Adopting Encrypted DNS in Enterprise Environments
The internet was not built with security in mind, and there are few parts of the internet infrastructure where this is more evident than the design of the domain name system (DNS).
The internet was not built with security in mind, and there are few parts of the internet infrastructure where this is more evident than the design of the domain name system (DNS).
Businesses should stop worrying about preventing intruders getting into their computer networks, and concentrate instead on minimising the damage they cause when they do. That's the view of James Lewis, a cybersecurity expert at the Washington DC-based Center for Strategic and International Studies (CSIS).
Picture this: Your company is ticking along nicely, making use of a reliable and well-engineered piece of software to support some important business process, when suddenly it becomes apparent that all is not well in the project's developer community. A fork is in the cards, and the very future of the project hangs in the balance.
Playing computer games can help make the world a safer place. Yes, really. Maybe not blockbusters like Grand Theft Auto, but a new type of game designed to perform another function while you're playing it. Take Binary Fission, for example. It challenges you to sort coloured atomic particles in as few steps as possible.
There is, they say, more than one way to skin a cat. And if you are after high capacity SSD storage there's more than one way to get it. Put simply, you can go for one big high capacity SSD or lots of little high capacity SSDs.
The days of open source software free lunches are rapidly coming to an end, and that means enterprises that fail to stick to the terms of open source licenses can expect to be sued. That's the stark warning from Mark Radcliffe, a licensing expert and partner at law firm DLA Piper.
APIs offer a new and powerful attack vector for hackers. Fortunately, API management products can help organizations boost their API security. Good security has never been more important, yet attack surfaces have ballooned over the past few years. One reason: APIs. Ten years ago enterprises built monolithic enterprise software applications with a limited number of (relatively) easy-to-secure interfaces.
"When I was in college 30 years ago COBOL was declared dead, but it's still going strong and it's still a very good language." So says Leon Kappelman, a professor of information systems at the University of North Texas (UNT).
Passwords are a pain. We choose simple words that are easy to remember, but equally easy for hackers to guess. Yet we still forget them. And they also get stolen with alarming frequency.
If your storage systems are due a refresh and you are planning future purchases, then there's a huge elephant in the room that needs addressing: Intel and Micron's high performance 3D XPoint technology.
"Go is a programming language designed by Google to help solve Google's problems." So said Rob Pike, one of the Go language's designers. That may be the case, yet the open source language is increasingly being adopted by enterprises around the world for building applications at large scale.
Slack exploded onto the group chat scene almost three years ago, and if you're a developer you've almost certainly come across it. One reason for Slack's popularity with developers - as well as the wider community - is that it's easy to sign in to Slack and use it anywhere, according to Adam Preset, Gartner's research director for digital workplace.
Citizen developer tools that allow business staff to build applications are becoming increasingly powerful and can lead to important productivity gains. That's the view of Mark Driver, a research director at Gartner. He expects citizen development efforts to expand significantly over the next five years.
When hipster customers at Newcomer Wines grab a bottle of Austrian vino, they expect to be able to pay using their Apple smart watches. Cash is decidedly old hat. The ability to accept Apple Pay is important to reinforce the wine merchant's trendy image, says co-founder Peter Honegger.
What's the best way to build an application that could do anything from control home appliances remotely to gather meteorological data from sensors to produce a weather forecast? Startups offering data ingestion platforms take much of the hard work out of developing for the Internet of Things.
Docker exploded onto the scene a couple of years ago, and it's been causing excitement in IT circles ever since. The application container technology provided by Docker promises to change the way that IT operations are carried out just as virtualization technology did a few years previously.
The analysis of large volumes of data collected from fields, warehouses, trucks - and even animals' stomachs - may be key to preventing widespread hunger in the coming decades.
The security of open source software relies on the community spotting errors -- but Heartbleed and other recent events suggest that that's not happening.
The Pareto principle states that 80 percent of outcomes can be attributed to 20 percent of the possible causes of a given event. Also known as the 80-20 rule, it's relevant to almost every field of human endeavor.
-
Business deals that have to be aborted, staff who don't receive their wages, invoices that don't get paid on time - companies can face potentially catastrophic disruption when their banks suffer computer system failures.
Enterprise bug bounty programs are increasing in popularity. They offer cash to hackers who find and report security vulnerabilities and are an effective way for large organizations to beef up the security of their software.
Does you SSL server have misconfigurations and known vulnerabilities that make it insecure?
Apple recently unveiled Swift, a new language to replace Objective-C for OS X and iOS application development. Apple won't accept submissions built using Swift to the iOS or Mac App Store until the fall, when iOS 8 and the next version of OS X (Yosemite) ship, so there's still some time to learn the ins and outs of this new programming language.
Are virtual currencies just a passing fad, or will they evolve into a valuable tool for doing business?
Fancy a bank account with $300,000 (£184,000) in it? If you know where to look and you don't mind dealing with cybercriminals then the going rate is just $300.
Silk Road, the infamous online marketplace for drugs and other illegal goods, was closed down by the FBI earlier this month.
The lowdown on cybercriminal finance and money laundering
Underwater hotel rooms: Is down becoming the new up?
Automated software that hacks PCs in seconds
Companies are under pressure to make sure their encryption is up to scratch
Pinball simulators are becoming big business - and feeding a real pinball revival
High-speed internet - or the lack of it - has become a global economic issue.
Firms make big money from selling big data
The pinball industry is coming back to life
Why the changing shape and weight of the driving population is forcing car manufacturers to look for new ways to test vehicles.
Paul Rubens considers some of the technologies that could replace them - inlcuding an edible, electonic capsule
Developing Battlefield 4 proved to be a technical challenge for its publisher Electronics Arts
Could Office365 be Microsoft's saviour
Large JavaScript Web apps can be hard to develop and slow to run. Google's Dart language may offer a solution to address both of those issues.
Paul Rubens demonstrates the use of Wireshark to troubleshoot common SIP-based VoIP connection, calling, and call quality problems.
Scans and tests that don't break the bank
Service level agreements may not be as they appear
-
-
There's more than one way to develop a mobile app, and enterprises are discovering that different types of apps may call for different development approaches.