TechDemocracy aims to provide a holistic assessment of cyber risk  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Gartner estimates that global spending on cybersecurity solutions exceeded $81 billion in 2016. The average enterprise with 1,000 or more employees spends about $15 million fighting cybercrime each year, according to the Ponemon Institute. Despite such heavy investments in all types of solutions, many CISOs still find it challenging to answer the questions, “How likely are we to have a breach, and if we do incur a breach, what will be the financial impact?”The main obstacle to answering those fundamental questions is that much of the information needed to reveal an organization’s state of cyber risk is trapped in product silos, and it’s seldom fully mapped to the organization’s compliance policies.To read this article in full or to leave a comment, please click here

TechDemocracy aims to provide a holistic assessment of cyber risk  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Gartner estimates that global spending on cybersecurity solutions exceeded $81 billion in 2016. The average enterprise with 1,000 or more employees spends about $15 million fighting cybercrime each year, according to the Ponemon Institute. Despite such heavy investments in all types of solutions, many CISOs still find it challenging to answer the questions, “How likely are we to have a breach, and if we do incur a breach, what will be the financial impact?”The main obstacle to answering those fundamental questions is that much of the information needed to reveal an organization’s state of cyber risk is trapped in product silos, and it’s seldom fully mapped to the organization’s compliance policies.To read this article in full or to leave a comment, please click here

5 reasons to attend DockerCon 2017

DockerCon 2017 is for the hackers, the makers and those who want to build tools of mass innovation. In April, 5,000 of the best and brightest will come together to share and learn from different experiences, diverse backgrounds, and common interests. We know that part of what makes DockerCon so special is what happens in the hallways, not just the main stage. Those spontaneous connections between attendees, and the endless networking and learning opportunities, are where the most meaningful interactions occur.

DockerCon 2017

If you haven’t been to a DockerCon yet, you may not know what you are missing. To try to explain why DockerCon 2017 is a must attend conference, we took the liberty of putting together the Top 5 reasons to join us April 17-20 in Austin, Texas.

  1. The.Best.Content. From beginner to deep dive, DockerCon brings together the brightest minds to talk about their passion. Those passions range from tracing containers, building containers from scratch, monitoring and storage, to creating effective images. The list goes on.
  2. Experts Everywhere. Want to meet the maintainers and tech leads of the Docker project? DockerCon! The community members that put together the coolest IoT hack to make walking in between sessions Continue reading

Microsoft unveils a bonanza of security capabilities

Companies concerned about cybersecurity have a fleet of new Microsoft tools coming their way. The company announced a host of new security capabilities Friday morning as part of the run-up to the massive RSA security conference next week in San Francisco.On the Windows front, the company announced that it's adding the ability to use on-premises Active Directory with Windows Hello, its system for allowing biometric-based logins with Windows 10. Microsoft also launched new tools to help organizations get more use out of mobile device management products by giving them tools to migrate group policy settings to cloud-managed devices.What's more, Microsoft has launched a new tool that’s designed to help customers configure the Surface hardware under their administration, doing things like disabling the tablets' cameras. To read this article in full or to leave a comment, please click here

Microsoft unveils a bonanza of security capabilities

Companies concerned about cybersecurity have a fleet of new Microsoft tools coming their way. The company announced a host of new security capabilities Friday morning as part of the run-up to the massive RSA security conference next week in San Francisco.On the Windows front, the company announced that it's adding the ability to use on-premises Active Directory with Windows Hello, its system for allowing biometric-based logins with Windows 10. Microsoft also launched new tools to help organizations get more use out of mobile device management products by giving them tools to migrate group policy settings to cloud-managed devices.What's more, Microsoft has launched a new tool that’s designed to help customers configure the Surface hardware under their administration, doing things like disabling the tablets' cameras. To read this article in full or to leave a comment, please click here

Response: Facebook – The growing ecosystem around open networking hardware

There is more genuine innovation and change coming from Facebook than any networking vendor. Whether its hardware designs, firmware (BMC , FBOSS applications and new protocols. I’m remain confident that the future isn’t being made by billion dollar companies with 65% gross margins.

If you are involved in network strategy then these videos will get you thinking in new ways.

The growing ecosystem around open networking hardware | Engineering Blog | Facebook Code | Facebook : https://code.facebook.com/posts/1241394199239439/the-growing-ecosystem-around-open-networking-hardware/

The post Response: Facebook – The growing ecosystem around open networking hardware appeared first on EtherealMind.

Locking Down Docker To Open Up Enterprise Adoption

It happens time and time again with any new technology. Coders create this new thing, it gets deployed as an experiment and, if it is an open source project, shared with the world. As its utility is realized, adoption suddenly spikes with the do-it-yourself crowd that is eager to solve a particular problem. And then, as more mainstream enterprises take an interest, the talk turns to security.

It’s like being told to grow up by a grownup, to eat your vegetables. In fact, it isn’t like that at all. It is precisely that, and it is healthy for any technology

Locking Down Docker To Open Up Enterprise Adoption was written by Timothy Prickett Morgan at The Next Platform.

Intel researches tech to prepare for a future beyond today’s PCs

Intel realizes there will be a post-Moore's Law era and is already investing in technologies to drive computing beyond today's PCs and servers.The chipmaker is "investing heavily" in quantum and neuromorphic computing, said Brian Krzanich, CEO of Intel, during a question-and-answer session at the company's investor day on Thursday."We are investing in those edge type things that are way out there," Krzanich said.To give an idea of how far out these technologies are, Krzanich said his daughter would perhaps be running the company by then.Researching in these technologies, which are still in their infancy, is something Intel has to do to survive for many more decades. Shrinking silicon chips and cramming more features into them is becoming difficult, and Intel is already having trouble in manufacturing smaller chips.To read this article in full or to leave a comment, please click here

Recent WordPress vulnerability used to deface 1.5 million pages

Up to 20 attackers or groups of attackers are defacing WordPress websites that haven't yet applied a recent patch for a critical vulnerability.The vulnerability, located in the platform's REST API, allows unauthenticated attackers to modify the content of any post or page within a WordPress site. The flaw was fixed in WordPress 4.7.2, released on Jan. 26, but the WordPress team did not publicly disclose the vulnerability's existence until a week later, to allow enough time for a large number of users to deploy the update.To read this article in full or to leave a comment, please click here

Recent WordPress vulnerability used to deface 1.5 million pages

Up to 20 attackers or groups of attackers are defacing WordPress websites that haven't yet applied a recent patch for a critical vulnerability.The vulnerability, located in the platform's REST API, allows unauthenticated attackers to modify the content of any post or page within a WordPress site. The flaw was fixed in WordPress 4.7.2, released on Jan. 26, but the WordPress team did not publicly disclose the vulnerability's existence until a week later, to allow enough time for a large number of users to deploy the update.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IBM’s Watson powers Invoca’s call analysis suite

IBM’s Watson cognitive computing platform is almost a victim of its own fame. Watson famously beat all-comers to win the Jeopardy game show a few years ago. At the time, the general public (helped, it has to be said, by IBM’s marketers) assumed the win was an indication that, in short order, smart computers would be everywhere and intuitively making the right decisions in every situation.+ Also on Network World: IBM's Watson wants to do your tax returns + Since the Jeopardy win, however, IBM seems to have had a hard time finding good market fits for Watson. This isn’t a criticism of IBM in any way. The reality is that while many consumer brands apply artificial intelligence (AI) to their products (think Amazon book recommendations, Google maps smart routing or Apple's Siri) most existing examples have been from those companies building AI tools themselves. There are far fewer examples of enterprises leveraging a third-party cognitive platform to build into their own applications.To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For February 10th, 2017

Hey, it's HighScalability time:

 

It was a game of drones.

If you like this sort of Stuff then please support me on Patreon.

  • Half a trillion: Apple’s cash machine; 4,000-5,000: collected data points per adult in US; 10 million: gallons of gas UPS saves turning right; 2.27: Tesla 0-60 time; 40: complex steps to phone security; $2.3 billion: VR/AR investment in 2016; 18%: small players make up public cloud services market; 500°C: first chip to survive on Venus; 5 billion: ever notes; 375,000: images from The Metropolitan Museum of Art in public domain; 18 million: queries per minute against Facebook's Beringei database; 159: jobs per immigrant founder; 2.5 miles: whales breach for stronger signal; 10,000x: computers faster in 2035; 

  • Quotable Quotes: 
    • @martin_casado: Chinese factory replaces 90% of human workers with robots. Production rises by 250%, defects drop by 80%
    • Jure Leskovec: It’s [trolling] a spiral of negativity. Just one person waking up cranky can create a spark and, because of discussion context and voting, these sparks can spiral out into cascades of bad behavior. Bad conversations lead to bad conversations. People who get Continue reading

33% off MagicFiber Microfiber Cleaning Cloths For Screens and Other Delicate Surfaces, 30 Pack – Deal Alert

This extremely soft, high-quality 6x7 microfiber cloth from MagicFiber absorbs and safely removes dust, oil smudges, fingerprints, and dirt from eyeglasses, camera lenses, computer screens, televisions, and other delicate surfaces without any harsh chemicals. It's machine or hand washable, and is built to last. The cloths are highly rated on Amazon, where it currently averages 4.8 out of 5 stars from over 9,100 people (90% rate 5 stars: read recent reviews). Its typical list price of $29.99 has been reduced 33% to $20 for a pack of 30 individually wrapped, so you may decide to toss one in everybody's stocking this holiday season. See the discounted 30-pack of microfiber cleaning cloths now on Amazon.To read this article in full or to leave a comment, please click here

Attorneys predict a demanding year for IT outsourcing customers

In a year that’s already been marked by uncertainty, one thing is clear: IT outsourcing customers will need to reexamine their approaches to IT services in 2017. “We see a big year ahead for technology transactions,” says Brad Peterson, partner in the Chicago office of Mayer Brown, in a recent webinar on the law firm’s 2017 predictions for the IT and business services space.[ Related: Outsourcing trends to watch in 2017 ]There are big changes afoot in a number of areas — from a political climate that threatens to reshape the already shifting global IT services industry to new data protection and privacy regulations and the drive to extract more value from data to the widespread adoption of new digital technologies to a revolution that’s begun in the more rapid delivery of software and other systems.To read this article in full or to leave a comment, please click here

63% off Jackery Bolt 6,000mAh Power Bank with Built-in Lightning and Micro USB Cables – Deal Alert

Reduce some of that cable clutter with the ultra compact Jackery Bolt 6,000mAh external battery charger that features a built-in Apple Lighting cable for your iPhone or iPad and a built-in micro-USB cable for other mobile devices. With an additional open USB port you can charge up to 3 devices at once. Powerful 6000 mAh capacity can fully charge an iPhone 6 at up to 3 times.  The Jackery Bolt averages 4.5 out of 5 stars from over 240 people on Amazon (read reviews), where its list price of $69.99 has been reduced 63% down to just $25.99. See the discounted external power bank now on Amazon. To read this article in full or to leave a comment, please click here