IDG Contributor Network: ScyllaDB another contender to the open source NoSQL database crown

The world of the database is one of those areas that sees lots of people obsessing over details that to outside observers would seem trivial. Graph, NoSQL, SQL, distributed—so many choices.So, when ScyllaDB told me about a funding round that they’d raised and their stated intention to replace Apache Cassandra, I was interested—if slightly skeptical. Not skeptical because of anything I know about ScyllaDB per se, but simply because of the busy-ness of the space.+ Also on Network World: Google’s new cloud service is a unique take on a database + The launch only a couple of weeks ago of Google’s Cloud Spanner database, an offering developed from the internal tools that Google itself uses, certainly upped the database ante. Google’s assertion that Cloud Spanner gives users all the benefits of both regular relational and NoSQL databases put all other database offerings on guard.To read this article in full or to leave a comment, please click here

IDG Contributor Network: ScyllaDB another contender to the open source NoSQL database crown

The world of the database is one of those areas that sees lots of people obsessing over details that to outside observers would seem trivial. Graph, NoSQL, SQL, distributed—so many choices.So, when ScyllaDB told me about a funding round that they’d raised and their stated intention to replace Apache Cassandra, I was interested—if slightly skeptical. Not skeptical because of anything I know about ScyllaDB per se, but simply because of the busy-ness of the space.+ Also on Network World: Google’s new cloud service is a unique take on a database + The launch only a couple of weeks ago of Google’s Cloud Spanner database, an offering developed from the internal tools that Google itself uses, certainly upped the database ante. Google’s assertion that Cloud Spanner gives users all the benefits of both regular relational and NoSQL databases put all other database offerings on guard.To read this article in full or to leave a comment, please click here

CIA false flag team repurposed Shamoon data wiper, other malware

The U.S. Central Intelligence Agency documents published by WikiLeaks Tuesday shows that one of the agency's teams specializes in reusing bits of code and techniques from public malware samples.According to the leaked documents the Umbrage team is part of the Remote Development Branch under the CIA's Center for Cyber Intelligence. It maintains a library of techniques borrowed from in-the-wild malware that could be integrated into its own projects.To read this article in full or to leave a comment, please click here

CIA false flag team repurposed Shamoon data wiper, other malware

The U.S. Central Intelligence Agency documents published by WikiLeaks Tuesday shows that one of the agency's teams specializes in reusing bits of code and techniques from public malware samples.According to the leaked documents the Umbrage team is part of the Remote Development Branch under the CIA's Center for Cyber Intelligence. It maintains a library of techniques borrowed from in-the-wild malware that could be integrated into its own projects.To read this article in full or to leave a comment, please click here

IT professionals think Apple devices are easier to manage, according to new survey

A recent survey has found that your IT department thinks a Mac is more manageable than a PC or Chromebook.According to a survey of IT professionals, Macs and iOS devices are easier to manage when it comes to security, device configuration, software deployment, and support. Of those surveyed, 62 percent said the Mac is as easy or easier to deploy than PC, and 93 percent said it’s as easy or easier to deploy an iPhone or iPad over another device.While most IT professionals found Apple’s products easier to manage overall, that was not the case when it comes to Mac integration. Only 36 percent of IT professionals claimed that it was easy or easier to integrate Macs into other environments. The survey is based on responses from 300 IT professionals and was commissioned by Jamf, the software management firm that focuses solely on Apple devices.To read this article in full or to leave a comment, please click here

How pay transparency and equity help employers retain workers

More than ever, companies are updating their compensation strategy and practice to build more trusting relationships with their workforce, emphasizing pay transparency and equity, according to the 2017 Compensation Best Practices Report from cloud compensation services company PayScale.The 2017 Compensation Best Practices Report (CBPR) is based on data from 7,700 executives, line of business managers, human resource leaders and compensation practitioners, and reflects current attitudes about compensation, business growth, hiring and retention. The latest annual report shows a shift is underway at many companies as key talent markets are becoming increasingly competitive.To read this article in full or to leave a comment, please click here

What’s the value in attack attribution?

For those who pursue forensic analysis with the hope of identifying and prosecuting an attacker, they likely will find that the time spent on attack attribution is fruitless.If, however, they are looking to use what they gain through attack attribution to inform their overall security procedures from prevention to response, the effort yields valuable results.Many experts in the industry have questioned whether there is any value to attribution. SafeBreach CTO & co-founder Itzik Kotler said, "The only interesting aspect in attribution itself is to classify and put information in a box and use it over and over again."Kolter offered a hypothetical in which right now CNN gets hacked by the Chinese. "That someone can or cannot attribute it to the Chinese doesn't matter. It does matter if we can say we think this is from China," Kolter said.To read this article in full or to leave a comment, please click here

What’s the value in attack attribution?

For those who pursue forensic analysis with the hope of identifying and prosecuting an attacker, they likely will find that the time spent on attack attribution is fruitless.If, however, they are looking to use what they gain through attack attribution to inform their overall security procedures from prevention to response, the effort yields valuable results.Many experts in the industry have questioned whether there is any value to attribution. SafeBreach CTO & co-founder Itzik Kotler said, "The only interesting aspect in attribution itself is to classify and put information in a box and use it over and over again."Kolter offered a hypothetical in which right now CNN gets hacked by the Chinese. "That someone can or cannot attribute it to the Chinese doesn't matter. It does matter if we can say we think this is from China," Kolter said.To read this article in full or to leave a comment, please click here

Smackdown: Office 365 vs. G Suite collaboration

Ever since I can remember, Silicon Valley has been enamored with the idea of group editing of documents. Very little good writing gets done that way, of course. It’s like the joke that a camel is a horse designed by committee. Office 365 vs. G Suite: Meeting collaborationTo read this article in full or to leave a comment, please click here(Insider Story)

Ryzen CPUs explained: Everything you need to know about AMD’s disruptive multicore chips

After a decade of fielding ho-hum FX-series processors, AMD’s finally released its highly disruptive Ryzen chips, throwing down the gauntlet and challenging Intel’s supremacy in high-end computing.AMD’s new Ryzen chips include several CPUs (and CPU families) of various levels of potency. What’s more, Ryzen introduces a completely new motherboard platform, and the processors require different memory and coolers than their predecessors. There’s a lot to sift through—so let’s sift!Here’s everything you need to know about AMD’s Ryzen.Meet AMD’s Ryzen CPUs AMD Details about the AMD Ryzen chips announced thus far.To read this article in full or to leave a comment, please click here

Here’s how Microsoft has rethought its approach to email

Two years ago, Microsoft made a massive shift in the way it approached the email market. In January 2015, the company launched Outlook for iOS and Android, free professional-grade email apps for two platforms that Microsoft previously underserved in that regard.Outlook for iOS and its Android sibling were special, because they supported Gmail, Yahoo and iCloud email, in addition to Microsoft’s Outlook.com, Office 365 and Exchange email offerings. While connecting to third party email providers isn't new for Outlook, offering one-click support for different email providers at launch sent a message that this wouldn't be locked to the Microsoft ecosystem.To read this article in full or to leave a comment, please click here

Consumer Reports decision to rate cybersecurity is a huge deal

Conventional wisdom has it that most consumers simply don’t pay much attention to computer security and privacy issues. Perhaps worse, they don’t think they can do much to protect themselves without foregoing many of the benefits of our digital, connected age. Consumer Reports is trying to change both of those things. Consumer Reports’ new cybersecurity standard The influential publication and public-interest organization announced on Monday that it has collaborated on a digital consumer-protection standard designed to define “how companies should build these products to really be good for consumers in terms of privacy and other issues,” said Maria Rerecich, who directs electronics testing at Consumer Reports, in a statement. To read this article in full or to leave a comment, please click here

Consumer Reports decision to rate cybersecurity is a huge deal

Conventional wisdom has it that most consumers simply don’t pay much attention to computer security and privacy issues. Perhaps worse, they don’t think they can do much to protect themselves without foregoing many of the benefits of our digital, connected age. Consumer Reports is trying to change both of those things. Consumer Reports’ new cybersecurity standard The influential publication and public-interest organization announced on Monday that it has collaborated on a digital consumer-protection standard designed to define “how companies should build these products to really be good for consumers in terms of privacy and other issues,” said Maria Rerecich, who directs electronics testing at Consumer Reports, in a statement. To read this article in full or to leave a comment, please click here

6 cloud computing savings you may be missing out on

Hidden costs?Image by ThinkstockAs more organizations deploy applications in the cloud to meet demand spikes, cost is a major consideration. Often, businesses start comparing service charges and the cost of renting or buying nodes, making a list of all of the things that matter to each option: computing in the cloud, renting compute capacity for some amount of time, or adding servers to the permanent arsenal. While these contributing factors may seem obvious and the math relatively straightforward, those who have taken the leap into the cloud have often cited that crucial cost considerations are easily overlooked.To read this article in full or to leave a comment, please click here

US senator probes into CloudPets smart toy hack

A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices.Bill Nelson, a Florida Democrat, wrote in a letter Tuesday to CEO Mark Meyers that the breach raises serious questions concerning how well the company protects the information it collects, particularly from children.Nelson also said that the incident raises questions about the vendor's compliance with the Children’s Online Privacy Protection Act that requires covered companies to have reasonable procedures to protect the confidentiality, security and integrity of personal information collected from children.To read this article in full or to leave a comment, please click here

US senator probes into CloudPets smart toy hack

A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices.Bill Nelson, a Florida Democrat, wrote in a letter Tuesday to CEO Mark Meyers that the breach raises serious questions concerning how well the company protects the information it collects, particularly from children.Nelson also said that the incident raises questions about the vendor's compliance with the Children’s Online Privacy Protection Act that requires covered companies to have reasonable procedures to protect the confidentiality, security and integrity of personal information collected from children.To read this article in full or to leave a comment, please click here