All posts on August, 2017


Email to Essential smartphone users causes alarm

The term “improperly configured” is a real plague on the IT landscape.

It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.

Essential phone recently sent an email to customers asking for proof of identity. This request was a little odd in the first place — who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

One big lesson from the Essential smartphone email fiasco

The term “improperly configured” is a real plague on the IT landscape.

It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.

Essential phone recently sent out an email to customers asking for proof of identity. This request was a little odd in the first place–who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Jenkins Blue Ocean UI to provide code quality insights

Blue Ocean, the new user interface for the popular Jenkins continuous integration and continuous delivery (CI/CD) platform, will begin incorporating insights into code quality trends and static analyses, under an improvement plan detailed this week by the project’s creator.

The goal is to improve the developer’s visibility into the health of software projects, Blue Ocean creator James Dumay, director of project management at Jenkins technology vendor CloudBees, said. Plans also call for expanding the capabilities of Blue Ocean’s visual pipeline editor to better match what is available in Jenkins’ declarative pipelines for software delivery. The development team intends to outfit Blue Ocean with these capabilities in the next six to 12 months.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Windows PCs and enterprise: Don’t expect a break-up

Old-school PCs may be déclassé, relegated by pronouncements of technology Trotskyites to the dustbin of history because smartphones and tablets and wearables and who knows what else, have or will soon take their place.

Not in corporations, they won’t.

PCs still lord it there, said Spiceworks, an online community and resource for IT professionals and the vendors trying to reach them.

“It turns out desktops still rule in the workplace … and it’s not even close,” wrote Peter Tsai, a senior technology analyst. According to a Spiceworks survey conducted in July, 60% of the employees in organizations represented by 998 IT professionals in the U.S., Canada and the U.K. relied on a desktop PC as their primary computing device.

To read this article in full or to leave a comment, please click here

Read more 0 Comments
Trends

Consumers’ Embrace of Mobile Apps Is Limited to a Choice Few

Mobile app use has become a powerful habit among U.S. consumers, based on new research findings. An increasing number of users have been spending their time consuming video, music and social media on smartphones and other mobile devices, but many are reluctant to try new apps. A large percentage of mobile app users’ time is spent on apps like Facebook, Snapchat, Twitter or Instagram.

Read more 0 Comments

BrandPost: DNS: Early Warning System for Cyber Attacks

The Domain Name System (DNS) is akin to the central exchange for the Internet. It lists, tracks, and matches domain names – like www.akamai.com — to machine-readable IP addresses – like 23.199.214.34 — to steer traffic to the desired site.

But security wasn’t top of mind in the design of the DNS protocol. As such, it should come as no surprise that DNS-based threats continue to stalk the digital world. In fact, DNS is one of the top three most frequently used attack vectors to date this year, according to Akamai’s First Quarter, 2017 State of the Internet / Security Report.

To read this article in full or to leave a comment, please click here

Read more 0 Comments