July 16, 2013

The Virtual Tug of War
The basis of the age-old feud is clear – performance as dictated by the networking camp vs. a protected environment as advocated by the security folks. The uneasy Solomonic decision facing CIOs the world over is whether to skimp on security in order to ensure flawless application delivery or ensure the organization is safe by taking a performance hit in order to avoid becoming a security statistic.


Unusual file-infecting malware steals FTP credentials
Once the new EXPIRO variant runs on a system, it searches for .EXE files on all local, removable and networked drives, and adds its malicious code to them. In addition, it collects information about the system and its users, including Windows log-in credentials, and steals FTP credentials from a popular open-source FTP client called FileZilla.


Identity and access management market faces identity crisis in cloud
Legacy approaches to IAM, such as Active Directory or Oracle's Identity Manager, are failing organizations because those products can't manage access from consumer endpoints, don't support rapid adoption of cloud services and can't provide secure data exchange across user populations, said Wendy Nather, an analyst with the 451 Research Group.


Apple: Game over or room to grow?
No, the real problem with Apple is that this company, long the arbiter of cool, the corporate trendsetter on all matters from design to marketing to operational excellence, has gone from being insanely great to merely great. ... The criticism that stings Apple the most is that it has lost its edge for innovation. The defensiveness over the frequently repeated criticism shone through during Apple's keynote presentations at its annual conference for developers in June.


5 Ways to Refocus Your Small Business In Tough Times
Successful businesses need to be able to blend a great idea with a well-thought-out and repeatable plan.  Striking that balance has proven to be a big challenge for many small business owners. "This is a tough time to be in business," said Gary Barnes, a serial entrepreneur and founder of Gary Barnes International. "More of us than ever are facing new problems and challenges."


What should you know about Next Generation Firewalls?
NGFW vendors must resist the urge to continue to bundle every security module in a single device since this is not how most enterprise customers deploy their network security. In addition, it is important that NGFWs retain the implicit “deny all” when it comes to application traffic rather than expecting administrators to tune individual applications to prevent tunneling in the manner of IPS signatures.


Toshiba to sell world's fastest SD cards this year
Toshiba said its latest memory is the first to use a controller that is compliant with the UHS-II (Ultra High Speed) specification, which theoretically offers speeds up to 312 MBps. The specification was first announced by the SD Association in January 2011, at the annual CES Electronics show in Las Vegas.


Gigabit-Boosted DSL Internet Standard Could be Ready in 2014, ITU Says
The standard is expected to be deployed by service providers that want to offer Fiber to the Home-like services, the ITU said. G.fast is meant to enable flexible upstream and downstream speeds to support bandwidth-intensive applications such as uploading high-resolution video and photo libraries to cloud-based storage, and communicating via HD video, it said.


The Chain of Responsibility Pattern in .NET
The Chain of Responsibility Pattern consists of three components: the handler interface, at least one concrete handler, and the client application. The handler interface defines the contract for handling a request in the chain. The concrete handler class implements the handler interface and either handles the request or forwards it to its successor handler. The client application sends the request to the initial concrete handler.



Quote for the day:

"Whatever you do, do it with intelligence, and keep the end in view." -- Thomas à Kempis