Haiti EarthQuake Relief Live Breaking News From Major News Wires

Haiti EarthQuake

Subscribe to Haiti EarthQuake: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Haiti EarthQuake: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Haiti Earthquake on Ulitzer What Haiti has been through is unthinkable. The White House is urging us to contribute through The Red Cross, or to have $10 charged to your cell phone by texting “HAITI” to “90999. It also suggests finding more ways to help through the Center for International Disaster Information. ... (more)

Build Your Own Hack Lab

No matter what facet of information security you're in, from being the CISO down to just installing security patches and keeping up to date, there will probably be a point where you need to see the details of a hack. Maybe it's because you need to fingerprint what it does or how it acts on your network. Maybe it's because you need to be able to reproduce it in a penetration test. Either way you look at it, sometimes you just need to test something out. Obviously, this could go one of a few ways. You could execute these hacks on your network. This could lead to potentially bad outcomes, especially if you break something. The next option is to try it out on someone else's network who doesn't know. (Read: ILLEGAL!). The last option, and also the one we use over here at Hurricane Labs, is a lab environment. A lab environment is simply going to consist of a bunch of diffe... (more)

L’Europe face aux défis des infrastructures Cloud Computing

Cloud Expo Europe La décennie 2010 - 2020 sera celle du Cloud Computing ; c’est un message que je répète sur ce blog depuis longtemps et il est maintenant bien accepté par tous les fournisseurs, y compris les «historiques», par la grande majorité des responsables informatiques. Les deux composantes techniques majeures de cette révolution Cloud Computing sont les infrastructures et les usages, en mode SaaS, Software as a Service. Pour ces deux composantes, les conditions de la réussite sont très différentes. Je suis extrêmement pessimiste sur la capacité de l’Europe à réussir dans les infrastructures Cloud, et ... raisonnablement optimiste dans les usages. Je vais me concentrer, dans ce texte, sur les infrastructures, les fondations du Tsunami Cloud Computing. Infrastructures Cloud : les conditions de la réussite Amazon et Google ont montré la voie ; d’autres acteurs, c... (more)

Internet Business Transactions near 450 Billion a Day

By D. Bruce Johnston, President and CEO, DBJ Associates Commerce on the Internet continues to skyrocket. Chad Levitt, author of the “New Sales Economy Blog,” recently wrote a post, “Sales Reps, Are You Ready for the Digital Universe?,” based on information he gleaned from a recently released IDC report on predictions for the year 2020. Here are some of the major findings from the IDC report: Between now and 2020, the amount of digital information created and replicated in the world will grow to an almost inconceivable 35 trillion gigabytes as all major forms of media – voice, TV, radio, print – will complete the journey from analog to digital. Last year despite the global recession, the Digital Universe, set a record. It grew by 62% to nearly 800,000 petabytes. A petabytes is a million gigabytes. Picture a stack of DVDs reaching from the earth to the moon and back. ... (more)

IT Chaos Theory: The PeopleSoft Effect

#cloud #devops A robust integration ecosystem is critical to prevent the PeopleSoft effect within the network In chaos theory, the butterfly effect is the sensitive dependence on initial conditions, where a small change at one place in a nonlinear system can result in large differences to a later state. The name of the effect, coined by Edward Lorenz, is derived from the theoretical example of a hurricane's formation being contingent on whether or not a distant butterfly had flapped its wings several weeks before. -- Wikipedia, Butterfly Effect Many may not recognize the field of IT chaos theory (because technically I made it up for this post) but its premise is similar in nature to that of chaos theory. The big difference is that while Chaos Theory has a butterfly effect, IT Chaos Theory has a PeopleSoft effect. In IT Chaos Theory, the PeopleSoft effect is the sen... (more)

Evolve IP Helps Customers Avoid Downtime During Hurricane Sandy

A few weeks ago, Superstorm Sandy ravaged the East Coast, leaving devastation in its wake. Thousands of people were without power, food, and water. It quickly became clear that Sandy’s aftermath would bring life on the East Coast to a standstill for days as the region began to rebuild. Early estimates of the damage put the business loss associated with the storm as high as $30 billion. But Grudi Associates, The John M. Glover Agency, and many others weren’t a part of that group. Evolve IP’s redundant cloud platform allowed them to run their businesses remotely as the storm raged on. For example, InformationWeek Cloud picked up the story of how we helped Apria Health Care stay functional during the storm so that they could continue to provide their vital health services to customers in the days after the storm. Thanks to Evolve IP, Apria was able to deliver essential p... (more)

Five Truths of Information Security

Information security professionals often find themselves filling a critical but unique role within an organization. An effective security approach must balance required business operations and system availability while still ensuring the confidentiality and integrity of these same systems. Systems that are absolutely secure are not usable. Likewise, systems that are completely usable are absolutely not secure. When managing information security of any environment, bear in mind these five truths: 1. Incidents will happen An incident response plan should not be a matter of “if”, but instead a matter of “when”. As defenders, we are tasked with managing and protecting every vulnerable service and system, which is a gargantuan task compared to the attacker, who must only successfully exploit one single vulnerability. The discipline of risk management would not exist if... (more)

IT Security: The Cobbler Effect

If anyone has been reading the news lately you have probably noticed that some information security focused organizations are pretty bad at actual information security. From the NSA allowing a low level administrator to walk out with sensitive data (and I’m not getting into that one) to SSL certificate providers having bad SSL certificates, the problem is widespread and affects so many security firms. I have always had the stance that if you can’t secure your own stuff you have no real hope in securing anyone else’s, this is especially true of consulting houses. Of course no one is perfect but wow at least make an effort! This brings into sharp focus what I (and many others) call the Cobbler Effect. This is the idea, based on an old story/proverb that the cobbler was so busy making shoes for everyone else that his own children had no shoes. This is a complete cop o... (more)

Airport Oddities: The Weirdest Things You Can Buy On A Stopover

Monday 12 August, 2013 Cheapflights.co.uk rounds up the strangest objects found in airport shops. With substantial experience scouring the globe, the team at Cheapflights.co.uk has compiled a list of the oddest items that can be purchased in airports around the globe. Although all equally weird, some of these items come with an interesting background story while the others are just simply good for a laugh (or cringe!). TOKYO, JAPAN: Need a lap to rest your head? No more need for a standard rounded neck pillow, Japanese men have moved on to the lap pillow. Quite simply, this contraption is a foam pillow shaped like a woman's lap and can be purchased in Narita International's duty free shops. Made to replicate the sensation a child would have resting his/her head on their mother's lap, the pillow is said to offer similar comfort to men during stressful times or when simpl... (more)

Subversion Disaster Recovery

Disaster Recovery is something most people only think about right after a natural disaster. Business continuity (Latin for “Will you go out of business if your office floods?”) is usually an afterthought. The truth is that most of us are too busy to spend a lot of energy on the hypotheticals of disaster recovery and business continuity planning. While we often think of our workplaces as impervious, the truth is that computers are fragile and buildings are damaged frequently. Flooding, fire, theft, and tornadoes are all common enough that every development team should have a contingency plan. But as we enter the traditional peak of hurricane season in the Atlantic, let’s take a quick look at the the recoverability of Subversion and Git repositories in case of catastrophe. Hurricane Sandy Aftermath in New York City: Is your server safe? Image used under Creative Comm... (more)

Subversion Disaster Recovery

Disaster Recovery is something most people only think about right after a natural disaster. Business continuity (Latin for “Will you go out of business if your office floods?”) is usually an afterthought. The truth is that most of us are too busy to spend a lot of energy on the hypotheticals of disaster recovery and business continuity planning. While we often think of our workplaces as impervious, the truth is that computers are fragile and buildings are damaged frequently. Flooding, fire, theft, and tornadoes are all common enough that every development team should have a contingency plan. But as we enter the traditional peak of hurricane season in the Atlantic, let’s take a quick look at the the recoverability of Subversion and Git repositories in case of catastrophe. Hurricane Sandy Aftermath in New York City: Is your server safe? Image used under Creative Comm... (more)