Ubuntu News

Snap up your development – Tools for making the snap trek easier

Software development is what happens in between users and bug reports. Niccolo Machiavelli In an ideal world, developers would be able to create new applications without any errors, and live happily ever after. Unfortunately, errors, warnings and bugs are an inseparable part of the process. Sometimes, these problems are caused Continue Reading

Information Governance for Healthcare Institutions

Information governance is nothing new, but for it to be effective, it requires understanding, flexibility, and collaboration between a variety of teams and departments. Fortinet’s Susan Biddle offers her insights into the role of information governance in organizational security and how healthcare organizations can adapt. Can solid information governance boost Continue Reading

Energy and Utilities Benefit from Mobile

Energy and Utility companies’ work is distributed far and wide, between residential homes, businesses, schools, and wherever else the supporting infrastructure exists. Territories for field workers can often span a few towns wide and without a plan on prioritizing their sites, time and money can be wasted on unproductive routes. Over two Continue Reading

Improving the Parallel Applier with Writeset-based Dependency Tracking

MySQL 8.0.1 introduces a new mechanism to track the dependencies between transactions. This feature is used to optimize the binary log applier on asynchronous replication slaves, improving the throughput significantly on workloads where there is low-concurrency on the master and/or on systems with very fast storage. Before diving into that Continue Reading

Q&A: Information Sharing and Trust in Cybersecurity Today

With cybercrime such a big concern these days, cooperation and information sharing between public and private organizations has never been more important. We recently talked with Derek Manky, Global Security Strategist at Fortinet, to get his thoughts on the difficulty, and importance, of trusted networks for sharing information in the Continue Reading

Evenly Distributed Future

Traveling back and forth between the UK and US I often find myself answering the question “What does CloudFlare do?”. That question gets posed by USCIS on arrival and I’ve honed a short and accurate answer: “CloudFlare protects web sites from hackers, makes web sites faster and ensures they work Continue Reading

Using Context to Predict the Future

The vast majority of security strategies are reactive. The goal is to close the gap between the time to compromise and time to discover. According to the 2016 DBIR report, this compromise time is minutes for a majority (over 80%) of breaches. Solving this problem is complicated because threats are Continue Reading

Cyber Threat Assessment: How to Find Indicators of Compromise

The threat landscape is in a constant state of evolution, and the arms race between cyberguardians and cybercriminals has been heating up dramatically over the course of the last year. An additional 20 billion IoT devices will be connected to the network by 2020, along with expansive growth in personal Continue Reading

Managing Challenges and Risks in Ubiquitous IT Systems

Innovations in wireless and computing technology are driving the growth of connectivity between devices and appliances throughout the home, office, car, store, or practically any place that has a Wi-Fi connection. Known as ubiquitous computing, the r…

>