Daily Tech Digest - August 18, 2017

An inside look at the Oracle container management strategy

One of the things about containers is making sure that you only put into a container, particularly in production, the bits that you need to run your application. And so one of the open source tools we announced, called Smith, helps you build a container with only the bits that you need for your application to run so you reduce that surface area. From a security perspective, you also reduce potential vulnerabilities, because there's not a whole bunch of stuff in that container that you need to patch. So, that's an example of what we're doing there to really help folks build containers very tightly, reduce that surface area and operationalize them in production.


Cisco outlook shows Robbins turnaround hasn’t spurred growth

Cloud CompetitionRobbins is working to restore the kind of growth that made Cisco one of the world’s largest companies. The networking-gear maker hasn’t reported an annual revenue gain of more than 10 percent since 2010. His effort to fire up sales are being hampered by a shift to computing in the cloud -- in remote data centers that provide services over the internet. Owners of such facilities like Amazon.com Inc.’s Amazon Web Services, are increasingly building their own hardware and replacing traditional suppliers of servers, storage and networking. ... “One of the key things that we needed to do was get some energy in our core markets,” Robbins said. That started with the offering of new switch products in June. “You’re going to see more and more of that innovation coming from us.”


It's official: Supercomputing is now ho-hum (thanks, cloud)

Cycle's Friedman also pointed to this growing democratization of supercomputing. "Cloud is bringing [high performance computing, HPC] into a broader world. We see a broader use of the techniques and technologies of HPC to help people use computation to predict rather than simply report. Historically, most analytic computation has been focused on validating and reporting what we already know: capturing transactions, reporting on activities, validating designs, checking our math. Classic examples include all of the accounting type workloads, human resource systems, inventory management, etc. With the availability of HPC-like (large compute, network, and storage capacity) environments easily accessible by anyone, more and more groups are using data and simulation to predict future events, outcomes, or reactions."


G Suite updates boost version control and collaboration in Google Docs, Sheets, Slides

Speaking of versions, users will also now be able to preview "clean versions" of documents. This option strips out the suggested edits and comments to give a clearer picture of what the final product will look like. To enact this feature, click Tools > Review suggested edits > Preview accept all OR Preview reject all, the post said. With these latest updates, users can now accept or reject all editing suggestions at once when working in Docs. This is helpful if there are commas or simple punctuation suggestions that a user believes should be accepted. Click Tools > Review suggested edits > Accept all or Reject all to make this happen. Editing suggestions can also be made in a document from an Android or iOS mobile device as well, the post said.


How Business Should Prepare For The Future Security Threat Landscape

Our whole value proposition around security really is in four different areas, prevent, protect, detect, and external partnership. What is really, really important and closer to my heart is the external partnerships. Our goal is to not just sell you a secure device or offering. That's not our main intention. Our intention is about the true partnership, as well. You're not only getting a secure device and offering, but you're getting a continuous partnership. One of the issues [in our industry] sometimes is it's one and done. We've won this sale, we won this customer, now we're done, and we can move onto the next one. That's not the model that we have here. We continue our partnership. We have solidified a partnership with McAfee. When you buy a Xerox device or buy into one of our offerings, we're bringing that partnership with us.


The 360 degree approach to cyber security

Even though technology has progressed, the way companies need to handle security today is fundamentally different from the approach they took 5 years ago. And there are many reasons for this. But two trends in particular are driving the new conception of cyber security for businesses. First, the increasing digitalization of processes and businesses is happening at an unprecedented pace. So a cyber security incident isn’t just something that causes extra hours in a company’s IT department. Today, IT often powers business engines along the whole value chain, and a single incident can bring operations to a grinding halt, and even threaten the existence of a company. Secondly, the threats are growing, both in number and sophistication. 2014 was the 8thyear in a row that the amount of detected malware doubled, resulting in an average of 81 attacks per minute.


Find My Device: How Android's security service can manage your missing phone

Android's native Find My Device system can precisely pinpoint any Android device — phone, tablet, even Android TV box (if you somehow manage to misplace one of those?!). It'll show you the device's exact location on an interactive map and give you tools to remotely ring it, lock it or wipe it entirely and send all of its data to the digital beyond. Find My Device has actually been a part of Android since 2013 — originally under the name "Android Device Manager," which stuck around until Google's broad Android security rebranding earlier this year — but it's always been a bit buried and easy to overlook. So take a few minutes now to learn the ins and outs of how it works and what it takes for your devices to be discoverable.


Is Your Small Business Ready to Defend Against a Data Breach?

"Small business information security is at a pivotal point in time. Between evolving outsider and insider threats, as well as changes to state and federal regulations, when it comes to disclosing breaches, small business leaders must take the time to remain vigilant about their information security needs," says Kevin Pollack, Shred-it Senior Vice President. "As work ramps up in the fall, it is a prime opportunity for small businesses to engage with employees about security and review their physical and digital risk. Business leaders should also take the time to implement cost effective preventative measures to protect confidential data." To help SBOs strengthen their information security protocols and mitigate the risk of fraud, Shred-it has identified five strategies for avoiding data breaches and reputational damage:


What is devops? Transforming software development

Devops is one of the key trends in software development to emerge recently. But the term is often not fully understood. An amalgamation of “development” and “operations,” “devops” describes the organizational structure, practices, and culture needed to enable rapid agile development and scalable, reliable operations. Devops is about the culture, collaborative practices, and automation that aligns development and operations teams so they have a single mindset on improving customer experiences, responding faster to business needs, and ensuring that innovation is balanced with security and operational needs. For development teams, that usually means standardizing platforms, following an agile development process, and participating in operationally driven initiatives.


What makes application delivery in China so hard?

Traffic traversing between China and the global market is controlled by what’s referred to as the Great Firewall of China, a system of filters and content inspection deployed via Chinese ISPs to control what content is available to users. Behind the Great Firewall is a combination of legislative and technological actions taken by the Chinese government to regulate the internet domestically. Domestic and foreign internet companies are required to cooperate with these efforts under Chinese corporate statutes. ... Commonly, traffic transiting the Great Firewall experiences congestion as it traverses the “choke point” of the Firewall, resulting in severe packet loss and additional latency, poor throughput, and other degradation. Of course, that’s the best case for traffic transiting the Firewall — for content that doesn’t run afoul of the government’s filters



Quote for the day:


"In the end, we will remember not the words of our enemies, but the silence of our friends." -- Martin Luther King, Jr.


No comments:

Post a Comment