HP launches world’s highest performance AI PC and only trusted-integrated AI model development platform

Posted in Commentary with tags on July 22, 2024 by itnerd

HP recently announced two new innovations to make it easier for business leaders, IT decision makers and users to unlock the power of AI, including the world’s highest performance AI PC and the first integration of a trust framework into an AI model development platform.

With only 33% of data scientists who are satisfied with their current AI tools and 81% who lack confidence in their company’s ability to deploy them, both products underscore the company’s commitment to make AI real for organizations and people with transformative experiences across its PCs, software and partner ecosystem.

  • New Updates to Z by HP AI Studio: HP is adding new capabilities to the Z by HP AI Studio, the world’s most comprehensive workstation solution for AI development. The platform empowers data scientists and AI creators to create models they trust with the integration of Galileo by Z, making HP the only manufacturer to develop an AI platform for workstations with built-in generative AI trust for LLM development.
  • Experiencing AI on HP PCs:
    • The new HP OmniBook Ultra enables users to run workloads faster, customize models and maintain privacy – all locally on the device.
    • The HP OmniStudio X All-in-One Desktop PC offers creation and entertainment in a sleek modern design with built-in-AI features.

Canadian Pricing + Availability:

  • Z by HP AI Studio with Galileo integration is expected to be available in the fall of 2024.
  • The HP OmniBook Ultra 14-inch Next Gen AI PC will be available in mid-September starting at $1,899 CAD.
  • The HP OmniStudio X 27- and 31.5-inch All-In-One Desktop PCs will also be available in September starting at $2,299 CAD.

Microsoft Comes Up With A Tool To Fix The Issues Caused By CrowdStrike

Posted in Commentary with tags , on July 22, 2024 by itnerd

Since Friday, I’ve been fixing the the issue where Windows computers blue screen on startup because of a bad antivirus update from CrowdStrike. The basic fix takes about five minutes. But it’s five minutes per computer that you need to have physical access to. Which means it will take days for a decent sized company to get back up and running.

Enter Microsoft. They’ve come out with a recovery tool that creates a USB stick that fixes the issue faster than either you or I can. And on top of that, if the drive is encrypted with Microsoft’s BitLocker encryption, it will prompt for the BitLocker recovery key. Which hopefully you have handy. Regardless, this will speed up getting this issue dealt with. Kudos to Microsoft for helping to fix CrowdStrike’s screw up.

You can get this tool here along with instructions on how to use it.

CrowdStrike Puts Out Technical Details Of Their Epic Screw Up… Why This Should Be Required Reading For Everyone

Posted in Commentary with tags on July 21, 2024 by itnerd

After pretty much bricking every Windows 10/11 computer that ran CrowdStrike Falcon, CrowdStrike put out a post that details the technical ins and outs of what led up to what happened on Friday. You can read it here. In it they seem very open. And the company has committed to providing additional details and a root cause analysis.

The thing is that what happened on Friday is a warning to the planet, and to the IT industry. CrowdStrike really screwed up here and disrupted the planet in the process. The mitigation for this is relatively easy to apply as I did that a whole bunch of times on Friday and Saturday. But because of the scale of this event, we’re talking about days before this problem is fully dealt with. In other words, this was bad. But it could have been worse. We need to learn from that and be prepared for the next event like this. Because there will be a next event. That starts with CrowdStrike being completely open to laying bare what happened and what they will do to ensure that it never happens again. And that’s followed up by other companies learning from this event and ensuring that they don’t become the next Crowdstrike.

UPDATE: After I posted this, I got this commentary from John Gunn, CEO, Token:

If anyone wants to know what a full-blown cyberattack from China or other enemy nations might look like, this event just gave us a small preview of the interruptions and havoc that could be inflicted. Every day we hear about new ransomware attacks, but these are revealed because of the immediate financial payoff the attackers seek. There are undoubtedly countless significant network intrusions throughout our infrastructure and essential services that are undetected which are like sleeper cells waiting to be activated if we enter a major conflict with these nations.

Review: EnGenius Wifi 7 2x2x2 ECW526 Access Point

Posted in Products with tags on July 20, 2024 by itnerd

This review took way longer than it should have. That’s because I needed to find the right environment to properly test the EnGenius Wifi 7 2x2x2 ECW526 Access Point as my standard testing protocol that I’ve used in the past wouldn’t work for this WiFi 7 access point. In short, I had to call in a few favours to source WiFi 7 devices and find a network and Internet connection fast enough to really give this access point a proper test. Thus I ended up borrowing a Microsoft Surface Laptop 7 which came with WiFi 7 from a client who is going to have me deploy them to their workforce in the next 10 days or so. And I convinced a client who has a 10GB Internet connection and a 10GB backbone that I set up for them to leverage said Internet connection to let me use their set up on a Friday evening to test this access point. You’ll see why I went through all these hoops in a few minutes. Right now, let’s have a look at the access point.

The access point looks like pretty much every other EnGenius access point. But it has a metal base for starters. And it only has a single light on the front.

Here’s another area where things are different. It has a PoE port that does 10 Gigabit Ethernet. You read that correctly, 10 Gigabit Ethernet. There’s also a DC 12v plug. But if you’re using PoE, you won’t need it.

There’s also a Kensington lock slot to ensure that this access point doesn’t grow legs and walk away.

In terms of speeds, here’s what EnGenius says that this access point can handle:

  • 6 GHz: 5800 Mbps 
  • 5 GHz: 2900 Mbps 
  • 2.4 GHz: 700 Mbps

Those are pretty amazing numbers if they are accurate. And it explains why I needed to source a WiFi 7 compatible device and a network that could handle these speeds.

I won’t bore you with the setup details as in typical EnGenius fashion, it is trivial to set up. There’s no reason why you shouldn’t have this up and running within 15 minutes or less. But what you’re here to see is if this access point lives up to the numbers that EnGenius says it should. I should say up front that I always take the claims of those who make wireless gear with a pinch of salt. But having said that, on the 6GHz band where WiFi 7 lives, I encountered some pretty impressive speeds during my testing which involved copying a 4.65 GB file from a computer that was wired to the 10GB backbone directly to the Surface Laptop 7 on WiFi 7. Here are the results:

  • 1 Meter from the access point: 1.95 Gbps per second
  • 5 Meters from the access point: 1.2 Gbps per second
  • 10 Meters from the access point: 1.03 Gbps per second

All of this was within line of sight of the access point. Meaning that if it had to go through walls, the speeds will drop. Regardless, the worst result was slightly faster than wired Gigabit Ethernet. And if you plot out your deployment of WiFi 7 to have no WiFi 7 dead spots, you can likely do a whole lot better in terms of speed. Quite simply, this is the fastest WiFi device that I have ever tested.

Is there a downside to the EnGenius Wifi 7 2x2x2 ECW526 Access Point? None that I can think of. And the price is right at $299.00 USD a copy. And if the price for one unit isn’t enough for you to jump on this bandwagon, EnGenius has a buy 2 get 1 free deal at the moment. Which means that you can deploy WiFi 7 without breaking the bank. Thus making this access point truly a cost effective way of getting cutting edge WiFi into your environment.

The Challenge Of Fixing Computers Affected By The CrowdStrike Bug Is Going To Be MASSIVE

Posted in Commentary with tags on July 19, 2024 by itnerd

This CrowdStrike created nightmare via a bad antivirus update is a massive problem. How massive? Let me give you some perspective:

  • Plus or minus a billion computers are basically bricked worldwide.
  • These are mostly corporate ones as corporate computers are most likely to use the CrowdStrike AV software.
  • Every affected computer needs to be rebooted in Safe Mode and have a driver manually removed. That should take 4 to 5 minutes a computer. I know that because I’ve done that about 50 times today.
  • Smart companies take away the rights for common employees to do this.
  • Even if they had the rights to this, imagine the average end user trying to handle a moderately complex task like this.

This is most non trivial event that could possibly exist. But there’s more. I sourced comments from a number of industry experts on this:

Evan Dornbush, former NSA cybersecurity expert:

   “This is of course  a phishing attack opportunity. Don’t make a bad situation worse. Only follow recommended instructions direct from your CrowdStrike rep. There will be a lot of misinformation about how to reconfigure your computers or which critical system files to delete.  Don’t fall victim to downloading phony solutions.

   “Similarly, this is a great time to reflect on password management, since the fix may eventually require administrative access to systems that have not rebooted in quite some time.”

Omdia Senior Director, Cybersecurity Maxine Holt

The global IT outage crisis is escalating, and organizations everywhere are in full scramble mode, desperately implementing workarounds to keep their businesses afloat. Microsoft has pointed fingers at a third-party software update, while CrowdStrike admits to a “defect found in a single content update for Windows hosts” and is working feverishly with affected customers. Omdia analysts connect the dots: this isn’t a cyberattack, but it’s unquestionably a cybersecurity disaster.

Cybersecurity’s role is to protect and ensure uninterrupted business operations. Today, on 19 July 2024, many organizations are failing to operate, proving that even non-malicious cybersecurity failures can bring businesses to their knees. The workaround, involving booting into safe mode, is a nightmare for cloud customers. Cloud-dependent businesses are facing severe disruptions.

Omdia’s Cloud and Data Center analysts have long warned about over-reliance on cloud services. Today’s outages will make enterprises rethink moving mission-critical applications off-premises. The ripple effect is massive, hitting CrowdStrike, Microsoft, AWS, Azure, Google, and beyond. CrowdStrike’s shares have plummeted by more than 20% in unofficial pre-market trading in the US, translating to a staggering $16 billion loss in value.

Looking forward, there’s a shift towards consolidating security tools into integrated platforms. However, as one CISO starkly put it, “Consolidating with fewer vendors means that any issue has a huge operational impact. Businesses must demand rigorous testing and transparency from their vendors.”

CrowdStrike’s testing procedures will undoubtedly be scrutinized in the aftermath. For now, the outages continue to rise, and the tech world watches as the fallout unfolds.

Steve Hahn, Executive VP, BullWall:

   “This event, more than any other, is precisely why companies need a defense in depth strategy. One issue on your endpoint security and not only can your infrastructure go down, but you can be left wide open for a myriad of attacks. Ransomware uses endpoints, and other attack vectors, as their launch mechanism for their attack and you need layers of security over your critical data and fileshares.

   “It will be interesting to see if we have a ripple of downstream consequences. Right now we are dealing with outages at airlines and other critical businesses but will we also see a wave of Ransomware attacks that follow? Time will tell.”

I wish every help desk globally well in dealing with this as this is going to be days if not a week or two of remediation. I also hope that CrowdStrike gets hauled in front of the relevant authorities globally to explain why this happened, and why corporate users should trust them again.

UPDATE: Madison Horn for Congress (OK-5) adds this comment:

With 15 years of experience in both the private and public sectors, I bring a deep insight into complex technological issues. If elected, I will be the most credentialed cybersecurity lawmaker in U.S. history. My leadership transcends partisan divides, focusing on practical solutions. By bridging the gap between technology and policy, I will address workforce development, AI regulation, and trust in government. My candidacy represents a path toward bipartisan cooperation to confront our nation’s complex challenges.” 

“Today, we face the largest IT blackout in history, caused not by a cyber attack or malicious actor, but by human error. This outage has impacted communities and 911 operators, and what we can assume at this time, caused billion dollar losses across the global economy – starkly highlighting the fragility of our interconnected world. 

While today’s events could not have been prevented with a single solution, any set of systems that have the potential to cause massive societal impact in the event of failure—such as the 9/11 communication outages for first responders—must have right-sized regulations that protect human life and ensure economic stability. 

Presently, the critical infrastructure and financial sectors have requirements that ensure the classification of systems that could be single points of failure, yet misclassification and outdated regulations persist. In many cases, existing regulations are not properly tailored to specific industries. This issue is compounded by the fact that governing bodies struggle to keep pace with rapid technological change — leading to a disconnect in understanding the underlying technology, its dependencies, capabilities, cost of implementation, and workforce limitations. 

This gap between our regulatory landscape and the demands of the rapid advancement of technology impacting society are widening. To address today’s critical challenges, we need leaders who have expertise in technology, enabling Congress to effectively collaborate with the private sector to drive solutions. The technology we use today, which fits in a device smaller than a deck of cards, has the potential to disrupt critical infrastructure like our electric grid. To safeguard our future, we need elected leaders who not only grasp the gravity of this technological reality but also have the expertise to address and mitigate these risks effectively. 

UPDATE #2:  Tom Marsland, VP of Technology, Cloud Range adds this comment:

Recovery is going to be painful, to put it lightly. The recovery steps outlined by CrowdStrike involve manually booting the affected PC into a recovery mode, deleting a file, and restarting.  This is not something that can be done remotely, and in many organizations, will require an administrator. This means someone from IT Support going computer to computer and doing this manually. This was most certainly preventable. This sort of release goes to the importance of change / configuration management.  This update should’ve been tested internally by CrowdStrike, then released to a small subset of users, then to their broader ecosystem. That is done specifically to catch problems with updates before they affect the entire ecosystem. Either that didn’t happen here at all, or that process failed to catch this bug, which is a  problem in and of itself.

This will take days, probably weeks for larger organizations. Unfortunately, as is the case in many cyber breaches as well, this is nothing new. Organizations failure to follow best practices with testing and deploying patches (both from a CrowdStrike side and from an organization receiving updates side) is the root cause of this.  When major patches roll out or become available, putting on auto-updates is one way to make sure your organization gets patched, but if there’s any concern about the operability or function of that update, organizations generally roll those out within their own businesses to a small set at first, and then to everyone else. The organizations affected today seem to be the ones that turned on automatic updates and that was it.

UPDATE #3: Tom Siu, CISO, Inversion6

This case with CrowdStrike Falcon and Microsoft Windows highlights one of the low-frequency and high-impact risks that don’t often rise to the top of your Risk Index. I call it the “auto-immune response risk” situation where your security tools and services misidentify normative files and services, and automated corrective actions lead to system outage. In the military, we called these “blue on blue” engagements.

The lesson that cybersecurity professionals need to know is that in the real world, errors can happen and propagate throughout our environments. This is why cybersecurity and IT teams need to have clear shared objectives and cogent leadership to first recover the IT systems, avoid lowering the security posture, and then plan/execute a path forward.  Uptime may be important, and CISOs will have to justify arguments for extended outages caused by security tooling. Often the toughest call in an incident response scenario is to take systems offline due to a vulnerability; here we have them offline already. The planning and execution we see going on currently is basically a disaster recovery scenario.

One risk mitigation for this scenario is to use mildly diverse portfolio of endpoint security solutions. For example, one product on your endpoints, and a different product on your infrastructure. I know vendors, and CISOs, often desire to unify these applications under “one pane of glass” (licensing simplicity is a big factor) but this type of low-frequency risk is going to a harder argument for a multiple solutions.  

This doesn’t sound like a patch that went awry, but more of a more complex systems interaction that hasn’t been fully evaluated; I suggest we make our judgements about the vendors by the quality and transparency of their communications and assistance. Additionally, we as security professionals need to incorporate public and internal communications for this type of event into our Incident Response Plans.

In conclusion, one question I’ve seen today is, “Is this an IT outage or a security incident?”

My answer is, “Yes.”

SolarWinds Mostly Beats The Rap When It Comes To An SEC Lawsuit Related To Their Epic Pwnage

Posted in Commentary with tags on July 19, 2024 by itnerd

Well, this isn’t good in terms of accountability.

A U.S. judge dismissed most of a Securities and Exchange Commission lawsuit accusing software company SolarWinds of defrauding investors by concealing its security weaknesses before and after a Russia-linked cyberattack targeting the U.S. government. You can read the decision here.

John Gunn, CEO, Token had this to say:

The backdrop to this ruling is the recent SCOTUS decision in Loper that overturned the Chevron deference and placed a greater burden on regulatory agencies, including the SEC, to more clearly define regulatory requirements and to move decisions on penalties from agencies to the courts. 

Anyone who sees this as SolarWinds being relieved from the consequences of their actions is overlooking the $26 million they paid to settle the shareholder class action lawsuit resulting from this incident and the staggering $2 billion loss in company value they have suffered since the incident was disclosed. These financial penalties have the biggest impact on other organizations’ motivation to pursue more stringent cybersecurity protections and disclosures.

While SolarWinds did pay a financial price for this hack, I really think that this isn’t enough. Legal accountability has to be layered on top of this as a financial accountability will simply become a cost to doing business. That doesn’t happen with legal accountability. Hopefully this gets appealed.

Discounting Dominates Prime Day Says Salesforce data

Posted in Commentary with tags on July 19, 2024 by itnerd

Amazon reported its biggest sales this year via Prime Day. Here’s some key Canadian and global data which provides a snapshot based on the activity of 1.5 billion shoppers globally across Commerce Cloud and other Salesforce products.

Canadian data shows:

  • Discount rates (averaging at 27% off) were much more enticing this year compared to last year’s Prime Day with Canadian retailers increasing discount usage by 11%
  • Sales for non-Amazon retailers in Canada grew by 8% YoY
  • Canadian retailers witnessed consumers buying more units per transaction YOY (4.7% compared to 4.2 in 2023)
  • Canadian web traffic grew by 5% YoY (compared to +2% globally), while order growth shows an increase of 6% (higher than the flat 0% growth globally) 
  • Add to cart value (19%), conversion rate (2.5%) and cart abandonment rate (87%) for Canada remains stable YOY
  • Social traffic grew by 1% YOY (11% compared to 10% in 2023)

Global data shows: 

  • Global web traffic has grown +2% YoY
  • Top performing verticals (for sales growth) are:
  • Health & Beauty including makeup, skincare and haircare (+16%)
  • Makeup +30%
  • Skincare +14%
  • other health & beauty +14%
  • Active Footwear (+12%)
  • General Footwear (+8%)
  • Highest discounted categories for Prime Day 1+2 combined globally are:
  • General Apparel 28% 
  • Beauty, Makeup 28% (a jump of 7% from last year)
  • Beauty, Skincare 22%
  • Home, Furniture 22%

This data was provided by Salesforce.

CrowdStrike CEO Speaks To Taking Down The Entire Planet With A Bad AV Update…. And He Actually Apologizes For This Mess

Posted in Commentary with tags on July 19, 2024 by itnerd

Earlier today I posted a story about security company CrowdStrike taking down the entire planet with a bad antivirus update. In that story I pointed out that the CEO of CrowdStrike George Kurtz posted a Tweet where he completely failed to apologize for bringing the entire planet to a standstill. At the time I said this:

The problem with this Tweet is that he completely failed to apologize for basically taking down the entire planet because of a screw up with his product. If I used his product, I’d be looking to move to some other antivirus product. Because this Tweet to be frank, sucks.

Well, I guess someone must have told him that the Tweet in question didn’t go over well because I just found this on the YouTube channel of NBC:

You tell me about the quality of his response. I’m really not impressed by this as this kind of looks like a hostage video. But to be fair, he’s likely been up all night and he’s likely reconsidering his life choices. At least he apologized for taking down the entire planet, but maybe you have a different view. If so, post a comment and share it.

#Fail: Faulty CrowdStrike AV Update Takes Down Millions Of Windows PCs Globally

Posted in Commentary with tags on July 19, 2024 by itnerd

This is not a good look for cybersecurity company Crowdstrike.

A bad update for the CrowdStrike Falcon antivirus product installed on Windows PCs has taken down millions of PC globally. I am hearing stories of flights being grounded, Sky News being taken off air for a few hours, and retailers being unable to sell anything.

In short, this is extraordinary bad.

This is made worse by the CEO of CrowStrike who decided to Tweet. This Tweet was not a good idea:

The problem with this Tweet is that he completely failed to apologize for basically taking down the entire planet because of a screw up with his product. If I used his product, I’d be looking to move to some other antivirus product. Because this Tweet to be frank, sucks.

There is a workaround that was posted to Reddit. But it will have to be done on a PC by PC basis. Which means that companies could be down for days. Which is of course bad.

I’ll be watching this situation and posting updates when it warrants an update. But this situation is bad and likely won’t improve for a while. And when this is resolved, CrowdStrike will have a whole lot of explaining to do.

Former Trump Media Shell Company CEO Hit With Lawsuit Alleging Securities Fraud

Posted in Commentary with tags on July 18, 2024 by itnerd

From the “this might not help the share price” department comes news that Patrick Orlando who is the former CEO of Digital World Acquisition Company, which was a shell company that helped to take social media platform Truth Social public is being sued for securities fraud by the SEC:

In a filing with the court of District of Columbia, the SEC said Orlando broke rules concerning securities by issuing false and misleading statements while he led the blank-check firm.

Orlando misled investors by failing to disclose that his company had formulated a plan to acquire Trump Media & Technology Group Corp and was pursuing the acquisition before DWAC’s initial public offering, according to the filing.

In March, Digital World completed its merger with Trump Media & Technology Group that owns social media platform Truth Social, which is backed by Trump.

In July last year, DWAC had settled regulatory charges of “material misrepresentations” to investors.

The SEC had said DWAC was found to have violated antifraud provisions of federal securities laws. The company had agreed to a cease-and-desist order and to pay an $18 million penalty if it closes the merger.

Now news like this won’t help the stock price of a normal stock. But Trump Media is the definition of a meme stock as it is grossly overvalued. So the normal rules don’t apply. Having said that, this likely isn’t going to be good news for the stock and Trump Media. Thus it will be interesting to see what effect that this lawsuit has on both parties.