Jul 31

In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.

read more

Jul 30

Slashdot reader Noryungi writes: Qubes OS certainly has an intriguing approach to security, but a newly discovered Xen vulnerability allows a hacker to escape a VM and own the host. If you are running Qubes, make sure you update the dom0 operating system to the latest version.

“A malicious, paravirtualized guest administrator can raise their system privileges to that of the host on unpatched installations,” according to an article in IT News, which quotes Xen as saying “The bits considered safe were too broad, and not actually safe.” IT News is also reporting that Qubes will move to full hardware memory virtualization in its next 4.0 release. Xen’s hypervisor “is used by cloud giants Amazon Web Services, IBM and Rackspace,” according to the article, which quotes a Qubes security researcher who asks the age-old question. “Has Xen been written by competent developers? How many more bugs of this caliber are we going to witness in the future?”

Read more of this story at Slashdot.

full article

Jul 30

It feels like the barbarians are continually at the gate. We can’t seem to go more than a week before a new data breach is in the news, impacting potentially millions of individuals. The targets range from companies like Omni Hotels, which had been breached affecting up to 50,000 customers whose personal and credit card information was exposed, to North Carolina State University, where over 38,000 students’ personal information, including their SSNs, were at risk. As I mentioned in a recent blog ‘Internet of Things and Big Data – who owns your data?’, we have been storing our personal and credit card information in a variety of systems, credit card companies, banks, online retailers, hotels - and that’s just naming a few. The information in those systems is more valuable than gold to the hackers. The hacker attacks are constant, creative, and changing frequently.

read more

Jul 30

Cloud analytics is dramatically altering business intelligence. Some businesses will capitalize on these promising new technologies and gain key insights that’ll help them gain competitive advantage. And others won’t.
Whether you’re a business leader, an IT manager, or an analyst, we want to help you and the people you need to influence with a free copy of “Cloud Analytics for Dummies,” the essential guide to this explosive new space for business intelligence.

read more

Jul 30

Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics.
In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to monitor and adjust functions like performance, capacity, caching, security, optimization, uptime and service levels; identify trends or patterns to forecast future requirements; detect problems before they result in failures or downtime; and convert insight into actions like changing policies, storage tiers, or DR strategies.

read more

Jul 29

When being spoilt for choice is sometimes still no choice at all

Sysadmin blog  Microsoft Office remains one of the most important software products available, despite some rather nasty flaws. For me, Microsoft Office and video games anchor me to Windows. While video games seem set to remain largely Windows-only for the foreseeable future, Office is losing its grip.…

Full Article

Jul 29

The Cloud Security Alliance (CSA) today announced the release of a new whitepaper from the CSA Mobile Working Group on a new initiative to support… Read more at VMblog.com.

Jul 29

A new security exploit in the Xen hypervisor raised eyebrows and generated headlines this week. The uncovered bug in the server virtualization… Read more at VMblog.com.

Jul 29

To the majority of the world, today is just another day; perhaps a little extra exciting because it’s a Friday. But, in the world of IT, today is THE Read more at VMblog.com.

Jul 29

Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations.
In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to improve safety, performance, and reliability in today’s modern wind turbines.

read more

«     |     ?     |     »