5 Steps To Implement A Containerization Strategy Successfully

Everything in energy – from optimizing charging stations at EV networks to optimizing the grid – works by software. How do we make it better for renewables?

There are several steps for backend developers to implement a reliable containerization strategy. Many modern software development teams are taking advantage of container technology in order to guarantee enhanced storage security and accelerated application delivery. Even with various containerized networks available, there are several steps to take before you can launch a reliable strategy. Taking the proper steps ensures that your system and development team is prepared for the integration of container application technology. If you are interested in a unique development strategy for your software pipeline, read on to learn about the essential steps to implement a containerization strategy. 

Assess The Readiness Of Your Platform

Before you can implement an effective containerization strategies, you need to first assess the readiness of your Read more

Read More

Encrypt Email Attachments with Jumble

You’ve asked for it (on more than one occasion) and we can finally announce that Jumble has released email attachments; this is BIG news! Now when you send a secure email you can easily attach ANY file type for encryption – Jumble will seamlessly encrypt email attachments and include it in the secure email.

Why the wait for encrypted email attachments?

It took us a little longer than planned to develop and release encrypted attachments because unlike most end-to-end email encryption providers Jumble is zero-knowledge and combining the functionality with the ease of use took some time.
If you want to know more about what zero knowledge means click here but in brief it means we don’t have access to your email data or attachments as we don’t store a copy of it….EVER.  This means we can’t read your email data or attachments and we can’t hand it over nor … Read more

Read More

Israel’s Northern Coast Under Threat of Massive Air Pollution

More than 2 years worth of pollution is expected to be released in 8 hours

Last week I visited friends in the sleepy northern coastal town of Atlit. People are friendly. Peaceful roads wind around leafy streets. Trains run close to the beach, and you hear the warning clang and the rumble as you go about your daily business. The beach is clean and quiet at this time of year. You can see a shadowy silhouette in the watery distance though; the Leviathan gas rig. You don’t pay it too much mind, it seems far enough away. The whole place has the charm of a small town in the 1960s. And the air – the air is fresh and sweet. 

But we don’t know how the fresh the air is going to be in Atlit, or indeed in any of the northern coastal towns, once the Leviathan gas platform starts … Read more

Read More

Gmail’s encrypted email warning, what’s missing?

Gmail’s encrypted email warning is coming for emails that are sent and received through unsecured connections.  Earlier this month, Google released their Safer Email Transparency report, which reveals the strides made in email encryption between 2013 and 2015.  It’s very important to note that these strides specifically relate to the security of email data while it’s in transit between the sender and the recipient and not while it’s at rest in a user’s inbox or sent items…which is arguably where the data is at the highest risk of attack.

For a long time, it’s been recognised that email communication is unsecure and Google’s report uses the popular analogy that compares sending an email to sending a postcard in that the data is open to attack while it’s in transit; just think of a postman being able to read what’s written on a postcard.  Traditionally, like many communications, emails have been … Read more

Read More

Travel Tech Safety: How to Protect Your Data When on Vacation

In a connected, digital and wireless world, your personal, financial, business and private information is at risk from hackers and other thieves.

The threat magnifies when you’re on vacation. With the great memories and rejuvenation of time away with family, friends or self comes vulnerability to less than secure technology. Below are some tips to protect your information and to make sure your business runs smoothly so you can enjoy vacation.

Back Up and Secure Before Departure

Your computer could be stolen, destroyed, crash, become infected with a virus or malfunction while you’re on vacation. Before you leave, back up the data, including emails you need or want to keep, using a hard drive, the cloud or a portable storage device.

Along with backup comes making sure would-be hacks or thieves can’t steal passwords or other sensitive information. Go into your browser’s settings options and follow the steps to remove Read more

Read More