Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Intel Xeon 6 6900P Series Processors Intel is launching its most powerful Xeon processors yet with the Xeon 6 6900P Series, featuring up to 128 P-cores and a massive 504MB of L3 cache for HPC and AI data center applications.   All High-Performance P-Cores Larger Performance Uplift Massive Memory Bandwidth Large... Read more...
Intel Xeon w7-2595X - MSRP $2,039 The Intel Xeon w7-2595X is a new high-performance 26-Core processor for creators or workstation professionals that require massive memory capacity, bandwidth and horsepower.   Great Multi-Threaded Performance Drops Into Existing Platform Massive Memory Bandwidth Support For... Read more...
Intel Xeon 6 Series Processors Intel is launching the first wave of next-generation Xeon 6 6700E-series processors today, based on Sierra Forest, featuring up to 144 E-cores per socket. Many More Cores Per Socket Power Efficiency Improvements Big Performance Gains Over 5th Gen New, Updated IO Tile Increased Bandwidth... Read more...
Most forms of malware can only make the attacker money in a roundabout way. For example, selling stolen data or bundling infected systems into a rentable botnet. Ransomware is different, however, in that it can be a moneymaker all on its own, and that's why infections have increased every year. IBM has debuted a new... Read more...
Intel 5th Generation Xeon Processors Codename: Emerald Rapids Intel refreshes its tiled chiplet based Xeon processors with more cores, more cache, higher frequencies, and enhanced power efficiency.   Higher Core Counts Improved Performance & Efficiency Drop-In Compatible With 4th Gen Faster Memory Support... Read more...
Intel is hard at work executing on its IDM 2.0 strategy, with a stated goal to deliver five process node advancements in four years. The company recently brought us and other members of the tech press out to its facilities in Malaysia to see its progress first-hand. Intel has several factories in Penang and Kulim... Read more...
You can call a kitty with a “pspspsps,” but you might be able to call Advanced Persistent Threat (APT) group 42, otherwise known as “Charming Kitten,” with a “pspspsps aux.” All jokes aside, this group, also known as TA453, now targets nuclear security and foreign policy experts to gather intelligence. Earlier this... Read more...
Throughout the end of last year and the beginning of this year, Intel finally released its full line of data center-focused Arctic Sound and Ponte Vecchio GPUs, as well as its Sapphire Rapids CPUs. These chips have been a long time coming, but they offer solid performance for high performance compute operations, as... Read more...
Intel 4th Generation Xeon Processors (Sapphire Rapids) Intel’s tiled chiplet approach with specialized accelerators could open the door for some truly custom server recipes for individual customer demands.   Accelerated workloads can fly DDR5, PCIe Gen 5, and CXL 1.1 Support SKU models to suit wide a... Read more...
Intel is launching its 4th Gen Xeon Scalable Processors (codename Sapphire Rapids) today, along with the Xeon CPU Max Series (codename Sapphire Rapids HBM) for datacenter customers. The company has been slowly disclosing information since its Innovation 2022 event, but now the veil is lifted on the entire 4th Gen Xeon... Read more...
iRobot’s automated Roomba vacuum cleaners have been navigating households for many years using infrared sensors. However, the company has equipped some of its more recent Roomba models with visible light cameras. As it turns out, these cameras can capture images of people in compromising positions, and these images... Read more...
The cuteness of kittens is widely recognized and appreciated on the internet, but there’s nothing cute about the Iranian Advanced Persistent Threat (APT) known as “Charming Kitten.” Also known as TA453 or APT42, this threat group has been conducting cyber espionage at the behest of the Iranian regime since at least... Read more...
For quite some time now—since the mid-1990s or thereabouts—there's been a significant split in the PC market between standard consumer desktops and workstation systems, also known as "high-end desktop" (HEDT) systems. HEDT machines, generally speaking, usually offer more high bandwidth connectivity, more cores, and... Read more...
Two iOS developers used a jailbroken iPhone to decrypt and analyze network traffic between the device and Apple. What the developers found is that many of Apple’s own apps frequently send detailed user behavior data along with unique device identifiers back to Apple even when analytics sharing, personalized ads, and... Read more...
Lately, Intel faces stiff competition in what have traditionally been its strongest markets: data center and the enterprise. NVIDIA muscled in on Intel's territory a long time ago with its powerful GPU compute accelerators, but now the green team is pushing its own CPUs along with its GPUs. On the other side, it has... Read more...
Yesterday evening, iPhone users may have been surprised to see multiple push notifications from Apple News containing a racist slur and other obscene language. The notifications were triggered by Fast Company’s Apple News account, prompting Apple News to disable the publication’s news channel. As it turns out, a... Read more...
Successful hacking involves more than just gaining unauthorized access to a system. Once inside, malicious actors like to cover their tracks not only to prevent getting caught, but also to maximize how much data they can extract. To this end, the Iranian-backed hacker group known as Charming Kitten has been discovered... Read more...
Yesterday, we reported on a data breach at Shields Health Care Group that resulted in the theft of personal information belong to 2 million Americans. Oftentimes, data stolen in breaches like this end up on online forums or marketplaces where cybercriminals buy and sell these ill-gotten gains. Lately, US law... Read more...
On April 1st, security researchers discovered a new Android-based spyware contacting infrastructure owned by a Russian-based threat group called Turla. Once installed, this malware can lurk on a device, collecting information and audio recordings while making money for Turla in a rather peculiar way. The malware... Read more...
Two days ago, we reported that the London police arrested seven individuals between the ages of 16 and 21 years old in connection with an investigation into notorious hacking group LAPSUS$. While it is unclear if the police nabbed the group's ringleader in the arrests, it is clear that the operational security (or... Read more...
Intel today has extended its vPro platform into its 12th Gen mobile and desktop CPU lineup based on Alder Lake, and with the expansion comes some new features and additional segmentation for different size businesses and enterprise clients. As it pertains to the latter, Intel added a couple of new tiers, including... Read more...
When folks talk about major security flaws like the Log4shell exploit in Log4j, or the Eternal Silence UPnP exploit, everyone tends to panic until they're resolved. That's because those bugs are remotely exploitable, meaning that they can be used to attack a system over the internet without placing the attacker in... Read more...
1 2 3 4 5 Next