Tag Archives: Features

Hosting Ars, part three: CI/CD, or how I learned to stop worrying and love DevOps

Enlarge / DevOps, DevOps, DevOps! ArtemisDiana / Getty Images reader comments 19 with Hosting Ars View more stories One of the most important things to happen in the evolution of development over the past many years is the widespread adoption of continuous integration and continuous deployment, or CI/CD. (Sometimes the “CD” stands for “continuous delivery,”… Read More »

How we host Ars Technica in the cloud, part two: The software

Enlarge / Welcome aboard the orbital HQ, readers! Aurich Lawson | Getty Images reader comments 3 with Hosting Ars View more stories Welcome back to our series on how Ars Technica is hosted and run! Last week, in part one, we cracked open the (virtual) doors to peek inside the Ars (virtual) data center. We… Read More »

The IBM mainframe: How it runs and why it survives

Enlarge / A Z16 Mainframe. reader comments 8 with Mainframe computers are often seen as ancient machines—practically dinosaurs. But mainframes, which are purpose-built to process enormous amounts of data, are still extremely relevant today. If they’re dinosaurs, they’re T-Rexes, and desktops and server computers are puny mammals to be trodden underfoot. It’s estimated that there… Read More »

The ‘90s Internet: When 20 hours online triggered an email from my ISP’s president

Banj Edwards | Aurich Lawson | Getty Images reader comments 112 with “When checking the system this morning, I noticed your account logged in for over 20 hours,” begins a December 1998 email from the president of my dial-up Internet service provider (ISP) at the time. “Our service is unlimited, but we ask that you… Read More »

Why AI detectors think the US Constitution was written by AI

Enlarge / An AI-generated image of James Madison writing the US Constitution using AI. Midjourney / Benj Edwards reader comments 84 with If you feed America’s most important legal document—the US Constitution—into a tool designed to detect text written by AI models like ChatGPT, it will tell you that the document was almost certainly written by… Read More »

Hackers can steal cryptographic keys by video-recording power LEDs 60 feet away

Enlarge / Left: a smart card reader processing the encryption key of an inserted smart card. Right: a surveillance camera video records the reader’s power LED from 60 feet away. Nassi et al. reader comments 33 with Researchers have devised a novel attack that recovers the secret encryption keys stored in smart cards and smartphones… Read More »

Passkeys may not be for you, but they are safe and easy—here’s why

Aurich Lawson | Getty Images reader comments 121 with My recent feature on passkeys attracted significant interest, and a number of the 1,100-plus comments raised questions about how the passkey system actually works and if it can be trusted. In response, I’ve put together this list of frequently asked questions to dispel a few myths… Read More »

Google passkeys are a no-brainer. You’ve turned them on, right?

Aurich Lawson | Getty Images reader comments 389 with By now, you’ve likely heard that passwordless Google accounts have finally arrived. The replacement for passwords is known as “passkeys.” There are many misconceptions about passkeys, both in terms of their usability and the security and privacy benefits they offer compared with current authentication methods. That’s… Read More »