BT

New Early adopter or innovator? InfoQ has been working on some new features for you. Learn more

Architecture & Design Follow 605 Followers

Building the Hyperconnected Future on Blockchains Paper Released at World Government Summit

by Kent Weare Follow 7 Followers on  Mar 04, 2017

At the recent World Government Summit, Hexayurt Capital and ConsenSys released a paper called “Building the Hyperconnected Future on Blockchains.” The purpose of the paper was to provide an Internet of Agreements (IoA) strategy and roadmap for the next wave of innovation in order to drive Globalization 2.0.

Development Follow 141 Followers

Bitbucket Introduces Required Two-Factor Authentication and IP Whitelisting

by Sergio De Simone Follow 5 Followers on  Feb 28, 2017

Atlassian has announced two new features aimed to make Bitbucket more secure: IP whitelisting and required two-factor verification.

Cloud Follow 55 Followers

Cloudbleed - Cloudflare Proxies Memory Leak

by Chris Swan Follow 106 Followers on  Feb 26, 2017

A buffer overflow bug has caused a small number of requests to Cloudflare proxies to leak data from unrelated requests, including potentially sensitive data such as passwords and other secrets. The issue, which has been named ‘Cloudbleed’, was discovered by Google Project Zero vulnerability researcher Tavis Ormandy.

Cloud Follow 55 Followers

Google Expands Audit Logging Capability to Majority of Cloud Services

by Richard Seroter Follow 2 Followers on  Jan 30, 2017 2

Tracking "who did what" in a self-service public cloud can be challenging. With Google Cloud Audit Logging, Google captures log streams for seventeen services in Google Cloud Platform (GCP) .

Data Science Follow 267 Followers

Intel Open-Sources BigDL, Distributed Deep Learning Library for Apache Spark

by Alexandre Rodrigues Follow 0 Followers on  Jan 13, 2017

Intel open-sources BigDL, a distributed deep learning library that runs on Apache Spark. It leverages existing Spark clusters to run deep learning computations and simplifies the data loading from big datasets stored in Hadoop.

DevOps Follow 225 Followers

Running Docker Containers Securely in Production

by Hrishikesh Barua Follow 4 Followers on  Dec 17, 2016

Hardening Docker containers in production involves a combination of techniques including making them immutable, minimizing the attack surface and applying both standard Linux hardening procedures as well as ones that are specific to a container environment.

Cloud Follow 55 Followers

Amazon Announces AWS Shield for DDoS Protection

by Kent Weare Follow 7 Followers on  Dec 03, 2016

At the recent re:Invent 2016 event, Amazon announced a new service called AWS Shield, which provides customers with protection from Distributed Denial of Service (DDoS) attacks. This announcement comes just over a month after Amazon was impacted by a DDoS attack on a DNS provider that Amazon used, Dynamic Network Services (Dyn).

Java Follow 367 Followers

Stormpath's Java SDK 1.0 Released

by Matt Raible Follow 4 Followers on  Aug 31, 2016

This week Stormpath released version 1.0 of their user management and authentication Java SDK. Stormpath generally provides APIs for implementing authentication, authorization and user management in web and mobile applications, including open source implementations, targeting a range of languages and frameworks.

DevOps Follow 225 Followers

DevOps Survival in the Highly Regulated Financial Industry

by Manuel Pais Follow 6 Followers on  Jul 31, 2016

Robert Scherrer, head of application engineering at SIX, on how the company leveraged DevOps principles and benefits in the highly regulated Swiss financial industry. Engaging with compliance auditors to collaboratively agree on solutions early before it's too costly to change and avoiding legacy internal directives (not actually required by external regulations) are the main takeaways.

Cloud Follow 55 Followers

Microsoft Reaches New Milestone in Delivering Trusted Cloud Services

by Kent Weare Follow 7 Followers on  Mar 28, 2016

Microsoft recently announced an expansion of their Azure regions world-wide. The number of regions announced now sits at 30, with 22 being generally available (GA). The most recent wave, of Azure regions, focuses on trusted environments for government customers or regions with specific privacy needs.

Cloud Follow 55 Followers

New Security Capabilities Available in Azure Operations Management Suite

by Kent Weare Follow 7 Followers on  Mar 13, 2016

On February 25th, 2016 Microsoft announced updates to their Operations Management Suite (OMS). The updates, in this particular iteration of the service, are focused on the security and audit portions of the suite and target the user experience, additional capabilities and features.

Development Follow 141 Followers

Apple Defends Encryption with TV Interview, Files Counter Lawsuit

by Alex Blewitt Follow 2 Followers on  Feb 26, 2016

Apple has responded to questions raised about its stance with the FBI and CEO Tim Cook has appeared on live TV to defend Apple's stance. They have now filed a lawsuit to have the FBI's case dismissed. InfoQ updates you with the latest on the subject.

Development Follow 141 Followers

Remotely Exploitable GlibC DNS Bug Discovered

by Alex Blewitt Follow 2 Followers on  Feb 17, 2016 1

A recently discovered buffer overflow in the DNS resolution of GLibC, which has been present since 2008, has the potential to be remotely exploitable and crash a significant number of Linux applications. InfoQ investigates.

DevOps Follow 225 Followers

Secrets Management with Chef-Vault

by João Miranda Follow 2 Followers on  Jan 31, 2016

Secret management is a difficult problem in a distributed and scalable environment. Chef-vault is a Chef tool built on top of encrypted data bags that eliminates the need to share the decryption key with all users and nodes of an infrastructure.

DevOps Follow 225 Followers

Keeping Your Secrets Safe in a Distributed and Scalable Environment

by Rui Covelo Follow 0 Followers on  Dec 28, 2015

At the Velocity Conference in Amsterdam, Alex Shoof explained how to manage secrets in a scalable and distributed environment. Shoof proposed a system based on five fundamental principles for secret management.

Login to InfoQ to interact with what matters most to you.


Recover your password...

Follow

Follow your favorite topics and editors

Quick overview of most important highlights in the industry and on the site.

Like

More signal, less noise

Build your own feed by choosing topics you want to read about and editors you want to hear from.

Notifications

Stay up-to-date

Set up your notifications and don't miss out on content that matters to you

BT