For workloads that don’t require a consistent CPU performance but do experience spikes in service demand, Amazon’s AWS EC2 service offers Burstable Performance Instances. Their competitive pricing can contribute to considerable savings and improve service availability, but how do you know if you are getting a good deal? You don’t, unless you are able to verify your CPU credits usage and the remaining balance. Here is how to figure out what’s really going on.
Juniper Networks’ Embarrassment Lives On in Its Flawed SSL Configuration
Recent revelations from the maker of networking gear Juniper Networks have shaken the industry: Juniper has identified unauthorized code in ScreenOS, its operating system that powers the NetScreen line of Juniper firewalls. Then last Friday, cryptography researchers revealed that Juniper has allowed changes to its code that could enable eavesdropping on encrypted virtual private network sessions of its customers.
The Open Source Community Mourns the death of Ian Murdock, the Creator of Debian
The untimely death of Ian Murdock, 42, on Dec. 28, 2015, has shaken the Linux community and the world of Open Source.
„Linux old timer. Debian founder. Sun alum. Salesforce ExactTarget exec.“
is how Ian Murdock described himself on his blog at ianmurdock.com.
In IT to “Support and Defend”: Why Cybersecurity Is a Battlefield and Microsegmentation is Your Friend
The traditional perimeter-focused security model has outlived its active usefulness as evidenced by the never-ending array of security breaches that constantly push the envelope on our tolerance for administrative “malpractice” in IT.
From the various security breaches in the private sector that are by now too plentiful to enumerate, through the fingerprint-stained OPM disaster, to the recently leaked database of personally identifiable information on over 191 million registered voters (in other words: all of them): no vulnerability seems too obscure, no exploit too impractical, no hack too audacious for some keyboard-toting mercenary to take advantage of the collective naiveté–or is it sheer incompetence?–of those who are paid to protect and defend access to sensitive information. How in the world did these people get their jobs, how dare they draw a salary, and how can they sleep at night? And, even more importantly: are you, by any chance, one of them?
Tip of the Day: How to Extract Domain Names from Email Addresses using Regular Expressions (RegEX)
Extracting domain names from email addresses with the help of regular expressions takes just a nanosecond once you have the formula. The formula is the key.