Latest Entries

Recent revelations in the areas of security and privacy have caught the attention of a wide audience and certainly have changed the attitude of many companies. But these revelations come with one piece of reassurance: Cryptography works. So whenever secrets are to be shared securely or privacy must be preserved, the best thing to do is encrypt all sensitive information. And as Google and others have experienced, this advice isn’t restricted to communication over the Internet; it extends to communication within intranets. Cryptography methods are highly complex. Therefore, using standard application programming interfaces (APIs), referring to well-known and trusted implementations of those methods, is a best practice to avoid security flaws when writing software that needs cryptography…

Read Full Article →

On September 24, 2014 a serious software vulnerability called Shellshock was reported . The United States Computer Emergency Readiness Team has issued an alert, and along with other security organizations worldwide is recommending users and system administrators of Unix-based operating systems such as Linux and Mac OS X apply security fixes as soon as possible. The warning states that the Shellshock bug could be exploited to compromise millions of servers and other devices worldwide…

Read Full Article →

SDN: “Simply Done Nothing?” With a name that is as clear, you wouldn’t have thought that there is room for vagueness to surround this technology. Yet, the need to explicate an innovation in software has never been more acute than with Software-Defined Networking (SDN). SDN’s introduction has become a paradox of sorts, where clarity (of its name) and mystery (that surrounds everything else beyond the moniker) coexist, offering little help to most IT execs by way of aiding the adoption. SDN started from Ph.D. work sponsored by the Clean Slate program at Stanford back in 2008, and has been available since 2009. But, still, it appears that people who understand SDN are in the minority of the fortunate and the brave. For the rest, SDN still merely represents “been there, if that, but simply done nothing about it.”…

Read Full Article →

Houston-based BMC Software, Inc., a leading provider of information technology management systems and software, has filed a patent infringement lawsuit in the U.S. District Court for the Eastern District of Texas against Santa Clara, California-based ServiceNow, Inc.

According to the lawsuit filed Sept. 23, 2014, ServiceNow has built much of its business around the infringement of BMC’s patented technologies. In the filing, BMC claims its patents are being violated by products that comprise core elements of ServiceNow’s IT management offerings, including:

- Incident Management and Problem Management;…

Read Full Article →

EMC Corporation announced that it has been recognized as a leader among S&P 500 companies by the environmental non-profit group, CDP, for the depth and quality of the climate change data disclosed to investors and the global marketplace.  For the sixth time, EMC has been included in the Climate Disclosure Leadership Index (CDLI) for its leadership in the quality of climate change disclosures…

Read Full Article →

CA Technologies announced that it has been positioned by Gartner, Inc. in the Leaders quadrant of the “Magic Quadrant for Data Center Infrastructure Management Tools” report.* According to the report, “Companies in the Leaders quadrant offer a comprehensive range of DCIM functions and capabilities.”CA Data Center Infrastructure Management (DCIM) – a centralized solution for monitoring power, cooling and environmental factors across data center facilities and IT systems as well as managing the use of space and lifecycle of assets which make up the data center infrastructure – was evaluated for the report…

Read Full Article →