Cloud adoption is finally becoming mainstream. Over the past few months, the nature of the discussions has been shifting from theoretical, to architectural, and now to every operational challenge. This is exciting.
It means we’re finally moving past “should we?”—past “can we?”—and in to “how do we?” territory. What I’m seeing now is a lot of organizations facing the realities of having their IT infrastructure split between on-premise and cloud environments.
This week Trend Micro’s own Kyle Wilhoit was featured in a 2-part series on NBC about information security risks facing Sochi visitors.
There is some controversy around the accuracy of those reports. Kyle published the technical details of the experiment on our blog today which should clear up the experiment itself. That leaves the broadcast of the results in question.
I think it’s important to remember that what was portrayed in the broadcast was tailored to the average user.
Microsoft gets on board with the shared responsibility model promoted by AWS. This is great news. The more providers that raise awareness around this balance the better off everyone will be
In the post, “In A World Of Open Source Big Data, Splunk Should Not Exist”, Matt Asay raises some very good points. Log collection and analysis should be easy pickings for an open project. But no one has put together the collection piece with the analysis in a simple to deploy and extend bundle…yet
Chrissie Brodigan points out the newly updated breakdown of the GitHub Workflow. It’s a very clear design that explains this basic git workflow in terms that are easy to understand
Twitter pulled together a great interactive visualization of the state of the union address. They lined up the transcript of the speech with the reaction on Twitter. Very impressive. Check it out
Highlighting the challenges with network bandwidth management at the Super Bowl, Jon Brodkin dives into the details. Well as many details as are public. It’s an interesting problem to tackle, very temporary build out of a significant infrastructure. Seems like the priorities are in the right place though
Joshua Porter looks at scrolling vs clicking from the users point of view. His summary, “scrolling is a continuation; clicking is a decision”. Definitely worth the quick read
Meng To takes a look at the challenges & benefits of taking a “mobile first” approach to site design. Using his design of Carshare.hk as a case study, Meng’s real world examples help highlights the advantages of this approach
Todd Hamilton pulls together a fantastic concept for the iWatch (which doesn’t yet exist). It’s an elegant approach and addresses a lot of the existing problems with smartwatches (which generally aren’t very useful)
How do you pick the names of your servers? Server Density tackles this interesting topic by explaining their approach. It’s practical but I like a little more flare in the names I pick…though practical usually wins :-)
Brilliant “re-enactment” of a conference call if it was a real life meeting. Sadly, this hit home for me…
Kenn White highlights a file that’s valid .js and .gif. Awesome.
Good analysis by @keydet89 of the disconnect between incident response processes and malware reverse engineering. Cross-team communication needs to be built into each of these processes
Nugget is a handy tool for testing URLs and dumping the data into backstop and graphite.
— Des Traynor shared a handy image showing the overlay of profile pics for Facebook, Twitter, and LinkedIn
Alex Guyot does a fantastic job laying out the URL scheme that lies at the foundation of app interaction on iOS. Framed in the context of his app, Drafts, this post is application to anyone doing dev or security work on iOS
Bruce Schneier recently penned a brilliant essay for Wired entitled, “The Internet of Things Is Wildly Insecure”. In it, he addresses the challenges that we’re going to face as we extend connectivity to more and more devices
Patrick Dubroy tweeted out a fantastic post by Tim Bray about what we’ll see in software design and structure on both the server and client side of things in the coming year
“Cloud Security: New Challenges, Same Principles” by Adrienne Hall, was posted on the Microsoft Security blog at the end of September. One of their top posts for the year, it’s a good remind that strong fundamentals are the key to success in the cloud
Light Table, a very cool IDE, is now completely open source. With the recent implementation of a plugin model, it’s a lot easier to contribute to the project
Jason Goldberg. CEO of Fab summarizes 2013 for his company which went from a valuation of 1 billion to laying off ~1/2 of it’s staff. Jason does a good job at a mea culpa and sharing some insight into what went wrong and how to fix it…hopefully
Steven Levy has a well constructed essay on Threat Level entitled, “How the NSA Almost Killed the Internet”. In it, he addresses the challenges that all technologies now face with a specific focus US companies
Digital Ocean has pulled together a great list of their “20 Developers To Follow In 2014” for web development. Even if you interests lie in other areas of development, these folks are still good to follow
Great write up by Margaret Sullivan on a really interesting case, “When a (Partial) Tweet Becomes an Ad, What Are the Rules?”. Deals with an issue around this tweet from A. O. Scott
Mustache is a concise templating language that has been implemented in a number of languages. It’s simple to roll out and is extremely versatile