Amazon's WorkSpaces: Why is it needed?
While WorkSpaces are based on Windows Server and include traditional office applications, they can be linked to a wide variety of devices through custom WorkSpaces clients. These devices harmonize the applications' GUI (essentially, Windows 7) with the specifics of the client devices. Amazon uses the Teradici PCoIP protocol to create a secure link between the WorkSpaces instances in the cloud and the clients, and because the protocol carries only the GUI and not the underlying application data, there's inherently less exposure of secure information as well as encryption and authentication (via Active Directory) protection for applications.
RSA 2014: Principles key to digital world, says Microsoft
Adherence to the principles of security, transparency and privacy means that Microsoft does defence and not offence, said Charney. It also means Microsoft does not put back doors in its products and services, which in any case would be economic suicide, he said. “People have asked if our Defender anti-virus product will raise alerts if it finds government surveillance software, but the answer is simple. We don’t care what the source or the motive of malware is.
Coca-Cola’s New Marketing Map: Is It Better?
This blog entry focuses on two issues: What went wrong with Coke’s social media marketing? and How can Coke get more bang for fewer bucks? The nadir of Coca-Cola’s disconnect with fans and readers is its millions of Likes, which often result in fewer than 100 comments. Its largest market is the US; this is where its weakness is most evident. Meanwhile, Diet Coke faces rising concerns over artificial sweeteners. Coca-Cola has announced that profits fell by 8.4 percent in the last quarter of 2013, and it is now eyeing US$1 billion in cuts.
eBook: Fundamentals of SQL Server 2012 Replication
Fundamentals of SQL Server 2012 Replication provides a hands-on introduction to SQL Server replication. The book begins with a short overview that introduces you to the technologies that make up replication. In the following chapters, the book will walk you through setting up different replication scenarios. All hands-on exercises are designed with security best practices in mind. When you're finished working through the exercises, you will be able to implement your own multi-server replication setup while following the principle of least privilege.
DataStax adds in-memory option to Cassandra database
Besides being fast, the in-memory option introduced with DataStax Enterprise 4.0 is also easy to use, and allows developers to treat in-memory objects the same way they would regular Cassandra tables. The platform is based on the 2.0 release of the open-source database, which adds support for lightweight transactions and includes improvements to the native query language that make it a bit easier to import data from relational systems. That helps clear a migration path for slow-moving enterprises with large-scale Oracle investments to sustain—a task that consumes a lot of time and resources but doesn’t generate any quantifiable value.
Five Things Developers Need to Know About PaaS
As with any new technology or approach to doing business, PaaS will appeal to different groups for different reasons. The clear business value is that PaaS is added at the application layer. For ISVs, PaaS can help extend the availability of a traditional software product or enable organizations to add new capabilities to their existing IT spectrum. It's also helpful to anyone wishing to achieve productivity gains, speed time to results, or reduce their costs. But like any technological shift, PaaS adoption requires changes in how people work and demands collaboration if it is to be as successful as possible.
SQL Server Indexed Views: The Basics
Indexed views can be a powerful tool, but they are not a 'free lunch' and we need to use them with care. Once we create an indexed view, every time we modify data in the underlying tables then not only must SQL Server maintain the index entries on those tables, but also the index entries on the view. This can affect write performance. In addition, they also have the potential to cause other issues. For example, if one or more of the base tables is subject to frequent updates, then, depending on the aggregations we perform in the indexed view, it is possible that we will increase lock contention on the view's index.
How to dispose of unwanted backup media
Whether you write your backups to removable media, spinning disks, or some combination of the two, your backup media will eventually wear out and need to be replaced. Of course, this raises the question of how best to dispose of unwanted backup media. The problem with backup media disposal is that your backup media contains sensitive data. Even if the data really doesn't seem all that important, there is no shortage of surprisingly creative uses for various forms of stolen data. As such, it is clearly in your best interest to make sure that the contents of old backup media do not fall into the wrong hands.
Microsoft launches technical preview of Emet 5.0
Version 5.0 adds two new protections for enterprises on top of the 12 built-in security mitigations included in version 4.1. First, an attack surface reduction mitigation helps enterprises protect third-party and custom-built applications by selectively enabling Java, Adobe Flash Player and Microsoft or third-party plugins. “Enterprises can configure Java to load on the intranet for line-of-business applications but not on the internet,” Ness told Computer Weekly. “Most businesses need Java only internally, but this opens them up to vulnerabilities on the internet. Emet 5.0 enables enterprises to block Java where they do not need it,” he said.
Samsung beefs up Knox mobile management software
With the update, however, Samsung will allow some third-party MDM and enterprise mobility management (EMM) vendors to run in an untrusted state on the personal side of a device. Software from MDM vendors Good, Mobile Iron and Fixmo will be allowed to run on the personal side. Good's software will work better on a Samsung device than any other device, Samsung asserted. The cost of Knox 2.0 service will be $3.60 per user per month with pricing discounts for larger volumes. IT shops will be able to sign up for Knox software online. Injong Rhee, Samsung's senior vice president of research for business-to-business mobile communication, led the Knox briefing for Computerworld.
Quote for the day:
"The secret of joy in work is contained in one word: excellence. To know how to do something well is to enjoy it" -- Pearl Buck
While WorkSpaces are based on Windows Server and include traditional office applications, they can be linked to a wide variety of devices through custom WorkSpaces clients. These devices harmonize the applications' GUI (essentially, Windows 7) with the specifics of the client devices. Amazon uses the Teradici PCoIP protocol to create a secure link between the WorkSpaces instances in the cloud and the clients, and because the protocol carries only the GUI and not the underlying application data, there's inherently less exposure of secure information as well as encryption and authentication (via Active Directory) protection for applications.
RSA 2014: Principles key to digital world, says Microsoft
Adherence to the principles of security, transparency and privacy means that Microsoft does defence and not offence, said Charney. It also means Microsoft does not put back doors in its products and services, which in any case would be economic suicide, he said. “People have asked if our Defender anti-virus product will raise alerts if it finds government surveillance software, but the answer is simple. We don’t care what the source or the motive of malware is.
Coca-Cola’s New Marketing Map: Is It Better?
This blog entry focuses on two issues: What went wrong with Coke’s social media marketing? and How can Coke get more bang for fewer bucks? The nadir of Coca-Cola’s disconnect with fans and readers is its millions of Likes, which often result in fewer than 100 comments. Its largest market is the US; this is where its weakness is most evident. Meanwhile, Diet Coke faces rising concerns over artificial sweeteners. Coca-Cola has announced that profits fell by 8.4 percent in the last quarter of 2013, and it is now eyeing US$1 billion in cuts.
eBook: Fundamentals of SQL Server 2012 Replication
Fundamentals of SQL Server 2012 Replication provides a hands-on introduction to SQL Server replication. The book begins with a short overview that introduces you to the technologies that make up replication. In the following chapters, the book will walk you through setting up different replication scenarios. All hands-on exercises are designed with security best practices in mind. When you're finished working through the exercises, you will be able to implement your own multi-server replication setup while following the principle of least privilege.
DataStax adds in-memory option to Cassandra database
Besides being fast, the in-memory option introduced with DataStax Enterprise 4.0 is also easy to use, and allows developers to treat in-memory objects the same way they would regular Cassandra tables. The platform is based on the 2.0 release of the open-source database, which adds support for lightweight transactions and includes improvements to the native query language that make it a bit easier to import data from relational systems. That helps clear a migration path for slow-moving enterprises with large-scale Oracle investments to sustain—a task that consumes a lot of time and resources but doesn’t generate any quantifiable value.
Five Things Developers Need to Know About PaaS
As with any new technology or approach to doing business, PaaS will appeal to different groups for different reasons. The clear business value is that PaaS is added at the application layer. For ISVs, PaaS can help extend the availability of a traditional software product or enable organizations to add new capabilities to their existing IT spectrum. It's also helpful to anyone wishing to achieve productivity gains, speed time to results, or reduce their costs. But like any technological shift, PaaS adoption requires changes in how people work and demands collaboration if it is to be as successful as possible.
SQL Server Indexed Views: The Basics
Indexed views can be a powerful tool, but they are not a 'free lunch' and we need to use them with care. Once we create an indexed view, every time we modify data in the underlying tables then not only must SQL Server maintain the index entries on those tables, but also the index entries on the view. This can affect write performance. In addition, they also have the potential to cause other issues. For example, if one or more of the base tables is subject to frequent updates, then, depending on the aggregations we perform in the indexed view, it is possible that we will increase lock contention on the view's index.
How to dispose of unwanted backup media
Whether you write your backups to removable media, spinning disks, or some combination of the two, your backup media will eventually wear out and need to be replaced. Of course, this raises the question of how best to dispose of unwanted backup media. The problem with backup media disposal is that your backup media contains sensitive data. Even if the data really doesn't seem all that important, there is no shortage of surprisingly creative uses for various forms of stolen data. As such, it is clearly in your best interest to make sure that the contents of old backup media do not fall into the wrong hands.
Microsoft launches technical preview of Emet 5.0
Version 5.0 adds two new protections for enterprises on top of the 12 built-in security mitigations included in version 4.1. First, an attack surface reduction mitigation helps enterprises protect third-party and custom-built applications by selectively enabling Java, Adobe Flash Player and Microsoft or third-party plugins. “Enterprises can configure Java to load on the intranet for line-of-business applications but not on the internet,” Ness told Computer Weekly. “Most businesses need Java only internally, but this opens them up to vulnerabilities on the internet. Emet 5.0 enables enterprises to block Java where they do not need it,” he said.
Samsung beefs up Knox mobile management software
With the update, however, Samsung will allow some third-party MDM and enterprise mobility management (EMM) vendors to run in an untrusted state on the personal side of a device. Software from MDM vendors Good, Mobile Iron and Fixmo will be allowed to run on the personal side. Good's software will work better on a Samsung device than any other device, Samsung asserted. The cost of Knox 2.0 service will be $3.60 per user per month with pricing discounts for larger volumes. IT shops will be able to sign up for Knox software online. Injong Rhee, Samsung's senior vice president of research for business-to-business mobile communication, led the Knox briefing for Computerworld.
Quote for the day:
"The secret of joy in work is contained in one word: excellence. To know how to do something well is to enjoy it" -- Pearl Buck
No comments:
Post a Comment