All posts on August, 2017


Email to Essential smartphone users causes alarm

The term “improperly configured” is a real plague on the IT landscape.

It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.

Essential phone recently sent an email to customers asking for proof of identity. This request was a little odd in the first place — who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

One big lesson from the Essential smartphone email fiasco

The term “improperly configured” is a real plague on the IT landscape.

It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.

Essential phone recently sent out an email to customers asking for proof of identity. This request was a little odd in the first place–who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

One big lesson from the Essential smartphone email fiasco

The term “improperly configured” is a real plague on the IT landscape.

It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.

Essential phone recently sent out an email to customers asking for proof of identity. This request was a little odd in the first place–who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Jenkins Blue Ocean UI to provide code quality insights

Blue Ocean, the new user interface for the popular Jenkins continuous integration and continuous delivery (CI/CD) platform, will begin incorporating insights into code quality trends and static analyses, under an improvement plan detailed this week by the project’s creator.

The goal is to improve the developer’s visibility into the health of software projects, Blue Ocean creator James Dumay, director of project management at Jenkins technology vendor CloudBees, said. Plans also call for expanding the capabilities of Blue Ocean’s visual pipeline editor to better match what is available in Jenkins’ declarative pipelines for software delivery. The development team intends to outfit Blue Ocean with these capabilities in the next six to 12 months.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Jenkins Blue Ocean UI to provide code quality insights

Blue Ocean, the new user interface for the popular Jenkins continuous integration and continuous delivery (CI/CD) platform, will begin incorporating insights into code quality trends and static analyses, under an improvement plan detailed this week by the project’s creator.

The goal is to improve the developer’s visibility into the health of software projects, Blue Ocean creator James Dumay, director of project management at Jenkins technology vendor CloudBees, said. Plans also call for expanding the capabilities of Blue Ocean’s visual pipeline editor to better match what is available in Jenkins’ declarative pipelines for software delivery. The development team intends to outfit Blue Ocean with these capabilities in the next six to 12 months.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Windows PCs and enterprise: Don’t expect a break-up

Old-school PCs may be déclassé, relegated by pronouncements of technology Trotskyites to the dustbin of history because smartphones and tablets and wearables and who knows what else, have or will soon take their place.

Not in corporations, they won’t.

PCs still lord it there, said Spiceworks, an online community and resource for IT professionals and the vendors trying to reach them.

“It turns out desktops still rule in the workplace … and it’s not even close,” wrote Peter Tsai, a senior technology analyst. According to a Spiceworks survey conducted in July, 60% of the employees in organizations represented by 998 IT professionals in the U.S., Canada and the U.K. relied on a desktop PC as their primary computing device.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Windows PCs and enterprise: Don’t expect a break-up

Old-school PCs may be déclassé, relegated by pronouncements of technology Trotskyites to the dustbin of history because smartphones and tablets and wearables and who knows what else, have or will soon take their place.

Not in corporations, they won’t.

PCs still lord it there, said Spiceworks, an online community and resource for IT professionals and the vendors trying to reach them.

“It turns out desktops still rule in the workplace … and it’s not even close,” wrote Peter Tsai, a senior technology analyst. According to a Spiceworks survey conducted in July, 60% of the employees in organizations represented by 998 IT professionals in the U.S., Canada and the U.K. relied on a desktop PC as their primary computing device.

To read this article in full or to leave a comment, please click here

Read more 0 Comments