AMD data center chips vulnerable to revealing data through ‘BadRAM’ attack
AMD’s Secure Encrypted Virtualization (SEV), meant to protect processor memory from prying eyes in virtual machine (VM) environments, can be tricked into giving access to its encrypted memory contents...
View ArticleWhat is IPv6, why is it so important, and why is it adoption taking so long?
For the most part the dire warnings about running out of internet addresses have ceased because, slowly but surely, migration from the world of Internet Protocol Version 4 (IPv4) to IPv6 has begun,...
View ArticleSweden gets one of the EU’s seven AI factories
The new Swedish AI factory is named Mimer and is one of seven now selected by the EU. Mimer is one of five of these AI factories that will now have a brand new AI-optimized supercomputer. Developed...
View ArticleGlobal internet traffic surges 17% as post-quantum cryptography adoption grows
Overall internet traffic continues to grow year after year, with no slowdown in sight. Cloudflare released its annual Cloudflare Radar Year in Review report this week, providing insights into the...
View Article10 quantum computing milestones of 2024
There was a time, back in the early days of computing, when we had vacuum tubes, relays, mechanical gears plus several different types of analog computers. We’re kind of in that same era today with...
View ArticleGoogle, Microsoft could turn gatekeepers for advanced AI chips
The US government could designate cloud providers including Google and Microsoft as global gatekeepers for advanced AI chips, a step widely viewed as the latest effort to block China’s access to this...
View ArticleCompTIA introduces foundational tech certification
CompTIA has created a certification designed to provide individuals with broad foundational and digital skills that can be used to build a career in technology. CompTIA Tech+ will eventually replace...
View ArticleUS moves to tighten restrictions on China Telecom amid security fears
The US Commerce Department is intensifying its actions against China Telecom’s US unit over concerns that its cloud and internet services could be used to funnel American data to Beijing, according to...
View Article5 reasons why 2025 will be the year of OpenTelemetry
Some open-source projects are spectacularly successful and become standard components of the IT infrastructure. Take Linux or Kubernetes, for example. Others fall by the wayside – remember the Ubuntu...
View ArticleSchneider Electric shares energy-efficient data center designs
Schneider Electric has introduced AI-ready data center designs aimed at addressing the energy demands and sustainability challenges brought by artificial intelligence (AI). The new solutions are...
View ArticleEquinix to end its bare-metal service
Hosting and colocation giant Equinix is sunsetting its bare-metal infrastructure-as-a-service (IaaS) offering by June 2026. New features will no longer be added to Equinix Metal, as the service was...
View ArticleEurope takes on Starlink with $11.5 billion IRIS² satellite constellation
The European Union is planning its own satellite constellation, IRIS², as part of a €10.6 billion ($11.1 billion ) initiative to provide secure, resilient connectivity to businesses, governments, and...
View ArticleCisco grabs SnapAttack for threat detection
Cisco is acquiring threat-detection startup SnapAttack for an undisclosed amount as it continues to expand its security portfolio. Established in 2001 by Booz Allen’s Dark Labs, SnapAttack is known...
View ArticleIT/OT convergence propels zero-trust security efforts
Zero-trust security is essential to enterprises that are converging operational technology (OT) with IT infrastructure. New research from Enterprise Management Associates (EMA) identified how this...
View ArticleCompTIA launches expert-level cybersecurity certification
CompTIA this week made available its CompTIA SecurityX certification program, which is an updated version of the CompTIA Advanced Security Practitioner (CASP+) cert and part of CompTIA’s Xpert Series...
View ArticleHow to work with text colors on Linux
When you list files on the Linux command line, many of the file names show up in colors, as you’ve probably noticed. The colors used depend on the file types. For example, the names of directories...
View ArticleNetwork jobs watch: Hiring, skills and certification trends
Network and infrastructure roles continue to shift as enterprises adopt technologies such as AI-driven network operations, multicloud networking, zero trust network access (ZTNA), and SD-WAN. Here’s a...
View ArticleTransparency, efficiency, innovation: The digital transformation of policing...
In the era of digital transformation, public safety stands at a critical crossroads. Law enforcement agencies globally are under increasing scrutiny to enhance transparency, efficiency, and trust...
View ArticleNvidia’s Run:ai acquisition waved through by EU
Nvidia will face no objections to its plan to acquire Israeli AI orchestration software vendor Run:ai Labs in Europe, after the European Commission gave the deal its approval Friday. The Commission’s...
View ArticleThreats delivered over encrypted channels continue to rise
Encryption is the default for online communication, with nearly all web traffic protected by secure protocols like TLS/SSL. Yet, as encryption becomes more ubiquitous by the day, so do the...
View Article