January 18, 2015

David Cameron in 'cloud cuckoo land' over plans to deify security services
Independent expert Ive Noclue said: “It’s crazy. Cameron is living in cloud cuckoo land if he thinks that this is a sensible idea, and no it wouldn’t be possible to implement properly. You can't just go around turning ordinary intelligence officers into divine beings and creating a new omnipotent pantheon. This is obviously what the Tories are planning to do and it's not sensible." Other security experts echo Noclue, describing the approach as “idiocy” and saying Cameron’s plans are “ill-thought out and scary”.


Top Cloud Security Tips for CISOs
Integrating traditional security tools like those you're used to using in your on-premise data center might prove to be very complicated to use in the cloud, and may thus eliminate many of the cloud automation advantages. When possible, try to use tools specifically tailored to the cloud. Dome9 does a wonderful job providing an IaaS firewall, Incapsula provides a Web Application Firewall solution for such clouds, and Porticor provides an innovative key management and encryption solution for multiple IaaS clouds.


IBM Reveals Proof of Concept for Blockchain-Powered Internet of Things
The ADEPT concept, or Autonomous Decentralized Peer-to-Peer Telemetry, taps blockchains to provide the backbone of the system, utilizing a mix of proof-of-work and proof-of-stake to secure transactions. IBM and Samsung chose three protocols – BitTorrent (file sharing), Ethereum (smart contracts) and TeleHash (peer-to-peer messaging) – to underpin the ADEPT concept. ADEPT was formally unveiled at CES 2015 in Las Vegas. According to the draft paper, blockchains deployed within the ADEPT system would serve as a ledger of existence for billions of devices that would autonomously broadcast transactions between peers in a three-tier system of peer devices and architecture.


The time a major financial institution was hacked in under 15 minutes
Darkhotel is a specific operation where attackers are targeting C-level executives at major companies, and they're compromising hotel WiFi networks such that when you go to log into the hotel network, you get into the network and you think you're on the hotel's network, but they've actually gotten into the middle, so to speak, and your device then tells you, "Oh, you need to download a security patch for Adobe. Click here to update." And you're actually executing some malware on your device. Why are the C-level execs the target? Well, a couple of reasons. First, C-level execs are famous for wanting the rules bent for them. "I know you've got your security policies, but just make my iPad work, please!" That kind of thing.


Sony Xperia Z3 Tablet Compact review: Outstanding multimedia experience at a price
The Sony Xperia Z3 is one of my favorite smartphones, check out my review, so I was looking forward to spending time with the Xperia Z3 Tablet Compact. Sony took many elements of the sleek Z3 design and brought them to an eight inch Android tablet. It's thin, light, waterprooof, focused on audio and video experiences, optimized for PS4 gaming, and one of the best Android tablets you can find today. It is an iPad mini competitor and worth considering if you want an Android tablet.


Aligning Big Data
In order to bring some semblance of simplicity, coherence and integrity to the Big Data debate I am sharing an evolving model for pervasive information architecture and management. This is an overview of the realignment and placement of Big Data into a more generalized architectural framework, an architecture that integrates data warehousing (DW 2.0), business intelligence and statistical analysis. The model is currently referred to as the DW 3.0 Information Supply Framework, or DW 3.0 for short.


10 Companies to Watch in 2015
Every year we highlight 10 companies and technologies to watch. Our selection is driven primarily by the fact that the companies we mention have briefed us in the past 12 months, and hence we are reasonably familiar with their capabilities. Naturally, we tend to choose companies and technologies that are distinctive, innovative and align with what we consider to be the direction of the IT industry. Here is this year’s list, arranged in alphabetical order to avoid any suggestion that ranking is involved:


Should enterprises join the rush to use Docker's container software?
"Containers are not a landmark innovation," he wrote an email. If you take into account OS-level virtualization technology like BSD jails and Unix chroot, containers have actually existed for up to 30 years, he said. So why are the likes of Google, IBM, Amazon and Microsoft, as well as non-tech firms and big banks, signing up for what The New York Times describes as "a new way to create software," facilitated by Docker's brand of container technology? For starters, as Forrester's Dave Bartoletti lays out, Docker makes containers easier and more efficient to use, providing benefits that allow companies to provide services in such a way that formerly was possible only from large cloud vendors.


Podcasts by The Open Group
Listen to, or read the transcripts of, recent podcast sessions available on The Open Group Blog. The podcasts feature subject matter experts and panels consisting of Open Group members and staff. Our archive of podcasts serves as a repository of analysis and exploration on subjects most integral to the profession, and continues the conversations being held in our industry.


Is Open Source Collaboration the Key to Better Communication?
Communication has been pushed to new heights with advancing smartphone capabilities and cloud-based applications and services, but are these technologies making communication better?  One of the benefits of modern communication systems is the reduced friction of team and business collaboration. To fully realize the promise of these modern technologies, they must fit into daily workflows. They cannot be disruptive and must be complementary to how employees want to work.



Quote for the day:

"Remember that not getting what you want is sometimes a wonderful stroke of luck." -- DALAI LAMA

No comments:

Post a Comment