News Category: Enterprise

The Engine of HPC and Machine Learning

There is no question right now that if you have a big computing job in either high performance computing – the colloquial name for traditional massively parallel simulation and modeling applications – or in machine learning – the set of statistical analysis routines with feedback loops that can do...
Read 0 Comments

The Decentralized Internet Is Here, With Some Glitches

Proponents as varied as privacy activists and marquee venture capitalists talk about the decentralized internet as a kind of digital Garden of Eden that can restore the freedom and good will of the internet's early days. The argument goes that big tech companies have locked up our data and minds...
Read 0 Comments

Eliminating Storage Failures in the Cloud

With the advent of disk mirroring over 35 years ago, data redundancy has been the basic strategy against data loss. That redundancy was extended in the replicated state machine (RSM) clusters popularized by cloud vendors in early aughts, and widely used today in scale-out systems of all types. The...
Read 0 Comments

Why Are There Few Women in Tech? Watch a Recruiting Session

Tech companies have employed a host of tactics to help lift the scant number of women and minorities who work within their ranks, like anti-bias training, affinity groups, and software that scans job postings for gendered language. Yet the numbers remain dire. Of men with science, technology...
Read 0 Comments

​Memcached DDoS: The Biggest, Baddest Denial of Service Attacker Yet

We've been seeing a rise of ever bigger Distributed Denial of Service (DDoS) attacks for years now. But, now a new attack method, Memcrashed, can blast your site with over a terabyte of traffic. Good luck standing up to that volume of abuse! Memcrashed works by exploiting the memcached program. ...
Read 0 Comments

Shell Scripting and Security

Basic ways you can use shell scripts to monitor password strength and secret accounts. Whether you have Linux running on your laptop or ancient PC file server or whether you're managing a data center, your system is also vulnerable to malicious users. I can't offer any sort of robust solution in...
Read 0 Comments

Security in the Modern Data Center

The National Institute of Standards and Technology, a division of the U.S. Department of Commerce, is well known in the security community for its standards and recommendations that guide many organizations towards secure culture, policies and technological infrastructure. Its recently publicized...
Read 0 Comments

Xen Project Member Spotlight: DornerWorks

We see virtualization becoming more and more of a necessity in the embedded world. As the complexity of processors increases, the difficulty of utilizing them increases. Processors, like the Zynq UltraScale+ MPSoC, that have a Quad-Core ARM Cortex-A53, a Dual-Core ARM Cortex-R5, and an FPGA in a...
Read 0 Comments

DevOps Jobs Salaries: 9 Statistics to See

If you’re on the hunt for a DevOps job, don’t expect your search to last long. With the right set of skills, you have employers competing for your services these days. Even IT pros just beginning a transition into a DevOps-oriented job from a more traditional role are set up for success in this...
Read 0 Comments

EdgeX Foundry Continues Momentum with ‘California Code’ Preview

Only 3 months away from our first release, the EdgeX community has made available what we are calling the “California Preview.”  This preview is a collection of five key microservices written in Go that are drop in replacements for our Java microservices.  The work on the California release (not...
Read 0 Comments

Pages

Click Here!