Showing posts from July 28, 2015

Google Cloud Platform: Control over encryption in the public cloud.

The security remains a dynamic situation to improve and to rethink. We live henceforth in digital age where data is a critical asset that deserves and requires the best vigilance.
The cloud streamlines our digital experiences; so it is indispensable to make sure that you canindependently control data encryption anywhere and anytime.
Great security and more control over how you manage security on Cloud Platforms are now required.
Customer-Supplied Encryption Keys for Google Compute Engine in beta navigates on this curve allowing you to bring-your-own-keys to encrypt compute resources. observes that, you can create and hold the keys, you can determine when data is active or at rest.
According to Google, absolutely no one inside or outside Google can access your at rest data without possession of your keys.

Customer-Supplied Encryption Keys are available in beta in select countries and you can access Customer-Supplied Encryption Keys through Google API, Developers Consol…

Puppet Enterprise 2015.2 in our digital age.

The real-time ability to respond to changes quickly is a game-changer in our disruptive world where competition is high and where downtime and outages are not tolerated. Puppet Enterprise 2015.2 is henceforth there with the goal to help you deploy and move faster without sacrificing reliability. New capabilities include: Visualize your infrastructure code to respond to changes quicklyAutomate provisioning for VMware vSphere virtual machinesManage infrastructure faster with a next-generation Puppet Enterprise web UIFor those who unfamiliar, recalls that Puppet Enterprise helps you automate repetitive tasks, deploy critical apps on-premise or in the Cloud. Puppet Enterprise automates configuration and ongoing management of your machines and the software running on them.

Critical vulnerabilities affecting Chrysler, Dodge, Jeep, and Ram models.

Image recalls that, a vulnerability affecting the Uconnect software from FCA has been reported. Exploitation of this vulnerability may allow an unauthorized user to take remote control of an affected vehicle, but the attack requires access to Sprint's cellular network, which connects FCA vehicles to the Internet. Sprint has blocked the port used for attacks.
FCA and the National Highway Transportation Safety Administration (NHTSA) have also initiated a safety recall for all potentially affected Chrysler, Dodge, Jeep, and Ram models. See the NHTSA recall announcement for a complete list.
So, recommends that users review ICS Alert 15-203-01 and Vulnerability Note VU#819439 for more information. Uconnect users are encouraged to review the NHTSA recall announcement and apply the software update.

Nearly $1.36B poured last week in the digital economy.

The entertainment continues to generate excitements. So, DraftKings has raised $300M / Series D for its knowledge-based daily fantasy sports website that allows users to play against other users for cash prizes.Overall, has captured:
$22M / Series B for Darktrace; a world leader in Enterprise Immune System technology. Darktrace is currently valued at more than $100M and will use the funds to fuel growth in the Asia-Pacific. Investors include:Summit Partners $19M / Series B for Granular that provides management software and analytics for large, professionally managed farms to streamline operations. Investors include:Andreessen Horowitz, Google Ventures, Khosla Ventures and others. $20M / Series B for Cazena, a big-data-as-a-service provider to enterprise customers. Founded in 2014 and based in Massachusetts, Cazena has raised $28M to date. Investors include: Andreessen Horowitz, North Bridge Venture Partners & Growth Equity and Formation 8.

Big data processing in the cloud.

Data-centric enterprises are henceforth engaged in a long journey for data exploration. The stakes are at the core of their development at growth.
In this momentum, enterprises need streamlined paradigms, tools and technologies (available on The cloud plays henceforth a key role within this dynamic with the goal to radically simplify big data processing,driving faster business outcomes at a fraction of the cost. 
Beyond challenges and security concerns that could prevent many enterprises from moving big data processing to the cloud, the cloud brings the end-to-end: agility, scalability, flexibility, cost savings, performance, productivity, security every enterprise need.
Henceforth you can leverage in real-time Big data technologies such as: Hadoop, Search, Spark, MPP SQL, and others.
Automated provisioning saves skilled resources for the most value-adding work. Secure gateway and end-to-end encrypted cloud architecture ensure your data stays safe, both on the wire an…