Posts

Showing posts from January, 2021

Why is Amazon doing this?

 What's important is that the service means that developers are getting cloud-based access to a full Mac mini, which should help them build and test their software. Macs can be used to build rendering and CI / CD farms for Apple environments, and to consolidate the development of multiplatform applications on AWS, whether Apple, Windows and Android, accelerating the launch of new software on the market.  “Mac instances run macOS 10.14 (Mojave) and 10.15 (Catalina) and can be accessed via the command line (SSH) or remote desktop (VNC). Amazon Machine Images (AMIs) for EC2 Mac instances are optimized for EC2 and include the AWS goodies that you would find in other AWS AMIs: an ENA driver, the AWS Command Line Interface (CLI) , CloudWatch Agent , CloudFormation Helper Scripts , support for AWS Systems Manager and ec2 user account. You can use these AMIs as is, or you can install your own packages and create custom AMIs (the homebrew-aws repository contains additional packages and docu

Post-pandemic perceptions

 The survey was carried out with 1081 Brazilians between March 10 and 16, just before the covid-19 pandemic spread to Brazil. To verify whether there were changes in consumer perception after the beginning of social isolation in cities, the survey was repeated in September. Most opinions remained, with minimal fluctuations. The biggest difference of opinion was related to the belief of automated service in the next decade. There was an increase of 9% among those who believe that they will speak only to robots in a period of five years. It went from 57% to 66%. “The pandemic taught that investing in technology is necessary. It is increasingly necessary to facilitate processes. But despite the intense use of bots , the human will always be there to solve demands with a higher level of difficulty ”, added Fernando Pompei, commercial director of the group. The Linux System Administrator will take care of the small projects at the service level. They have to optimize the existing environme

4 forecasts for security of payments in 2021

In parallel with this pandemic year that, at times, seemed interminable, global economies have adapted and accelerated changes that have had a strong impact on consumer behavior, fraud patterns and risk mitigation needs. In the projection for next year, I believe that many of the changes that have occurred in digital payments will be maintained. But the most important thing is that this year's experiences should accelerate innovation and force companies to learn from their mistakes so that they are not repeated in 2021. Below I list some trends that I identify for the next year: With new consumer habits, new responsibilities The habits acquired by the consumer during the pandemic will become the new normal, and commercial establishments will need to update their fraud prevention strategies. According to Visa's Back to Business study, 78% of global consumers surveyed have adapted their way of paying because of a greater security concern. Almost half of them (48%) said they would

Top 7 security mistakes when migrating to cloud-based applications

 With the pandemic, many companies have moved to more cloud-based applications out of necessity, because more of us are working remotely. In a Menlo Security survey of 200 IT managers, 40% of respondents said they are facing growing threats from cloud applications and Internet of Things (IoT) attacks because of this trend. There are good and bad ways to do this migration to the cloud. Many of the pitfalls are not exactly new. At a Gartner meeting in 2019, for example, two IT managers said their Office 365 deployments were halted due to the need to update legacy equipment. The way we now use - and share - our home computers has changed. Our PCs are no longer personal. That same computer can support your child's virtual school and your spouse's applications as well. A survey conducted in mid-June 2020 by CyberArk found that more than half of the respondents saved their passwords in the browsers of their corporate PCs. This does not bode well for any security policy, for sure. Her

Advantages and benefits of Cloud Computing

 To end this discussion on public clouds, it is important to unravel some of the advantages that managers and directors seek when adopting the technology: Cost reduction Purchase of equipment, maintenance, updating, backup and security routines: all these obligations of an own server structure generate costs that can be reduced with the public cloud. Juniper network engineer help in the network execution for combined testing, repairing and documentation. The implementation of a public cloud means giving more quality to IT spending, changing the investment model (CAPEX) to the expense model (OPEX), where the infrastructure becomes a “pay per use” model. This change provides financial advantages for the contracting company, due to the release of an investment that is often unique and redirecting its capital for use in the main activity. Flexibility Transforming infrastructure investment into service also guarantees essential flexibility for any company in a market that changes so quickl

The new skills that the IT manager must develop

 Check out, below, a breakdown of some characteristics that cannot be missing in the professional profile of an IT manager today: Knowing how to build and lead a team Brazil has been experiencing a shortage of specialized IT labor for several years. This means that there are few professionals with excellent training. Therefore, attracting and retaining them is a challenge. A good IT manager today is one who assembles a high-performance team and leads it to excellence. Hence the importance of seeking leadership training and developing the ability to deal with people of different profiles. Develop solutions to business problems Attentive to the contribution of technology to business results, the boards of organizations expect from the IT manager a great capacity to understand the challenges and suggest solutions that solve them. Being able to capture the desires of the executive board and set up fast and efficient projects for building applications, data analysis, etc., is now a highly d

Data cannot be controlled

 Another big myth around cloud security is that the organization loses control over its data and is therefore more vulnerable. The location of geographic data storage is a justifiable concern, particularly for companies that handle confidential records. Due to regulatory and compliance standards, it may be illegal for these companies to transfer data abroad. However, this does not mean that data cannot be controlled with cloud storage. If creating your own data center is not an option, the company can turn to local providers. The ideal is to sign contracts with providers that comply with regulations and laws, but also be transparent about where business data is allocated, how they travel and how they are protected. How have you treated cloud security at your company? Also read an article on how to safely migrate your business to the cloud! IT support technicians play a vital role in enterprise computing and networking environments. This educated professional identifies and resolves te

Are server virtualization and Cloud Computing the same?

 Have you heard of server virtualization? What about cloud computing? In recent years, these two technologies have won the IT market, after all, they promise more agility, mobility and flexibility for companies. Costs are also reduced, which is crucial in a scenario of economic crisis. In addition, with simpler and more practical IT management, the company can improve the management of its resources and be more competitive. But are these technologies the same? Follow this post and check the answer! What is server virtualization? Server virtualization is a practice in which software creates multiple virtual machines to make better use of available resources. In this process, instances are created - with processor, memory, storage space and network interfaces - which are defined according to the user's demands. The IT Support Engineer is responsible for taking offer application and technical support to the users. They have to respond and resolve the support requests and service tick

Smart grid: learn how the smart grid works

 Smart Grid is a generic for the application of computational intelligence and network skills to an electricity distribution system. In recent times, this concept has gained prominence, especially in smart grid projects that seek to improve operations, maintenance and planning, ensuring that each component of the power grid can "speak" and "listen". In this article, in addition to understanding what a Smart Grid is, you will also see how it works and what benefits it can bring. Check out! What is Smart Grid A Smart Grid is literally a smart grid. In many places, an energy company will only know that the service is interrupted if a customer calls. In a Smart Grid scenario, the company will know immediately why certain components of the network (smart meters in the affected area, for example) have stopped sending sensor data. By ensuring that all components of the network - from transformers and power lines to domestic, commercial and industrial electrical meters - ha