In 2015, up to 10,000 refugees crossed Germany’s borders everyday with the aim of applying for asylum. The Federal Office for Migration and Refugees knew they had to process everyone discreetly, efficiently, and accurately.
Despite changes in government and a turnover in administrations, one thing remains the same: agencies are under pressure to improve citizen services while reducing costs. A key strategy to achieving this resulted in the “Cloud First” directive in 2011: a step to push agencies to the Cloud for the common good. It stated:
Issuing advisories has a cost: It costs the security team significant amounts of time to craft and send the advisories; it costs many of our downstreams time to apply, build, and test patches; and it costs many of our users time to decide whether to do an update, and if so, to test and deploy it.
Given this, the Xen Project Security Team wants to clarify when they should issue an advisory or not: the Xen Security Response Process only mentions “‘vulnerabilities”, without specifying what constitutes a vulnerability.
When Apple announced their new file system, APFS, in June, I hustled to be in the front row of the WWDC presentation, questions with the presenters, and then the open Q&A session. I took a week to write up my notes which turned into as 12 page behemoth of a blog post — longer than my college thesis.
I asked Carl Olofson, Research VP, Application Development and Deployment, IDC to give our readers his view on where Oracle Exadata Database Machine fits in a company's digital transformation strategy. Here is his take...
Your company’s digital strategy may be about entering new geographies or markets, launching new products and services, or improving customer loyalty – all to drive business growth. But this also puts your IT organization under intense pressures these days.