SyncDog Announces Partnership with SafeLogic, Integrating CryptoComply to SyncDog Sentinel Product for Compliant …

Reston, VA (PRWEB) September 08, 2014

SyncDog, Inc. an industry-leading provider of enterprise mobility solutions, today announced a technology partnership with SafeLogic, a provider of innovative encryption products for applications in servers, workstations, appliances, and mobile devices. SyncDog, known for its SentinelSecure mobile security solutions, will feature SafeLogics CryptoComply module at MobileCON, part of the Super Mobility Week expo in Las Vegas, September 9th-11th.

SyncDogs flagship product SentinelSecure provides mobile app containerization, active mobile server monitoring, mobile device provisioning and administration with end-to-end transaction monitoring. SyncDog has licensed SafeLogics CryptoComply module for deployment on iOS and Android platforms, to provide FIPS 140-2 validated encryption in SyncDogs SentinelSecure container product. SyncDog will be taking orders for SyncDog SentinelSecure featuring CryptoComply at MobileCON in Las Vegas, with full integration for the combined product offering slated for October 1, 2014.

FIPS 140 was established as a benchmark for encryption over 20 years ago, and it is now demanded by enterprise customers worldwide in addition to the government and military, said SafeLogic CEO Ray Potter. The SyncDog partnership now provides wider distribution of a defense-grade secure mobile container to public and private industry, as well as local, state and federal government. We are proud to be a piece of the SentinelSecure solution.

We are excited to be able to offer encryption that has been certified to the FIPS 140 standard, said SyncDog President and CEO Jonas Gyllensvaan. We look forward to discussing this new development and other client work with our SentinelSecure product line at MobileCON in Las Vegas.

Gyllensvaan and Potter will be available to the media in the SyncDog booth (#7711) at MobileCON from 1:00-2:00 PM Pacific Time on Tuesday, September 9. A media advisory has been issued and can be accessed here for this editorial interview opportunity.

About SyncDog, Inc.

A mobile workforce fueled by BYOD is fast replacing traditional computing as the most complex work platform for IT professionals to manage. IT shops are now forced to support platforms running outside of their standard networks creating a nearly insurmountable dilemma for maintaining service quality and security.

SyncDog, Inc. offsets this burden in a comprehensive solution that manages pro-active mobile device monitoring, mobile device security, mobile application containerization, and compliance reporting. Our flagship product SyncDog Enterprise Mobility Platform solves the mobility service & security dilemma that keeps IT staff in the dark about service disruptions and security issues caused by malicious and careless users. With SyncDog Enterprise Mobility, IT administrators have the enterprise visibility to be proactive with application delivery and security giving them the freedom to focus on driving revenue to the organization.

The mobile workforce is the new enterprise norm and disruptions to mobile service delivery and system-wide security can be devastating to both revenue and reputation. SyncDog Enterprise Mobility is a powerful combination of low overhead and predictive intelligence for all of todays mobile platforms. Your network supports every transaction crossing it and SyncDog helps you understand it. More info: http://www.syncdog.com.

Read more here:
SyncDog Announces Partnership with SafeLogic, Integrating CryptoComply to SyncDog Sentinel Product for Compliant ...

Chef muscles up with Microsoft, Amazon

Chef, a popular open source software program for managing the configuration settings of servers, software and other IT components, now can reach deeper into the data center with the help of some intertwined services from Microsoft, VMware and Amazon Web Services (AWS).

Chef 12, released Monday, also comes with a new licensing model that should make it easier for customers to add or remove premium features.

The Chef IT automation software provides a way for administrators to write scripts, often called recipes, to configure and deploy a new piece of equipment or software. Recipes can be used to automate the management of large numbers of assets.

Since its initial release in 2009, Chef has been downloaded over 10 million times. It is used by companies such as Facebook, Hewlett-Packard, Rackspace, AirBnB and others.

To extend the capabilities of Chef, the company has leveraged resources offered by other IT vendors.

For instance, a backup copy of Chef can now be stored and run on AWS Elastic Block Storage (EBS).

Should the main Chef server go down, operations can shift to EBS. Organizations can set up copies of the Chef server in different geographic areas, for extra protection in times of disaster.

Eventually, Chef will also support block storage services from other cloud services as well.

A new replication feature allows users to synchronize configuration data across multiple Chef servers, which can provide a single set of policies across all the locations being managed by Chef.

You could use a single Chef server as a central location for developing policies for configuration and management, said Colin Campbell, Chef director of patterns and practices.

Read more:
Chef muscles up with Microsoft, Amazon

A visual history of open source

September 08, 2014, 10:56 AM The open source movement has brought good things to the lives of countless people around the world. But have you ever wondered how it all got started? Check out this infographic that walks you through the birth of open source in the 1950s to today's thriving open source world.

According to Piktochart:

From operating systems to development tools and programming languages to browsers and thousands of utilities and applications, Open Source has led the way. Now, discover the movement's history.

More at Piktochart

Image credit: InformIT

Hat tip: Arccore on Google+

Note that I've only included a small chunk of the infographic in the quote box above. Be sure to click through to see the entire thing. I think it's a great visual representation of how far open source has come over the years.

The infographic is based on five Wikipedia articles. Here are links to each of them if you want to enjoy some additional reading:

GNU Project Open Source Free Software Movement History of Free and Open Source Software Open Source Initiative

LibreOffice 4.0 versus Microsoft Office 2013 Technology Personalized compares LibreOffice 4.0 to Microsoft Office 2013, and finds that LibreOffice 4.0 holds its own against Microsoft's office suite.

Read the original post:
A visual history of open source

U.S.-Israeli Plot to Kidnap Edward Snowden Foiled

AFP EXCLUSIVE: U.S.-Israeli Plot to Kidnap Edward Snowden Foiled

U.S.-Israeli Plot to Kidnap Edward Snowden Foiled

U.S.-Israeli Plot to Kidnap Edward Snowden Foiled

By Richard Walker —

A plot by the Central Intelligence Agency (CIA) and Israel’s Mossad to kidnap National Security Agency (NSA) whistleblower Edward Snowden was foiled by agents of Russia’s intelligence agency, the Federal Security Service (FSB).

Continue reading

US ‘kidnaps’ Russian MP’s son to ‘exchange him for Snowden’

http://rt.com/news/171188-russian-hacker-kidnapped-america/

US ‘kidnaps’ Russian MP’s son to ‘exchange him for Snowden’

Published time: July 08, 2014 10:39
Edited time: July 10, 2014 17:25
RIA Novosti / Aleksandr Utkin

RIA Novosti / Aleksandr Utkin

A Russian MP claims the US kidnapped his son from the Maldives on bogus cyber-fraud charges and may be preparing to offer him as bait in a swap deal for Edward Snowden.

Roman Seleznyov, 30, was arrested at Male international airport as he was about to board a flight to Moscow. He was forced by US secret service agents to board a private plane to Guam and was later arrested. The Russian ministry slammed his detention as “a de-facto kidnapping.”

Continue reading

NSA monitored calls of 35 world leaders after US official handed over contacts

http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-calls

NSA monitored calls of 35 world leaders after US official handed over contacts

• Agency given more than 200 numbers by government official
• NSA encourages departments to share their 'Rolodexes'
• Surveillance produced 'little intelligence', memo acknowledges

The NSA memo suggests that such surveillance was not isolated as the agency routinely monitors world leaders. Photograph: Guardian

The NSA memo suggests that such surveillance was not isolated as the agency routinely monitors world leaders. Photograph: Guardian

The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden.

Continue reading

Pamela Anderson Pays Visit To Julian Assange

Actress Pamela Anderson sought out the advice of controversial WikiLeaks founder Julian Assange about the launch of her new charity foundation.

The Baywatch star and passionate activist set up the Pamela Anderson Foundation earlier this year (14) to benefit a variety of human, animal and environmental rights causes.

She wanted to discuss her plans for the organisation with Assange, so she paid him a visit in August (14) at the Ecuadorian embassy in London, where he has been living for two years after claiming political asylum.

Fashion designer Dame Vivienne Westwood tells Britain's Mail on Sunday, "I was supposed to take Pamela Anderson to see Julian in the embassy but she got the date wrong, so she went on her own the day after me. She told me afterwards that they got on very well. Julian was just brilliant... Pamela's trying to help people with her new trust and he gave her some ideas on how to do that."

His publicist has confirmed the meeting, simply adding, "She asked for his advice."

Assange, who is trying to avoid extradition to Sweden on rape and sexual assault allegations, announced his plans to leave the embassy last month (Aug14).

Read more from the original source:
Pamela Anderson Pays Visit To Julian Assange

How To Trade One Kind Of Cryptocurrency For A Different Kind Of Cryptocurrency – Video


How To Trade One Kind Of Cryptocurrency For A Different Kind Of Cryptocurrency
In this video we show you how easy it is to exchange (or trade) one kind of cryptocurrency for another. We like using Bleutrade - https://bleutrade.com/home/...

By: Cryptolix

See the article here:
How To Trade One Kind Of Cryptocurrency For A Different Kind Of Cryptocurrency - Video