Accenture wants to help businesses secure their blockchains

Accenture wants to help businesses use blockchain technologies more securely by locking away the encryption keys they use to sign transactions.It's built a system that blockchain developers can use to store credentials in specialized cryptoprocessors called hardware security modules (HSMs).HSMs are typically used by banks to store the PINs associated with payment cards or the credentials used to make interbank payments over the SWIFT network, and are much more secure than storing the credentials, even in encrypted form, on network-connected servers from where attackers could steal them.The PINs or credentials never leave the HSMs, and their use within them is strictly controlled.To read this article in full or to leave a comment, please click here

Accenture wants to help businesses secure their blockchains

Accenture wants to help businesses use blockchain technologies more securely by locking away the encryption keys they use to sign transactions.It's built a system that blockchain developers can use to store credentials in specialized cryptoprocessors called hardware security modules (HSMs).HSMs are typically used by banks to store the PINs associated with payment cards or the credentials used to make interbank payments over the SWIFT network, and are much more secure than storing the credentials, even in encrypted form, on network-connected servers from where attackers could steal them.The PINs or credentials never leave the HSMs, and their use within them is strictly controlled.To read this article in full or to leave a comment, please click here

Here’s how Evernote moved 3 petabytes of data to Google’s cloud

Evernote decided last year that it wanted to move away from running its own data centers and start using the public cloud to operate its popular note-taking service. On Wednesday, it announced that the lion's share of the work is done, save for some last user attachments.The company signed up to work with Google, and as part of the migration process, the tech titan sent a team of engineers (in one case, bearing doughnuts) over to work with its customer on making sure the process was a success.Evernote wanted to take advantage of the cloud to help with features based on machine learning that it has been developing. It also wanted to leverage the flexibility that comes from not having to run a data center.To read this article in full or to leave a comment, please click here

In-memory noSQL DBMS Client in Big Data Cluster

This is guest post by Sergei Sheinin, creator of the 2DX Web UI Database Cluster Framework, a low latency big data cluster with in-memory noSQL DBMS Web Browser client.

When I began working in the field of data management the disconnect between rigid structure of relational database tables and free form of documents managed by end users and their businesses stood out as a technical and managerial hurdle. On the one hand there were strict definitions of normalized relational database models and unstructured document formats on the other. Often the users in charge of changing document structures held organizational responsibilities far removed from database modeling or programming. On one occasion I was involved in a project where call center operators made on the fly decisions to update a document structure based on phone conversations with customers. Such updates had to be streamed into a relational back-end creating havoc in database structure and build of table columns.

In seeking a permanent solution I researched merits of Entity-Attribute-Value database schema and its applications. This technique proved successful in enabling front end users to modify relational-bound documents through performing updates to structure described in their metadata. However application of EAV raised Continue reading

Avaya powers the hockey Mecca: Montreal Canadiens’ Bell Centre

In the sports world there is no team more revered by its city than the Montreal Canadiens. With all due respect to Green Back Packer, New York Yankee or New England Patriots fans, you don’t know the absolute die-hard devotion of a Canadiens supporter. The team has also had an unparalleled level of success in North American sports with 24 Stanley Cup Championships and an equal number of players in the recently released NHL's top 100 players of all time. The home of this storied franchise is the Bell Centre in downtown Montreal. When one walks into the building, its easy to understand what “Canadiens tradition” means, as there are reminders of the legends who played for this franchise and the promise of future greatness, which is why the fans come out in droves no matter what. Through success and failure, good times and bad, the seats always sell out. To read this article in full or to leave a comment, please click here

NASA has a shadow IT problem

It’s not often enterprises get direct evidence of a shadow IT operation but a recent audit of NASA’s IT realm came up with 28 unsanctioned cloud services operating in its environment. NASA’s own CIO office found eight such services while the NASA Office of Inspector General discovered another 20, as part of an overall cloud security audit done by the NASA OIG. +More on Network World: NASA’s “Human Computers” and the Hidden Figures movie story+To read this article in full or to leave a comment, please click here

NASA has a shadow IT problem

It’s not often enterprises get direct evidence of a shadow IT operation but a recent audit of NASA’s IT realm came up with 28 unsanctioned cloud services operating in its environment.NASA’s own CIO office found eight such services while the NASA Office of Inspector General discovered another 20, as part of an overall cloud security audit done by the NASA OIG.+More on Network World: NASA’s “Human Computers” and the Hidden Figures movie story+To read this article in full or to leave a comment, please click here

NASA has a shadow IT problem

It’s not often enterprises get direct evidence of a shadow IT operation but a recent audit of NASA’s IT realm came up with 28 unsanctioned cloud services operating in its environment.NASA’s own CIO office found eight such services while the NASA Office of Inspector General discovered another 20, as part of an overall cloud security audit done by the NASA OIG.+More on Network World: NASA’s “Human Computers” and the Hidden Figures movie story+To read this article in full or to leave a comment, please click here

13 tech jobs that pay $200k salaries

Which IT roles earn the biggest salaries? Thirteen tech jobs can pull in salaries of $200,000 or more, according to new data from a tech staffing firm.The jobs that top $200,000 are the highest paying titles included in Mondo’s annual Tech Salary Guide, which lists salary ranges for 95 IT jobs. Most jobs in the $200,000 range are high-level IT leadership or technical positions related to hot areas such as security and big data. Two of the highest-paying jobs are developer roles tied to specific vendor platforms: Demandware and iOS. RELATED: 25 CIO pay packages revealed | Want to boost your CIO pay? Switch jobs | Bonuses, stocks, perks lift CIO compensation | 20 highest paid tech CEOsTo read this article in full or to leave a comment, please click here

13% off Jaybird X2 Sport Wireless Bluetooth Headphones (Storm White) – Deal Alert

With a regular list price of $149.99, the current discount makes the Jaybird X2 Sport is now available with a 13% discount for this deal. Features include: Premium Bluetooth Audio For Skip-Free Music Outdoors 8 Hours of Music + Calls With Complete Remote Controls Secure Over/Under-Ear Fit Options Lifetime Sweat proof Warranty Includes Comply Premium Sport Memory Foam Ear Tips, Patented Secure-Fit Ear Fins, Friction-Fit Silicone Sport Carrying Case, Silicone Ear Tips, Charging Cable & Cord Management Clips. Jump to Amazon now for additional details, and to explore buying options.To read this article in full or to leave a comment, please click here

Hard-to-detect fileless attacks target banks, other organizations

A wave of attacks that have recently affected banks and other enterprises used open-source penetration testing tools loaded directly into memory instead of traditional malware, making their detection much harder.Researchers from antivirus vendor Kaspersky Lab started investigating these attacks after the security team from an unnamed bank found Meterpreter in the random access memory (RAM) of a server that acted as the organization's Windows domain controller.Meterpreter is an in-memory attack payload that can inject itself into other running processes and is used to establish persistency on a compromised system. It is part of the Metasploit penetration testing framework, a popular tool used both by internal security teams and by malicious hackers.To read this article in full or to leave a comment, please click here

Hard-to-detect fileless attacks target banks, other organizations

A wave of attacks that have recently affected banks and other enterprises used open-source penetration testing tools loaded directly into memory instead of traditional malware, making their detection much harder.Researchers from antivirus vendor Kaspersky Lab started investigating these attacks after the security team from an unnamed bank found Meterpreter in the random access memory (RAM) of a server that acted as the organization's Windows domain controller.Meterpreter is an in-memory attack payload that can inject itself into other running processes and is used to establish persistency on a compromised system. It is part of the Metasploit penetration testing framework, a popular tool used both by internal security teams and by malicious hackers.To read this article in full or to leave a comment, please click here

Unwinding Moore’s Law from Genomics with Co-Design

More than almost any other market or research segment, genomics is vastly outpacing Moore’s Law.

The continued march of new sequencing and other instruments has created a flood of data and development of the DNA analysis software stack has created a tsunami. For some, high performance genomic research can only move at the pace of innovation with custom hardware and software, co-designed and tuned for the task.

We have described efforts to build custom ASICs for sequence alignment, as well as using reprogrammable hardware for genomics research, but for centers that have defined workloads and are limited by performance constraints

Unwinding Moore’s Law from Genomics with Co-Design was written by Nicole Hemsoth at The Next Platform.

HPE’s Mesosphere reseller agreement heats up container management market

Hewlett Packard Enterprise this week announced an agreement with container management platform startup Mesophere to resell the smaller company’s flagship product, a data center operating system dubbed DC/OS.The news marks a validation of Mesosphere’s technology given HPE is seeing demand for the product from its enterprise customers, analysts say. It also reinforces the notion that more and more organizations are embracing the use of containers – a technology used to package modern applications and run them in data centers or public clouds.+MORE AT NETWORK WORLD: Google cloud search helps enterprise users find data quickly | What P4 Programming is and why it’s so important for SDN +To read this article in full or to leave a comment, please click here

Announcing the DockerCon speakers and sessions

Today we’re excited to share the launch the DockerCon 2017 agenda. With 100+ DockerCon speakers, 60+ breakout sessions, 11 workshops, and hands on labs, we’re confident that you’ll find the right content for your role (Developer, IT Ops, Enterprise) or your level of Docker expertise (Beginner, Intermediate, Advanced).

 

View the announced schedule and speakers lineup  

 

Announced sessions include:

Use Case

  • 0 to 60 with Docker in 5 Months: How a Traditional Fortune 40 Company Turns on a Dime by Tim Tyler (MetLife)
  • Activision’s Skypilot: Delivering Amazing Game Experiences through Containerized Pipelines by Tom Shaw (Activision)
  • Cool Genes: The Search for a Cure Using Genomics, Big Data, and Docker by James Lowey (TGEN)
  • The Tale of Two Deployments: Greenfield and Monolith Docker at Cornell by Shawn Bower and Brett Haranin (Cornell University)
  • Taking Docker From Local to Production at Intuit by JanJaap Lahpor (Intuit)


The Use Case track at @dockercon looks great w/ @tomwillfixit @JanJaapLahpor @drizzt51 #dockercon
Click To Tweet


DockerCon Speakers

Using Docker

  • Docker for Devs by John Zaccone (Ippon Technologies)
  • Docker for Ops by Scott Couton (Puppet)
  • Docker for Java Developers by Arun Gupta (Couchbase) and Fabiane Nardon (TailTarget)
  • Docker for .NET Developers by Michele Bustamante (Solliance)
  • Creating Effective Continue reading

Tutorial: Everything You Always Wanted to Know About Optical Networking – YouTube

Added to my to-do list to watch and re-watch this about every 6 months.

Topics include:

  • How fiber works (the basics, fiber types and limitations, etc)
  • Optical power (understanding dBm, loss, using light meters, etc)
  • Working with optics (choosing the right type, designing optical networks, etc)
  • DWDM (how it works, muxes, OADMs and ROADMs, amps, etc)
  • Dispersion and other impairments (what is it, why do we care, how do we fix it)
  • Optical Myths (can I hurt myself looking into fiber, c

Tutorial: Tutorial Everything You Always Wanted to Know About Optical Networking – YouTube : https://www.youtube.com/watch?v=_KFpXuHqHQg

The post Tutorial: Everything You Always Wanted to Know About Optical Networking – YouTube appeared first on EtherealMind.

Geekiest alarm clock ever?

Everyone knows what to do when life gives you lemons. Well, the same can apply when technology cries wolf at four in the morning, according to a contributor to Reddit’s section devoted to systems administration. Every morning at just past 4 a.m., I get a text from Solarwinds that makes my phone beep. The alert is that one of our LDAP servers is unresponsive. Then two minutes later I get a text/phone beep that LDAP is back up. Every day.It’s OK, I need to catch the bus/train just past 5 a.m. anyway, gives me time to get ready / pack my lunch, drink a cup of coffee, etc.To read this article in full or to leave a comment, please click here