Google Cloud Key Management Service could help more enterprises encrypt data

Attackers are increasingly able to penetrate perimeter defenses, compromise accounts and mine data without targets even being aware of the attack, as the Democratic National Committee breach proved. Encrypting data is the best defense.Strong encryption of complex data structures requires a Key Management System (KMS). But implementing a KMS can be challenging, especially for enterprises below the security poverty line that don’t have the budget to hire a multidisciplinary security team. Google may have a solution with its Cloud Key Management Service (CKMS) now in beta in select countries.  To read this article in full or to leave a comment, please click here

Google Cloud Key Management Service could help more enterprises encrypt data

Attackers are increasingly able to penetrate perimeter defenses, compromise accounts and mine data without targets even being aware of the attack, as the Democratic National Committee breach proved. Encrypting data is the best defense.Strong encryption of complex data structures requires a Key Management System (KMS). But implementing a KMS can be challenging, especially for enterprises below the security poverty line that don’t have the budget to hire a multidisciplinary security team. Google may have a solution with its Cloud Key Management Service (CKMS) now in beta in select countries.  To read this article in full or to leave a comment, please click here

44% off YETI Rambler 64oz Stainless Steel Vacuum Insulated Bottle with Cap – Deal Alert

With double-wall vacuum insulation, these over-engineered drink holders keep your favorite beverage as cold -- or hot -- as science allows. Over-the-nose wide mouth, anti-condensation, puncture and rust-resistant, no-leak cap, and a giant 64-oz capacity that can fit everything from a growler of beer to multiple bowls of soup. The Yeti Rambler is currently listed for the very low price of $49.99, a good deal considering its $89.99 list price. See the high-end, over-engineered Yeti bottle now on Amazon. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Infrastructure monitoring: Turn data into knowledge and minimize slowdowns

It’s 2 a.m., and a hospital’s system has slowed to a crawl. Lives are at stake. For the harried system admins looking for the source of the slowdown, time is of the essence.The hospital’s system has servers attached through a SAN to storage devices. But where’s the weak link? The administrator cannot afford to waste time analyzing server performance when the problem may be in a storage device or the SAN. He needs information that enables him to conduct his root cause analysis as quickly as possible.Perhaps you don’t have to worry about whether someone will live or die when your IT infrastructure fails. However, when it’s slow or down, it fails to deliver a satisfying user experience. Also, it’s likely that your company’s operations falter, costs increase, and your bottom line suffers.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Infrastructure monitoring: Turn data into knowledge and minimize slowdowns

It’s 2 a.m., and a hospital’s system has slowed to a crawl. Lives are at stake. For the harried system admins looking for the source of the slowdown, time is of the essence.The hospital’s system has servers attached through a SAN to storage devices. But where’s the weak link? The administrator cannot afford to waste time analyzing server performance when the problem may be in a storage device or the SAN. He needs information that enables him to conduct his root cause analysis as quickly as possible.Perhaps you don’t have to worry about whether someone will live or die when your IT infrastructure fails. However, when it’s slow or down, it fails to deliver a satisfying user experience. Also, it’s likely that your company’s operations falter, costs increase, and your bottom line suffers.To read this article in full or to leave a comment, please click here

Is this the year IoT standards will finally make sense?

A few brave souls predict IoT standards will start to gel this year, but making all those connected things work together still looks like a long shot.Two years ago, some industry analysts cautiously suggested that a vast array of IoT standards would merge into just a few beginning in 2017. If the internet of things in late 2014 was a cacophony of discordant musicians tuning up, it’s now reached the point where a few virtuosos are playing the same tune. But there’s still a lot of sheet music getting passed around.To read this article in full or to leave a comment, please click here

Is this the year IoT standards will finally make sense?

A few brave souls predict IoT standards will start to gel this year, but making all those connected things work together still looks like a long shot.Two years ago, some industry analysts cautiously suggested that a vast array of IoT standards would merge into just a few beginning in 2017. If the internet of things in late 2014 was a cacophony of discordant musicians tuning up, it’s now reached the point where a few virtuosos are playing the same tune. But there’s still a lot of sheet music getting passed around.To read this article in full or to leave a comment, please click here

The Interplay Of HPC Interconnects And CPU Utilization

Choosing the right interconnect for high-performance compute and storage platforms is critical for achieving the highest possible system performance and overall return on investment.

Over time, interconnect technologies have become more sophisticated and include more intelligent capabilities (offload engines), which enable the interconnect to do more than just transferring data. Intelligent interconnect can increase system efficiency; interconnect with offload engines (offload interconnect) dramatically reduces CPU overhead, allowing more CPU cycles to be dedicated to applications and therefore enabling higher application performance and user productivity.

Today, the interconnect technology has become even more critical than ever before, due to a number

The Interplay Of HPC Interconnects And CPU Utilization was written by Timothy Prickett Morgan at The Next Platform.

Stumbling And Fumbling Into Video Blogging

I’m used to writing and to podcasting. I know what the content creation and publication process looks like for written and audio media. The increasing popularity of video has had me and my business partner scratching our heads, wondering how we can best leverage the medium. Or if we even should.

And so, we’ve begun our video adventure the way we’ve always done things. Just go for it. Try it. Hit publish. It won’t be perfect, but that’s okay. Learn and improve.

My first video was a good bit of work, taking roughly eight hours to write, shoot, produce, and publish a ten minute video covering some tech industry news. That’s not scalable, but it was a learning experience. Here was my process.

Write

I get press releases from dozens of marketers and public relations firms, usually several per day. I chose some that I thought folks might be interested in. And then I wrote copy. I know from past projects that many written words translate to many spoken minutes. You have to keep copy tight if you’re writing to a time limit.

I managed to do that, writing just under a thousand words of copy. I did ad lib a bit, but Continue reading

Stuff The Internet Says On Scalability For January 13th, 2017

Hey, it's HighScalability time:

 

So you think you're early to market! The Man Who Invented VR Goggles 50 Years Too Soon

If you like this sort of Stuff then please support me on Patreon.

  • 99.9: Percent PCs cheaper than in 1980; 300x20 miles: California megaflood; 7.5 million: articles published on Medium; 1 million: Amazon paid eBook downloads per day; 121: pages on P vs. NP; 79%: Americans use Facebook; 1,600: SpaceX satellites to fund a city on Mars; 

  • Quotable Quotes:
    • @GossiTheDog: How corporate security works: A) buy a firewall B) add a rule allowing all traffic C) the end How corporate security works:A) buy a firewall B) add a rule allowing all traffic C) the end
    • @caitie: Distributed Systems PSA: your regular reminder that the operational cost of a system should be included & considered when designing a system
    • @jimpjorps: 1998: the internet means you can "telecommute" to a tech job from anywhere on Earth 2017: everyone works in the same one square mile of SF
    • Jessi Hempel: [re: BitTorrent] Perhaps the lesson here is that sometimes technologies are not products. And they’re not companies. They’re just damn good technologies.
    • Continue reading