Skip to main content
Disassembling ‘The Chinese Computer’
To:Brew Readers
IT Brew // Morning Brew // Update
Book club!
April 15, 2024 View Online | Sign Up

IT Brew

Amazon Web Services DevOps

It’s Monday! It’s tax day. Time to finally take off those eclipse glasses, find those W-2s, and face reality.

In today’s edition:

China’s keys to computing

Leaving for Linux

Let’s just have the AI party here!

—Amanda Florian, Tom McKay, Billy Hurley, Patrick Lucas Austin

IT OPERATIONS

Computer class

computer screen being hacked Francis Scialabba

What do decades-old Chinese computing inputs have to do with today’s biggest tech companies and generative AI? IT Brew recently caught up with Tom Mullaney, a sinologist, Stanford University professor of Chinese history, and author of The Chinese Computer, an upcoming book he spent 16 years working on. In the book, he outlines the many methods used to produce Chinese characters. The first and most basic component of Chinese computing—when it comes to these inputs and outputs—is that users “operate entirely in code all the time.”

To type out the phrase, “We like computers,” using the Sogou Pinyin method, for example, someone would use a standard QWERTY keyboard and use the input method editor to select the corresponding characters they wanted. So, “wm,” “xh,” and “dn” become the fully translated Simplified Chinese phrase: “我们喜欢电脑” after selection. In this way, people using inputs in Chinese think in code while typing out their sentences—as opposed to spelling something letter by letter with the Latin alphabet.

“From a practical standpoint, if it weren’t for all of the engineers and linguists I talked about in the book, basically modding and hacking and [creating] workarounds and bootstrapping, computing—there would be no Chinese computing market. Like, Microsoft and Apple would never have set a toe in the Chinese computing environment,” he told IT Brew.

Read more here.—AF

Do you work in IT or have information about your IT department you want to share? Email [email protected].

   

PRESENTED BY AMAZON WEB SERVICES DEVOPS

Achieve application portability

Amazon Web Services DevOps

Join Amazon Web Services (AWS) and DevOps Institute for a practical webinar on leveraging AWS solutions to streamline cloud application architectures for portability with Kubernetes. Learn best practices for building applications that dynamically scale to runtime conditions.

As runtime environments get more diverse and complex, developers can get bogged down by having to ensure consistent application performance across a variety of configurations. They need more options for building applications that dynamically adapt to runtime conditions, ensuring optimal performance regardless of location or scale.

Register today.

IT STRATEGY

We’ve moved!

An illustration of a white window with blue paned glass in front of a yellow background. The top four panes are made to look like Microsoft's slanted, rectangular Windows logo, and peeping out through the open part of the window is a swirly blue background. Francis Scialabba

The German state of Schleswig-Holstein has finished its review and is now taking concrete steps to migrate around 30,000 employees from Windows to Linux, Ars Technica reported. That means workers will use open-source software including LibreOffice, Nextcloud, Open X-Change, and Mozilla Thunderbird instead of Microsoft equivalents like Word and Exchange/Outlook.

Schleswig-Holstein will also develop an open-source alternative to Microsoft Active Directory, as well as its own telephone services, according to Ars Technica.

Justifications for the switch include older devices—a former minister told a German-language IT news portal in 2021 some of their computers couldn’t handle new Windows 11 hardware requirements—as well as cost, security, and freedom from international cloud services.

In an announcement in German, Schleswig-Holstein Digitalization Minister Dirk Schrödter touted investment in “real programming services from our domestic digital economy” rather than software licensing. He also wrote the move away from proprietary software would strengthen the state’s push for digital sovereignty and positions it to seek alternatives when building future administrative apps and services.

Read more here.—TM

Do you work in IT or have information about your IT department you want to share? Email [email protected]. Want to go encrypted? Ask Tom for his Signal.

   

AI

On-prem again, off again

Small IBM logo with AI behind it Sopa Images/Getty Images

In the AI age, IT pros have a familiar question to consider: On-prem or not on-prem?

According to a recent panel discussion at Bloomberg Headquarters, IT practitioners must take inventory of a company’s AI efforts and weigh the benefits of hosting the services on location or off in the cloud.

“The thing you should be asking yourself on a technical level is at what point is the majority of the IT capacity of your enterprise in service of AI-driven technology versus traditional workloads? And if the answer is greater than 50%, you need to rethink your entire IT architecture and start building to optimize for AI first,” John Roese, global chief technology officer, Dell Technologies, told a crowd during Bloomberg Intelligence’s April 4 event, Generative AI: Next steps and evolution.

The evolution: Generative AI is poised to produce $1.3 trillion in revenue, according to Bloomberg Intelligence, and generative AI “is poised to expand its impact from less than 1% of total IT hardware, software services, ad spending, and gaming market spending to 10% by 2032.”

Early, controversial uses of the tech already include generating summaries, code, personalized recommendations, art, and language translation.

Keep reading here.—BH

Do you work in IT or have information about your IT department you want to share? Email [email protected].

   

TOGETHER WITH AKAMAI

Akamai

Keep an eye on your API. Hackers are out there, and APIs present an eye-catching attack surface. Thankfully, Akamai’s white paper has critical security information, such as how to address the complete API threat landscape and incorporate the latest tech. Check it out to learn the dos and don’ts of API security.

PATCH NOTES

Picture of data with "Clean Me" written on it + bottle of cleaner in front of it, Patch Notes Francis Scialabba

Today’s top IT reads.

Stat: 34%. That’s the portion of US CEOs who believe that employees will fully return to the office within the next 10 years, according to a study released by accountancy firm KPMG US. The percentage of CEOs who held that view in 2023: 62%. (Business Insider)

Quote: “We’ve deployed two use cases. But what about a world where we might have 100,000?”—Jeff McMillan, the new head of firmwide AI at Morgan Stanley, talking about how banks are testing out the cutting-edge tech (Axios)

Read: One tech editor’s long week with the wearable AI Pin. (CNET)

Got adaptability?: When optimal performance isn’t optional, your applications need to be consistent, dynamic, and endlessly adaptable. Join this AWS + DevOps Institute webinar to see how it’s done. Register today.*

*A message from our sponsor.

SHARE THE BREW

Share IT Brew with your coworkers, acquire free Brew swag, and then make new friends as a result of your fresh Brew swag.

We’re saying we’ll give you free stuff and more friends if you share a link. One link.

Your referral count: 2

Click to Share

Or copy & paste your referral link to others:
itbrew.com/r/?kid=9ec4d467

         
ADVERTISE // CAREERS // SHOP // FAQ

Update your email preferences or unsubscribe here.
View our privacy policy here.

Copyright © 2024 Morning Brew. All rights reserved.
22 W 19th St, 4th Floor, New York, NY 10011

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.