Announcement

Announcement

Announcement 19 articles, 2016-04-11 12:03 1 News News for the Open Source Professional 2016-04-11 12:03 480Bytes www.linux.com 2 CW@50: Storage – From punched cards to flash and the cloud Since the launch of Computer Weekly in 1966, we have moved from a world of punched cards and paper tape to one where flash and the cloud have revolutionised data storage. 2016-04-11 09:32 2KB www.computerweekly.com 3 Security Think Tank: Tackle vital patching challenge with risk- based approach What strategies can companies adopt to help keep up with and deal with the huge volume of software updates they are facing? 2016-04-11 08:40 3KB www.computerweekly.com 4 Logitech G900 Chaos Spectrum Wireless Gaming Mouse Review The Logitech G900 Chaos Spectrum has been designed with an emphasis on reducing as much weight as possible. From the thin wall molding to the hollow "spoked" hyper-fast scroll wheel design. The result is a wireless gaming mouse that weighs just 107g, which should... 2016-04-11 08:35 7KB www.techspot.com 5 Google glitch translates 'Russian Federation' into 'Mordor'; it has a ring to it Irony alert: Google Translate bug brands Russians as occupiers when translating from Ukrainian 2016-04-11 07:24 3KB www.v3.co.uk 6 Microsoft delivers enterprise-class ERP to the cloud REDMOND, Wash. — March 9, 2016 — Microsoft Corp... 2016-04-11 10:33 7KB news.microsoft.com 7 Microsoft outlines intelligence vision and announces new innovations for Windows 10 SAN FRANCISCO — March 30, 2016 — Wednesday at Build 2016, Microsoft CEO Satya Nadella and Terry Myerson, executive vice president of... 2016-04-11 10:33 8KB news.microsoft.com 8 FileHippo News - powered by FeedBurner “We have a tool that works on a narrow slice of phones,” Comey said at an encryption and surveillance conference at Kenyon University in Ohio... 2016-04-11 04:22 22KB feeds2.feedburner.com 9 Tech leader to establish roots at uCity Square: Microsoft Innovation Center comes to Philadelphia PHILADELPHIA — (April 4, 2016) — A new Microsoft Innovation Center (MIC) will open to the public at uCity Square... 2016-04-11 01:52 7KB news.microsoft.com 10 Apple patent shows hypothetical touchpad keyboard Apple has filed a patent for a hypothetical new keyboard. The touch-based keyboard will be harder to damage, includes a backlight, and has the ability to transform to different situations. 2016-04-11 02:50 1KB feedproxy.google.com 11 Now that’s a suitor! The Daily Mail talks to private equity firms as it FLIRTS WITH YAHOO BID The parent company of U. K. tabloid Daily Mail may make a bid for Yahoo’s news and media businesses. According to the WSJ, the Daily Mail and General Trust.. 2016-04-10 20:16 2KB feedproxy.google.com 12 Can Israel build big, sustainable companies? For all the "Start-up Nation" fanfare, Google's acquisition of Waze - Israel's highest profile start-up exit to date - was valued at just $1.1B. And, while.. 2016-04-10 20:16 2KB feedproxy.google.com 13 The open web is not going away Dries Buytaert and Matt Mullenweg recently posted calls to arms in defense of the "open web. " I, too, am a believer in the open web. It delivers on the.. 2016-04-10 20:16 5KB feedproxy.google.com 14 INNOVATE2016: Silicon Valley needs to address equality or risk being vilified in the U. S. Entrepreneurs and investors need to build innovative products and services that benefit everyone, and not just the privileged. Unless Silicon Valley becomes.. 2016-04-10 20:16 774Bytes feedproxy.google.com 15 Embracing the sharing economy for growth in China China's track record for economic growth has been impressive in the last several decades, with China accounting for up to one-third of global growth in recent.. 2016-04-10 20:16 12KB feedproxy.google.com 16 Ground delivery robots: Passing fancy or next wave? “Every failed on demand startup will reappear as a successful robotics driven business in five to 10 years.” So tweeted Jeremy Conrad, founding partner of.. 2016-04-10 20:16 7KB feedproxy.google.com 17 Tagging may be the best way to make IoT contextually relevant and usable With language like this, social networks become a natural point of interaction between people and things, and TAGs will make it seem effortless for us all... 2016-04-10 20:16 8KB feedproxy.google.com 18 Buying @Haje: How I got my given name as my Twitter handle for $250 You'll never guess how I got my given name as my Twitter handle. It involved a six-month campaign that included some light Internet stalking, badgering staff.. 2016-04-10 20:16 9KB feedproxy.google.com 19 Google Fiber free service ends in Kansas City Google has pulled the plug on its free offering in Kansas City. Existing customers of the service can continue to use the plan until May 19, after which they'll have to switch to a paid tier. 2016-04-10 16:54 1KB feedproxy.google.com Articles 19 articles, 2016-04-11 12:03 1 News Brought to you by The Linux Foundation is a non-profit consortium enabling collaboration and innovation through an open source development model. Learn More © 2016 The Linux Foundation 2016-04-11 12:03 www.linux 2 CW@50: Storage – From punched cards to flash and the cloud The relationship of storage to the architecture of computing is all about capacity, latency and throughput. In other words, how much data can be kept, how quickly it can be accessed and at what rate. Since the launch of Computer Weekly in 1966, the world of storage has gone through transformations as remarkable as aviation’s progression from the Wright brothers to supersonic flight. And just as the pioneers of flight would recognise the fundamentals of today’s aircraft in basic design, from the viewpoint of 1966, the speeds and magnitudes of storage now would seem utterly alien. In the 1960s, the key methods of data storage centred on two media: paper and cardboard, and magnetic media. Magnetic tape and even the spinning hard drive had already been invented for data, but punched cards and paper tape were used to run programs and store data in most of the nation’s datacentres. Punched cards – which dated back to textile and fairground organ applications from the 19th century and beyond – were usually the IBM-derived standard 7 3 / 8 in x 3 1 / 4 in with 80 columns and 12 rows (0-9 and 11 and 12), although there were variants of card size and column width from other computer makers, such as the UK’s ICL . Data was represented by punched holes in each column that were read by shining a light on the card. Initially, combinations of punched holes had represented analogue forms of information, but as the 20th century progressed, they came to represent binary data. Information about the data set – metadata – was represented in rows 11 and 12 and sometimes in unused columns. One IBM card held 72 x 10 bits. State-of-the-art punched-card hardware in 1966 was the IBM 2540 (a peripheral to the System/360 mainframe ), which could read 1,000 cards per minute (giving a throughput of 720Kb per minute; write speed/cards punched was 300 per minute) and an input hopper that held 3,100 cards. That is just over 2MB of capacity, but that was theoretically infinitely scalable as long as there was a human available to unload and reload the hoppers. 2016-04-11 09:32 Antony Adshead 3 3 Security Think Tank: Tackle vital patching challenge with risk- based approach Patching is one of the areas where organisational security is frequently under strain and struggling to attain good quality processes in the face of increased threats and the resulting high volume of patches. According to the Centre for the Protection of National Infrastructure (CPNI), disregard for patching represents a significant and growing problem for all businesses. Patch management is part of an overarching configuration management regime, and should be harmonised with it and with the risk management regime. However, we know from experience that this is seen as too difficult and left in the capable – but laden – hands of the IT team. In effect, many businesses are in a totally reactive, “patch everything as it comes” mode. This is stressful and inefficient and is no guarantee of a quality patch management system. Businesses use a vast array of systems and applications, and starting from a risk perspective will help triage how we build our patch management regime. In risk assessing each server and application, find out what information it uses/ holds and how critical this information is – how important is the CIA ( confidentiality, integrity and availability ) of the information and what would be the impact of its compromise. Some areas may be more critical than others and the necessity of patching therefore raised higher in the patching regime. The same risk-based approach should be applied to the patches themselves. With the understanding of each application and its CIA in mind, the next stage is to understand how critical (or not) the patches are so that their application can be prioritised. For instance, a critical security patch on a payroll application should take priority over a new feature for a marketing email system. Without this system of risk assessing the effect of not patching (or delaying and scheduling all non-critical updates and fixes) and understanding the criticality of the system or application being patched, the continuation of patch pandemonium is assured.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    32 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us