Category: Technology

  • Cyber Resilience Towards the Quantification of Cyber Security Threats

    The World Economic Forum and its partners have developed and shared a way for organizations to calculate the impact of cyber security threats. The framework, called cyber value-at-risk comes at a time when cyberattacks are increasing in velocity and intensity, and when 90% of companies worldwide recognize they are insufficiently prepared to protect themselves against them. Download the…

  • 9 Reasons Why News Media Web Sites Should Consider Moving to HTTPS in 2015

    If you work in news media and are interested in technology, you may enjoy my article listing 9 Reasons Why News Media Web Sites Should Consider Moving to HTTPS in 2015. I co-authored it with Eitan Konigsburg and Elena Kvochko, two colleagues with expertise, deep knowledge and passion for cyber security, privacy and technology. It is published on the Times Open Blog…

  • Why investors should care about cyber security breaches

    If you are interested in business, technology, and cyber security, you may enjoy my article about why investors should care about cyber security breaches. I co-authored it with Elena Kvochko, a leader in the field of cyber resilience.

  • SHA-3 Hash Generator

    http://crypto-js.googlecode.com/svn/tags/3.1.2/build/rollups/sha3.js SHA-3, originally known as Keccak is a cryptographic hash function. Learn more on WikiPedia… Enter text below to generate the SHA-3 Hash Code for Output length in bits: 512384256224 The SHA-3 Hash Code is below //

  • Proposal for Linking To Users Across Social Networks @username@service

    We present here a convention for linking to users across social networks. Social networks have evolved into a category of their own. They are not like most Web sites in the traditional sense and even when considered modern Web apps, they are a special type of application. They have become our new digital personas. Email…

  • Hosting Large-Scale Web Sites: Contract Review Guide for the CTO

    If you host and operate large-scale Web sites, or negotiate contract agreements with vendors that provide such services, you need to understand what should be included in a Web hosting infrastructure. This knowledge will help you in three areas: Providing reliability, scalability & good performance Minimizing risks via security, privacy, regulatory compliance and reduction of…

  • Understanding SLA Uptime Percentages

    The table below helps illustrate why you should ensure that the “SLA Uptime Measurement Meter Reset Window” is the same duration as your billing cycle or shorter. Availability % Downtime per year Downtime per month (30 days) Downtime per week Downtime per day 90 “one nine” 36.5 days 72 hours 16.8 hours 2.4000 hours 95…

  • How to Avoid Duplicate Search Results when using Apple Mail.app with Gmail

    How to Avoid Duplicate Search Results when using Apple Mail.app with Gmail

    I use Gmail’s IMAP feature with my Apple Mac OS’s built in Mail.app program. Mail.app keeps local copies (on all my personal Macs) of all my email messages that I’ve kept (since 1994). It enables me to: Effectively work offline with all my emails (searching, reading and composing), when my computer is not online. That’s…

  • Checklist for Migration of Web Application from Traditional Hosting to Cloud

    In 2010, Cloud Computing is likely to see increasing adoption. Migrating Web applications from one data center to another is a complex project. To assist you in migrating Web applications from your hosting facilities to cloud hosting solutions like Amazon EC2, Microsoft Azure or RackSpace’s Cloud offerings, I’ve published a set of checklists for migrating…

  • Save Money On Hosting & CDN By Optimizing Your Architecture & Applications

    If you manage technology for a company that has a large Web presence, it is likely that a large percentage of your total technology costs is spent on the Web hosting environment, including the Content Delivery Network (CDN, e.g. Akamai, LimeLight, CDNetworks, Cotendo). In this article, we discuss some ways to manage these costs. Before…

  • Save Your Company Money In Monthly Bills Using Browser Caching

    Companies that operate heavily trafficked Web sites can save thousands of dollars every month by maximizing their use of browser-side caching. Large Web sites pay for bandwidth at their Web hosting data center and also at their content delivery network (CDN, e.g. Akamai, LimeLight, CDNetworks). Bandwidth costs add up to huge monthly bills. On small-business…

  • Using Amazon Elastic Block Store (EBS) with an EC2 Instance

    One of the differences between Amazon EC2 server instances and normal servers is that the server’s local disk storage state (i.e. changes to data) on EC2 instances does not persist over instance shutdowns and powering on. This was mentioned in my earlier post about hosting my Web site on Amazon EC2 and S3, Therefore, it…