Farewell to the Alcatel phone exchange
Farewell to the Alcatel phone exchangeOn 14 February, CERN disconnected the Alcatel phone exchange, which began in 1990 (and hit the frontpage of the Bulletin at the time). This now marks the end of...
View ArticleCERN ticketing system introduces automated retention – closed tickets may be...
CERN ticketing system introduces automated retention – closed tickets may be deletedWith nearly 400 services across CERN making use of the CERN Service Desk, you’ve probably had to open a few tickets...
View ArticleCERN rewarded for its contributions to cloud computing
CERN rewarded for its contributions to cloud computingOn 21 March, CERN received the “Top End User” special award from the Cloud Native Computing Foundation (CNCF) for its “forward-looking approach to...
View ArticleComputer Security: Day of the open firewall
Computer Security: Day of the open firewallWith ongoing vulnerability scans of CERN’s internet presence performed by an external specialised company, the Computer Security team’s plans to perform...
View ArticleWorld Wide Web at 35
World Wide Web at 35Tim Berners-Lee invented and developed the World Wide Web as an essential tool for high energy physics at CERN from 1989 to 1994. Together with a small team he conceived HTML, http,...
View ArticleComputer Security: Swipes vs PINs vs passwords vs you
Computer Security: Swipes vs PINs vs passwords vs youWhat kind of person are you? An artist, like a painter? A credit card fanatic or just “in numbers”? Cerebral, a memoriser or even a genius? An...
View ArticleThe next-generation triggers for CERN detectors
The next-generation triggers for CERN detectors The experiments at the Large Hadron Collider (LHC) require high-performance event-selection systems – known as “triggers” in particle physics – to filter...
View ArticleCERN donates computing equipment to South Africa
CERN donates computing equipment to South AfricaOn 9 April 2024, a ceremony at CERN marked the donation of computing equipment to the Tshwane University of Technology in South Africa. The ceremony was...
View ArticleIT: interactions, innovations, impact
IT: interactions, innovations, impactIn the logical sequence from collisions to a scientific breakthrough, computing comes last. But definitely not least. At CERN, computing is a distributed effort....
View ArticleComputer Security: Pay per vulnerability
Computer Security: Pay per vulnerabilityRemember CERN’s WhiteHat Challenge, in which we gave people outside CERN permission to hack into the Organization as long as they abided by a short set of rules...
View ArticleComputer Security: WhiteHat & Zebra trainings are back
Computer Security: WhiteHat & Zebra trainings are backVulnerabilities and weaknesses lurk all over the digital place: unprotected file uploads, generous SQL queries, unfiltered input fields,...
View ArticleComputer Security: The better generation
Computer Security: The better generationTo all those fine folks out there who are interested in computer security, who take care of the secrecy of their passwords and other credentials, who protect...
View ArticleComputer Security: Blind trust means money lost
Computer Security: Blind trust means money lostWe acknowledge that finding decent accommodation near CERN in the Geneva area or the Pays de Gex is difficult. Particularly difficult if you’re trying to...
View ArticleComputer Security: Dear summer students, welcome!
Computer Security: Dear summer students, welcome!A warm welcome to the summer-student class of 2024! We’re glad that you made it to CERN! We offer a packed agenda for the next two months: challenging...
View ArticleComputer Security: Don’t print naked
Computer Security: Don’t print nakedIf you’re interested in what’s going on at CERN, in professional projects and plans, or in private problems and parties, hanging out at one of CERN’s printers is a...
View ArticleDigital archaeology: new LEP data now available to all
Digital archaeology: new LEP data now available to allUnlike letters carved on the Rosetta stone, digital data is not written on a virtually immutable support. Just a few years after it is written, its...
View ArticleComputer Security: Security NIMBYs
Computer Security: Security NIMBYsSecurity sucks. No doubt about it. It’s a cost factor, a resource drain, and does not provide any immediate benefit. It creates hurdles, inconveniences and...
View ArticleCERN Drawing Directory (CDD) to be phased out before the end of 2024
CERN Drawing Directory (CDD) to be phased out before the end of 2024After almost 30 years of use*, the CERN Drawing Directory (CDD) will be gradually phased out before the end of 2024. The new PLM...
View ArticleComputer Security: Audited for the better
Computer Security: Audited for the betterSummer 2023 was an intense season for CERN computer security. In the context of a dedicated cybersecurity audit, as planned by the five-yearly internal audit...
View ArticleCERN70: Where the Web was born…
CERN70: Where the Web was born…20 August 2024 · Voir en françaisPart 15 of the CERN70 feature series. Find out more: cern70.cernTim Berners-Lee wrote a proposal in 1989 for an information management...
View Article