Welcome!

From an International Authority on Network and Internet Technologies

David Strom

Subscribe to David Strom: eMailAlertsEmail Alerts
Get David Strom via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by David Strom

CA Technologies says, “For DevOps to work correctly, it must be treated as a movement, not a market for a specific vendor’s products.” As Arlo Guthrie once sang, with three people it is an organization. But if we can find 50 people who can sing the praises of DevOps, it can become a movement! Trouble is, many software developers are stuck in the past. In a 2012 service virtualization survey of IT executives and managers by analyst firm voke, only 6% of the group responded they were completely confident that new IT applications would be delivered to market on time. But maybe its high time DevOps becomes a movement. You can read more about this idea in my post last week on CA’s blog here. ... (more)

The Next PDF You Open May Be Your Last

You know by now not to open unexpected email attachments, but what if someone that appears legit sends you a PDF? How harmful can it be? As it turns out, very. This week a harmless-looking invitation to a Nobel Prize ceremony was a nasty piece of business indeed. When saved to a hard drive and opened, it sets up a backdoor so that the bad guys can take over your PC at will, all while you think nothing is going on. What is troubling is that this isn’t new. This PDF exploit has been around for several years, yet it seems that it doesn’t get much attention from the general public. ... (more)

How to Extract Your Contacts from LinkedIn and Facebook

Facebook on Ulitzer If you have spent any time online using social networks like LinkedIn or Facebook, you know they can be difficult to grow your network and add contacts. But even harder is the ability to extract your contacts once you have built up a reasonably sized network. None of the social networks makes it very easy to get this information. Why would you want to do this? Several reasons. First is the peace of mind that you have control over your own data. Should you decide to leave the network, or should the network decided to leave you (either for cause or for lack of... (more)

Google vs. China, Our First Cyber War

Last week we witnessed the first Cyber War, but it didn’t go down quite as many of us expected. Instead of a group of anonymous hackers trying to take over thousands of infected PCs or trying to cut off access to critical infrastructure, we saw Google declare the first salvo in its war against Chinese censorship by moving its servers to Hong Kong. The more I thought about this, the more I realized that this was war, declared by a private company on a nation state. Just because Google doesn’t have its own army (yet), or that no actual physical weapons were fired doesn’t make it a... (more)

Top500 news: The Rise of the GPU

Desktop Virtualization Journal GPU, as in graphics processing unit, don’t get as much credit as CPUs, the supposed “brains” inside the PC. Well, that is slowly changing, particularly as people figure out that the modern GPUs have a lot of raw processing horsepower to more around all those pixels while you play your FPS games. This week, the latest list of the world’s top 500 supercomputers was announced. What I find interesting about it is that at number 5 is a new Chinese design that marries Intel Xeon CPU chips with AMD/ATI graphics chips. There are thousands of clusters that ... (more)