IDG Contributor Network: The first step to starting an enterprise IoT project

At long last, the Internet of Things (IoT) is moving beyond the hype and initial deployment cycle and entering a phase where we are now seeing many successful enterprise implementations. Thousands of businesses across all industries have begun to experience the operational benefits and new value propositions delivered by the IoT. But, as I speak with customers, partners and industry leaders around the world, I still hear many frontline business and operations managers say that they are unsure how, exactly, to begin their IoT initiatives. Often, they have an idea for how they would like to use IoT in their business but are not aware of all the considerations they should think through before beginning, or how to create their project plan and measure the impact.To read this article in full, please click here

Google, Cisco amp-up enterprise cloud integration

The joint Google and Cisco Kubernetes platform for enterprise customers should appear before the end of the year, and things are getting warm between the two companies ahead of that highly anticipated release.Cisco and Google last October teamed up to develop a Kubernetes hybrid-cloud offering.  Kubernetes, originally designed by Google, is an open-source-based system for developing and orchestrating containerized applications.RELATED: How to make hybrid cloud work The Cisco/Google combination – which is currently being tested by early access enterprise customers, according to Google – will let IT managers and application developers use Cisco tools to manage their on-premises environments and link it up with Google’s public IaaS cloud which offers orchestration, security and ties to a vast developer community.To read this article in full, please click here

Google, Cisco amp-up enterprise cloud integration

The joint Google and Cisco Kubernetes platform for enterprise customers should appear before the end of the year, and things are getting warm between the two companies ahead of that highly anticipated release.Cisco and Google last October teamed up to develop a Kubernetes hybrid-cloud offering.  Kubernetes, originally designed by Google, is an open-source-based system for developing and orchestrating containerized applications.RELATED: How to make hybrid cloud workThe Cisco/Google combination – which is currently being tested by an early access enterprise customer, according to Google – will let IT managers and application developers use Cisco tools to manage their on-premises environments and link it up with Google’s public IaaS cloud which offers orchestration, security and ties to a vast developer community.To read this article in full, please click here

Minecraft API with Workers + Coffeescript

Minecraft API with Workers + Coffeescript

The following is a guest post by Ashcon Partovi, a computer science and business undergraduate at the University of British Columbia in Vancouver, Canada. He's the founder of a popular Minecraft multiplayer server, stratus.network, that provides competitive, team-based gameplay to thousands of players every week

Minecraft API with Workers + Coffeescript

If you've ever played a video game in the past couple of years, chances are you know about Minecraft. You might be familiar with the game or even planted a tree or two, but what you might not know about is the vast number of Minecraft online communities. In this post, I'm going to describe how I used Cloudflare Workers to deploy and scale a production-grade API that solves a big problem for these Minecraft websites.

Introducing the Problem

Here is an example of my Minecraft player profile from one of the many multiplayer websites. It shows some identity information such as my username, a bitmap of my avatar, and a preview of my friends. Although rendering this page with 49 bitmap avatars may seem like an easy task, it's far from trivial. In fact, it's unnecessarily complicated.

Minecraft API with Workers + Coffeescript

Here is the current workflow to render a player profile on a website given Continue reading

Research; HTTPS Interceptions

I have written elsewhere about the problems with the “little green lock” shown by browsers to indicate a web page (or site) is secure. In that article, I considered the problem of freely available certificates, and a hole in the way browsers load pages. In March of 2017, another paper was published documenting another problem with the “green lock” paradigm—the impact of HTTPS interception. In theory, a successful HTTPS session means the session between host and the server has been encrypted, which means no third party can read the contents of the packets passing between the two.

This works, modulo the trustworthiness of the certificates involved in encrypting the traffic, so long as there is no-one in the middle of the connection encrypting packets from the receiver, and re-encrypting them towards the transmitter. This “man in the middle,” or MITM, can read the contents of all the packets in the exchange, even though the data is encrypted on transmit. Surely such MITM situations are rare, right?

Right.

The researchers in this paper set out to discover just how often HTTPS (LTS) sessions are terminated and re-encrypted by some device or piece of software in the middle. To discover how often Continue reading

IDG Contributor Network: Are you winning the data intelligence game?

When big data was hyped as the next technology set to transform the business world many organizations began to collect as much of it as they could lay their hands on. Data centers proliferated as companies sucked in data points from customer interactions, supply chain partners, mobile devices and many, many other sources.It looked as though enterprises had jumped on board with the idea of big data, but what they were actually doing was hoarding information. Very few had any idea about how to unlock the insights contained within. Businesses that saw the value and pioneered analytics are beginning to see a major return on their investment.In a global, cross-industry McKinsey survey of 530 C-level execs and senior managers, almost half said that data and analytics have significantly or fundamentally changed business practices in their sales and marketing functions, and more than a third said the same about R&D. Big data can have a major beneficial impact, but realizing those potential benefits requires a winning strategy.To read this article in full, please click here

IDG Contributor Network: Are you winning the data intelligence game?

When big data was hyped as the next technology set to transform the business world many organizations began to collect as much of it as they could lay their hands on. Data centers proliferated as companies sucked in data points from customer interactions, supply chain partners, mobile devices and many, many other sources.It looked as though enterprises had jumped on board with the idea of big data, but what they were actually doing was hoarding information. Very few had any idea about how to unlock the insights contained within. Businesses that saw the value and pioneered analytics are beginning to see a major return on their investment.In a global, cross-industry McKinsey survey of 530 C-level execs and senior managers, almost half said that data and analytics have significantly or fundamentally changed business practices in their sales and marketing functions, and more than a third said the same about R&D. Big data can have a major beneficial impact, but realizing those potential benefits requires a winning strategy.To read this article in full, please click here