The top 12 tech stories of 2022

The year highlighted how vulnerable the technology sector is to the vagaries of geopolitics and the macroeconomy, as IT giants laid off workers, regulators cracked down on tech rule-breakers, nations negotiated data security regulations, the US-China chip war widened, and the Ukraine war disrupted business as usual.

The Power of Complaining Properly

Recently I’ve started listening to a new podcast all about the brain and behaviors called Hidden Brain. It’s got a lot great content and you should totally check it out. One of the latest episodes deals with complaining and how it can make us less productive and more likely to repeat patterns or shut people out.

Complaining is as old as language. I’m sure as soon as the first person to create communications around spoken words was able to teach another person one of the first things they did was complain about the weather or something they hated. Our mind is built to express itself about things we don’t like, such as bad drivers or silly behaviors at work.

The episode explores the ways that our brain can trap us in cycles of complaining simply for the sake of complaining. It also discusses how we should try to spend more time trying to be productive in how we address complaints. I’ve experienced this a lot in IT as well as in my career after being directly involved in IT and there’s a lot of merit in changing the way we complain about things.

Airing Grievances

Complaining without a suggested solution Continue reading

Nvidia still crushing the data center market

Nvidia is playing some serious games.When Jensen Huang and his two partners established Nvidia in 1993, the graphics chip market had many more competitors than the CPU market, which had just two. Nvidia’s competitors in the gaming market included ATI Technologies, Matrox, S3, Chips & Technology, and 3DFX.A decade later, Nvidia had laid waste to every one of them except for ATI, which was purchased by AMD in 2006. For most of this century, Nvidia has shifted its focus to bring the same technology it uses to render videogames in 4k pixel resolution to power supercomputers, high-performance computing (HPC) in the enterprise, and artificial intelligence.To read this article in full, please click here

Nvidia still crushing the data center market

Nvidia is playing some serious games.When Jensen Huang and his two partners established Nvidia in 1993, the graphics chip market had many more competitors than the CPU market, which had just two. Nvidia’s competitors in the gaming market included ATI Technologies, Matrox, S3, Chips & Technology, and 3DFX.A decade later, Nvidia had laid waste to every one of them except for ATI, which was purchased by AMD in 2006. For most of this century, Nvidia has shifted its focus to bring the same technology it uses to render videogames in 4k pixel resolution to power supercomputers, high-performance computing (HPC) in the enterprise, and artificial intelligence.To read this article in full, please click here

Intel splits GPU group into two separate units

Intel announced plans to split its AXG graphics group and move the resources into two existing business units to better serve their respective markets.The consumer/gaming end of the GPU business will move to Intel’s Client Compute Group (CCG), which develops consumer computing platforms based on the company’s CPU products. The teams responsible for data center and supercomputing products such as the Ponte Vecchio and Rialto Bridge will move to the Data Center and AI (DCAI) business unit.The GPU SoC and IP design teams will also fall under the DCAI umbrella, but they will continue to support the client graphics team. Jeff McVeigh, currently the vice president and general manager of the Super Compute Group, will serve as the interim leader of this team until a permanent leader is found.To read this article in full, please click here

Intel splits GPU group into two separate units

Intel announced plans to split its AXG graphics group and move the resources into two existing business units to better serve their respective markets.The consumer/gaming end of the GPU business will move to Intel’s Client Compute Group (CCG), which develops consumer computing platforms based on the company’s CPU products. The teams responsible for data center and supercomputing products such as the Ponte Vecchio and Rialto Bridge will move to the Data Center and AI (DCAI) business unit.The GPU SoC and IP design teams will also fall under the DCAI umbrella, but they will continue to support the client graphics team. Jeff McVeigh, currently the vice president and general manager of the Super Compute Group, will serve as the interim leader of this team until a permanent leader is found.To read this article in full, please click here

Cloudflare Radar 2022 Year in Review

Cloudflare Radar 2022 Year in Review
Cloudflare Radar 2022 Year in Review

In 2022, with nearly five billion people around the world (as well as an untold number of “bots”) using the Internet, analyzing aggregate data about this usage can uncover some very interesting trends. To that end, we’re excited to present the Cloudflare Radar 2022 Year In Review, featuring interactive charts, graphs, and maps you can use to explore notable Internet trends observed throughout this past year. The Year In Review website is part of Cloudflare Radar, which celebrated its second birthday in September with the launch of Radar 2.0.

We have organized the trends we observed around three different topic areas: Traffic, Adoption, and Security. The content covered within each of these areas is described in more detail in their respective sections below. Building on the 2021 Year In Review, we have incorporated several additional metrics this year, and have also improved the underlying methodology. (As such, the charts are not directly comparable to develop insights into year-over-year changes.)

Website visualizations shown at a weekly granularity cover the period from January 2 through November 26, 2022 (the start of the first full week of the year through the end of the last full Continue reading

What is Zero Trust Network Architecture (ZTNA)?

Zero Trust is a term coined by John Kindervag while he was an analyst at Forrester Research to describe a strategic framework in which nothing on the network is trusted by default – not devices, not end users, not processes. Everything must be authenticated, authorized, verified and continuously monitored.The traditional approach to security was based on the concept of “trust, but verify.” The weakness of this approach is that once someone was authenticated, they were considered trusted and could move laterally to access sensitive data and systems that should have been off-limits.Zero Trust principles change this to “never trust, always verify.” A Zero Trust architecture doesn’t aim to make a system trusted or secure, but rather to eliminate the concept of trust altogether. Zero Trust security models assume that an attacker is present in the environment at all times. Trust is never granted unconditionally or permanently, but must be continually evaluated.To read this article in full, please click here

What is Zero Trust Network Architecture (ZTNA)?

Zero Trust is a term coined by John Kindervag while he was an analyst at Forrester Research to describe a strategic framework in which nothing on the network is trusted by default – not devices, not end users, not processes. Everything must be authenticated, authorized, verified and continuously monitored.The traditional approach to security was based on the concept of “trust, but verify.” The weakness of this approach is that once someone was authenticated, they were considered trusted and could move laterally to access sensitive data and systems that should have been off-limits.Zero Trust principles change this to “never trust, always verify.” A Zero Trust architecture doesn’t aim to make a system trusted or secure, but rather to eliminate the concept of trust altogether. Zero Trust security models assume that an attacker is present in the environment at all times. Trust is never granted unconditionally or permanently, but must be continually evaluated.To read this article in full, please click here

Using the ss command on Linux to view details on sockets

The ss command is used to dump socket statistics on Linux systems. It serves as a replacement for the netstat command and is often used for troubleshooting network problems.What is a socket? To make the best use of the ss command, it’s important to understand what a socket is. A socket is a type of pseudo file (i.e., not an actual file) that represents a network connection. A socket identifies both the remote host and the port that it connects to so that data can be sent between the systems. Sockets are similar to pipes except that pipes only facilitate connections between processes on the same system where sockets work on the same or different systems. Unlike pipes, sockets also provide bidirectional communication.To read this article in full, please click here

Using the ss command on Linux to view details on sockets

The ss command is used to dump socket statistics on Linux systems. It serves as a replacement for the netstat command and is often used for troubleshooting network problems.What is a socket? To make the best use of the ss command, it’s important to understand what a socket is. A socket is a type of pseudo file (i.e., not an actual file) that represents a network connection. A socket identifies both the remote host and the port that it connects to so that data can be sent between the systems. Sockets are similar to pipes except that pipes only facilitate connections between processes on the same system where sockets work on the same or different systems. Unlike pipes, sockets also provide bidirectional communication.To read this article in full, please click here

EU Commission opens antitrust inquiry into Broadcom’s $61B VMware acquisition

A month after the UK’s Competition Market’s Authority (CMA) announced it was investigating Broadcom’s proposed acquisition of VMware, European antitrust regulators have launched its own probe into the $61 billion deal.In the US, the Federal Trade Commission (FTC) is five months into its own investigation of the deal.Meanwhile, the EU Commision said in a statement published on December 20 that it  “is particularly concerned that the transaction would allow Broadcom to restrict competition in the market for certain hardware components which interoperate with VMware's software.”To read this article in full, please click here

EU Commission opens antitrust inquiry into Broadcom’s $61B VMware acquisition

A month after the UK’s Competition Market’s Authority (CMA) announced it was investigating Broadcom’s proposed acquisition of VMware, European antitrust regulators have launched its own probe into the $61 billion deal.In the US, the Federal Trade Commission (FTC) is five months into its own investigation of the deal.Meanwhile, the EU Commision said in a statement published on December 20 that it  “is particularly concerned that the transaction would allow Broadcom to restrict competition in the market for certain hardware components which interoperate with VMware's software.”To read this article in full, please click here

Handwashing Techniques to Teach Your Employees

National handwashing awareness week is an annual event celebrated in December to focus on the importance of proper hand hygiene and general health. It is designed to remind everyone that clean hands can help prevent illness, disease, and the spread of germs. Encouraging hand hygiene among your employees is essential for workplace safety. Teaching handwashing techniques can help provide an extra layer of protection, lessen the spread of germs, and show employees that you care about their health and well-being. To ensure hand hygiene at work, here’s what you should teach your employees:

Use warm water and soap when washing hands

Warm water helps to remove more dirt, oils, and germs from the skin than cold water. Employees should use hot water if it’s available and always make sure to wet their hands with clean running water before applying soap. All surfaces of the hands should be washed thoroughly, including the backs of the hands, wrists, between fingers, and under fingernails.

Scrub for at least 20 seconds

After wetting their hands with clean running water, employees should apply soap and lather up their hands while scrubbing them together in a back-and-forth motion for at least 20 seconds. This includes scrubbing Continue reading

One of our most requested features is here: DNS record comments and tags

One of our most requested features is here: DNS record comments and tags
One of our most requested features is here: DNS record comments and tags

Starting today, we’re adding support on all zone plans to add custom comments on your DNS records. Users on the Pro, Business and Enterprise plan will also be able to tag DNS records.

DNS records are important

DNS records play an essential role when it comes to operating a website or a web application. In general, they are used to mapping human-readable hostnames to machine-readable information, most commonly IP addresses. Besides mapping hostnames to IP addresses they also fulfill many other use cases like:

  • Ensuring emails can reach your inbox, by setting up MX records.
  • Avoiding email spoofing and phishing by configuring SPF, DMARC and DKIM policies as TXT records.
  • Validating a TLS certificate by adding a TXT (or CNAME) record.
  • Specifying allowed certificate authorities that can issue certificates on behalf of your domain by creating a CAA record.
  • Validating ownership of your domain for other web services (website hosting, email hosting, web storage, etc.) - usually by creating a TXT record.
  • And many more.

With all these different use cases, it is easy to forget what a particular DNS record is for and it is not always possible to derive the purpose from the name, type and Continue reading