Remove Authentication Remove Linux Remove Microsoft Remove Operating Systems
article thumbnail

Microsoft Pluton is a new processor with Xbox-like security for Windows PCs

The Verge

Microsoft is creating a new security chip that’s designed to protect future Windows PCs. Microsoft Pluton is a security processor that is built directly into future CPUs and will replace the existing Trusted Platform Module (TPM), a chip that’s currently used to secure hardware and cryptographic keys. so you just get it.”

Windows 141
article thumbnail

GeekWire Podcast: NY Times vs. Microsoft; Plus, Oren Etzioni on AI in 2023 and beyond

GeekWire

Image created by AI in Microsoft Designer, based on the prompt, “Generate an image reflecting the rise of AI in 2023 and what’s next in the field.” ’s lawsuit against Microsoft and OpenAI over their use of its articles in GPT-4 and other AI models. ” AI2 technical director Oren Etzioni.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 136

Scott Lowe

The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Operating Systems/Applications. Ryan Blunden has authored a fairly comprehensive piece on environment variables in Linux and macOS. Linux may be coming to the Apple M1 chip.

Linux 60
article thumbnail

Technology Short Take 114

Scott Lowe

Courtesy of Tigera, Alex Pollitt shares some guidelines on when Linux conntrack is no longer your friend. Apparently Dell’s new docking stations support firmware updates via Linux. Operating Systems/Applications. Cindy Sridharan has a good article on health checks and graceful degradation in distributed systems.

Linux 60
article thumbnail

Technology Short Take 141

Scott Lowe

Via Ivan Pepelnjak, I was pointed to Jon Langemak’s in-depth discussion of working with Linux VRFs. Sonia Cuff provides a set of links for detailed instructions on setting up VPN access from macOS to Microsoft Azure with Azure Active Directory authentication. Operating Systems/Applications. Networking.

Vmware 60
article thumbnail

Technology Short Take 116

Scott Lowe

If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. Lennart Koopmann provides a guide to Yubikey authentication in the real world. Operating Systems/Applications. It provides the basics behind X.509v3

Storage 60
article thumbnail

Technology Short Take 112

Scott Lowe

Milind Gunjan shares some tips for troubleshooting Linux bridged networking on a KVM host. Many organizations prefer to use two-factor authentication (2FA) to help protect their systems. ” Operating Systems/Applications. Here’s Microsoft’s side of the same announcement. configurations.