Contributed

How Can Cloud Computing Make A Business More Efficient

Grazed from Esker.  Author: Steve Smith.

Upward Efficiency — Key Benefits Of Cloud Computing

Increasing cloud maturity has diversified the market and spurred significant investment; as noted by ZDNet, cloud computing is now a $29 billion industry and shows no signs of slowing. For many companies, however, the knowledge that "everyone else is doing it" isn't enough to throw their hat in the cloud ring and outsource some or all of their compute needs.

Both IT professionals and C-suite executives need a better sales pitch - one based on improved productivity and efficiency - to support cloud spending. Here's a rundown of six key benefits offered by the cloud...

VMware Patches Man-in-the-Middle and Web Session Hijack Vulnerability

By David Marshall

ATTN: VMware administrators.  Do you have plans this afternoon?  What about this weekend? 

"Patch now!" is the word coming down from the VMware mothership after the company revealed a new security flaw (VMSA-2016-0004) this week in the VMware Client Integration Plug-in that if exploited by an attacker could lead to a man-in-the-middle attack.

 

VMware Patches XSS Vulnerabilities in vRealize for Linux

By David Marshall

The stored XSS flaws in vRealize only affect some versions, but could lead to the compromise of user workstations

VMware has patched two cross-site scripting issues this week in several editions of the company's vRealize software.  The flaws reportedly could be exploited in stored XSS attacks and lead to remote code execution and the compromise of business workstations.  

A VMware security advisory was posted on Tuesday, citing issues with Linux versions of VMware vRealize Automation 6.x prior to 6.2.4, and VMware vRealize Business Advanced and Enterprise 8.x prior to 8.2.5.

Linux users operating affected versions are urged to patch their environments as soon as possible to address the problem.  According to the National Institute of Standards and Technology (NIST), the vulnerability could allow "remote authenticated users to inject arbitrary web script or HTML via unspecified vectors."

How to Get Ahead in Cloud Computing

Cloud computing is growing rapidly, so the number of jobs available in the sector is on the increase. For anyone looking to get ahead in tech, looking for a job in cloud computing could be the way forward. So how can you ensure you have the right skills to progress in your chosen career?

The tech world is vast and varied. There are thousands of different jobs in tech, so it is important to select the right career path if you have a specific job in mind. Clearly this is easier said than done if you are still in education, but the skills you learn at the start of your career will play a big part in where you eventually end up. 

The Best Route into Cloud Computing

For many people, the most obvious route into an IT career is via a university degree and, perhaps, a post-grad qualification. There is no doubt that a good degree from a recognised university will help your cause, but a degree is not the be all and end all, particularly in a specialised field such as cloud computing.

Zerto Releases Zerto Virtual Replication (ZVR) Version 4.5

Article Written by David Marshall

Zerto has recently announced the availability of a new feature rich update to its flagship product, Zerto Virtual Replication (ZVR), bringing it to version 4.5.    

Zerto Virtual Replication is the first hypervisor-based replication solution to offer enterprise-class cross-hypervisor replication, disaster recovery, data protection and workload mobility.  With ZVR, IT departments can automatically convert Hyper-V VMs to VMware, convert VMware VMs to Hyper- V, & convert Hyper-V to AWS for increased flexibility and cost savings.

Zerto Virtual Replication 4.5 builds upon the company's always-on replication, with no snapshots, replication and orchestration capabilities by adding granular recovery.  Now, a single file or folder can be recovered from the journal, improving the mean time to recovery for files, folders, VMs, applications and sites.  Many other improvements were made as well to simplify disaster recovery operations, to further reduce ongoing management and maintenance and to automate more DR operations to ensure consistency and repeatability.

And it is Zerto's interoperability (cross-replication, multi-hypervisor support) that is one of the big advantages that sets this solution apart from others.

 

VMware's Number Two, Carl Eschenbach, Leaves Virtualization Giant for VC Firm

Article Written by David Marshall

Carl Eschenbach, VMware’s president and chief operating officer, has announced that he is leaving the company after 14 years of service.  In an official company statement made today, VMware confirmed that Eschenbach has resigned from his operational role to "pursue a new career opportunity."  VMware also stated that he would continue to strategically advise VMware chief executive officer Pat Gelsinger, the VMware Board of Directors and the executive team.

Although the official announcement did not specify where Eschenbach was headed, Fortune reported that he will land at venture capital firm Sequoia Capital as a partner.

 

Navigating the Transition to Managed IT with Cloud Infrastructure

Article Written by David Graffia, VP of Sales at dinCloud

Gone are the days where IT could operate as a siloed business unit. Today, IT is challenged to not only facilitate, but drive business objectives, and deliver faster, more agile service. This is due to factors both in and outside of IT jurisdiction, all of which will be explored in this article. 

Factors Transforming IT 

Widespread adoption of cloud-based infrastructure is changing the way IT operates - it is no longer weighed down by inflexible on-premises hardware. Accordingly, IT departments are expected to deliver service faster, quickly adapt to changing objectives, and work towards automation. Changing expectations of IT are largely due to an overall shift in the pace at which the business sector operates. With an anytime, anywhere approach to productivity, changes can happen quickly. 

IBM Partners with VMware on Hybrid Cloud and Plans to Boost Cloud Credibility

Article Written by David Marshall

ibm vmware interconnect

IBM is in Las Vegas this week playing host at its InterConnect event, the company's annual cloud and mobile technology conference.  And with a number of announcements being made, IBM just rolled up its sleeves, puffed out its chest, and put others on notice that it plans on taking a seat at the big boys cloud computing table.

Big Blue announced a major partnership with VMware to bring its customers onto the IBM Cloud; and at the same time, also announced partnerships with the developer community GitHub, link shortener Bitly, the recently open-sourced Swift language from Apple, and more.

 

Pwn2Own Contest Places a $75K Bounty to Hack VMware Workstation at CanSecWest Security Conference

Article Written by David Marshall



The annual Pwn2Own hacking contest returns next month to the CanSecWest security conference and researchers are going up against the most popular browsers and operating systems, challenged with finding and exposing exploits.  

For this year's contest, participants will be asked to exploit Microsoft Edge or Google Chrome on fully patched versions of 64-bit Windows 10 and Apple Safari on OS X El Capitan.  

Exploiting Google Chrome or Microsoft Edge will earn hackers a $65,000 prize, while exploiting Apple Safari on Mac will earn a payout of $40,000.  Achieving system-level access on Windows or root access on Mac OS X would bring an additional bonus of $20,000 to the pot.
 

Docker Puts Emphasis on Container Security with Docker 1.10

Article Written by David Marshall

containers

Docker has launched the latest version of its containerization platform, and with it, placed a heavy emphasis on security updates.  The latest release of Docker Engine has now reached version 1.10 (that's one incremental number above 1.09, so as not to be confused with a 1.1 release).

The new additions help answer one of the main objections raised by some of the early critics of the technology -- solving security challenges.

Up until this release, Docker containers have had to run as root under the Docker daemon, bringing with it a host of security concerns.  The security solution in Docker 1.10 is a new feature called "user namespaces," a concept that was originally introduced as an experimental feature in Docker version 1.9.  User namespaces expands on the idea of granular access policies by allowing multiple namespaces to reside on the same Docker host.