DoD Greenlights Parallel Works Hybrid Multi-Cloud HPC Platform with ATO Approval, Now Ready for Defense and Industry Use

Posted in Commentary with tags on September 15, 2025 by itnerd

 Parallel Works today announced its ACTIVATE High Security Platform (HSP) has achieved a historic milestone as the first-ever hybrid multi-cloud computing solution to receive the Authority to Operate (ATO) by the Department of Defense (DoD). Granted by the High Performance Computing Modernization Program (HPCMP), the IL-5 ATO authorization enables more agile, cloud-enabled defense computing capabilities to modernize defense infrastructure through scalable, secure and high-performance cloud solutions.

The designation opens the door for partners, integrators, DoD civilians and military end users to utilize Parallel Works ATO through two options:

  1. ACTIVATE HSP can be used as a shared service on NIPRnet through HPCMP.
  2. Organizations can leverage the ACTIVATE HSP software stack and inherit the required compliance and security boundaries to operate within the government ecosystem.

The ATO authorization provides immediate access to a secure, IL5-authorized HPC platform, thereby shortening the time to market for DoD agencies, defense contractors, national labs, system integrators and AI/ML teams.

The DoD’s demand for automated computing solutions is skyrocketing as technology advances to support AI-driven wargaming, digital and model-based systems. Parallel Works ACTIVATE HSP advances the transition with turnkey HPC integration across DoD and commercial clouds, providing advanced orchestration for real-time simulation and AI analytics.

The Parallel Works hybrid, multi-cloud computing HSP is one of only three software programs approved to handle export-controlled workload environments, including International Traffic in Arms (ITAR), DoD IL5 and the Federal Risk and Authorization Management Program (FedRAMP).

Availability

The Parallel Works ACTIVATE hybrid, multi-cloud HSP is available immediately. Interested technology partners can connect at info@parallelworks.com. For more information on Parallel Works ACTIVATE HSP and the opportunities the ATO provides click here

AI cuts energy waste by up to 30% in buildings says KPMG

Posted in Commentary with tags on September 15, 2025 by itnerd

KPMG has recently released a report on “How AI is helping to improve energy efficiency and management in real estate.” It says that traditional retrofits are too slow and costly to deliver the scale of cuts required to reach net-zero goals of 2050, and instead points out that artificial intelligence is a faster route, but only together with the Strategic Energy Management (SEM) framework.

Exergio, a company that developed an AI-based tool for energy efficiency in commercial buildings, says that findings reflect what is already visible in real-world cases.

KPMG states that SEM should track how buildings use energy and assign clear responsibility for fixing problems. According to Karčiauskas, this usually means facility managers or energy officers are tasked with day-to-day oversight. However, certain tasks such as changing parameters in sensors should be automatically assigned to AI and machine learning models to adjust in real-time, with experts overseeing the process.

On its own, implementing a SEM mindset typically delivers 5-7% savings per year. But when used with AI, they rise to around 20%-30% state energy efficiency experts.

There are three tiers of SEM, according to the report. The first tier focuses on getting more out of what is already in place: engineers have to tune HVAC, lighting, and control systems so they run more efficiently day to day. This, according to Karčiauskas, is “a task of AI at the moment as we want to achieve faster savings”.

The second step is replacing worn or outdated equipment, for instance, boilers, chillers, or pumps, with models that use less energy. The third adds renewables or long-term power contracts, but only once the building’s basic energy consumption has been brought under control.

The authors of the paper stress that renewables should come last, since they deliver limited value if the building’s consumption has not already been optimised.

The study also indicates that efficiency depends less on new hardware and more on how existing systems are managed.

SEM has a five-step cycle. It includes assessment, planning, implementation, building capability, and monitoring. Within this setup, AI could regulate HVAC concurrently based on occupancy, weather, and usage, while managers define energy-saving goals, set comfort ranges, and review results.

Kids & Data: How Apps Invade Children’s Privacy

Posted in Commentary with tags on September 15, 2025 by itnerd

Safety Detectives has conducted recently based on how apps designed for children invade their privacy. While conducting our research they identified some concerning privacy related points such as:

  • 70% of the reviewed apps collect identifiers, data usage and biometric information, often without parental consent.
  • Several apps openly admit sharing kids’ data for marketing and ad tracking.
  • To date, regulators have issued over $1 billion in penalties for children’s privacy violations.
  • Some apps had conflicting disclosures across platforms.

 You can check the full report here: https://www.safetydetectives.com/blog/blog-kids-apps-privacy-research/

Major security flaw exposed in enterprise chatbot maker Yellow.ai 

Posted in Commentary with tags on September 15, 2025 by itnerd

Cybernews has just released a report about enterprise chatbot maker Yellow.ai. It reveals that Yellow.ai’s customer service chatbot allowed users to steal cookies and execute malicious code upon request, with zero pushback.

The flaw highlights multiple security issues, such as improper user input sanitization, improper chatbot output sanitization, the web server not verifying content produced by the chatbot, running unverified code, and loading content from arbitrary web resources. This leaves many options for Cross-Site Scripting (XSS) attacks.

Cybernews reached out to Yellow.ai before publishing the research, and the company fixed the issue by sanitizing the generated code, ensuring that it would not get executed. However, the bot still generates malicious code if asked.

Yellow.ai customers include major companies like Sony, Logitech, Hyundai, Domino’s, and hundreds of other brands. It is unclear whether the chatbots used by Yellow.ai’s clients have the same security flaw as the customer service bot had, so Cybernews urges all Yellow.ai clients to be wary.

For more information, here’s the full report: https://cybernews.com/security/yellowai-customer-chatbot-cookies-flaw

What You Should Do Before Upgrading To macOS Tahoe….. And Why You Shouldn’t Upgrade Just Yet

Posted in Commentary with tags on September 15, 2025 by itnerd

Apple is expected to release their latest OS which is macOS Tahoe today. Before we go on, here’s a list of what macOS Tahoe will run on:

  • iMac 2019 and later
  • Mac Pro 2019 and later
  • Mac Studio 2022 and later
  • MacBook Air with Apple Silicon 2020 and later
  • Mac mini 2020 and later
  • MacBook Pro with Apple Silicon 2020 and later
  • MacBook Pro (16‑inch, 2019)
  • MacBook Pro (13‑inch, 2020, Four Thunderbolt 3 ports)

You should note that some features of Tahoe won’t work on Intel Macs. And on top of that, this is the last year that Intel Macs will be supported. So if you haven’t made the move to Apple Silicon, now would be a really good time to dump your Intel Mac.

Related to the above, here’s list of features that Tahoe includes.

If your Mac isn’t on this list, you’re out of luck. But assuming that it is, here’s some tips on what you might want to do before you pull that trigger and upgrade. And a couple reasons why you shouldn’t.

  1. Don’t Upgrade… At least not yet. Part 1 : The reason why you shouldn’t upgrade is that Apple’s initial releases tend to be buggy. But they usually get better after they release an update or two. Though that wasn’t the case with Sequoia as they never fixed the Time Machine issues that this specific OS had. So you may want to wait until at least the .1 update hits the streets before making the jump. Or better yet, wait until the .2 release to be extra safe. 
  2. Don’t Upgrade… At least not yet. Part 2: Your apps that you depend upon may not be ready for Tahoe. Thus out may be a better strategy to confirm whether they are ready or not. And if they’re not, wait for them to be compatible with Tahoe before you upgrade.
  3. If you Must Upgrade, Make A Backup: Needless to say, making a backup of your current setup is vital before upgrading. That way you have a way to go back to where you were if things don’t work out. There’s plenty of backup solutions out there from Apple’s own Time Machine to third party utilities such as Carbon Copy Cloner that can be used for this purpose.
  4. Upgrade Your Software BEFORE You Upgrade: Assuming your apps are going to be compatible with Tahoe, you should ensure that all your apps are up to date before you pull the trigger on upgrading. That will reduce the risk that something might go sideways during the upgrade.
  5. Run Disk Utility BEFORE You Upgrade: The last thing I would do is boot of the Recovery Partition and run Disk Utility to verify the volume that you plan to install the upgrade on. It likely wouldn’t hurt to do a permission repair as well.

At this point you should be good to go. Key word being SHOULD. Upgrading an operating system isn’t a trivial process. But if you take these steps beforehand, you should reduce the risk of any issues. Or you can take my first couple of suggestions which is to wait for a bit before upgrading. Then follow the rest of my advice. In my case, I am not planning on upgrading to Tahoe. At least not yet given my experience with Sequoia. But I may upgrade in the future depending on what problems do or do not surface in the coming weeks.

How You Can Prepare Your iPhone For iOS 26

Posted in Tips with tags on September 15, 2025 by itnerd

At 1PM EST today, Apple will release iOS 26 to the public. As long as you have a supported device, it will bring you new features and improvements to your iDevice experience.

If you want to see a full feature set, click here.

Speaking of supported devices, here’s what iOS 26 will run on:

  • iPhone 16
  • iPhone 16 Plus
  • iPhone 16 Pro
  • iPhone 16 Pro Max
  • iPhone 15
  • iPhone 15 Plus
  • iPhone 15 Pro
  • iPhone 15 Pro Max
  • iPhone 14
  • iPhone 14 Plus
  • iPhone 14 Pro
  • iPhone 14 Pro Max
  • iPhone 13
  • iPhone 13 mini
  • iPhone 13 Pro
  • iPhone 13 Pro Max
  • iPhone 12
  • iPhone 12 Pro
  • iPhone 12 Pro Max
  • iPhone 12 Mini
  • iPhone 11
  • iPhone 11 Pro
  • iPhone SE Second Generation

If your phone isn’t on this list, then it’s not supported. And the following phones will come with iOS 26 out of the box:

  • iPhone 17
  • iPhone Air
  • iPhone 17 Pro
  • iPhone 17 Pro Max

If you are wondering why there are no iPads on the list, that’s because Apple has spun off the iPads into a separate OS called iPadOS which is due out at the same time. Having said that, this advice applies to iPads as well. 

Now, since this is a major upgrade there is always a chance, no matter how remote that something can go sideways. To make sure that you’re not caught out by something unexpected, here’s what you can do:

1. Update your Apps: Make sure that all your apps are up to date before upgrading by opening the App Store app and seeing if any updates are required. This is important because it is possible that the changes that Apple has made on areas like privacy and performance could break an app that you rely on. Thus I find that it is always a good idea to check for updates and install them before a new version of iOS hits the streets.

2. Dump any uneeded photos, videos or apps: iOS updates tend to need a fair amount of free space to allow for a successful installation. Thus if you have anything less than 8GB of free space, consider deleting unused apps or photos/videos. In terms of the photos and videos you want to keep, you can move them to the cloud or a computer so that they’re safely stored without taking up space on your iPhone. I personally use iCloud myself, but Google Photos is another option.

3. Backup your iDevice: If you value the data on your iDevice, backing it up is a must. You have two options for backing up your iDevice: iCloud or iTunes. Follow this guide to backing up your iPhone using iCloud or iTunes.

At this point you should be good to go to upgrade to iOS 26. Key word being SHOULD. Upgrading an operating system isn’t a trivial process. But if you take these steps beforehand, you should reduce the risk of any issues that you might encounter.

One other thing before I go, you may want to consider not upgrading to iOS 26 and instead wait for iOS 26.1 to hit the streets before you upgrade as that’s likely to have additional bug fixes and also fix issues that hit the streets when iOS 26 comes out. Plus that’s the version that is going to bring Apple Intelligence to the table. I’ll be upgrading later today and if anything seriously goes off the rails, you’ll be the first to hear about it.

Peer Software to Showcase Enterprise Data Management Solutions at Leading 2025 Industry Events

Posted in Commentary with tags on September 12, 2025 by itnerd

Peer Software today announced its participation in several industry events throughout Fall 2025, including Autodesk University, GITEX Global, Dell Technologies Forum, and NetApp Insight. These engagements reflect Peer Software’s dedication to delivering enterprise-grade distributed file management and orchestration solutions tailored for edge, data center, and hybrid, multi-cloud environments.

Upcoming Events:

  • IBC2025
    When: September 12-15, 2025
    Where: RAI Amsterdam, Amsterdam, Netherlands
    What: As part of the vibrant tech showcase, Peer Software will be present at Dell’s booth supporting Dell’s distributed global media workflow solutions.
     
  • Autodesk University 2025
    When: September 16–18, 2025
    Where: Music City Center, Nashville, TN – Booth 342
    What: Peer Software will showcase its Active‑Active file service solutions that maximize productivity for distributed teams, support AI-driven workflows, and ensure continuous availability in AEC, manufacturing and media environments.
     
  • Dell Technologies Forum
    When: September 30, 2025
    Where: Royal Maxim Palace Kempinski, Cairo, Egypt
    What: At the Dell Technologies Forum in Cairo, Peer Software joins Dell Technologies as a sponsor to showcase innovative solutions for seamless data integration, optimized media and AI workflows, and maximum availability within Dell storage environments.
     
  • GITEX Global 2025
    When: October 13–17, 2025
    Where: Dubai World Trade Center, Dubai, UAE–Hall 6, Stand A10
    What: At GITEX, Peer is teaming with Dell Technologies to present solutions for powering hybrid data interoperability, media and AI workflows, and high availability across the Dell storage ecosystem.
     
  • NetApp Insight 2025
    When: October 14–16, 2025
    Where: MGM Grand, Las Vegas, NV
    What: Proudly teaming with one of its longest-standing storage partners, Peer is showcasing its hybrid Active-Active replication capabilities across globally distributed NetApp NAS environments, Amazon FSx for NetApp ONTAP and advanced edge data management capabilities designed for mixed NetApp and Windows customers.

Founded in 1993, Peer Software specializes in simplifying enterprise file orchestration across distributed environments—from edge offices to cloud and data centers. Its solutions help organizations maintain resilient, always-on data infrastructure while embracing hybrid architectures, AI workloads, and cross-platform interoperability.

HP Uncovers Ultra-Realistic Adobe Invoice and Chained Living Off The Land Technique Scam

Posted in Commentary with tags on September 12, 2025 by itnerd

HP Wolf Security just released its September Threat Insights Report highlightinig how attackers are modifying and improving old techniques to bypass detection and fool users.

By chaining living-off-the-land (LOTL) tools, using advanced visual deception to boost phishing success, and hiding malware in less obvious file types, like images, attackers are sharpening their edge.

Notable campaigns highlighted in the report include:

  • Fake Adobe Reader invoices – ultra-realistic upload screens (see image below) – including a fake loading bar – used to hide a reverse shell inside a small SVG image, giving attackers remote access to user devices.
  • Malware Hidden in Image Pixels – malicious code embedded in pixel data of Microsoft Compiled HTML Help files, with PowerShell and CMD used to execute and then delete evidence.
  • Resurgent Lumma Stealer – spreading through IMG archive attachments, using LOTL and image-based delivery to bypass filters despite a law-enforcement crackdown earlier this year.

The report is here and there is a blog post as well for your reading pleasure.

Rogers to Offer the New iPhone 17, iPhone Air, iPhone 17 Pro, iPhone 17 Pro Max, Apple Watch Series 11, Apple Watch Ultra 3, and AirPods Pro 3

Posted in Commentary with tags on September 12, 2025 by itnerd

Rogers will offer the latest iPhone generation, the latest Apple Watch lineup, and AirPods Pro 3. All four iPhone models — iPhone 17, iPhone Air, iPhone 17 Pro, and iPhone 17 Pro Max — feature the Center Stage front camera for next level selfies, 48MP Fusion camera systems, the latest-generation chips for incredible performance, and fantastic all-day battery life. The beautiful new designs are even more durable and offer 3x better scratch resistance thanks to Ceramic Shield 2. Apple Watch Series 11 offers sleep score, along with up to 24 hours of battery life and a display that’s 2x more scratch-resistant. AirPods Pro 3 feature a new design and incredible sound quality, the world’s best in-ear Active Noise Cancellation of any wireless headphones, hands-free Live Translation, exceptional in-ear fit and stability, heart rate sensing during workouts, and extended battery life.

Customers will be able to pre-order the latest iPhone models on September 12, with availability beginning September 19. The new Apple Watch lineup and AirPods Pro 3 are available for customers on September 19. For complete pricing and availability details, please visit rogers.com.

Get your whole family on Canada’s most reliable 5G+ network with the latest iPhone generation. Rogers covers over 2,500 communities across the country and has been ranked the most reliable 5G+ wireless network in Canada by umlaut. With Rogers additional line discounts, households can mix and match the right options for everyone while unlocking exclusive perks they won’t find anywhere else — like 2x cashback on Rogers purchases with a Rogers Red credit card and 50% off Roam Like Home on our 5G Ultimate Plan.

With 5G+ mobile plans that bring great value, unmatched perks, and great services for the whole family, Rogers is the #1 choice for Canadians. 

Flashpoint’s New Guidebook on Primary Source Collections Is Out

Posted in Commentary with tags on September 12, 2025 by itnerd

Executives don’t ask for “security data feeds.” They want to know: Are we exposed? What’s the impact? How do we respond? 

Modern threat intelligence teams are under constant pressure to deliver precise, contextual answers to these questions—not just for cybersecurity, but also for fraud, legal, insider risk, physical security, and more. These internal stakeholders demand clarity on issues like whether a brand is being directly targeted, who is behind a disinformation campaign, or what fraud tactics are emerging in closed, non-English-speaking communities. 

Flashpoint has released a guide on primary source collection entitled Upgrade Your Threat Intelligence: Gain the Primary Source Advantage.

Traditional “data-first” frameworks produce breadth without depth, forcing teams into a passive role. Such questions can’t be answered by static dashboards or broad threat feeds; they require direct access to original sources, adaptive collection, and expert analysis that ties threats to business impact.

In this report Flashpoint lays out how Primary Source Collection changes the equation of doing data collection the usual way. Without this approach, organizations risk blind spots—unmonitored closed communities, fast-moving threats missed by rigid collection schedules, and generic context divorced from business needs. 

You can read the report here: http://flashpoint.io/resources/e-book/threat-intelligence-gain-primary-source-advantage