News

SMS Two-Factor Authentication Is No Longer Enough

With the near-constant occurrence of highly organized and complex cybercrime attacks, effective digital authentication has never been more challenging. Businesses must verify who they’re transacting with by implementing additional security measures, but at the same time they need to minimize...
Read 0 Comments

Docker Usage Rises, But High Portability Pointless for Most

Docker containers are a powerful and popular development option in the cloud. But, while many IT teams are turning to containers, few can fully take advantage of the technology. The adoption of Docker -- and containers in general -- within AWS environments continues to rapidly increase. However,...
Read 0 Comments

Researchers Reveal SDN Security Vulnerability, Propose Solution

Three Italian researchers have published a paper highlighting a security vulnerability in software-defined networking (SDN) that isn't intrinsic to legacy networks. It's not a showstopper, though, and they propose a solution to protect against it. "It" is a new attack they call Know Your Enemy (KYE...
Read 1 Comments

greg-burns-iotivity-alljoyn.png

Greg Burns
Greg Burns says IoTivity and AllJoyn have a lot in common. Similarities include standardized wire protocols, schema definitions, and data models, as well as an IP multicast based proximal discovery scheme that lets devices find and communicate each other without requiring a cloud service.

How IoTivity and AllJoyn Could Combine

At the Embedded Linux Conference in April, Open Connectivity Foundation (OCF) Executive Director Mike Richmond concluded his keynote on the potential for interoperability between the OCF’s IoTivity IoT framework and the AllSeen Alliance’s AllJoyn spec by inviting to the stage Greg Burns, the chief...
Read 0 Comments

NV Gains Momentum for a Secure DMZ

NV technologies make it possible to employ virtual firewalls that can be attached to specific applications and segregate them based on risk. This is the concept of building a secure DMZ in the data center. The end result is that the virtual firewall is not only capable of examining every packet...
Read 0 Comments

Report: DOD Must Embrace Open-Source Software

The Defense Department increasingly relies on software for everything from weapons systems to accounting, but it is failing to capitalize on the power of open-source software, according to a report from the Center for a New American Security. In "Open Source Software and the Department of Defense...
Read 0 Comments

How Google Does Open Source

TORONTO — Marc Merlin has been working as an engineer at Google since 2002 and has seen (and done) a lot of open source and Linux work during that time. Speaking at the LinuxCon North America event this week, Merlin provided a standing room only audience with an overview how Google uses and...
Read 0 Comments

Open Source Windows May Not Be that Big a Long Shot After All

Here’s a burning question for the tech universe: Could Microsoft, which built its Windows cash cow on proprietary or closed-source software, reverse course and open-source Windows itself?  Maybe not, although the very notion would have been unthinkable not too long ago. But it is now on the table...
Read 1 Comments

How to Install and Configure Graphics Drivers in Linux

The hunt for gaming performance on Linux is a constant and ever-changing challenge. The market for discrete graphics cards has become dominated by the two graphics giants: Nvidia and Advanced Micro Devices (AMD). This has meant the decision boils down to one simple question: Which company's...
Read 0 Comments

More Companies Taking the Agile, DevOps Route

As Agile software development and DevOps adoption in the enterprise continues to grow, more vendors are jumping into the ring with new platforms. There has been a flurry of activity in the Agile and DevOpsworld of late, with vendors providing new software, services and support for developers....
Read 0 Comments

Pages