Remove sigs
article thumbnail

PCIe 7.0 Draft 0.5 Spec Available: 512 GB/s over PCIe x16 On Track For 2025

Hacker News

PCI-SIG this week released version 0.5 This is the second draft of the spec and the final call for PCI-SIG members to submit their new features to the standard. The latest update on the development of the specification comes a couple months shy of a year after the PCI-SIG published the initial Draft 0.3 of the PCI-Express 7.0

article thumbnail

Inside PCIe 6.0 with PCI SIG president Al Yanes + Inside AMD & Intel Earnings

DataCentric podcast

The PCI SIG released the specification for PCIe 6.0 Long-time PCI SIG president, and IBM distinguished engineer, Al Yanes walks hosts Matt Kimball and Steve McDowell, both principal analysts at Moor Insights & Strategy, through the specification, talking about what's new and different and the benefit that IT will ultimately enjoy.

40
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sudo without a setuid binary or SSH over a Unix socket

Hacker News

This is related to the work of the Confined Users SIG in Fedora. I am of the opinion that setuid/setgid binaries are a UNIX legacy that should be deprecated. I will explain the security reasons behind that statement in a future post.

120
120
article thumbnail

Introduction to ActivityPub (2021)

Hacker News

Although only adopted as an official World Wide Web Consortium recommendation in 2018, the ActivityPub protocol is already implemented in a sig.

136
136
article thumbnail

Building a Strong Community for Women in Data Management and Governance

Dataversity

In September, I had the privilege of co-hosting a new special interest group (SIG), Women in Data Management and Governance, alongside DATAVERSITY’s Shannon Kempe, at a pre-conference Enterprise Data World (EDW) event. I’m so honored to be part of building this community and to better serve a critical and growing constituency in our industry.

article thumbnail

Vendor Security is Key to Preventing Future Data Breaches

Smart Data Collective

Standardized questionnaires, like the Standard Information Gathering (SIG) questionnaire or the Cloud Security Alliance’s Consensus Assessments Initiative Questionnaire (CAIQ), can be used to gather information about a vendor’s security practices.

78
article thumbnail

Les tendances en matière de location intelligence pour 2024

Precisely

Cependant, les utilisateurs métiers ont toujours eu recours à l’expertise des spécialistes SIG pour obtenir les informations dont ils ont besoin.