IBM/Red Hat Leftovers
-
Top tech conferences for sysadmins in 2022 | Enable Sysadmin
In the pre-pandemic past, time and budget often limited which industry events people could attend. While time will always be a factor, the shift towards virtual gatherings has made that commitment much easier for many people. Pair a more flexible schedule with reduced costs for travel and tickets, and you have the most accessible industry landscape in history.
Sysadmins are known as "jack-of-all-trades" technologists who need broad and deep knowledge to do their jobs well. But this makes it hard for them to choose which conferences—many aimed at specific tech audiences—to attend.
Like everything in life, it comes down to your priorities. Want to focus on your automation skills this year? AnsibleFest it is. Want to bridge the gap between sysadmins and developers? Try DevConf or All Things Open (which, in my experience, leans towards developers). What about container technology? Well, there's Kubecon for that...
You see my point. There are a lot of events to choose from. So it raises the question, what is your number one must-attend tech event for 2022?
-
Simple Partitioning with Ansible Storage Role – Storage APIs
There are probably not too many people that need to do disk partitioning and storage space management on a daily basis. For most of us it is something low level that needs to be set up just once and then promptly forgotten.
Strangely enough the Ansible Storage Role can be very useful for both of these groups of people. Here, I would like to try and explain why and how to use it.
Please remember that Storage Role operations are often destructive – the user can easily lose data if he is not being careful. Backup, if possible, think twice if not.
-
Safeguarding consumer data for banks: some guidelines for privacy engineering
Open banking requirements add complexity to protecting customer data. Banks need to juggle the complexity of keeping customer data safe and adhering to privacy requirements and expectations -- while also sharing data with authorized institutions. These regulations also inform the software development process, which must implement ever increasing functional capability and efficiencies while adhering to the prescribed directives. The question is, how?
Software development efforts are not conducted independently of regulatory requirements. While ultimately banks must ensure that customer data is not stolen or altered in the process of sharing and that customer privacy is not compromised - violations can risk a bank’s reputation and incur financial penalties from regulators - there is a clear need for developers to contribute significantly to better privacy engineering standards.
-
IBM Emeritus Irving Wladawsky-Berger: Is It Possible to Establish Norms for Responsible State Behavior in Cyberspace?
In mid-December, the Council one Foreign Relations sponsored a virtual roundtable with Joseph Nye, - former dean of Harvard’s Kennedy School of Government, - to discuss his recent Foreign Affairs article The End of Anarchy?: How to Build a New Digital Order. Professor Nye has long been regarded as one of America’s preeminent strategic thinkers and political scientists. In the 1970s he chaired the National Security Council Group on Nonproliferation of Nuclear Weapons, and over the past decade he’s brought his expertise to the study of conflict and deterrence in cyberspace.
Cybersecurity is an increasingly important aspect of the of US national security strategy, including global trade and the protection of our critical infrastructures. In June of 2021, FBI Director Christopher Wray compared the danger of ransomware attacks on US firms by Russian criminal groups to the September 11 terrorist attacks. And, in a July editorial, the NY times said that ransomware attacks have emerged as “a formidable potential threat to national security,” given “their ability to seriously disrupt economies and to breach strategically critical enterprises or agencies,” urging governments that “It is a war that needs to be fought, and won.”
At an MIT conference in February of 2019, former US Secretary of State Henry Kissinger was asked if we need cybersecurity control agreements with Russia, China and other nations similar to the nuclear arms control agreements that he spent so much time negotiating during the Cold War. Dr. Kissinger replied that for arms control to be effective, the two sides needed to share information and agree to inspections. But such mechanisms are harder to apply in the digital world, because the transparency that was essential for arms control would be very hard to establish for cyber threats. In addition, while controls of physical arms are relatively explicable and negotiable, the variety and speed of cyber attacks make it much harder to develop adequate control agreements.
- Login or register to post comments
- Printer-friendly version
- 1723 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago