O.S.S. Blogs & News >
I have come to realise that where you lay your head at night has the significant impact on how you perceive the Internet.
As something of an infrastructure architect, I have come to realise that all workloads should be on a cloud. Now, if what you just heard me say seems to say that everything should be on a public cloud, and your ERP/CRM should use the vendor SaaS platform I believe you have seriously misunderstood cloud.
This year's conference branded "LCA By the Bay" was hosted at the Deakin University Waterfront Campus, and attracted 600 delegates from students with an interest in Linux, to professionals from global organisations such as IBM, Google, Wikimedia Foundation, and Red Hat.
Identity and Access Management (IAM) refers to a set of business processes and supporting technologies that enable the creation, maintenance, and use of a digital identity – i.e. it is about your users: who they are, how they are authenticated and what they can access.
November, 2015 – Open Systems Specialists Limited (OSS), a leading provider of I.C.T. Infrastructure and Services is celebrating the anniversary of its founding, marking twenty successful years of exceeding customer expectations by delivering exceptional services across most major industries in New Zealand.
I have been doing a lot of reading over the last couple of months as part of my role as the OSS Practice Manager. As you can see on the OSS website, we have four practices that we as a company specialise in. The reason for all the reading is firstly because I like to know what it is that our technical consultants are working with, and secondly because I need to know about trends and new products in the industry so we can provide the best service to our customers.
The information security landscape has changed dramatically over the last 10 years. It used to be the case that defending against outside attacks from the Internet with a rudimentary firewall was sufficient in almost all cases, and that intrusion detection was a straightforward case of monitoring log data for anything out of the normal.
I interact with clients (and potential clients) on a daily basis. It struck me a while ago that many of the issues they are struggling to cope with, they have brought upon themselves.
In February 2013 the Center for Strategic and International Studies (CSIS) released a paper titled Raising the Bar for Cybersecurity. In the paper it is stated that more than 90% of successful security breaches required only the most basic techniques; 85% of breaches took months to be discovered; and 96% of successful breaches could have been avoided if the victims had put in simple or intermediate controls.
We are all basically familiar with Von Neumann machines – instructions work on data, with instructions and data stored independently. This is the basic architecture of everything from a phone to a mainframe. We know we can use a single installation of a program to manipulate a multitude of corresponding datasets. For example an installation of Word can be used to edit any Word document.
We have become so familiar with the Von Neumann concept that we start to forget a key point: