Simpler web payments: Introducing the Payment Request API

2016-12-16 KENNETH 0

Simpler web payments: Introducing the Payment Request API We’re thrilled to introduce a preview implementation of the Payment Request API in Microsoft Edge, enabling simpler checkout and payments on the web on Windows 10 PCs and Phones. Support for Payment Request in stable builds will be coming to EdgeHTML 15 in the Creators Update early next year. Payment Request works with Microsoft Wallet on Windows 10 PCs and phones to make ecommerce faster and simpler for customers and merchants alike. You can begin to develop for the Payment Request API today in Microsoft Edge on preview builds, starting with Windows Insider Preview build 14986. The Microsoft Wallet user experience allowing for end to end testing will be available in an upcoming Insider build soon. Conversion rates in the checkout flow are a key measure for ecommerce sites. 46% of e-commerce shoppers abandon the [ more… ]

Docker Swarm Load Balancing with NGINX and NGINX Plus

2016-12-15 KENNETH 0

Docker Swarm Load Balancing with NGINX and NGINX Plus At nginx.conf 2016 in Austin this September, I gave a presentation on using NGINX and NGINX Plus in a Docker Swarm cluster. In this post I discuss how to use NGINX and NGINX Plus for Docker Swarm load balancing in conjunction with the features introduced in Docker 1.12. All files I used during my demo at nginx.conf (and more) are available on GitHub for you to experiment with. Overview Docker version 1.12, released in late July 2016, integrates Docker Engine and Swarm and adds some new orchestration features, to create a platform similar to other container platforms such as Kubernetes. In Docker 1.12, Swarm Mode allows you to combine a set of Docker hosts into a swarm, providing a fault‑tolerant, self‑healing, decentralized architecture. The new platform also makes it easier to set up a Swarm cluster, secures all [ more… ]

Silicon Valley startup innovates using Surface Book

2016-12-15 KENNETH 0

Silicon Valley startup innovates using Surface Book “He walks off the plane from Tokyo at 3 a.m. and joins my call with Toronto at 5 a.m.,” remarked David Sidhu, VP of customer success at Litmus Automation. David was describing the incredible work ethic of Co-founder and CEO Vatsal Shah, the man behind the rapid growth and development for his Silicon Valley startup, launched in 2014. In three short years, Vatsal has built an incredible team of software engineers, from “a few guys in a room” to a bustling HQ in San Jose and satellite offices in Tokyo and Toronto. Litmus Automation is leading the revolution for “connected things,” IOT for some of the largest manufacturing companies in the world. Renault, Nissan, Texas Instruments and Dell are just a few to leverage products Loop and Loop Edge, a secure cloud based [ more… ]

Extending User Control of Flash with Click-to-Run

2016-12-15 KENNETH 0

Extending User Control of Flash with Click-to-Run Adobe Flash has been an integral part of the web for decades, enabling rich content and animations in browsers since before HTML5 was introduced. In modern browsers, web standards pioneered by Microsoft, Adobe, Google, Apple, Mozilla, and many others are now enabling sites to exceed those experiences without Flash and with improved performance and security. Starting in the Anniversary Edition of Windows 10, we began to give users more control over Flash by selectively pausing certain Flash content, like ads, that were not central to the page. In our next release, we will extend this functionality and encourage the transition to HTML5 alternatives by providing additional user control over when Flash content loads. Windows Insiders will be able to try an early implementation of this feature soon in upcoming preview builds. The user [ more… ]

Third-Party Content and Old Software Pose Security Risks

2016-12-14 KENNETH 0

Third-Party Content and Old Software Pose Security Risks A recent article in CSO magazine states that nearly half of the top million websites “pose security risks”. There are two major sources of risk cited in the article: Third-party content. Many reputable sites, for example, run ads from third-party advertising networks. Users of the reputable site are exposed to any security breaches in the third-party advertising network, and such breaches happen frequently. Old software. More than 10% of the top million sites are running old software with known security vulnerabilities. The outdated software includes version 1.8 of the NGINX open source software. In specific configurations, which are rarely used and not recommended by NGINX, Inc., open source version 1.8 has a specific security vulnerability. If you are running an outdated version of NGINX, or need assistance in keeping your software up [ more… ]