eBook: Full Stack Web Performance

Full Stack Web Performance is written for anyone grappling with the challenges of performance in a DevOps environment. Whether you’re a web developer, a DevOps engineer, an engineering manager or an architect, you’ll glean something useful from this practical how-to by Tom Barker. We’re in the midst of a giant leap forward in software engineering and IT. Cross-functional DevOps teams are the order of the day, and Full Stack Web Performance addresses how web performance … More Continue reading eBook: Full Stack Web Performance

Replacing a Failed Ebook Reader Battery

Resurrecting a beloved piece of tech can be a trying process when fighting through the mild heartbreak — doubly so if the product has been discontinued. When their old Sony PRS-T1 e-book reader refused to charge after leaving it on their dashboard during a hot day, [Andrea Gangemi] decided to leverage a little techno-necromancy and hack together a fix.

[Gangemi] found the problem to be a battery failure, but there was nary a replacement to be found. An old Motorola mobile phone battery ended up fitting the purpose nicely. Cracking open the e-book reader, de-soldering the old battery and — …read more

Continue reading Replacing a Failed Ebook Reader Battery

100 best practices in Big Data security

The Cloud Security Alliance (CSA) released the new handbook from the CSA Big Data Working Group, outlining the 100 best practices in Big Data security. The Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy strives to detail the best practices that should be followed by any big data service provider to fortify their infrastructure. The term Big Data refers to the massive amounts of digital information companies and … More Continue reading 100 best practices in Big Data security

eBook: Defending against crypto ransomware

Unlike traditional malware, crypto ransomware doesn’t steal information. Instead, it encrypts a victim’s documents, spreadsheets, pictures, videos and other files, and then demands a ransom to unlock the encrypted files — a form of digital blackmail. The ransom amount varies, from $150–$500 for an individual to thousands of dollars for an organization. The payment goes through systems that are hard to trace, such as wire transfers, premium-rate text messages, pre-paid voucher services like Paysafecard, or … More Continue reading eBook: Defending against crypto ransomware

Removing DRM From Aaron Swartz’s eBook

After his death, Aaron Swartz became one of the Internet’s most famous defenders of the free exchange of information, one of the most polarizing figures on the topic of intellectual property, and the most famous person that still held on to the ideals the Internet was founded on. Aaron was against DRM, fought for the users, and encouraged open access to information.

Early this year, Verso Books published the collected writings of Aaron Swartz. This eBook, according to Verso, contains ‘social DRM’, a watermarking technology that Verso estimates will, “contribute £200,000 to the publisher’s revenue in its first year.” This …read more

Continue reading Removing DRM From Aaron Swartz’s eBook

Review: DevOpsSec

About the author Jim Bird, CTO of a major US-based institutional alternative trading system, has more than 20 years of experience in financial services technology, including Agile and DevOps environments. Inside DevOpsSec: Delivering Secure Software Through Continuous Delivery As more and more companies consider implementing the DevOps software development and delivery model, this book comes just at the right time. It gives an overview of how DevOps can be implemented and how security and compliance … More Continue reading Review: DevOpsSec