watts. That’s more along the lines of a desktop processor than a server processor, which can often be double that number.To read this article in full, please click here

AMD introduces Epyc server processors for the edge

AMD has formally launched its new Epyc 8004 Series processors, the fourth generation of server processors developed under the Siena codename. They're specifically built for energy-efficient and differentiated platforms such as the intelligent edge, as well as for data center, cloud services, storage and other applications.The 8004 product family ranges from eight cores to 64 cores. The 8004 core design is known as Zen 4c, as in compact. It has fewer cores, fewer PCIe lanes and fewer memory channels, but the payoff is in much lower power requirements.In an era of ever-increasing power consumption, the 8004 series is going in the opposite direction. The product family has thermal design power (TDP) measurements ranging from about 70 to 225 watts. That’s more along the lines of a desktop processor than a server processor, which can often be double that number.To read this article in full, please click here

AMD introduces Epyc server processors for the edge

AMD has formally launched its new Epyc 8004 Series processors, the fourth generation of server processors developed under the Siena codename. They're specifically built for energy-efficient and differentiated platforms such as the intelligent edge, as well as for data center, cloud services, storage and other applications.The 8004 product family ranges from eight cores to 64 cores. The 8004 core design is known as Zen 4c, as in compact. It has fewer cores, fewer PCIe lanes and fewer memory channels, but the payoff is in much lower power requirements.In an era of ever-increasing power consumption, the 8004 series is going in the opposite direction. The product family has thermal design power (TDP) measurements ranging from about 70 to 225 watts. That’s more along the lines of a desktop processor than a server processor, which can often be double that number.To read this article in full, please click here