Intel says its elegant, narrow rack-oriented design will ultimately allow for 1 pertabyte of storage in a 1U rack. (A petabyte is a thousand terabytes (TBs), which is a thousand gigabytes.) That would be enough to hold 70 years of uninterrupted entertainment, or 300,000 movies, the technology supplier says. For comparison, to obtain a petabyte of storage using 10TB capacity HDDs, one would need a 100-bay 4U server, according to Techgage, which wrote about Intel’s announcement earlier this month. ... Experts say massive levels of data density savings will be required in the future because our insatiable demand for data is going to overrun existing storage tools available. Indeed, storage density improvements might become as important for tech development in our data-intensive future as battery chemistry advancements are thought to be now
To install the malware, Symantec found, the attackers used decoy documents related to security issues in South Asia. The documents included reports from Reuters, Zee News, and the Hindu, and were related to military issues, Kashmir, and an Indian secessionist movement. The malware allows spies to upload and download files, carry out processes, log keystrokes, identify the target’s location, steal personal data, and take screenshots, Symantec said, adding that the malware was also being used to target Android devices. In response to frequent cyber-security incidents, India in February established a center to help companies and individuals detect and remove malware. The center is operated by the Indian Computer Emergency Response Team (CERT-In).
To run two webpages in split-screen, open Chrome and ensure you’ve got at least two tabs open. Long-press your Android overview button (it’s the one shaped like a square, right next to the home button) to launch split-screen mode as you normally would. Now tap the overflow menu button in Chrome, and select “Move to other window” (see screenshot above). The tab you have up will move over to the other side of the split as a second instance of Chrome. When you’re done, exit split-screen mode by dragging the divider to one side. The tab will go back into your single Chrome instance. You can also close the tab and open a different app in split-screen mode.
One of the factors that dictates what people do as consultants is the availability of charge codes. Everyone knows that lawyers, for example, typically bill their time in 15 minute increments. They need not only to bill their time in these time segments, but they also need a "charge code" - some mechanism to associate the time they just spent to a client, a business development activity or some overhead charge. As consultants, most of us are no different. Regardless of how you ultimately bill the client (time and materials, fixed fee, gain-sharing or other mechanisms) almost every consultant and consulting firm I'm aware of tracks consulting time. I'm sure the same is true in many other industries where people are accountable for a time sheet at the end of a week or month.
Helm is an open source Microsoft tool added with the acquisition of Deis in April. It's a package manager for Kubernetes to keep track of resources, according to Michelle Noorali, a senior software engineer for Microsoft Azure and the core maintainer of the Kubernetes Helm project. Noorali explained that a package in Helm is called a "Chart," which consists of metadata, Kubernetes resource definitions, configurations and documentation. It's a tool to ease developers into Kubernetes, which is "still really hard" to master, she said. Microsoft also has an experimental open source project to streamline Kubernetes development on the Azure Container Service called "Draft." It will detect the language used in the source tree and containerize an app, according to Gabe Monroy
To effectively address SSH key management issues in an agency, IT managers must determine who has access to the most critical infrastructure. It’s important to get control of which SSH key-based access may have root access in the environment and, more importantly, how deep the transitive trust of this access extends. The question to be answered here is, “If I breach one root key, how deeply can I penetrate into the environment?” It’s also important to grasp which SSH key-based trusts are related to service accounts and which are for interactive use. Each key-based trust, regardless of its usage, should be assigned back to an individual owner in the environment to establish accountability. Where SSH user key-based trusts are in use, it is critical to ensure the clear separation of duties.
Most petabyte-scale enterprises have significant storage sprawl, with over half managing ten or more different storage systems according to a 2016 survey. As the business ages, storage sprawls out even further and soon IT ends up managing a substantial investment in infrastructure. This infrastructure is valuable, but the challenge is that over time, the difficulty of moving data means much of it is on the wrong resource for current business needs. By virtualizing data with software, enterprises can create a global namespace that makes different storage resources simultaneously available to applications. Once the control path is separated from the data path through virtualization, control can span storage silos. This makes it possible to easily move data without interrupting applications.
The latest TDK, like those before it, can be found on hacking forums and even in social media advertisements in China. All the user has to do is download the APK and install it and they're ready to build ransomware. The process itself is simple: Just specify a ransom message, an unlock key, the ransomware's app icon, mathematical operations to randomize the code, and an animation to show on the infected machine. After the no-code ransomware builder finishes specifying those few simple options they're prompted to subscribe to the app, which they can do with a one-time payment to the developer. Once paid for, the app purchaser is free to create as many custom ransomware variants as desired. The only thing the app leaves to the ransomware builder is distribution: All it does is provide the APK file.
Majority of organisations in private and public sector currently view cyber security as an IT problem not business risk. Department heads focus on the efficiency for instance, IT departments solely focus on network and database infrastructure and upper level management focuses on corporate performance while neglecting the growing security needs within the organisation. Also, the public entities hold a wealth of government and citizen information to ensure service delivery meanwhile ignoring the prevalent threats this data is exposed to. The above raises the question, who should be concerned? Most of the security issues faced within organisations may not necessarily be as a result of poor systems – organisations have established a number strong and well protected systems
Thirty years of experience and research has taught me that there is no relationship between organizational title and interpersonal competence. It has also taught me that the costs of silence are both calculable and catastrophic. Consider our study in health care where we found that 90 percent of nurses don’t speak up to a physician even when they know a patient’s safety is at risk. We’ve also studied workplace safety. We found that 93 percent of people say their organization is at risk of an accident waiting to happen because people are either unwilling or unable to speak up. In our recent study, we wanted to see if we could further quantify the cost of this silence. Our goal was to calculate a per-conversation price tag to show just how much it costs when an employee decides to stay silent—rather than voice a major concern.
Quote for the day:
"Peace isn't merely the absence of conflict, but the presence of justice." -- Harrison Ford