News

Maru OS Mixes a Custom ROM with a Dockable Debian Desktop, and Now it's Open Source

The idea of a smartphone that magically turns into a full PC has been something of a pipedream for a while now. Motorola tried it with its Atrix laptop dock, Canonical is trying something similar with its Ubuntu Unity phone OS that can dock into a monitor. Even Microsoft is giving it a go with...
Read 0 Comments

seshu-adunuthula-ebay.png

Seshu Adunuthula
“The data is the most important asset that we have,” said Seshu Adunuthula, eBay’s head of analytics infrastructure, during a keynote at Apache Big Data in Vancouver.

How eBay Uses Apache Software to Reach Its Big Data Goals

eBay’s ecommerce platform creates a huge amount of data. It has more than 800 million active listings, with 8.8 million new listings each week. There are 162 million active buyers, and 25 million sellers. “The data is the most important asset that we have,” said Seshu Adunuthula, eBay’s head of...
Read 0 Comments

Fedora 24 Review: The Year’s Best Linux Distro Is Puzzlingly Hard to Recommend

Fedora 24 is very near the best Linux distro release I've used, and certainly the best release I have tested this year. Considering 2016 has welcomed new offerings like Mint 18 and Ubuntu 16.04 LTS, that says a great deal about the Fedora project's latest work. But like many Fedora releases before...
Read 0 Comments

SMS Two-Factor Authentication Is No Longer Enough

With the near-constant occurrence of highly organized and complex cybercrime attacks, effective digital authentication has never been more challenging. Businesses must verify who they’re transacting with by implementing additional security measures, but at the same time they need to minimize...
Read 0 Comments

The Cloud Security Alliance Publishes Its Best Practices for Big Data Security

Big Data is a boon for businesses worldwide, but the benefits come at a cost. The more data companies store, the more vulnerable they are to potential security breaches. And data breaches can be enormously expensive when they occur. IBM’s 2016 Cost of Data Breach report found that the average...
Read 0 Comments

Docker Usage Rises, But High Portability Pointless for Most

Docker containers are a powerful and popular development option in the cloud. But, while many IT teams are turning to containers, few can fully take advantage of the technology. The adoption of Docker -- and containers in general -- within AWS environments continues to rapidly increase. However,...
Read 0 Comments

Containers Debunked: DevOps, Security and Why Containers Will Not Replace Virtual Machines

The tech industry is full of exciting trends that promise to change the face of the industry and business as we know it, but one that is gaining a huge amount of focus is containers. However, problems lie with the technology and threaten to root itself deep in the mythology about it, namely the...
Read 0 Comments

Researchers Reveal SDN Security Vulnerability, Propose Solution

Three Italian researchers have published a paper highlighting a security vulnerability in software-defined networking (SDN) that isn't intrinsic to legacy networks. It's not a showstopper, though, and they propose a solution to protect against it. "It" is a new attack they call Know Your Enemy (KYE...
Read 1 Comments

NV Gains Momentum for a Secure DMZ

NV technologies make it possible to employ virtual firewalls that can be attached to specific applications and segregate them based on risk. This is the concept of building a secure DMZ in the data center. The end result is that the virtual firewall is not only capable of examining every packet...
Read 0 Comments

Report: DOD Must Embrace Open-Source Software

The Defense Department increasingly relies on software for everything from weapons systems to accounting, but it is failing to capitalize on the power of open-source software, according to a report from the Center for a New American Security. In "Open Source Software and the Department of Defense...
Read 0 Comments

Pages