No Image

Defining a Modern App

2021-10-07 KENNETH 0

Defining a Modern App Developers, architects, and DevOps engineers are no longer satisfied with the status quo when it comes to designing and building applications. We know this because we talk to them all the time. They’re tired of the challenges in porting applications from one cloud to another. They’ve experienced the intense pressure of spinning up additional compute infrastructure quickly to meet unexpected demand. They’ve struggled to put the right assets in place after suffering a major failure or outage. Basically, they are tired of the stress and hassles of legacy application architectures. What we’ve heard over and over again from customers and community members is that they want to build “modern apps.” The term is broad enough to mean different things to different people, so we asked our Dev and DevOps colleagues what a modern app means to [ more… ]

No Image

USN-5106-1: Linux kernel (OEM) vulnerabilities

2021-10-07 KENNETH 0

USN-5106-1: Linux kernel (OEM) vulnerabilities Valentina Palmiotti discovered that the io_uring subsystem in the Linux kernel could be coerced to free adjacent memory. A local attacker could use this to execute arbitrary code. (CVE-2021-41073) It was discovered that the Linux kernel did not properly enforce certain types of entries in the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. An attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2020-26541) It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. An attacker who could start and control a VM could possibly use this to expose sensitive information or execute arbitrary code. (CVE-2021-22543) Murray McAllister discovered that the joystick device interface in the Linux kernel did not properly validate data passed via an [ more… ]

No Image

USN-5105-1: Bottle vulnerability

2021-10-07 KENNETH 0

USN-5105-1: Bottle vulnerability It was discovered that Bottle incorrectly handled certain inputs. An attacker could possibly use this issue to cache malicious requests. Source: USN-5105-1: Bottle vulnerability

Windows 11 blossoms with ‘Bloom’ – a new symbol for a new operating system

2021-10-07 KENNETH 0

Windows 11 blossoms with ‘Bloom’ – a new symbol for a new operating system With Windows 11, a fresh perspective starts with the very first image you see on the screen: a desktop wallpaper that’s also a symbolic image of starting anew with this operating system. Inspired by flowers, this new blue beauty is called Bloom. The story of its creation spans a creative and dynamic collaboration between engineering, design and marketing teams at Microsoft, across an ocean during a pandemic and which incorporated a parallel workflow that caught the eye of Windows 11 designers. “It’s the same Windows that you know and love, but this is a new beginning, a new era,” says Christina Koehn, creative director for Windows 11, which became available Oct. 5. This new era comes with intuitive navigation, easy organization, more apps and efficient ways [ more… ]

No Image

AWS Cloud Control API 출시 – AWS 및 서드 파티 서비스에 대한 API 서비스

2021-10-07 KENNETH 0

AWS Cloud Control API 출시 – AWS 및 서드 파티 서비스에 대한 API 서비스 오늘 AWS Cloud Control API 기능을 신규 출시합니다. 이 서비스는 개발자가 AWS와 서드 파티 서비스를 쉽게 관리할 수 있도록 설계된 일반적인 애플리케이션 프로그램 인터페이스(API) 집합입니다. AWS는 가장 광범위하고 심층적인 클라우드 서비스 포트폴리오를 제공합니다. 빌더는 이러한 기능을 활용하여 모든 유형의 클라우드 인프라를 구축합니다. AWS는 15년 전 Amazon Simple Storage Service(Amazon S3)에서 시작하여 200개가 넘는 서비스를 제공할 만큼 성장했습니다. 각 AWS 서비스에는 고유한 어휘, 입력 파라미터 및 오류 보고와 함께 특정 API가 포함되어 있습니다. 예를 들어, S3 CreateBucket API를 사용하여 Amazon Simple Storage Service(Amazon S3) 버킷을 사용하고, Amazon Elastic Compute Cloud(Amazon EC2) RunInstances API를 사용하여 EC2 인스턴스를 생성합니다. 코드형 인프라를 구축하거나, 보안 태세를 검사하고 자동으로 개선하거나, 구성 관리를 위해서, 또는 뛰어난 성능-컴퓨팅 클러스터를 프로비저닝하고 구성하는 등 여러 가지 이유로 AWS API를 사용할 수 있습니다. 사용 사례는 매우 많습니다. [ more… ]