Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!



Results 1 to 2 of 2
  1. #1
    Admin
    Yokel's Avatar
    Reputation Points
    105623
    Reputation Power
    100
    Join Date
    Jun 2012
    Posts
    5,798
    Time Online
    78 d 11 h 26 m
    Avg. Time Online
    28 m
    Mentioned
    1562 Post(s)
    Quoted
    175 Post(s)
    Liked
    5454 times
    Feedbacks
    233 (100%)

    Google Bought Lots of Macs

    Apparently, Google decided that it should have security by obscurity and bought shedloads of Apple’s expensive Macs. The search giant finally understood that Windows has no potential. Today Google employees don’t use Windows PCs, and this business case makes the company the world’s biggest Apple customer who bought 43,000 devices.

    Now Google seems to be expanding its plans to dump the corporate network model for something a little more zero trust. The industry experts said that it was important to get rid of the idea that there existed a kind of network perimeter. While you are guarding it, you discover that firewalls and other gatekeeper instruments relying on a perimeter just don’t help.

    The plan is that the search giant would authenticate and authorize users only after their machines have been verified as belonging to Google and as being in a secure state. The company uses a so-called “meta-inventory” – it is connected to upstream inventory sources and provides an interface for authorization whenever user attempts to connect.

    While most companies use an inventory as a data dump which no one looks at to find out whether the information is correct, Google went through a cleaning to ensure accuracy and issued certificates to all authenticated users. Of course, this move caused a few headaches to systems management and latency as legacy systems like synchronous network attached storage had to be swapped to asynchronous cloud models.

    The advantage of non-Windows OS is that once an intruder gets through the certificate structure, they have to speak Mac. And this makes life very difficult for malware and other stuff designed for the PC. The only question is why doesn’t Google use Chrome, which is even more obscure and network oriented?

  2. #2
    New user iGuahan's Avatar
    Reputation Points
    10
    Reputation Power
    40
    Join Date
    Jul 2013
    Posts
    8
    Time Online
    2 h 36 m
    Avg. Time Online
    N/A
    Mentioned
    0 Post(s)
    Quoted
    0 Post(s)
    Feedbacks
    0
    Sad if they don't practice what they preach.


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •