the universal control points created by
hyperscaling digital platforms. Ninety-five to 99 percent of incumbent
companies must choose a different path, not by “doing digital” on the
margin of their established businesses but by wholeheartedly committing
themselves to a clear strategy.Second, success depends on the ability to invest in relevant
digital capabilities that are well aligned with strategy—and to do so at
scale. The right capabilities help you keep pace with your customers as
digitization transforms the way they research and consider products and
services, interact, and make purchases on the digital...(Read whole news on source site)
What is Azure Stack? | Build Azure
when Azure Stack hits General Availability (GA) release is fairly large for an initial release.
Here’s a list of the Azure Stack features coming in GA:
Compute – Virtual Machine (including extensions & availability sets), Service FabricData & Storage – Blobs, Tables, QueuesNetworking – Virtual Network, Load Balancer, VPN GatewayMgmt. & Security – Microsoft Azure Portal, Key VaultWeb & Mobile – App Service (Web Apps, Logic Apps, Mobile Apps, API Apps)Developer Services – Azure SDK
Robin Sillem, William Ferguson
This blog post explores performing man in the middle (MITM) attacks on your own machine, on some pre-made sample web apps. The focus of this post is on securing web apps, rather than the attacks themselves. An important note before starting:
This blog post shows how to perform an attack on a sandboxed sample website. Attacking targets without prior mutual consent is illegal. It is the reader’s responsibility to obey all applicable laws. The writers of this blog post and Scott Logic assume no liability and are not responsible for any misuse or damage caused from the use
of this tutorial.
A session hijack is where you have a session - an ongoing HTTP conversation - with a website, and an attacker gains access to this session, communicating with the site as if they were you. You may or may not be aware that the attacker is using your session. The session may or may not be authenticated, but it is likely that it is if any sensitive information is involved. This means that the attacker can do what ever you can on the site in question at the time of the hijack - change your password, read...(Read whole news on source site)
Our world is changing faster than ever before. It can be tough to keep up. And what you don’t know, can sometimes hurt you. Especially if you get disrupted. If you want to be a better disruptor vs. be the disrupted, it helps to know what’s going on around the world. There are amazing people, amazing companies, and amazing discoveries changing the world every day. Or at least giving it their best shot. You know the Mega-Trends: Cloud, Mobile, Social, and Big Data. You know the Nexus-Of-Forces, where the Mega-Trends (Cloud,
Mobile, Social, Big Data) converge around business scenarios. You know the Mega-Trend of Mega-Trends: Internet-Of-Things (IoT) But do you know how Virtual Reality is changing the game? … Disruption is Everywhere Are you aware of how the breadth and depth of diversity is changing our interactions with the world? Do you know how “bi-modal” or “dual-speed IT” are really taking shape in the 3rd Era of IT or the 4th Industrial Revolution? Do you know what you can print now with 3D printers? (and have you seen the 3D printed car that...(Read whole news on source site)
My previous blog post “Measuring temperature with Windows 10 IoT Core and Raspberry Pi” introduced you my simple solution for measuring temperatures. In this blog post we go step further and make some modifications to solution architecture so we don’t have to keep sensors connected all the time and as a result we can also emulate temperatures and situations that are not easy to produce in home or office.
The post Beer IoT: Moving to ITemperatureClient interface
appeared first on Gunnar Peipman - Programming Blog
had this twit, that caught my attention.
While half a minute pause is not something that we have really seen, we have seen production systems that spend a lot of their cycles on GC. That is better than a pause, but only in the same way that you prefer to stab your toe rather than break your leg. As per the title of this post, the most challenging tasks in a database engine isn’t actually how to fetch the data, or how it is stored, but the management of the various resources that are
available. In particular, CPU utilization, memory usage and I/O. Most databases handle I/O pretty much from the get go, because it is such a painful topic. And it is relatively easy and obvious to see how you need to handle CPU allocations. But memory is tricky. It is tricky because you typically want to share as much of it as possible, to reduce memory usage, except you don’t, because of thread safety and “is someone still using that?” issues. The GC is a really great invention in this regard, because you can offload all of this behavior (well, not the...(Read whole news on source site)
Software Microsoft Azure Stack Technical Preview is now available for download | Microsoft Azure Blog – The Microsoft Azure Stack Team announces the availability of downloads of the Azure Stack Technical Preview Information What I’ve learned about .NET Native – Mark Rendle continues his discussion of the running the .NET Core on Linux, taking a […]
When starting out with PowerShell, it is hard to escape from the detail to work out the best strategy for creating scripts. Laerte Junior explains how, when and why it pays to think in terms of versatile functions to meet varying demands.