May 24, 2014

WCF Routing Service - Part I: Basic Concept, Simple Routing Service & Content-based Routing
The Routing Service is a generic SOAP intermediary that acts as a router. The core functionality of the Routing Service is the ability to route incoming messages based on message content (in either the header or the message body) to the actual services hosted in the same machine as the Router Service or distributed across the network. Actually Routing Service acts as a front-end service that mirrors the target service(s). The main benefit of theRouting Service is to provide location transparency to the client (application) because the client is explicitly decoupled from knowing anything about the actual services that will actually perform tasks on its behalf.

Government to help UK business get cyber security basics right
“The Cyber Essentials Scheme (CES), aimed at raising the bar, which we assess to be pretty low,” said Giles Smith, deputy director, cyber security at the Department for Business Innovation and Skills (BIS). The scheme is set to be launched on 5 June, he told a seminar on cyber risks and opportunities hosted by law firm Sidley Austin and the Association of British Insurers in London. “The role of BIS within the national cyber security strategy is to enable growth by helping UK businesses to operate safely in cyberspace,” said Smith. To do this, he said, businesses need to embed cyber security in corporate governance processes, treating it like any other business risk, and establish confidence that the basic controls are in place.

Digital collaboration goes deeper, gets lightweight and intelligent
The pace of innovation in digital collaboration itself appears to remain unabated. The number of e-mails I get about new collaborative tools for the enterprise even today is astonishing. While I will share a list of the most promising ones here soon, there is no let up in sight, even though most of these products will not succeed. In reality, most companies will end up choosing relatively mature offerings, from a short list of each of the types of tools outlined in the main figure above. These include file sync and sharing, content/document management, chat, SMS, instant messaging, teleconferencing (including voice, video, and Web), legacy groupware, wikis, blogs, enterprise social networks, and some specialty outlier tools.

Dazed and Confused About Big Data
Big data sources can reveal vital information for every aspect of the business. But first, organizations have to gain a better understanding of what "big data" is and why it might matter for business insight. Research firm Gartner has introduced 12 dimensions to clarify the many aspects of the confusing world of big data. Instead of "big data", Gartner opts for Extreme Information Management, to reflect the diversity of data formats that can be considered "big data". The various dimensions underscore the reality that "big data" isn't just one thing and isn't just 'lots of data'. Approaching big data through different dimensions can help companies understand whether or not big data holds any value for their business needs, and where their most valuable big data may reside.

Wireless Power from Across the Room
Energous is the latest in a long line of companies fixated on the idea that life would be easier if we didn’t have so many wires and gadgets to plug in. Yet many of the wireless charging products that have come to market have relied on special charging mats that juice up devices at a short distance, and they’re still not that popular with consumers. “There’s not very many people that want to take their phone and go leave it somewhere while it charges,” Energous CEO Stephen Rizzone argues. “If they’re going to leave it somewhere while it charges, they’re going to plug it into a wall.” The most common wireless-charging technology currently available is magnetic induction, which uses coils to transfer power over small distances via a magnetic field. This is the method used to recharge electric toothbrushes, for example.

eBay Demonstrates How Not to Respond to a Huge Data Breach
Eva Velasquez of the non-profit Identity Theft Resource Center compares the incident to the far-more-visible breach of Target last December. “Our phone lines were blowing up with people calling about the Target breach asking what to do,” she says. “This week, it’s been very quiet here.” Those serial acts of miscommunication signal that eBay, despite its role as one of the biggest ecommerce companies on the planet, may not have had a disclosure plan in place for the possibility of a breach. “For a company like eBay, this is one of the first tabletop exercises I’d ever do in an organization,” says data breach consultant Kennedy. “They’re all over the place and don’t seem to have prepared at all.”

Researchers find a global botnet of infected PoS systems
According to IntelCrawler, the Nemanja botnet included 1,478 infected systems in countries on most continents including the U.S., the U.K., Canada, Australia, China, Russia, Brazil and Mexico. An analysis of the Nemanja botnet revealed that the compromised systems were running a wide variety of PoS, grocery store management and accounting software that is popular in different countries. The IntelCrawler researchers identified at least 25 different such software programs used on those systems. This doesn't mean that the identified applications are particularly vulnerable or insecure for further use, but shows that the Nemanja PoS malware was designed to work with different software.

Fun with Unicode
All Unicode code points can be encoded in either of the 2 standard encoding formats: UTF16 and UTF8. UTF16 are mostly double byte encoding (except for surrogate pairs). The encoding for U+222B is hexadecimal 22 2B if the byte ordering is Big endian and hexadecimal 2B 22 if the ordering is Little endian. For encoding Unicode code points outside of the Basic Multilingual Plane, 2 sets of 4 hexadecimal numbers are used. See Surrogate Support in Microsoft Products for more details on how to do the encoding. UTF8 is an encoding standard that uses 1 or more bytes to encode each Unicode code point.

SAP mobile chief details market strategy & tactics
There are many challenges here including device OS versions and hardware choices. Most enterprises are eager to move to the cloud, but one of the top concerns is security and the related concern of privacy. A single security flaw can be cause significant damage to an organisation. Think about the issue of BYOD that has already pushed enterprises to confront the topic of security, and we know the next logical step is bring your own anything (BYOx) which raises a number of additional issues such as agility, compliance, complexity of app development, and integration across platforms and backend systems.

Kenya: Overcoming Challenges of the National Digital Register
The Consumer Federation of Kenya (Cofek) a body looking at the welfare of consumers, added its voice to the on-going debate about the project: “Kenyans have not been told what exactly went wrong with a similar project where the IEBC was not too lucky with the Biometric Voter Register (BVR) after registering over 14 million people,” Cofek said in a statement. “Public trust level in such projects is fairly low given the unmet pledges on new generation IDs and security passports. Registering voters is anchored on different legislations as compared with registration of persons. The formats could also slightly vary.”

Quote for the day:

"If you decide to go for it, do it with spirit: Sometimes success is due less to ability than to zeal. " -- Charles Buxton

No comments:

Post a Comment