Are Containers and Serverless Computing Just Misunderstood?
Containers are expected to see an adoption surge next year.
Containers are expected to see an adoption surge next year.
It’s only four days since we were blessed with news of the KRACK vulnerability in WPA2, so what have we learned now that we’ve had some time to dig into the problem?
In terms of patching wireless access points the good news is that most of the enterprise vendors at least are on the ball and have either released patches, have them in testing, or have at least promised them in the near future. While one of the primary victims of KRACK in these devices is 802.11r (Fast Roaming) which is not likely to be used in most home environments, it’s more common to see repeater or mesh functionality in the home, and because the AP acts as a wireless client in these cases, it is susceptible to the vulnerability. So if you just have a single AP in the home, chances are that updating the firmware because of KRACK is not that urgent. That’s probably a good thing given the number of wireless access points embedded in routers managed by internet providers, running on old and unsupported hardware, or created by vendors who are no longer in business.
The clients are where Continue reading
Cloud security threats are "moving up the stack."
GE partners with Apple on IoT; Intel invests $60 million in 15 technology startups; Alibaba works with Red Hat.
Company is accelerating its $10 billion cost restructuring plan.
Cable operators frown upon questions about a conflict between CCAP and Remote PHY.
The next serious update will include AI and edge computing support.
Over the past few days we learnt about a new attack that posed a serious weakness in the encryption protocol used to secure all modern Wi-Fi networks. The KRACK Attack effectively allows interception of traffic on wireless networks secured by the WPA2 protocol. Whilst it is possible to backward patch implementations to mitigate this vulnerability, security updates are rarely installed universally.
Prior to this vulnerability, there were no shortage of wireless networks that were vulnerable to interception attacks. Some wireless networks continue to use a dated security protocol (called WEP) that is demonstrably "totally insecure" 1; other wireless networks, such as those in coffee shops and airports, remain completely open and do not authenticate users. Once an attacker gains access to a network, they can act as a Man-in-the-Middle to intercept connections over the network (using tactics known as ARP Cache Poisoning and DNS Hijacking). And yes, these interception tactics can easily be deployed against wired networks where someone gains access to an ethernet port.
With all this known, it is beyond doubt that it is simply not secure to blindly trust the medium that connects your users to the internet. HTTPS was created to allow HTTP traffic to Continue reading
Intel’s multi-year effort to expand its reach beyond its PC and server processor roots has taken the chip maker down multiple paths, some of which have ended in dead ends.
The most memorable of those was the billion-plus-dollar attempt to challenge ARM Holdings and its various partners – such as Qualcomm and Samsung – in making chips for mobile devices. Under current CEO Brian Krzanich, Intel has retrenched, dropping its mobile device efforts and pulling back from wearables, and instead is pushing to provide the foundational technologies that will underpin the trends that will continue to shape the industry, from …
Intel Pumps Funds Into Data Processing In All Shapes And Sizes was written by Jeffrey Burt at The Next Platform.
Hey, it's HighScalability time:
Cassini's last image of Saturn, stitched together from 11 color composites, each a stack of three images taken in red, green, and blue channels. (Jason Major)
If you like this sort of Stuff then please support me on Patreon.
![]() |
Fig 1.1- Standard Firewall Zones |
The French MP and Fields medal award winner, Cédric Villani, officially auditioned Constance Bommelaer de Leusse, the Internet Society’s Senior Director, Global Internet Policy, last Monday on national strategies for the future of artificial intelligence (AI). In addition, the Internet Society was asked to send written comments, which are reprinted here.
“Practical AI successes, computational programs that actually achieved intelligent behavior, were soon assimilated into whatever application domain they were found to be useful […] Once in use, successful AI systems were simply considered valuable automatic helpers.” Pamela McCorduck, Machines Who Think: A Personal Inquiry into the History and Prospects of Artificial Intelligence |
AI is not new, nor is it magic. It’s about algorithms.
“Intelligent” technology is already everywhere – such as spam filters or systems used by banks to monitor unusual activity and detect fraud – and it has been for some time. What is new and creating a lot of interest from governments stems from recent successes in a subfield of AI known as “machine learning,” which has spurred the rapid deployment of AI into new fields and applications. It is the result of a potent mix of data availability, increased computer power and algorithmic innovation that, if Continue reading
This acquisition adds real-time streaming view to application intelligence Cisco gained with AppDynamics buy.
This acquisition adds real-time streaming view to application intelligence Cisco gained with AppDynamics buy.