Tag Archives: Smart

AMD Has Yellow Carp Ready For Linux 5.14, More Smart Shift Updates + Display Fixes


Along with Intel having wrapped up their graphics driver feature work for Linux 5.14, AMD sent in another pull request too with more feature code they have ready for their AMDGPU kernel driver in 5.14 and will likely be their last major pull for this cycle too.

The AMD Radeon kernel graphics driver code for Linux 5.14 has already seen a number of features and improvements queue in DRM-Next. The exciting bits so far for Linux 5.14 on the red side include more Aldebaran accelerator bring-up work, HMM SVM support, PCI Express ASPM being enabled by default for relevant GPUs, TMZ support for Renoir, Van Gogh APU updates, Beige Goby support, GPU hot unplug support, AMD Smart Shift support for laptops, 16 bpc support for use by their Vulkan drivers, and a lot of smaller changes.

Within today’s potentially final feature pull request, AMDGPU has ready Yellow Carp as the newest RDNA2 GPU. AMD published their initial Yellow Carp hardware enablement driver code earlier this month and it’s ready to be introduced in Linux 5.14 in continuing the recent trend of providing launch day open-source AMD GPU support in the mainline kernel.

AMD’s Linux catered codenames for volleying early hardware bring-up for their GPUs continue to involve an X11 color followed by a fish species.

Besides having Yellow Carp support, there are SR-IOV fixes, updates to the new Smart Shift support, GPUVM TLB flushing changes, cleanups for BACO (Bus Active, Chip Off), various DC display code fixes and improvements, and a variety of other internal code clean-ups/changes.

The full list of AMDGPU changes heading to Linux 5.14 with this pull by way of DRM-Next can be found with this pull request.

Smart Security Strategies for the World of Social Media

If you are looking to make sure that your social media accounts are secure, you are going to need a detailed social media policy catering to the company and its employees. Because of the raised use of social media tools for business communications, you can rest assured that the security aspect of social media is more significant than ever.

Although there are clear benefits of using social media, there are risks involved, and you need to be careful. More than half the companies using the network had to deal with an incident in the last year. Therefore, protect yourself well against these threats related to social media security. Here is how you do it:

1. Develop a social media policy

When a business is using a social media network or is getting ready for it, the first thing you will need is a social media policy. Here are some guidelines outlining how you need to use social media with responsibility. This will not only provide protection but will ensure that there is no bad PR or legal trouble. In whatever cases using translation services to provide translation for the guidelines is also crucial, especially if the audience is wide and includes speakers of various languages. The policy must include:

  • Rules specifying confidentiality and personal use of social media.
  • Brand guidelines indicating how you will talk about your company.
  • Social media activities you need to avoid, such as FB quizzes that ask for personal info.
  • Guidelines that are related to confidentiality and copyright.
  • Responsibility of every department regarding all social media accounts.
  • Guidelines about effective creation of passwords and how often you should change them.
  • Things required for maintaining the devices and software updated.
  • Identifying and avoiding attacks, scams, and other security threats.
  • Who is to be notified in case of social media security concerns.

2. Train the employees about various security problems

Even when you have the greatest social media policy in place, it is no good if your employees are not following it. Your social media policy has to be simple to understand. However, training will provide your employees an opportunity to ask questions, engage, and acquire a sense of how significant it is to follow this policy. These security training sessions will also provide opportunities for reviewing the latest trends on social media networks. You may discuss if there are any sections of the security policy in need of an update. Keep in mind that it is not all gloomy. This training should also equip the employees to use these networks more effectively.

3. Have limited access to improve data security

Although you are likely to be focused on different security threats coming from outside, keep in mind that your employees are a major source of data breaches as well. Therefore, having limited access to social accounts is a great way of keeping them safe. You might have entire teams working on messaging, creating posts, or customer service. However, this does not mean that everybody has to know the passwords of the social network accounts. It is crucial to have a proper system in place that can revoke access to these accounts if needed. Learn how to unzip files where the passwords are set. This tool is useful for securing data using encryption.

4. Use security monitoring tools

It is a fact that unattended social media accounts are always ripe for hacking attempts. Therefore keep an eye on all your networks. You can also select a proper VPN or residential proxies that allows you to maintain your online presence securely. Companies such as GEOnode that offer residential proxies can ensure that your social media account security is not compromised. You need to watch out for all accounts, including those you have registered for and have not used at all. You can delegate someone from the team this task of making sure that all the posts on your various accounts are genuine. If there is any unexpected activity, follow up on it. Sometimes the post may appear legitimate, but it is worth digging into it if it is straying away from the content plans.

Why implement these smart social media security strategies?

As you might already know by now, social media security includes a process of analyzing active social media data as a method to protect them against threats. As a way to avoid risks, social media security is vital for every business or enterprise in blocking targeted attacks, securing corporate accounts from compromise, fighting scams and frauds. No company would want to have misinformation spread or having sensitive corporate data and private data revealed. That’s why implementing smart social media security strategies is vital.


It is a good idea to have the brand handle reserved for all your social media network accounts even when you have no intention of beginning the use immediately. It allows you to keep a consistent presence across different networks, thereby making it easier for people to locate you. Therefore, you mustn’t ignore the accounts you have never used or the ones you have stopped using.

Source link

Why 5G Security Needs Smart Network Automation

The GSMA estimates that 5G has the potential to add a staggering $2.2 trillion to our world’s economy in the next 15 years. But the killer apps that drive revenues and customer loyalty in the 5G age will be very different from what we know today. The beneficiaries of 5G will include autonomous vehicles, telehealth, smart cities, and logistics – each of them multi-billion-dollar markets. Each of them is also likely to suffer significant disruption, even loss of life if their security is compromised.

To support these new and exciting market opportunities, operators need an entirely new approach to network management, automation, and cybersecurity. In order to address the concerns surrounding the risks of 5G, networks will be automated end-to-end, and software-controlled processes will be integral to 5G’s infrastructure.

Delivering on the potential of 5G will require networks to be extensively automated. Manual processes will be no match for the demands of, say, deploying self-driving cars during a busy rush hour. The mantra of the 5G age will, therefore, be ‘programmability’ or the ability to define and control every aspect of the network in software, from the core to edge. But this programmability is a double-edged sword – it also gives hackers a means to cause mayhem from afar.

A critical foundation in developing secure systems is a robust architecture to identify threats and design and deploy effective security controls. This needs to be a day-one priority and not an afterthought. To make this happen in an effective manner, a new ecosystem of vendors, researchers, and operators need to emerge to drive the cybersecurity agenda for 5G.

This architecture needs to afford operators the flexibility to deliver the services customers need while denying malicious actors any opportunity to cause disruption. The application programming interfaces, also known as APIs that enable programmability together with artificial intelligence (AI) and machine learning (ML), can become the service provider’s silver bullets against cyber-attacks.

Below are the key elements of a robust 5G security architecture that operators should be aware of:

Edge Security: Effective edge detection can help identify and contain attacks quickly, away from sensitive core networks. Edge computing can thus reduce attack detection latency by placing security monitoring functions closer to users, and creating alternate data transmission routes, making the process more secure.

Software-Defined Networking (SDN) Controller Security: Software-defined networking can help mitigate any breaches by using intelligence gathered through northbound APIs to control southbound routers and switches.

Proactive Security Analytics: Applying AI and ML to traffic at all points in the network can help operators identify patterns in data traffic – particularly useful for identifying zero-day attacks.

Hypervisor and Container Security: Virtualized systems are at risk from a variety of attacks, including data exfiltration and resource starvation. Hypervisor hardening mechanisms can help guard against bugs and misconfigurations, which commonly result in vulnerabilities.

Orchestration Security: The orchestrator oversees the functions and infrastructure of the entire network. That means it helps contain attacks but can lead to system-wide disruption if compromised. A variety of systems and procedures can guarantee the integrity of the orchestrator.

5G is expected to become one of the biggest technology disruptors of this time, and the security stakes are high. Enterprises can’t think this is something they can do on their own, and they should not be afraid to turn to outside help such as academic experts, researchers, or technology vendors and operators themselves to shape and design the cybersecurity architectures that will protect these networks. If the networks upon which 5G will operate are not built securely, the promise of 5G will be spoiled by malicious attackers. Those are risks that cannot be ignored.


Source link