Showing posts with label router. Show all posts
Showing posts with label router. Show all posts

Daily Tech Digest - April 15, 2021

Cyber criminals are targeting the cloud — here’s how to defend against them

While threat actors may use methods to actively infiltrate a company’s defences, sometimes the vulnerabilities are already there. CSPs are usually quick to patch known vulnerabilities without requiring customer interaction. However, when cloud services involve the customer in managing the software, oversight can be tricky due to the complexity of the environment. Businesses should prioritise regular scanning and patching of known vulnerabilities with the latest version of each type of software they’re running on their system. On top of this, IT leaders should maintain an up-to-date inventory of assets to ensure visibility of all endpoints that require patching. In the rush to gain a competitive advantage, cloud environments are evolving rapidly with organisations using a hybrid or multi-cloud approach. This complexity can lead to misconfiguration if set up incorrectly. Misconfigured cloud infrastructures can expose data or resources to the public internet, and failure to implement encryption or multi-factor authentication can allow actors to access cloud-related tools, data, assets, or systems.


6 Key Forces Shaping Technology and Service Providers Through 2025

COVID-19 shut down businesses, supply chains and entire countries, and changed the way companies buy, sell and work. But other events like trade wars, legislation, and regulations can all impact technology providers. It’s not about predicting these events as much as identifying existing trends (i.e., work from home, e-commerce) that will accelerate if these occur. Customers demand products and services that meet their particular business or IT needs. In a broader sense, customer demand and expectations are shaped by cultural changes and world events (e.g., stay-at-home orders increasing demand for distributed work tools). User experiences and trends like mobility or subscription and freemium pricing, which were made popular in consumer markets, have led IT customers to want the same benefits from technology providers. Emerging technologies may seem like novelties when they first appear, but when these technologies become a trend, they can profoundly shape buying and selling behavior and enable new business models. Over the next several years, today’s immature technologies and “weak signals” have the potential to disrupt what your product does, who it serves and how you deliver it.


Fast Data - It’s Not Your Grandfather’s Operational Data

Fast data enables full-circle delivery of data that is “in motion.” In other words, it’s generated and consumed instantly by interactive applications running on large numbers of devices. Fast data enables organizations to act on insights gained from user interactions as these insights are generated at the point of the interaction. And because decisions or actions take place right at the front-end, fast data architectures are, by definition, distributed and real-time. Big data is focused on capturing data, storing it, and processing it periodically in batches. A fast data architecture, on the other hand, processes events in real time. Big data focuses on volume, while with fast data, the emphasis is on velocity. Here’s an example. A credit card company might want to create credit risk models based on demographic data. That’s a big data challenge. A fast data architecture would be required if that credit card company wants to send fraud alerts to customers in real-time, when a suspicious activity occurs in their accounts. Think of FedEx. To track millions of packages and ensure on-time and accurate delivery across the planet, FedEx needs access to the right real-time data to perform real-time analysis and deliver the right interaction—right away, right there, not a day later.


Better Software Writing Skills in Data Science: Dead Programs Tell No Lies

When you figure out that something “bad” happen to your program, you know this should not happen and you know there is no way around, the way to throw and exception higher can be via an assert. This will throw an exception to the higher up program which will have to decide what to do with it. An example would be you expect an int as input and you get a string, this is contract breaking, the higher up program ask you to handle improper data, why would your program decide why the contract was broken? It should be the responsibility of the caller to handle that exception properly. That might warrant a assert right there. Depending on the organization you work in, when an how to use exceptions and asserts might get philosophical. On the other hand it could also be subject to very specific rules. There might be really valid reason why an organization might prefer an approach over another. Learn the rules, and if there is no rule, have discussion around it and apply your best judgement. In any case, dead programs tells no lies. Better kill it than having to deal with polluted data a year in the future.


How to avoid social engineering scams

Social engineering is a collective term for ways in which fraudsters manipulate people into performing certain actions. It’s generally used in an information security context to refer to the tactics crooks use to trick people into handing over sensitive information or exposing their devices to malware. This often comes in the form of phishing scams – messages supposedly from a legitimate sender that ask the recipient to download an attachment or follow a link that directs them to a bogus website. However, social engineering isn’t always malicious. For example, say you need someone to do you a favour, but you’re unsure that they’ll agree if you ask them apropos of nothing. You might grease the wheels by offering to do something for them first, making them feel obliged to say yes when you ask them to return the favour. That’s a form of social engineering. You’re performing an action that will compel the person to do something that will benefit you. Understanding social engineering in this context helps you see that social engineering isn’t simply an IT problem. It’s a vulnerability in the way we make decisions and perceive others – something we delve into more in the next section.


Mesh networking vs. traditional Wi-Fi routers: What is best for your home office?

Before changing your setup, you should also consider your ISP package. If you're subscribed to a low-speed offering, new equipment is not going to necessarily help. Instead, package upgrades could be a better option. If you are a sole user and need a stable, powerful connection -- such as for resource-hungry work applications or gaming -- a traditional router may be all you need. Wired should be quicker than wireless, and so investment in a simple Ethernet cable, easily picked up for $10 to $15, could be enough. Wi-Fi range extenders, too, could be considered as an alternative to mesh if you just need to boost coverage in some areas, and will likely be less expensive than purchasing individual mesh nodes. Some vendors also offer mesh 'bolt-ons' such as Asus' AiMesh, which can connect up existing routers to create a mesh-like coverage network without ripping everything out and starting again. However, mesh networking is here to stay and at a time when many of us are now in the home rather than traditional home offices, a mesh setup could be a future-proof investment. 


Intel Report Spotlights Importance Of Transparency In Cybersecurity

Transparency and security assurance are important, but the Intel report also reveals other factors that businesses consider for endpoint and network infrastructure purchasing decisions. Interoperability with existing tools and platforms ranked highest with 63%, followed by installation cost (58%), system complexity (57%), vendor support (55%), and scalability issues (53%). One area that is particularly interesting is the intersection of hardware and software and how they can work together to solve cybersecurity problems in innovative ways. More than three-fourths of the survey participants indicated that it is highly important for technology providers to offer hardware assisted capabilities to mitigate software exploits. More than 70% also noted that it is important for technology providers to offer mechanisms and security controls to protect distributed workloads. Suzy Greenberg, Vice President of Intel Product Assurance and Security for Intel, joined me recently on the TechSpective Podcast to talk about this report and some of the insights and trends she finds interesting.


Security Bug Allows Attackers to Brick Kubernetes Clusters

The impact could be fairly wide: “As of Kubernetes v1.20, Docker is deprecated and the only container engines supported are CRI-O and Containerd,” Sasson explained. “This leads to a situation in which many clusters use CRI-O and are vulnerable. In an attack scenario, an adversary may pull a malicious image to multiple different nodes, crashing all of them and breaking the cluster without leaving a way to fix the issue other than restarting the nodes.” When a container engine pulls an image from a registry, it first downloads its manifest, which has the instructions on how to build the image. Part of that is a list of layers that compose the container file system, which the container engine reads and then downloads and decompresses each layer. “An adversary could upload to the registry a malicious layer that aims to exploit the vulnerability and then upload an image that uses numerous layers, including the malicious layer, and by that create a malicious image,” Sasson explained. “Then, when the victim pulls the image from the registry, it will download the malicious layer in that process and the vulnerability will be exploited.” Once the container engine starts downloading the malicious layer, the end result is a deadlock.


What is the market opportunity for NFTs?

NFTs have seen massive increases in trade volume and users in recent times. Investments in NFTs rose by 299% across 2020, and the NFT market’s sales volume grew by 2,882% in February alone. This increased interest resulted in part of the improving infrastructure surrounding NFTs, which has supported full stack services from trading venues, minting platforms, marketplaces and more. While detractors have suggested that the current crest of interest represents a bubble, experts have pointed to the fact that technology of NFTs is strong enough to survive a possible crash, and is expected to be around for quite some time. According to Beeple, a digital artist who recently made almost $70 million from his NFT sale, the technology will support any work or piece of real value. Similarly, the new owners of Beeple’s record setting piece of artwork, Vignesh (Metakovan) and Anand (Twobadour) believe their transaction represents a paradigm shift in how the world perceives art. They see NFTs as having an equalizing effect between the traditionally dominant West and the global South.


Applications, Challenges For Using AI In Fabs

One of the main applications for machine learning is defect detection and classification. The first step is using machine learning to detect actual defects and ignore noise. We are seeing many examples where machine learning is much better at extracting the actual killer defect signal from a noisy background of process and pattern variations. The second step is to leverage machine learning to classify defects. The challenge these days is that when optical inspectors run at high sensitivity to capture the most subtle, critical defects on the most critical layers, other anomalies are also detected. Machine learning is first applied to the inspection results to optimize the defect sample plan sent for review. Then, high-resolution SEM images are taken of those sites and additional machine learning is used to analyze and classify the defects to provide fab engineers with accurate information about the defect population – actionable data to drive process decisions. An emerging application is to make use of machine learning to be more predictive about where to inspect and measure.



Quote for the day:

"Real leaders are ordinary people with extraordinary determinations." -- John Seaman Garns

Daily Tech Digest - November 02, 2016

Tech Bytes - Daily Digest: November 02, 2016

The biggest cyber security threat is right under our noses, Will digital economy create a developer shortage, What big data is doing for shipping on a global scale, Defending against insider data breaches, Bitcoin isn't anonymous enough to be a currency and more.

The Biggest Cybersecurity Threat is Right Under Our Noses

Technology is advancing at a rate where the convergence of progress in multiple areas is finally making it possible to detect malicious insiders. The cost of storing data continues to go down. The processing capabilities of servers to sift through data keeps marching forward. And advances in machine learning—artificial intelligence—makes it possible to make sense of the data in meaningful ways. It is this confluence of massive secure scalable computing at a low cost, combined with exponential algorithm advances, that has made a breakthrough AI cybersecurity solution like Cognetyx possible. Take one of the toughest scenarios as an example. Let’s say an employee of a hospital for whatever reason decides to steal patient data. Maybe they hold a grudge against their boss. Perhaps they are going to sell the data.


6 trends that will shape cloud computing in 2017

The global public cloud market will top $146 billion in 2017, up from just $87 billion in 2015 and is growing at a 22 percent compound annual growth rate. The lion’s share of this growth will come from Amazon.com, Microsoft, Google and IBM, which have emerged as "mega-cloud providers,” Bartoletti says. They are opening new data centers and making concessions, such as Microsoft’s agreement to have T-Systems manage its cloud in Germany to meet data localization requirements. But the big players won’t be able to service every unique request, which means smaller regional players will see an uptick in adoption in 2017. Bartoletti recommends: "Keep you options open and don't be afraid to use multiple providers."


Will Digital Economy Create A Developer Shortage?

According to Sam Ramji, CEO of the Cloud Foundry Foundation, the companies that don't see a gap are not those furthest behind the effort to move into the digital economy. They are the ones that have been functioning as part of it for several years (companies such as Amazon, eBay, Google, Apple, and Netflix) and are attracting talent because of their position in the economy. The gap shows up more clearly in companies that are still dominated by their legacy systems, he noted. He said his impression that this might be the case was confirmed when Netflix made some of its internal code for managing AWS cloud operationsavailable as open source. When he asked Netflix officials why they released home-grown code, they explained that it would make knowledge of what they were doing more widespread.


What Big Data is Doing for Shipping on a Global Scale

Another important way that the use of Big Data can help optimize the shipping process on a global scale is to provide the information necessary to help shipping companies better manage multi-stop routing, which is a nightmare for any industry, and the shipping industry is no different. The use of Big Data will allow shipping companies to use a mathematical approach to determine where shipping containers should be placed on the ship. By using data to effectively place containers where they can be reached at the proper time, the entire process can be streamlined to run more effectively and efficiently — not only making the company more productive, but also saving the shipping company money.


ALM and DevOps tooling still a critical part of orchestration

With continuous development and DevOps integration, the DevOps models or recipes associated with each ALM phase have to be designed following the ALM processes. Then it can be codified in DevOps language -- declarative or imperative, as appropriate. When development changes are made to an application, component or service, the changes not only have to be tested in terms of application functionality, security and compliance, but also in how they impact the integration between ALM and DevOps. The tight coupling of development, ALM and DevOps demanded by continuous delivery has changed DevOps already. The two most popular tools, the imperative Chef and declarative Puppet, have both evolved to support modular declarations of resources.


Defending against insider data breaches

Internal data breaches have the potential to damage reputation and incur significant financial loss – not only for law firms but clients too. As highlighted by the Panama Papers, the impact of an insider cannot be underestimated. An anonymous source from within Panamanian law firm Mossack Fonseca was able to leak an unprecedented 11.5 million documents over the course of a year, with consequences that reverberated across the globe. Of course, this is an extreme example, but it does serve to highlight the danger posed by an insider who can go undetected for long periods of time.  While there is no silver bullet, there are steps that every law firm can take to reduce the risk of internal data leakage – and these aren’t constrained to the IT department.


Bitcoin Isn’t Anonymous Enough to Be a Currency

On the surface, privacy-preserving cryptocurrencies seem designed precisely to undermine such controls. Monero mixes multiple transactions together so that a source cannot be directly linked to a destination. Zcash creates shielded transactions where everything is hidden except for a string of data that proves the transaction is valid . Bitcoin also plans to add some of these features in the near future. As bad as it looks, though, developers aren’t creating anonymous payment systems because they want to help criminals evade the law. They're doing it because that’s the only way a decentralized currency can work. If, say, users have to evaluate the acceptability of each bitcoin based on its transaction history, then one coin can be worth more than another and the currency loses its reason for existence.


How Advanced Technology Can Save Us From Future Internet Shutdowns

“One self-help mechanism would be for a ‘good’ hacker to write a virus that finds insecure devices and simply disables them. This would remove insecure devices from the pool of computers that could be used as bots,” Eli Dourado, technology policy director at the Mercatus Center, told TheDCNF. “It would be inconvenient to consumers whose devices suddenly stopped working, but that inconvenience may be necessary to prevent more serious attacks in the future.” There are also security network services available, like Cloudfare and Akamai, but they can be expensive, said Ryan Hagemann, technology and civil liberties policy analyst at the Niskanen Center. “As with any decision, a company or individual will need to assess whether the benefits of employing such a service outweigh the costs.”


How To Find The Best Wi-Fi Router For A Home Office

Before you rush out to buy an expensive Wi-Fi router with MIMO, you should know that to utilize that speedy wireless your Wi-Fi devices must also support the tech. Unfortunately, the majority of today's Wi-Fi devices, including smartphones and tablets, only support one or two spatial streams, and they won't be able to take full advantage of Wi-Fi routers with more streams. The same thing applies to MU-MIMO routers, because only a handful of mobile devices available today support the tech. In some cases, it may make sense to buy a more affordable Wi-Fi router that delivers optimal performance with your existing devices, and then later opt for a more advanced router when you upgrade your mobile devices to phones, tablet or computers that support MIMO.


Cisco says it'll make IoT safe because it owns the network

Within the next year, Cisco will launch a program to certify IoT devices as compatible with its network-based software. Among other things, the software should be able to automatically authorize these devices on a “white-list” basis, allowing only endpoints that are safe instead of trying to find and block those that are not. Devices themselves will play a role here, telling the network what kinds of things they should be able to do, such as only connecting to the home server for the service it provides. This approach might help to prevent devastating events like the recent Mirai botnet attack that employed thousands of insecure internet-connected cameras. But the IoT onboarding and management capabilities go beyond security to include automation of other tasks like network configuration that administrators would otherwise have to do.



Quote for the day:


"The aim of education should be to teach the child to think, not what to think." -- Indira Gandhi


October 27, 2016

Tech Bytes - Daily Digest: October 27, 2016

Dealing with multiple service providers - A necessary evil, Can fintech prevent the next financial crisis, The difference between open source & open governance, 5 strategies to reboot your IT career, A quick primer on isolation levels & dirty reads, Residential routers easy to hackand more.

How IoT technologies are disrupting the aerospace and defence status quo

While current solutions only permit the airborne transfer of data for key vital parameters to maintenance crews, expanding this remit would allow them to determine the continual status and performance of individual parts and components within the engines, systems, and subsystems across the wider aircraft. This continuous visibility of the aircraft’s performance is crucial. If, for example, one of the engine vitals fails mid-air, a standby system would kick in and run all of the necessary functions to enable it to complete its journey safely. An alert would then be sent to the ground staff, who could use the real-time information to determine the cause of the failure, before engaging the necessary personnel and sourcing the components required to get the aircraft back up and running as soon as it lands.


Dealing with multiple service providers: A necessary evil

If dealing with an ever-expanding IT ecosystem is a mandate for enterprises, then developing the organizational maturity and capability of integrating and managing services purchased from disparate and specialized vendors is a necessary part of it. This means automating multi-vendor governance capabilities and leveraging tools and processes that help integrate the delivery and management of services from an end-to-end perspective. The fast-developing ecosystem proffers a strategic choice: to buy services (outsource to a third party) or to build services (develop in-house capability and implement within the enterprise). And, at the risk of stating the obvious, there’s no one-size-fits-all answer.


Can Fintech Prevent The Next Financial Crisis?

Under the current system, bankers do not risk their own money; rather, the risk is entirely on their savers aka the bank’s depositors. Under extreme circumstances, the government may be required to foot the bill if and when things turn sour at the bank. As for the bankers themselves they have very little at stake; in fact, their willingness to take risks (with their depositors’ funds, of course) often leads to lucrative bonuses. Bankers at no time do they risk their own savings or pensions. And that’s the real problem; how can professionals be expected to take low risk on behalf of others when they have so much to gain and so little to lose? We can’t expect them to take the high road; indeed, the sub-prime crisis proves that. So how exactly will P2P lending make a difference?


The difference between open source and open governance

On the open domain, the only two non-functional things that matter in the long term are whether it is open source and if it has attained momentum in the community and industry. None of this is related to how the software is being written, but this is exactly what open governance is concerned with: the how. Open source governance is the policy that promotes a democratic approach to participating in the development and strategic direction of a specific open source project. It is an effective strategy to attract developers and IT industry players to a single open source project with the objective of attaining momentum faster. It looks to avoid community fragmentation and ensure the commitment of IT industry players.


Ransomware: The Next Big Automotive Cybersecurity Threat?

“The current ransomware business model works well because the attackers ensure that the price paid is well worth the data restored,” explained Tony Lee, technical director at security research firm FireEye. “Can home users put a price on precious family photos or financial documents? Can organizations put a price on critical information necessary to conduct business? If that answer is yes and the price is low enough, the ransom will be paid.” The same rationale can be extended to vehicles. Approximately 250 million connected cars are expected to be on roads worldwide by 2020, according to a 2015 analysis by technology consulting firm Gartner, making connected cars the next potential market for hackers. These attacks could range from simply locking motorists out of their vehicles to locking them inside; a more ominous scenario would allow hackers to freeze the ignition, essentially “bricking” the car and making it completely unusable.


5 strategies to reboot your IT career

Technology changes faster than many of us can keep up with it. New paradigms like software-defined networks and the cloud emerge, and the old ones continue to hang around. But while the hotshot programmers and big data geeks get to play with the shiny new toys, you're busy waiting for the robots to come and take away your job. ... It doesn't have to be that way. Whether you cut your teeth on Unix and AIX or you tire of doing the necessary but thankless tasks that come with keeping the lights on and the datacenter humming, there's still time to reinvent yourself. It won't be fast or easy. It will mean investing a lot of time and possibly some money, taking risks, and hacking code. But it can turn into a much greater reward, both financially and psychically.


A Quick Primer on Isolation Levels and Dirty Reads

If you need to repeat the same read multiple times during a transaction, and want to be reasonably certain that it always returns the same value, you need to hold a read lock for the entire duration. This is automatically done for you when using theRepeatable Reads isolation level. We say “reasonably certain” for Repeatable Reads because of the possibility of “phantom reads”. A phantom read can occur when you perform a query using a where clause such as “WHERE Status = 1”. Those rows will be locked, but nothing prevents a new row matching the criteria from being added. The term "phantom" applies to the rows that appear the second time the query is executed. To be absolutely certain that two reads in the same transaction return the same data, you can use the Serializableisolation level.


Residential routers easy to hack

Weak passwords can be easily exploited. Fourteen percent of simulated attacks on the routers were, in fact, victorious. The probing attack methodology was simply to use common default usernames and passwords, along with some frequently used combinations. Telnet was left open on 20 percent of the routers, and command injection vulnerabilities were also caught. Telnet, as an unsecured service, shouldn’t be openly available to even a local network, ESET explains. Command injection vulnerabilities “aim for the execution of arbitrary commands on the host operating system.” They use a vulnerable application, the security company says. Proper input validation fixes the deficiency. Of that 7 percent of the now-common household devices with software vulnerabilities, about half (53 percent) had “bad access rights vulnerabilities,” or permissions problems, in other words.


Can government-funded innovation solve the cyber security threat?

Expecting the federal government to produce solutions is hopeful at best and woefully naive at worst, though that isn’t to say that it can’t somehow play a part. Even if it can’t actually develop the technologies necessary to compete in this new battle arena, it can still fund innovative R&D that can be developed into the next generation of defense infrastructure. This can be achieved through the Small Business Innovation Research (SBIR) program, a highly competitive research initiative through which domestic small businesses respond to federally specified R&D requirements with commercial applications. Awards are distributed in two phases, first for feasibility and proof of concept of the product, and then for further development and commercialization.


Five Questions General Counsels Should Ask About Privacy and Cybersecurity in Third-Party Contracts

Regulators are cultivating an ever-increasing patchwork of data protection laws and regulations. Because third parties may host and process data in various locations around the world, companies must keep abreast of constantly evolving developments in global data protection laws and regulations, including data localization laws and data transfer regulations. Compliance failures may subject a company to considerable fines and penalties (e.g., the EU General Data Protection Regulation, effective in May 2018, will allow penalties of up to four percent of worldwide revenues for compliance failures). In addition, data localization laws, which require that data must remain in the country, are emerging. For example, Russia has such a law, and others have been proposed in Indonesia and China.



Quote for the day:


"Without Simplicity and Transparency, you could become a Happy Underachiever." -- @GordenTredgold


August 03, 2012

Forecast for systems administrators: CloudyThe traditional sysadmin role is changing, thanks to cloud computing and virtualization. Here's how to ensure you have a job in 5 years.

“Big Data” Presents Big Opportunities for Firms and CFOs
Big Data has increased the demand for information management specialists, while dramatically increasing the potential for visionary professional growth and positioning. CPAs are perfectly suited to take a leadership role in deciphering and using Big Data to achieve strategic business goals.

Why Tax Directors’ Heads Should Be in the Cloud
So what’s the harm? “If the tax department isn’t involved early, an organization can end up creating substantial risk and missing out on tax-planning opportunities,” says Fortier. A change to a company’s cloud arrangement could make it ineligible for tax benefits, in particular, or it could very easily swing the return on investment of the whole project negative, he notes.

Huawei checking claims of flaws in its routers
Huawei Technologies said on Thursday it was verifying claims that its routers contained critical vulnerabilities, after security researchers disclosed alleged problems last weekend.

The robotic datacentre: Is this the future of the cloud?
Looking further ahead, Frankovsky imagines "a truly automated warehouse environment" where machines automatically service and swap out hardware. However Frankovsky said that this type of datacentre lies beyond 2020.

Sony Developing a Microsoft Surface-Inspired Tablet
The new device will also include a Tegra 3 Processor from NVIDIA, support Android 4.0 or a more recent iteration, come with a wide arrange of storage options (16GB, 32GB, or 64GB), contain 3G connectivity and offer 10 hours of Wi-Fi battery life.

100 Books Every Entrepreneur Should Read
Reading these quintessential business books is going to be my MBA. So, not only should you read these books – you should take notes and execute as much of what you learn as you can.

Power Up Your Leadership Effectiveness With Skilled Decision Making
One thing is for sure – a leader’s decision-making impacts credibility. So, take a moment now to think about your decision-making. Why take a moment? Decision-making is so natural, so automatic many of us aren’t aware of our decision-making style let alone how skilled we may or may not be.

Revisiting Information’s ROI
One common measure of success in IT has been based on dollars spent and time to return on investment. That approach can bring some level of visibility to our spending effectiveness, especially on the cost reduction side in headcount and overhead. But that kind of return isn’t really based on the value of information.


Quote for the day:

"A leader is someone who can do everything him(her)self, but let's other people help him(her)." 
-- Don Rittner

July 07, 2012


Direct Database Updates – A Cause of Concern
Many organizations still have the practice of directly updating the production databases to fix data integrity issues. This shows that the one or more applications deployed on top of the database are not reliable enough to maintain the database integrity.

One day your iPhone and wallet will be one.
For years, there have been whispers that Apple is working on its own approach to reinventing mobile payments, including the possibility of a NFC-equipped iPhone.

Google Compute Engine – Not AWS Killer (yet)
GCE is missing a lot of what larger enterprises will need – monitoring, security certifications, integration with IAM systems, SLAs, etc. GCI also lacks some of the things that really got people excited about EC2 early on – like an AMI community, even the AMI model so I can create one from my own server image.

An inconvenient truth: Respect me
Yet what I am hearing from these key employees, most between the ages of 30 and 40, is that they absolutely demand to be treated with respect, have their opinions listened to, and stand as a peer with their leaders.


Top 5 wireless routers: Home-networking evolved
It was clear from CES that 2012 is going to be a year of many changes in home networking. To help you keep up with these changes, here's our list of the Top 5 networking products currently available.

Cloud Computing in Health Care to Reach $5.4 Billion by 2017: Report
Although regulatory and security concerns have held back the health care industry from widespread adoption of public clouds, the overall cloud computing market in health care will grow to $5.4 billion by 2017, according to a report by research firm MarketsandMarkets.


Avoiding Downtime When Cloud Services Fail
Another AWS outage hit several large websites and their services last week. What can be done to avoid downtime? Architect for failover not just for scale

Best Practices For Managing Big Data
What most people don’t know is that the vast majority of Big Data is either duplicated data or synthesized data. ... Now they must manage a total of over a petabyte of data, of which less than 150 terabytes is unique.


Quote for the day
"If you put off everything till you're sure of it, you'll get nothing done." ~ Norman Vincent Peale