Category: Computing

  • Computer Security: Pay per vulnerability

    Computer Security: Pay per vulnerability

    The Computer Security team decided to engage with ethical hackers and launched a three (and a half) staged approach towards improving the security of CERN’s Internet presence and beyond

    Explore →

  • IT: interactions, innovations, impact

    In the logical sequence from collisions to a scientific breakthrough, computing comes last. But definitely not least

    Explore →

  • CERN donates computing equipment to South Africa

    CERN donates computing equipment to South Africa

    On 9 April 2024, a ceremony at CERN marked the donation of computing equipment to the Tshwane University of Technology in South Africa

    Explore →

  • The next-generation triggers for CERN detectors

    The next-generation triggers for CERN detectors

    The recently launched Next-Generation Triggers project is set to remarkably increase the efficiency, sensitivity and modelling of CERN experiments

    Explore →

  • Computer Security: Swipes vs PINs vs passwords vs you

    Computer Security: Swipes vs PINs vs passwords vs you

    There are many different ways to unlock your smartphone: swiping patterns, PIN numbers, passwords, biometric fingerprints or face recognition. Some are more secure, some less so

    Explore →

  • World Wide Web at 35

    World Wide Web at 35

    From Tim Berners-Lee’s first proposal in March 1989 to today, the World Wide Web’s impact on society has been profound

    Explore →

  • Computer Security: Day of the open firewall

    Computer Security: Day of the open firewall

    With ongoing vulnerability scans of CERN’s internet presence, the Computer Security team’s plans to perform penetration testing against selected targets visible to the internet

    Explore →

  • CERN rewarded for its contributions to cloud computing

    CERN rewarded for its contributions to cloud computing

    The award recognises CERN’s innovative use of cloud native technologies to address future scientific and operational challenges

    Explore →

  • Farewell to the Alcatel phone exchange

    Farewell to the Alcatel phone exchange

    Following the migration to software-based phones, CERN phones are now fully virtual and the Alcatel phone exchange has been disconnected

    Explore →

  • Computer Security: Bingo walk-through

    Computer Security: Bingo walk-through

    Bravo to all those who participated in the Bull**** Bingo and sent us their solution. Some people were wondering why their responses were not correct… Good point, so let’s walk through that Bingo

    Explore →