Beyond the Traveling Salesman: Escape Routes Get a Quantum Overhaul

When it comes to natural disasters, every second counts—and the clock may just be ticking a little slower following a collaboration between Terra Quantum and Honda Research Institute Europe (HRI-EU).

The post Beyond the Traveling Salesman: Escape Routes Get a Quantum Overhaul first appeared on The Next Platform.

Beyond the Traveling Salesman: Escape Routes Get a Quantum Overhaul was written by Nicole Hemsoth Prickett at The Next Platform.

Cisco significantly bolsters security portfolio with $28B Splunk buy

Looking to significantly reinforce its security software portfolio, Cisco has struck a $28 billion cash deal to acquire enterprise and cloud protection company Splunk.Founded in 2003, Splunk’s software platform is known for its wide-reaching ability to search, monitor and analyze data from a variety of systems. Network security teams can use this information to gain better visibility into and gather insights about network traffic, firewalls, intrusion detection systems (IDSes), intrusion prevention systems (IPSes), and security information and event management (SIEM) systems, from on premise and or its cloud-based package, according to Splunk.To read this article in full, please click here

Cisco significantly bolsters security portfolio with $28B Splunk buy

Looking to significantly reinforce its security software portfolio, Cisco has struck a $28 billion cash deal to acquire enterprise and cloud protection company Splunk.Founded in 2003, Splunk’s software platform is known for its wide-reaching ability to search, monitor and analyze data from a variety of systems. Network security teams can use this information to gain better visibility into and gather insights about network traffic, firewalls, intrusion detection systems (IDSes), intrusion prevention systems (IPSes), and security information and event management (SIEM) systems, from on premise and or its cloud-based package, according to Splunk.To read this article in full, please click here

The Race for the First Gordon Bell Climate Supercomputing Prize

At SC23 in November, the Association for Computing Machinery (ACM) will give out its first-ever ACM Gordon Bell Prize for Climate Modelling at a ceremony in Denver.

The post The Race for the First Gordon Bell Climate Supercomputing Prize first appeared on The Next Platform.

The Race for the First Gordon Bell Climate Supercomputing Prize was written by Nicole Hemsoth Prickett at The Next Platform.

Hub and Spoke: DoD Splits $238 Million Across Eight Semiconductor Centers

The U.S. Department of Defense has announced a slew of states are set to split $238 million in funding from the “Creating Helpful Incentives to Produce Semiconductors (CHIPS) and Science Act.”

The post Hub and Spoke: DoD Splits $238 Million Across Eight Semiconductor Centers first appeared on The Next Platform.

Hub and Spoke: DoD Splits $238 Million Across Eight Semiconductor Centers was written by Nicole Hemsoth Prickett at The Next Platform.

Cloudflare Email Security now works with CrowdStrike Falcon LogScale

Cloudflare Email Security now works with CrowdStrike Falcon LogScale
Cloudflare Email Security now works with CrowdStrike Falcon LogScale

We are excited to announce an extended partnership between CrowdStrike and Cloudflare to bring together Cloudflare Email Security and CrowdStrike Falcon® LogScale. With this integration, joint customers who have both Falcon LogScale and Cloudflare Email Security can now send detection data to be ingested and displayed within their Falcon LogScale dashboard.

What is CrowdStrike Falcon LogScale?

CrowdStrike Falcon LogScale enables organizations to ingest, aggregate and analyze massive volumes of streaming log data from a wide array of sources at petabyte scale. It offers search and visualization capabilities, enabling users to easily query and explore their log data to gain valuable insights and identify security threats or anomalies.

Falcon LogScale helps customers by providing:

Log Ingestion It supports the collection of logs from diverse sources and can handle high volumes of log data in real time.

Real-Time Search Users can perform fast searches across their log data, enabling quick detection and investigation of security incidents or operational issues.

Dashboards and Visualizations Falcon LogScale offers customizable dashboards and visualizations to help teams gain insights from their log data.

All of these capabilities enable proactive threat hunting by leveraging advanced analytics. It helps security teams identify potential threats, detect anomalies, and quickly remediate Continue reading

How network security can save security dollars

For the last twelve years, 100% of CIOs have said that they expect to spend more on IT security, making security the only category that just keeps on absorbing investment. Every year in the last three years, over 80% of enterprises have said that their IT security still needed improvement. So, like death and taxes, is security spending growth inevitable? If we keep on the way we have, it sure seems like it. But what might change?Let’s start with what’s important to users. External threats, meaning hacking, are a problem for every CIO. Internal threats, from badly behaving employees, are a problem for three out of four. Data theft is a universal fear, and malware that interferes with applications and operations is an important problem for over 90% of CIOs. As far as approaches or targets are concerned, 100% say access security on applications and data is essential and so is regular malware scanning. If you ask CIOs to pick a single thing they think is essential for IT security, it’s access security.To read this article in full, please click here

How network security can save security dollars

For the last twelve years, 100% of CIOs have said that they expect to spend more on IT security, making security the only category that just keeps on absorbing investment. Every year in the last three years, over 80% of enterprises have said that their IT security still needed improvement. So, like death and taxes, is security spending growth inevitable? If we keep on the way we have, it sure seems like it. But what might change?Let’s start with what’s important to users. External threats, meaning hacking, are a problem for every CIO. Internal threats, from badly behaving employees, are a problem for three out of four. Data theft is a universal fear, and malware that interferes with applications and operations is an important problem for over 90% of CIOs. As far as approaches or targets are concerned, 100% say access security on applications and data is essential and so is regular malware scanning. If you ask CIOs to pick a single thing they think is essential for IT security, it’s access security.To read this article in full, please click here

HPE Aruba intros Wi-Fi 6 access point, stackable switch for SMBs

HPE's Aruba networking division announced a new access point and switch that are designed to enable faster speeds, increased capacity, and strengthened security for small and medium businesses that are grappling with bandwidth-intensive cloud applications.The Aruba Instant On AP22D is a Wi-Fi 6 access point, and the Aruba Instant On 1960 is a stackable switch with 2.5GB port capacity. Both are designed to optimize network performance for employees and customers.The combination is ideal for SMBs with high data demands and growing traffic. The two new products work together to provide increased throughput and improved security with minimal effort, according to HPE Aruba Networking.To read this article in full, please click here

BGP Labs: Protect EBGP Sessions

I published another BGP labs exercise a few days ago. You can use it to practice EBGP session protection, including Generalized TTL Security Mechanism (GTSM) and TCP MD5 checksums1.

I would strongly recommend to run BGP labs with netlab, but if you like extra work, feel free to use any system you like including physical hardware.


  1. I would love to add TCP-AO to the mix, but it’s not yet supported by the Linux kernel, and so cannot be used in Cumulus Linux or FRR containers. ↩︎

Seismic Data Processing on Waferscale Has Gordon Bell Prize Potential

Scientists from KAUST and engineers from Cerebras Systems have fine-tuned an existing algorithm, Tile Low-Rank Matrix-Vector Multiplications (TLR-MVM), to improve the speed and accuracy of seismic data processing.

The post Seismic Data Processing on Waferscale Has Gordon Bell Prize Potential first appeared on The Next Platform.

Seismic Data Processing on Waferscale Has Gordon Bell Prize Potential was written by Nicole Hemsoth Prickett at The Next Platform.

SambaNova Tackles Generative AI With New Chip And New Approach

If you have the entire corpus of the Internet scrubbed of nonsense plus whatever else you can scrounge up in whatever language all put into the right format so you can chew on that data one token at a time with trillions of parameters of interconnections between those tokens to build a large language model for generative AI applications, you have an enormous problem.

The post SambaNova Tackles Generative AI With New Chip And New Approach first appeared on The Next Platform.

SambaNova Tackles Generative AI With New Chip And New Approach was written by Timothy Prickett Morgan at The Next Platform.

New chip designs on display at Intel Innovation 2023

Intel took the wraps off a number of new chip designs during its Innovation 2023 event in San Jose, Calif. Among the highlights is a preview of fifth-generation Xeon processors, which gain performance improvements and faster memory while using the same amount of power as the current generation.Scheduled to launch beginning December 14 and going into 2024, the fifth generation of Xeon processors splits the structure into two different core designs: the P (for performance) core, codenamed Granite Rapids, and the E (for efficient) core, codenamed Sierra Forest. P cores are high-performance cores for maximum computing power, while E cores are smaller, much less power-hungry, and designed for simpler tasks.To read this article in full, please click here

New chip designs on display at Intel Innovation 2023

Intel took the wraps off a number of new chip designs during its Innovation 2023 event in San Jose, Calif. Among the highlights is a preview of fifth-generation Xeon processors, which gain performance improvements and faster memory while using the same amount of power as the current generation.Scheduled to launch beginning December 14 and going into 2024, the fifth generation of Xeon processors splits the structure into two different core designs: the P (for performance) core, codenamed Granite Rapids, and the E (for efficient) core, codenamed Sierra Forest. P cores are high-performance cores for maximum computing power, while E cores are smaller, much less power-hungry, and designed for simpler tasks.To read this article in full, please click here

New chip designs on display at Intel Innovation 2023

Intel took the wraps off a number of new chip designs during its Innovation 2023 event in San Jose, Calif. Among the highlights is a preview of fifth-generation Xeon processors, which gain performance improvements and faster memory while using the same amount of power as the current generation.Scheduled to launch beginning December 14 and going into 2024, the fifth generation of Xeon processors splits the structure into two different core designs: the P (for performance) core, codenamed Granite Rapids, and the E (for efficient) core, codenamed Sierra Forest. P cores are high-performance cores for maximum computing power, while E cores are smaller, much less power-hungry, and designed for simpler tasks.To read this article in full, please click here

Using curl and wget commands to download pages from web sites

One of the most versatile tools for collecting data from a server is curl. The “url” portion of the name properly suggests that the command is built to locate data through the URL (uniform resource locater) that you provide. And it doesn’t just communicate with web servers. It supports a wide variety of protocols. This includes HTTP, HTTPS, FTP, FTPS, SCP, SFTP and more. The wget command, though similar in some ways to curl, primarily supports HTTP and FTP protocols.Using the curl command You might use the curl command to: Download files from the internet Run tests to ensure that the remote server is doing what is expected Do some debugging on various problems Log errors for later analysis Back up important files from the server Probably the most obvious thing to do with the curl command is to download a page from a web site for review on the command line. To do this, just enter “curl” followed by the URL of the web site like this (the content below is truncated):To read this article in full, please click here