Copy
This week, we got a lot of response from a story about a Google initiative to re-engineer its entire approach to security, a “zero-trust” model, dubbed “BeyondCorp.” View in browser »
The New Stack Update

ISSUE 101: Beyond the Firewall  

Talk Talk Talk

“Full snippets of code that show you various ways to connect your database with various choices of configuration parameters … are common in the wild. If you do initial work with JDBC, Codota will suggest your next step. It knows how to give you representative suggestions.”

___
Codota’s Eran Yahav on how the company’s AI-based developer technology works. 
Add It Up
47% of Surveyed Companies' Employees Are Open Source Contributors
More Reason to React for React Demand
Earlier this year we reported on React’s dramatic rise to being the top skill cited in Hacker News job postings. Now, HackerRank’s 2018 Developer Skills Report provides more evidence that you should brush up on your ability to use the JavaScript framework. The reports is based on 39,441 responses, with most coming from developers but others coming from employers. Thirty-three percent of employers need React skills, but only 19 percent of developers said they had knew React. Twice as many employer respondents want Vue.js as compared to those that know the framework, but the aggregate demand is much lower than the leaders’.
What's Happening

In this episode of The New Stack Makers podcast, we spoke with Dianne Marsh, director of engineering for engineering tools at Netflix. Her team is responsible for building the tools, including Spinnaker, that the other teams use for deploying their changes to the cloud. It also means that her team is at the pinnacle of helping their developers increase their productivity.

How Technology And Culture Influence Each Other

Beyond the Firewall

This week, we got a lot of response from a story we did about a Google initiative to re-engineer its entire approach to security, a “zero-trust” model which the company dubbed “BeyondCorp.” In short, the company abandoned the wall-and-moat model of establishing a firewall around the company’s internal network and apps, instead opting to authenticate users at their devices and at the individual app level.

In effect, the company entirely got rid of the virtual private network, which must sound like good news to any network admin who has struggled with that technology in the past 20 years. Even more amazing was that the team who worked on the project, discussed at the O’Reilly Security Conference in New York last fall, was able to shift all of Google’s employees, including remotes ones, over to this new model, with minimal disruption.

Zero trust is not a new idea, but with organizations moving at least some of their workloads to the cloud —not to mention how they may be hosting a whole range of public-facing apps that are tied into backend systems — the whole perimeter model gets awful muddy and difficult to coherently support by any sort of coherent strategy. Last August, we covered how ScaleFT has adopted this zero-trust approach for its access management platform. Google’s own approach uses an uber-reverse proxy, a “trust engine” that makes the decision of whether or not to provide access to the desired application. We expect to see more security companies aligning their products and services along this approach in the years to come.

As someone pointed out on Hacker News, “Most companies need to be able to answer the question, 'Is this client one of ours,’ when protecting sensitive resources. Most companies will instead answer the question, ‘is the client on our network,’ and pretend that it was the same question. The fact that it clearly is not has some very obvious security implications and attack vectors that we've been living with for decades. BeyondCorp tries to more directly answer the original question about device identity rather than subbing in the network question in its place.”

IBM, Intel Rethink Processor Designs to Accommodate AI Workloads

To meet the new needs of artificial intelligence, chip makers such as Intel and IBM are looking at alternative designs of their processors. This article looks into the work that IBM is doing to outfit its POWER9 architecture, as well as the new frameworks and support tools that Intel is developing for AI and machine learning. 

Can Yelp Data Predict Restaurant Closures?

The old joke about predictive analytics is that it is great at predicting the past. But one Princeton graduate student recently explored whether data science can really predict the future. Using nothing but data from Yelp, he claims to have developed an algorithm that correctly guesses whether a restaurant will close during the next four years with 91 percent accuracy.

Off-The-Shelf Hacker: Run MQTT on a Wearable Device

Although first developed nearly two decades decade ago largely to connect embedded industrial computers, MQTT is a sub-pub protocol that can offer a great way to connect homebrew maker gear. Here, our hardware hacker Dr. Torq explains how it can be used to power his steampunk namebadge, and how you can use it for your own projects.

FREE EBOOK: Learn about patterns and deployment use cases for Kubernetes.
Kubernetes emerged from a need to run cloud-native applications on a massively scaled network, and that’s exactly what it’s enabling its growing user base to do. The demand for platforms that can run web-scalable workloads means Kubernetes is increasingly under consideration by IT engineering teams, and many will choose to adopt the project.

This ebook serves as a primer for both newcomers, assessors and implementers who are looking to make the most of the ecosystem of products and services emerging around Kubernetes. We also go well beyond the basics and explore where Kubernetes fits into the DevOps pipeline, how to overcome production challenges, and considerations for Kubernetes adopters. 
Download The Ebook
We are grateful for the support of our ebook foundation sponsor:



And our sponsors for this ebook:









Copyright © 2018 The New Stack, All rights reserved.


Want to change how you receive these emails?
You can unsubscribe from this newsletter