I think that the data center industry has reached a point of equilibrium and stabilization where the players for cloud service have been defined, the large mega applications (like Facebook and Google) have become a monopoly on their respective businesses, and there has been slow but sustained growth in all of these markets. —Yuval Bacher
How many times in the software industry have you heard developers fight over which programming language is better? How many times have you heard about that one pattern that will fix all of our problems moving forward? —Marco Palladino
What’s clear is that supply chain attacks are a well-established, if underappreciated, method of surveillance — and much work remains to be done to secure computing devices from this type of compromise. —Micah Lee, Henrik Moltke
But when designing underlying cyber protections, too many architects are taking zero trust to be the primary objective. This is a misinterpretation. In the first instance, we should look to protect our resources from attack. What zero trust reminds us is that we are fallible, and that we should put in place backup plans in the form of monitoring and incident response for the (hopefully rare) cases where our protection plans fail. —Henry Harrison
We began our Turing Lecture June 4, 201811 with a review of computer architecture since the 1960s. In addition to that review, here, we highlight current challenges and identify future opportunities, projecting another golden age for the field of computer architecture in the next decade, much like the 1980s when we did the research that led to our award, delivering gains in cost, energy, and security, as well as performance. —John L. Hennessy, David A. Patterson
By now, you’ve likely heard of 5G, the next-generation wireless network. At the very least, you’ve likely read headlines or seen ads hailing how it will change home internet, the economy, and society in massive ways. Companies continue to fall over one another to say that they’ll be the first to offer this new, “life-changing“ technology. The problem? These claims are, as yet, untested, and they could be used to justify actions that would hurt not only the broadband market, but consumers. —Amir Nasr
Attackers have recently begun launching CoAP reflection/amplification DDoS attacks, a protocol primarily used today by mobile phones in China, but expected to grow with the explosion of Internet of Things (IoT) devices. —Matthew Bing
Related