Articles from Best Tech (trending on the web)

Scary exploit may let hackers target nearly 50% of Android phones with malware

Malware is never an easy subject for Android device owners. Savvy users usually say the matter is overblown and that they know how to protect themselves against such threats, though that’s not always the case. Google acknowledges the matter but usually minimizes it, though it’s also constantly coming up with better means for protecting the safety of users. Meanwhile millions of Android devices fall prey to malware, and most of the time users don’t even know what’s going on.

See You at Tech Cocktail on April 8th with author Ben Parr and Khorus’ Joel Trammell

I have been attending Techcocktail for probably as long as they have been held.  At the event yu will enjoy  meeting the #DCtech Startup community, entrepreneurs, VCs, Tech, marketing ninjas, journalists. The room has a lot of magic and I have made several serendipitous connections there.Event Details: Day: Wednesday, April 8thTime: 6:00-8:30pmLocation: 2231 Crystal Dr. Arlington, VA 22202 United StatesRegister at :  http://tech.co/event/tech-cocktails-dc-sessions-1 Hope to see you there.

Winning Strategies for Enterprise Mobile App Development

Enterprise mobile apps are being commissioned at a hectic pace across all industries, geographies and business processes. Employees see mobile apps as an essential means of resolving issues raised in phone calls, emails and other messages delivered by smartphones and tablets usually while the employee is ‘off site’ and ‘off duty.’ read more

EMC pools enterprise smarts to create data 'lakes'

EMC is drawing on its “federation” of companies to help customers build data lakes using EMC storage, VMware virtualization and Pivotal big-data smarts.The Federation Business Data Lake will ingest and analyze data from diverse sources to give enterprises new insights that can help them make better decisions, EMC says.

Encryption today: how safe is it really?

Cryptographic algorithms have been in a constant arms race with systems seeking to crack them. Yuri Samoilov/Flickr, CC BYWhen checking your email over a secure connection, or making a purchase from an online retailer, have you ever wondered how your private information or credit card data is kept secure?

Our information is kept away from prying eyes thanks to cryptographic algorithms, which scramble the message so no-one else can read it but its intended recipient. But what are these algorithms, how did they come to be widely used, and how secure really are they?

Portable storage for the paranoid: We test two secure USB drives on keypad vs. software security

Congratulations: You’ve decided your data is sensitive enough (or you’re paranoid enough) to store it on a secure USB drive. Basically encrypted storage on a stick, these portable flash drives come with FIPS 140-2 level three validation, meaning the cryptographic module will be rendered inoperable if tampering is detected. It costs quite a bit to acquire validation, which is part of the reason for premium pricing of these drives.

Article: The Microservice Revolution: Containerized Applications, Data and All

Microservice architectures and container-based virtualization have taken the software development community by storm in recent months. This article will describe the advantages of container-based microservices and why failing to containerize stateful services like databases greatly reduces the benefits of microservices architectures. By Luke Marsden

Pages