Enterprise Security – You Get What You Pay For
A free enterprise security solution will never pack the right set of features to manage your endpoints (whether 50 or 50,000). The only benefits a free enterprise solution has to offer are an anti-malware feature, probably some web-filtering capabilities, and a VPN (best case scenario). Is that enough? Any company that truly wants to secure its infrastructure, intellectual property, and other significant data knows that a free enterprise security solution won’t cut it. Sure, you might have an anti-malware engine running some heuristics, but what happens when you want to do more than just run an antivirus solution on those endpoints?
Continuous Delivery: From Theory to Practice
Monitoring deployments is a whole bible unto itself, and so it would be too lengthy to discuss this in detail. However the focus on this is probably the most important factor, since the ability to deploy 1000 times a day is worthless if you are unable to monitor how these changes affect your system. Since, let’s be honest, you’re not looking to deploy new features a thousand times a day, deploying a thousand times a day gives you the ability to fix things really fast and make small changes quickly. That’s why you need to have the entire process set up in such a way that enables you to quickly understand exactly what’s going on in your system - and only then will you have the ability to deploy as many times as you want.
The Proxy is the App
The proxy is the app, for all intents and purposes, because it is the only public interface seen by the app whether that's a native mobile or browser-based app. The proxy is able to provide visibility and security as well as performance-related services on behalf of the "app" because it effectively becomes the app itself. It provides the app routing functionality required to ensure a request to "login" goes to the "login service" while a request to "checkout" goes to the "checkout service" while mediating with the client to ensure performance and security requirements are met.
Experience from the University of Wisconsin-Madison IoT Lab
The IoT Lab has adopted a novel approach for successfully engaging students. It has fostered participation by dozens of undergraduate and graduate students (a large fraction being women) representing a range of disciplines including not only engineering and computer science, but also other “non-technical” disciplines such as business, human ecology (retailing and consumer sciences), nursing, economics, journalism and mass communications, mathematics, physics, statistics, and philosophy. There are several key insights that we have gained through our experience in engaging students with IoT. Here are two:
Ford drives scheduling with artificial intelligence
Here's how it works: If the company hires someone freshly out of college, they need to work rotational job assignments. He or she gets three different jobs in the first three years at Ford. "Ford has all these other opportunities in IT that we can do and in college you don't really think about it," said Kinnaird-Heether. "It gives you business acumen and helps you understand what positions are at the company and you have a better idea of what you want to do with the company." As more people joined, it became increasingly difficult for managers to fit workers into the right jobs, taking into account seniority and participants' own assignment preferences.
How to prioritise your Big Data Analytics use cases
Big Data Analytics is considered by some an innovation, and others an evolution. Whatever your position on that point, one thing for sure is that the technology behind it keeps evolving….fast. Hence the need for the fourth dimension of this pentagon:Technology. Use cases which require a Big Data technology that wouldn’t be part of your stack are definitely worth considering. Why? Because those cases will help the evolution of your Big Data technology ecosystem. It will also make it better performing, reliable, efficient, and redundant.
10 reasons why working in the office work beats telecommuting
Plenty of pundits have examined this trend and decided the office is a dead man walking. But if remote work is indeed going to kill office work, get ready for a tough time. Remote work can be hard, both for workers and their managers. Even if the employer has a good flexible working policy and the employee has the right skills for remote work, there are downsides to working from home. Why all the talk of the death of the office? Here are 10 shining examples of how onsite work trumps remote work.
5 ways a CIO can make a real difference to users
It seems that at most companies, CIOs play nothing but defense, worrying about malware attacks, ERP integration, financial reporting, rogue users, and licensing changes. But you can't win if you only play defense, especially in companies that rely on people to create, develop, and sell the products and services that make money. ... Yet in too many companies, CIOs and their IT organizations stay in the data center, avoiding user needs and opportunities. If CIOs spend a little effort on user-facing technology change, I bet they would become the kinds of key execs that most aspire to. Here are some simple projects that CIOs can initiate to matter in their company's technology offense.
Aeris and Tech Mahindra to launch carrier IoT platform
The platform will expand carrier service offerings to included packaged apps for key vertical systems, such as fleet and asset management, insurance and so on. It will also include a locally deployed technology platform for delivering managed device connectivity services; specialised system operations and support services; go-to-market planning support services; and an internet-scale device data analytics infrastructure. Device, customer and billing data will reside in the operator’s home country, keeping delivery costs low and reducing regulatory concerns in some markets.
Dangerous IE flaw opens door to phishing attacks
The flaw, described as a universal cross-site scripting vulnerability, was disclosed Saturday on the Full Disclosure mailing list by David Leo, a researcher with a security consultancy firm called Deusen. Leo's post included a link to a proof-of-concept exploit that demonstrates the attack using the dailymail.co.uk website as the target. When opened in Internet Explorer 11 on an up to date installation of Windows 8.1, the exploit page provides the user with a link. When the link is clicked, the dailymail.co.uk website opens in a new window, but after 7 seconds the site's content is replaced with a page reading "Hacked by Deusen."
Quote for the day:
"Leadership cannot really be taught. It can only be learned." -- Harold Geneen
A free enterprise security solution will never pack the right set of features to manage your endpoints (whether 50 or 50,000). The only benefits a free enterprise solution has to offer are an anti-malware feature, probably some web-filtering capabilities, and a VPN (best case scenario). Is that enough? Any company that truly wants to secure its infrastructure, intellectual property, and other significant data knows that a free enterprise security solution won’t cut it. Sure, you might have an anti-malware engine running some heuristics, but what happens when you want to do more than just run an antivirus solution on those endpoints?
Continuous Delivery: From Theory to Practice
Monitoring deployments is a whole bible unto itself, and so it would be too lengthy to discuss this in detail. However the focus on this is probably the most important factor, since the ability to deploy 1000 times a day is worthless if you are unable to monitor how these changes affect your system. Since, let’s be honest, you’re not looking to deploy new features a thousand times a day, deploying a thousand times a day gives you the ability to fix things really fast and make small changes quickly. That’s why you need to have the entire process set up in such a way that enables you to quickly understand exactly what’s going on in your system - and only then will you have the ability to deploy as many times as you want.
The Proxy is the App
The proxy is the app, for all intents and purposes, because it is the only public interface seen by the app whether that's a native mobile or browser-based app. The proxy is able to provide visibility and security as well as performance-related services on behalf of the "app" because it effectively becomes the app itself. It provides the app routing functionality required to ensure a request to "login" goes to the "login service" while a request to "checkout" goes to the "checkout service" while mediating with the client to ensure performance and security requirements are met.
Experience from the University of Wisconsin-Madison IoT Lab
The IoT Lab has adopted a novel approach for successfully engaging students. It has fostered participation by dozens of undergraduate and graduate students (a large fraction being women) representing a range of disciplines including not only engineering and computer science, but also other “non-technical” disciplines such as business, human ecology (retailing and consumer sciences), nursing, economics, journalism and mass communications, mathematics, physics, statistics, and philosophy. There are several key insights that we have gained through our experience in engaging students with IoT. Here are two:
Ford drives scheduling with artificial intelligence
Here's how it works: If the company hires someone freshly out of college, they need to work rotational job assignments. He or she gets three different jobs in the first three years at Ford. "Ford has all these other opportunities in IT that we can do and in college you don't really think about it," said Kinnaird-Heether. "It gives you business acumen and helps you understand what positions are at the company and you have a better idea of what you want to do with the company." As more people joined, it became increasingly difficult for managers to fit workers into the right jobs, taking into account seniority and participants' own assignment preferences.
How to prioritise your Big Data Analytics use cases
Big Data Analytics is considered by some an innovation, and others an evolution. Whatever your position on that point, one thing for sure is that the technology behind it keeps evolving….fast. Hence the need for the fourth dimension of this pentagon:Technology. Use cases which require a Big Data technology that wouldn’t be part of your stack are definitely worth considering. Why? Because those cases will help the evolution of your Big Data technology ecosystem. It will also make it better performing, reliable, efficient, and redundant.
10 reasons why working in the office work beats telecommuting
Plenty of pundits have examined this trend and decided the office is a dead man walking. But if remote work is indeed going to kill office work, get ready for a tough time. Remote work can be hard, both for workers and their managers. Even if the employer has a good flexible working policy and the employee has the right skills for remote work, there are downsides to working from home. Why all the talk of the death of the office? Here are 10 shining examples of how onsite work trumps remote work.
5 ways a CIO can make a real difference to users
It seems that at most companies, CIOs play nothing but defense, worrying about malware attacks, ERP integration, financial reporting, rogue users, and licensing changes. But you can't win if you only play defense, especially in companies that rely on people to create, develop, and sell the products and services that make money. ... Yet in too many companies, CIOs and their IT organizations stay in the data center, avoiding user needs and opportunities. If CIOs spend a little effort on user-facing technology change, I bet they would become the kinds of key execs that most aspire to. Here are some simple projects that CIOs can initiate to matter in their company's technology offense.
Aeris and Tech Mahindra to launch carrier IoT platform
The platform will expand carrier service offerings to included packaged apps for key vertical systems, such as fleet and asset management, insurance and so on. It will also include a locally deployed technology platform for delivering managed device connectivity services; specialised system operations and support services; go-to-market planning support services; and an internet-scale device data analytics infrastructure. Device, customer and billing data will reside in the operator’s home country, keeping delivery costs low and reducing regulatory concerns in some markets.
Dangerous IE flaw opens door to phishing attacks
The flaw, described as a universal cross-site scripting vulnerability, was disclosed Saturday on the Full Disclosure mailing list by David Leo, a researcher with a security consultancy firm called Deusen. Leo's post included a link to a proof-of-concept exploit that demonstrates the attack using the dailymail.co.uk website as the target. When opened in Internet Explorer 11 on an up to date installation of Windows 8.1, the exploit page provides the user with a link. When the link is clicked, the dailymail.co.uk website opens in a new window, but after 7 seconds the site's content is replaced with a page reading "Hacked by Deusen."
Quote for the day:
"Leadership cannot really be taught. It can only be learned." -- Harold Geneen
No comments:
Post a Comment