To Execution profile or to Memory Profile? That is the question.
Profilers work by either sampling top of stack or instrumenting the code with probes, or a combination of both. These techniques are very good at finding computations that happen frequently or take a long time. As my group experienced, the information gathered by execution profilers often correlates well with the source of the memory inefficiency. However it points to an execution problem which can sometimes be confusing.
Despite cloud computing security risks, infosec pros know their role
"If all of us by default have this level of trust in the cloud, why are we so uncomfortable when the business units come to us and say, 'I'm going to put this data out in the cloud'?" asked LaRosa. As he sees it, even though society has already come to trust the cloud tacitly, security pros still "push back" against enterprise cloud computing initiatives. "The problem isn't with the cloud," LaRosa added, it's with security practitioners' ability to evolve and accept it.
Other browser makers follow Google's lead, revoke rogue certificates
Google revoked the certificates for users of its Chrome browser on Saturday after a four-day investigation. Microsoft, Mozilla and Opera Software followed suit on Monday. In a security advisory, Microsoft said it had released an update to most versions of Windows -- including Windows Phone 8, Windows 8.1 and Windows Server 2012 R2 -- that revoked the pertinent certificates. Unlike other browser makers, Microsoft records trusted digital certificates in Windows, not in its Internet Explorer (IE) browser.
Report: Risk of an Uncertain Security Strategy
In spite of high-profile data breaches and the potential business impact of cyber attacks and data loss, small and midsize organizations are still not making cyber security a priority. Sophos and the Ponemon Institute recently released a report, Risk of an Uncertain Security Strategy, that highlights the need to make security a key priority.
Enterprise mobile management demands rethinking of work, play and productivity
To share his insights on how to better prepare for a mobile-enablement future that quickly complements other IT imperatives such as cloud, big data, and even more efficient data centers, we’re joined by Tom Kendra, Vice President and General Manager, Systems Management at Dell Software. The discussion is moderated by me, Dana Gardner, Principal Analyst at Interarbor Solutions.
Tomorrow's Data Center Will Be Mobile, Flexible, Highly Efficient and Secure
"This year, we're seeing organizations really start to examine how 'software-defined' everything impacts the data center," Cappuccio says. "Software-defined networking, software defined storage, that's all part of the conversation; how to move away from the physical and into the conceptual, but is there a way to take that concept and apply that to data centers as a whole."
Building Innovative Organizations with Lean Thinking
Since Peter Drucker first introduced the concept of "innovative organization”, it has become a buzzword amongst corporate managers. Particularly in IT, companies strive to create innovative teams. But whilst there has been a lot of theoretical discussion on how to build innovative organizations, there have been few practical experiments and analysis. Innovative organizations are like the moon: beautiful to look at, but seemingly impossible to grasp.
Do two-factor authentication vulnerabilities outweigh the benefits?
Most two-factor authentication technologies used with online services generate a one-time password (OTP) when users logs in with their username and password. A user receives the OTP via an SMS on their registered mobile device and enters it on the website to complete the login procedure. While two-factor authentication is a definite improvement on plain password authentication, it is not infallible.
Information Governance: Why It's Becoming a Boardroom Imperative
The rapid growth of data across the enterprise has resulted in increasing risk, liability and cost to organizations. At the same time, there is a significant opportunity to tap into this data to deliver increased productivity and greater strategic insight. In this slide show, with input from a Hewlett-Packard Autonomy study, eWEEK looks at the key reasons information governance is fast becoming a boardroom imperative.
Meg Whitman: Moonshot servers will solve datacenter power and cost crisis
"If the cloud were an independent county, it would rate number five in energy use. China is number one, the US is number two, Russia is number three, India is number four and the cloud is number five, and Japan is sixth," she said. Datacentres consume about two percent of the world's electricity, Whitman told the conference audience. "By the end of the decade datacentre demand will rise to over three percent unless we find a more efficient technology. This is not sustainable. We have to make better use of the electricity that we've got," she said.
Quote for the day:
"Education is more than a luxury; it is a responsibility that society owes to itself." -- Robin Cook
Profilers work by either sampling top of stack or instrumenting the code with probes, or a combination of both. These techniques are very good at finding computations that happen frequently or take a long time. As my group experienced, the information gathered by execution profilers often correlates well with the source of the memory inefficiency. However it points to an execution problem which can sometimes be confusing.
Despite cloud computing security risks, infosec pros know their role
"If all of us by default have this level of trust in the cloud, why are we so uncomfortable when the business units come to us and say, 'I'm going to put this data out in the cloud'?" asked LaRosa. As he sees it, even though society has already come to trust the cloud tacitly, security pros still "push back" against enterprise cloud computing initiatives. "The problem isn't with the cloud," LaRosa added, it's with security practitioners' ability to evolve and accept it.
Other browser makers follow Google's lead, revoke rogue certificates
Google revoked the certificates for users of its Chrome browser on Saturday after a four-day investigation. Microsoft, Mozilla and Opera Software followed suit on Monday. In a security advisory, Microsoft said it had released an update to most versions of Windows -- including Windows Phone 8, Windows 8.1 and Windows Server 2012 R2 -- that revoked the pertinent certificates. Unlike other browser makers, Microsoft records trusted digital certificates in Windows, not in its Internet Explorer (IE) browser.
Report: Risk of an Uncertain Security Strategy
In spite of high-profile data breaches and the potential business impact of cyber attacks and data loss, small and midsize organizations are still not making cyber security a priority. Sophos and the Ponemon Institute recently released a report, Risk of an Uncertain Security Strategy, that highlights the need to make security a key priority.
Enterprise mobile management demands rethinking of work, play and productivity
To share his insights on how to better prepare for a mobile-enablement future that quickly complements other IT imperatives such as cloud, big data, and even more efficient data centers, we’re joined by Tom Kendra, Vice President and General Manager, Systems Management at Dell Software. The discussion is moderated by me, Dana Gardner, Principal Analyst at Interarbor Solutions.
Tomorrow's Data Center Will Be Mobile, Flexible, Highly Efficient and Secure
"This year, we're seeing organizations really start to examine how 'software-defined' everything impacts the data center," Cappuccio says. "Software-defined networking, software defined storage, that's all part of the conversation; how to move away from the physical and into the conceptual, but is there a way to take that concept and apply that to data centers as a whole."
Building Innovative Organizations with Lean Thinking
Since Peter Drucker first introduced the concept of "innovative organization”, it has become a buzzword amongst corporate managers. Particularly in IT, companies strive to create innovative teams. But whilst there has been a lot of theoretical discussion on how to build innovative organizations, there have been few practical experiments and analysis. Innovative organizations are like the moon: beautiful to look at, but seemingly impossible to grasp.
Do two-factor authentication vulnerabilities outweigh the benefits?
Most two-factor authentication technologies used with online services generate a one-time password (OTP) when users logs in with their username and password. A user receives the OTP via an SMS on their registered mobile device and enters it on the website to complete the login procedure. While two-factor authentication is a definite improvement on plain password authentication, it is not infallible.
Information Governance: Why It's Becoming a Boardroom Imperative
The rapid growth of data across the enterprise has resulted in increasing risk, liability and cost to organizations. At the same time, there is a significant opportunity to tap into this data to deliver increased productivity and greater strategic insight. In this slide show, with input from a Hewlett-Packard Autonomy study, eWEEK looks at the key reasons information governance is fast becoming a boardroom imperative.
Meg Whitman: Moonshot servers will solve datacenter power and cost crisis
"If the cloud were an independent county, it would rate number five in energy use. China is number one, the US is number two, Russia is number three, India is number four and the cloud is number five, and Japan is sixth," she said. Datacentres consume about two percent of the world's electricity, Whitman told the conference audience. "By the end of the decade datacentre demand will rise to over three percent unless we find a more efficient technology. This is not sustainable. We have to make better use of the electricity that we've got," she said.
Quote for the day:
"Education is more than a luxury; it is a responsibility that society owes to itself." -- Robin Cook
No comments:
Post a Comment