Content Marketers » Publish Your Business Blog, Videos and Events on ALL EC » Save 25% Today!
Welcome Guest | Sign In
TechNewsWorld.com
salesforce commerce cloud
AWS Thinks Inside the Box With Outposts Data Center Revival
November 30, 2018
Amazon introduced AWS Outposts at its AWS re:Invent conference in Las Vegas. The new system, which provides AWS-branded boxes for use in traditional data centers, will allow the company to make advances into the world of on-premises storage, taking on legacy hardware vendors including Cisco, Dell, and Hewlett Packard Enterprise. Outposts technology can run on rival vendors' data center equipment.
Amazon's Shift
November 29, 2018
Andy Jassy, CEO of Amazon Web Services, announced that AWS customers would be off all Oracle databases by the end of 2019 and running on one of Amazon's database products. This is not the first time the market has heard something like this, but this time could be different. The statement comes on the heels of Amazon spending significant coin on Oracle licenses a few months ago.
When Is the Time to Hire a Cyber Specialist?
November 14, 2018
Cybersecurity has been becoming a larger and larger concern for organizations. Nowadays, most organizations -- regardless of size, industry, location, or profit vs. nonprofit status -- find themselves directly or indirectly impacted by cybersecurity. Even though the topic itself is increasing in importance, many smaller organizations don't have specialized security expertise on staff.
Whether Intended or Accidental, Internet Traffic Rerouting Can Be Costly
November 14, 2018
An apparent prefix leak from an errant router misconfiguration caused Google to lose control of several million of its IP addresses for more than an hour on Monday. During the event, Internet traffic was misrouted to China and Russia from Nigeria. The incident initially sparked concerns that it might have been a hijacking. The mishap made Google services unavailable to many users intermittently.
Will Oracle Roil the DB Market?
October 23, 2018
When we write the history of the IT era, the big factor that has played an important but not well recognized role will be hardware -- specifically, the Oracle Exadata appliance that puts databases into memory. All of the cloud software starting with the autonomous database on view this week at OpenWorld would be vastly different if the database was still running primarily on disk drives.
6 Tips for Managing Data Before an Emergency Strikes
October 18, 2018
Think about planning for a natural disaster emergency that might affect your home. You'd likely store some water, flashlights, food, blankets and other essentials. The key element of your planning would be proactivity. You'd do all of the work before an emergency occurred, not during the actual crisis. If your supplies were used up after the emergency passed, then you quickly would restock.
Software Security Best Practices Are Changing, Finds New Report
October 2, 2018
Independent software vendors, along with Internet of Things and cloud vendors, are involved in a market transformation that is making them look more alike. The similarities are evident in the way they approach software security initiatives, according to a report from Synopsys. Synopsys has released its ninth annual Building Security in Maturity Model, or BSIMM9.
Protecting Against 'Natural' Cybersecurity Erosion
September 21, 2018
Every child who's ever played a board game understands that the act of rolling dice yields an unpredictable result. In fact, that's why children's board games use dice in the first place: to ensure a random outcome that is -- from a macro point of view -- about the same likelihood each time the die is thrown. Consider what would happen if someone replaced the board game's dice with weighted dice.
Oracle Releases Second Half of Autonomous DB
August 10, 2018
A lot of people might have thought Oracle's announcement of the autonomous database at last year's OpenWorld and its subsequent release earlier this year were the whole story, but there's a lot more. This week's webcast featuring Larry Ellison was proof. Ellison must find his CTO role -- since he handed the CEO reins to Safra Catz and Mark Hurd -- to be stimulating and liberating at the same time.
Security Economics: The Key to Resilience
July 5, 2018
There are times when looking at something narrowly can be more effective than taking a wider and more comprehensive view. If you don't believe me, consider the experience of looking at organisms in a microscope or watching a bird through binoculars. Distractions are minimized, allowing optimal evaluation and analysis of what's under investigation.
Red Hat Launches Fuse 7, Fuse Online for Better Cloud Integration
June 5, 2018
Red Hat has launched its Fuse 7 cloud-native integration solution and introduced Fuse Online, an alternative iPaaS. Red Hat Fuse is a lightweight modular and flexible integration platform with a new-style enterprise service bus to unlock information. It provides a single, unified platform across hybrid cloud environments for collaboration between integration experts, application developers and business users.
Oracle's Security Jag
June 2, 2018
Oracle has been on a security campaign ever since Larry Ellison openly began discussing the new "autonomous database" -- so called because it can manage itself, including self-patching and upgrading, without human effort. The hands-off database can eliminate human labor to keep it tuned and running, according to Oracle, greatly reducing the time between availability and implementation.
The Cloud's Hazy Security
May 31, 2018
A significant percentage of IT systems are cloud-based, according to a recent survey. The cloud is a key enabler for emerging technology, suggests the CompTIA poll, which was conducted last month. Cloud computing was one of four trends respondents expected to feature heavily in IT conversations over the next 12 to 18 months, the survey found. Others were AI, the IoT and cybersecurity.
DevOps: Plenty of Devs, Not Enough Ops
May 29, 2018
In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiphishing training. However, security is only as strong as its weakest link.
Realistic 'Zero Trust' for Your Cybersecurity Program
May 29, 2018
If you're a cybersecurity practitioner, chances are good that you've heard the term "zero trust" over the past few months. If you attend trade shows, keep current with the trade media headlines, or network with peers and other security pros, you've probably at least heard the term. Depending on whom you're talking to, you'll get a different answer about what it is and why it might be useful.
WhiteSource Rolls Out New Open Source Security Detector
May 24, 2018
WhiteSource has launched its next-generation software composition analysis technology, dubbed "Effective Usage Analysis," with the promise that it can reduce open source vulnerability alerts by 70 percent. The newly developed technology provides details beyond which components are present in the application. It provides actionable insights into how components are being used.
Open Source Is Everywhere and So Are Vulnerabilities, Says Black Duck Report
May 15, 2018
Black Duck by Synopsys has released the 2018 Open Source Security and Risk Analysis report, which details new concerns about software vulnerabilities amid a surge in the use of open source components in both proprietary and open source software. The report provides an in-depth look at the state of open source security, license compliance and code-quality risk in commercial software.
Fedora 28 Comes With New Software Options
May 1, 2018
The Fedora Project has announced the general availability of Fedora 28, which introduces a new software delivery system based on a modular repository. The new system provides alternative versions of the software and updates that come with the default release, according to Fedora Project Leader Matthew Miller. It enables users to update specific components at the speed that meets their needs.
Insurance and the Consumer IoT
April 30, 2018
Smart home and consumer IoT solutions promise significant opportunities for the insurance industry in terms of reducing costs, alleviating risks, deepening customer engagement, and creating new services and revenue streams. There are many barriers ahead to overcome, but given the tremendous upside, insurance companies have begun attacking these challenges with a multi-tiered strategy.
Atlanta Works to Break Ransomware Hold
March 30, 2018
Nearly a week after it became the target of one of the largest ransomware attacks to date, the City of Atlanta has made progress toward recovery, but it is still far from business as usual. Hackers encrypted many of the city government's vital data and computer systems. Mayor Keisha Lance Bottoms characterized the ransomware attack as "a hostage situation."
Fileless Malware: Why You Should Care
March 2, 2018
It's a truism that just like organizations adapt, so too do criminals. Anyone who has ever seen a Wells Fargo commercial knows that there was a time when stagecoaches were a normative method for transporting cash and valuables. But what modern criminals in their right mind would attempt robbing a Brink's truck on horseback? That strategy might have worked well in the days of the Pony Express.
Free Linux Tool Monitors Systems for Meltdown Attacks
January 27, 2018
SentinelOne has released Blacksmith, a free Linux tool that can detect Meltdown vulnerability exploitation attempts. The company has been working on a similar tool to detect Spectre vulnerability attacks. Though free, Blacksmith is not open source. SentinelOne decided to expedite its development in-house to save time, said Raj Rajamani, vice president of product management.
Offsetting Asymmetry With Automation
November 24, 2017
In the security world, there is a truism that defense is harder than offense because it's an asymmetric playing field. The bad guys need only find one path into an environment -- one place where everything hasn't been done exactly "just so" and perfectly -- while those charged with securing that environment need to protect against intrusions everywhere they have a technology footprint.
'Invisible' Technologies: What You Can't See Can Hurt You
October 3, 2017
There are times when it seems like technology can work almost too well. Now, if working too well sounds to you like an impossibility, reflect that there's more to a technology than end-user experience. In addition to the experience of using the technology, there are other considerations that play a role: things like maintenance, operations and ongoing support.
AWS to Sell Cloud Services by the Second
September 20, 2017
Amazon Web Services on Monday unveiled a new per-second pricing plan for EC2 instances and EBS volumes, which will take effect Oct. 2. The new pricing for Elastic Compute Cloud and Elastic Block Storage used with EC2 instances will allow greater flexibility and efficiency for customers wanting to expand their use of cloud computing data, AWS said.
IT Convergence Trend Alters Approach to Federal Market
September 14, 2017
Federal agencies have begun using an emerging information technology tool to manage the huge amount of data the United States government generates and stores. Federal IT managers recently have embraced the concept of convergence, which has been gaining traction in the private sector. Agencies also have indicated that the approach may be useful for other federal IT applications.
Too Few Candidates to Fill Growing Number of Open Source Jobs
August 30, 2017
Open source hiring has been hampered by a lack of trained job-takers, according to The Linux Foundation, which released its sixth annual summary of career opportunities in open source last week. The report provides an overview of open source career trends, along with factors that motivate industry professionals, and methods employers use to attract and retain qualified talent.
The War Room: Experiential Security Planning
August 16, 2017
Ask any security practitioner about ransomware nowadays, and chances are good you'll get an earful. Recent outbreaks like Petya and WannaCry have left organizations around the world reeling, and statistics show that ransomware is on the rise. For example, 62 percent of participants surveyed for ISACA's recent "Global State of Cybersecurity" survey experienced a ransomware attack in 2016.
Sudo or Sudo Not, There Is No (4th) Try
June 24, 2017
If you're a Linux user, at some point in some tutorial or troubleshooting guide you've more than likely encountered Linux's magic word: "sudo". A casual observer probably can tell you that it's used to access restricted functions on your computer, but there is much more to it than that. My hope is that by taking a moment to learn about the power of "sudo", you will be better equipped to use it.
3 WannaCry Talking Points to Win Security Buy-In
June 21, 2017
By this point, most technology practitioners -- and nearly all security practitioners -- know about WannaCry. In fact, you might be sick of people analyzing it, rehashing it, sharing "lessons learned" about it, and otherwise laying out suggestions -- in some cases, contradictory -- about what you might do differently in the future. The level of unsolicited advice can border on the annoying.
See More Articles in Network Management Section >>
Facebook Twitter LinkedIn Google+ RSS
Does it matter to you if products you purchase are manufactured in another country?
Yes, and I will pay more for a domestically produced product.
Yes, but my shopping decisions won't change anything, so I do what's best for me.
I care, but it's impossible to keep track of where everything is made.
I want the best quality and price, regardless of country of origin.
It depends on the country. Some are OK, some aren't.
It depends on the company. I'll buy from a reputable non-domestic brand.
salesforce commerce cloud
salesforce commerce cloud