Many IT organizations must choose between giving developers the flexibility they need to be productive and keeping developer workstations managed and secure. Supply chain challenges have led to developers waiting weeks or months to get the hardware they need, forcing them to use aging hardware or unsecured personal devices. At the same time, hybrid work […]
Archives for 2022
Uber Open-Sourced Its Highly Scalable and Reliable Shuffle as a Service for Apache Spark
Uber engineering has recently open-sourced its highly scalable and reliable shuffle as a service for Apache Spark. Spark is one of the most important tools and platforms in data engineering and analytics. It is shuffling data on local machines by default and causes challenges while the scale is getting very large. Shuffle as a service […]
A Harm Reduction Framework Can Strengthen Cybersecurity
Cybersecurity guidance often focuses on eliminating risky behaviors but use reduction might not be enough. Adopting a harm reduction strategy could strengthen security with more effective guidance.
Blockchain Report Card: What Does It Matter to Enterprises Now?
Cryptocurrency, NFTs, and smart contracts are staples of the blockchain scene, but is there something more that organizations can benefit from here?
The Rise of the ‘Fractional’ CMO and the Role CIOs Play
A fractional CMO can help organizations target certain aspects of their business, but close coordination and cooperation with the CIO or CDO is critical to success.
When Your Open Source Turns to the Dark Side
Open-source software is more than a license. Below are three recent case studies of OSS being relicensed or going rogue, each providing a practical guide for vetting and using OSS.
Black Hat at 25: Why Cybersecurity Is Going to Get Worse Before It Gets Better
Chris Krebs, the former director of the US Cybersecurity and Infrastructure Security Agency, looked to the future of cybersecurity during his keynote speech at Black Hat USA.
How Cyberattackers Are Cultivating New Strategies and Reconfiguring Classic Gambits
Yuval Wollman draws on his experience in the Israeli intelligence community to offer insights on the current ransomware landscape — and how to best protect against a new generation of attackers.
Cloud Without Modernization Is an Antipattern
To maximize the benefits of cloud, consider five key paths to modernization.
What You Need to Know About Predictive Network Technology
You may not be able to peek into the future, but predictive network technology can spot and troubleshoot potential problems before they occur.