Wednesday, 30 March 2016

Microsoft: All Build announcements in 15 minutes



A new update for Windows 10. Bots, Cortana, and more bots. Big changes for Skype. Xbox running Windows apps. Build was a big deal, here’s everything that happened.

All of Microsoft’s Build announcements in 15 minutes

Tuesday, 29 March 2016

Java, Android: Oracle still seeking $9.3 billion in damages - it's not over until it's over...



Oracle is seeking as much as US $9.3 billion in damages in a long-running copyright lawsuit against Google over its use of Java in Android, court filings show.

Oracle sued Google six years ago, claiming the search giant needs a license to use parts of the Java platform in Google's market-leading mobile OS.

The companies went to trial over the matter in 2012 but the jury was split on the crucial question of whether Google’s use of Java was protected by "fair use," which permits copying under limited circumstances.

http://www.pcworld.com/article/3048818/oracle-seeks-93-billion-for-googles-use-of-java-in-android.html

Verizon: Hackers leak data of 1.5m Verizon enterprise customers



Verizon Communications has revealed an attacker exploited a security vulnerability on its enterprise client portal to steal the contact information of 1.5 million enterprise customers.

Attackers were discovered selling the database on an online black market by Brian Krebs of Krebs on Security.

The seller priced the entire package at US$100,000 (A$132,535), but offered to sell it off in parts of 100,000 records for US$10,000 apiece



Read more: http://www.itnews.com.au/news/hackers-leak-data-of-15m-verizon-enterprise-customers-417462

Wednesday, 30 December 2015

Ian Murdock: founder of the Debian project passes away at the age of 42 RIP



Dear friends and members of the open source community,
It is with great sadness that we inform you that Ian Murdock passed away on Monday night. This is a tragic loss for his family, for the Docker community, and the broader open source world; we all mourn his passing. To Ian’s children, family and loved ones, we offer our full support and deepest sympathies.
Ian was perhaps best known professionally as the founder of the Debian project, which he created while still a student at Purdue University, where he earned his bachelor’s degree in computer science in 1996. Debian was one of the first Linux distros to be forged, and it is widely regarded as a one of the most successful open-source projects ever launched. Ian helped pioneer the notion of a truly open project and community, embracing open design and open contribution; in fact the formative document of the open source movement itself (the Open Source Definition) was originally a Debian position statement. It is a testament to Ian’s commitment to openness and community that there are now more than 1,000 people currently involved in Debian development.

Monday, 12 October 2015

ThoughtWorks - TechRadar May 2015 - on the basis it's better late than never


ThoughtWorks - TechRadar  May 2015 - on the basis it's better late than never


Latest trends - MAY 2015

Innovation in Architecture - Organizations have accepted that "cloud" is the de-facto platform of the future, and the benefits and flexibility it brings have ushered in a renaissance in software architecture. The disposable infrastructure of cloud has enabled the first "cloud native" architecture, microservices. Continuous Delivery, a technique that is radically changing how tech-based businesses evolve, amplifies the impact of cloud as an architecture. We expect architectural innovation to continue, with trends such as containerization and software-defined networking providing even more technical options and capability.

A New Wave of Openness at Microsoft - Whilst Microsoft has dabbled in open-source in the past—including their open-source hosting platform CodePlex—the company's core assets continued to be proprietary and closely guarded secrets. Now, though, Microsoft seems to be embracing a new strategy of openness, releasing large parts of the .NET platform and runtime as open-source projects on GitHub. We're hopeful that this could pave the way to Linux as a hosting platform for .NET, allowing the C# language to compete alongside the current bevy of JVM-based languages.

Security Struggles Continue in the Enterprise - Despite increased attention on security and privacy, the industry hasn't made much progress since the last Radar and we continue to highlight the issue. Developers are responding with increased security infrastructure and tooling, building automated test tools such as the Zed Attack Proxy into deployment pipelines. Such tools are of course only part of a holistic approach to security, and we believe all organizations need to "raise their game" in this space.

Full publication:
https://assets.thoughtworks.com/assets/technology-radar-may-2015-en.pdf



Tuesday, 6 October 2015

Microsoft’s Windows 10 hardware event in 9 minutes



The best way to watch IT events?

Microsoft debuted new phones, a new tablet and a Surface Book. They even threw in some augmented reality for good measure. Here's the highlights from the hardware event.

Subscribe: http://goo.gl/G5RXGs

Microsoft’s Windows 10 hardware event in 9 minutes

Thursday, 1 October 2015

Windows: security vulnerability in WinRAR could affect up to half a billion users!!!


A security vulnerability has been found in WinRAR, a file archiver and compressor utility for Windows that is estimated to be used by more than half a billion users. The vulnerability, if exploited, allows remote attackers to execute system specific code to compromise a computer.

A proof-of-concept exploit for WinRAR SFX v5.21 has been published. Iranian researcher Mohammad Reza Espargham reported the vulnerability to Full Disclosure, a popular forum for disclosure of security information. "The vulnerability allows unauthorised remote attackers to execute system specific code to compromise a target system," he said.

The vulnerability is said to affect all versions of WinRAR SFX, making its users extremely prone to attacks. Security firm MalwareBytes has independently confirmed the existence of the critical vulnerability in the said application.