To dramatically reduce page load times, improve performance, and reduce your bandwidth and infrastructure costs, you can implement a CDN, or content delivery network, to cache these assets across a set of geographically distributed servers.
In this tutorial, we’ll provide a high-level overview of CDNs and how they work, as well as the benefits they can provide for your web applications.
What is a CDN?
A content delivery network is a geographically distributed group of servers optimized to deliver static content to end users. This static content can be almost any sort of data, but CDNs are most commonly used to deliver web pages and their related files, streaming video and audio, and large software packages.
Read the full article by Henif Jetha on DigitalOcean here:
The new General Data Protection Regulation of the EU will take effect on May 25th, 2018. Let us take a quick look on what this regulation is all about.
The General Data Protection Regulation is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU).
Today, the field of data protection is regulated by each 28 EU member state’s own laws. GDPR aims to erase the ambiguity brought forth by this.
GDPR concentrates on four distinct fields:
- Defines personal and sensitive data
- Details how these are to be handled
- Establishes fines for non-compiance
- Sets new requirements for breach notifications
But what is GDPR all about? Rights. Rights for the EU ciztiens to have greater controll of their data (personal data and sensitive personal data):
- Consent for personal data to be shared and processed
- Right to access personal data
- Right to be forgotten
- Right to portability
- Right to recification
- Right to resist processing
- Right not to be subject of automated decission making
From these rights, maybe the most important is the one about consent. Personal data may not be shared or processed without the explicit consent of the data subject. Data subject must be advised exactly and plainly on what data will be collected and how it will be used. Consent will be required for all processed or stored data, including systems already in place. Organisations will have to work out a way to gain consent which is fair, lawful and allowed.
With the new rights becoming law, organisations have to ask themselves; does this apply to me or not? This is best answered by a qualified lawyer, but in short: any data that represents an EU citizen has to meet the requirements, it does not matter where the data is stored or accessed from.
If an organisation is in the scope of GDPR, it may have to:
- Appoint a data protection officer (> 250 employees)
- Appoint reprezentative inside EU
- Review data collection procedures
- Create data protection awareness program for employees
- Perform initial and ongoing information audits
- Complete Data Protection Impact Assessments
To enforce compliance, the regulation opens the possibility for high fines.
- 2% of annual global revenue, or 10 million euro (w/e is higher).
- Data breaches
- Not employing DPO (when it would be needed)
- Not conducting DPIA (Data Protection Impact Assessments)
- Not keeping appropriate records
- 4% of annual global revenue, or 20 million euro (w/e is higher).
- Failing to gain consent
- Not upholding customer rights
- Moving data outside the EU
Of course these are only the maximal possible fines, their enforcement will be proprotionate. However non-compliance will have other impacts as well, such as damage to the company’s reputation and lost consumer trust.
Guides have been created and published for companies that detail the steps they should take to gain compliance. In general, they expect the companies to map what data they have, check if their processing is fair, lawful and allowed, remove any unneded data (data minimazation), create a procedure for consent handling, recognize the rights granted to individuals, create risk assasment from the data subject’s perspective, reduce risks, have incident response plan, host security awareness trainings for employees; finally, do all this (and more) before May 25th, 2018.
A quick way to gain first impressions on your company’s compliance level is to use self assessment form proviced by ico., which can be found here: http://www2.infosecinstitute.com/GDPR-Readiness
Keep Calm and Prepare for GDPR!
GDPR Compliance: What You Need to Know Before May 2018
Let’s Cut The Crap On GDPR by Carl Gottlieb
Virtual Session: GDPR without the Hype
For some, video conferencing is just a click away but what about those who aren’t really that fond of using Skype or Google Hangouts? Is it even possible for you to convince them to install a video call and chat application just so you could talk or chat to them via webcam? Well, some of them might say yes but wouldn’t it be much better if you can make a video call without even installing any software or application? Speaking of which, you might want to check out this cool web-based video conferencing service called appear.in.
WHAT IS IT AND WHAT DOES IT DO
Compared to other video call and chat applications, appear.in is a web-based group video calling service. What’s great about it is that you’re not required to login or register. There’s also no need for you to download and install any particular app or software. With appear.in, all you need is a stable internet connection, someone to talk to and of course – a supported web browser. As of now, you can use appear.in on Chrome, Firefox and Opera. So if you want to chat or start a video call, just create a chat room and then share the link to your chat room to your recipients. It’s as easy as that.
- Easy to use, web-based
- No user registration or login required – there’s also no need for you to install any software or app on your computer
- Neat, stable and responsive user interface
- Can cater up to eight participants
- Supports screen sharing
- Uses SSL/SRTP to secure and encrypt your chats and video conversations
- You can claim a chat room as your own
- You can lock a room to prevent others from joining in without your permission
- You can view or set your chat room in full screen
- You cannot drag, resize or move the chat box
- No emoticons for chats
- Works using WebRTC, so it will only work with browsers that support WebRTC
The way how appear.in works is quite simple. Since it’s purely web-based, you don’t need to install anything on your computer. If you want to start a video conversation, all you need to do is to access its homepage and then you create a chat room (or simply called as “room”) by typing in your preferred chat room name in the provided text box. You can create any name that you want but you can also opt to generate a random chat room name like “gamy-salmon”, “thirsty-grouse”, etc. Once you’re done, just click the “Create” button and make sure that you allow the web app to access your webcam and microphone. Just keep in mind that the recommended number of participants in a chat room is only limited to eight. If you go over this limit, there’s a possibility for the web app to crash or you might experience some unexpected errors.
You should also keep in mind that every appear.in chat room has a unique link. In order to invite other people to join your room, what you need to do is to send or share your room’s link to your recipients. So as soon as they click the link, they will automatically appear on your screen and vice versa. Other than this, you can also opt to keep your room locked so that no one else can join your video conversations.
If you want to gain more control over your chat room, you can own it by clicking the “Claim” button. As a chat room owner, you are given the privilege to secure your room with a password. You can also customize your room by setting your own background image or photo.
Functionality wise, appear.in is very easy to use. It’s hassle-free. The video and audio quality is also good plus it doesn’t crash or lag. It has screen sharing and full screen functions. Its user interface looks neat and you can also use its chat box to send a message to your recipients. It may lack some tools and options that would make it more user-friendly but what’s more important is that it does what it’s intended to do and so far, it’s doing a good job. It also uses SSL/SRTP encryption to secure your video calls and chats.
Today I would like to take a break from our ongoing informative articles. Just lean back and have some fun reading about how software projects got their name.
Most computer users have dozens of passwords: Banking websites, social media, bill payments, online retailers—all of them require secure logins. Because so many websites vary their password requirements it’s hard to use just one password that’s easy to remember, not to mention what a bad idea that is.
Keeping your online identity secure requires the use of complicated and varied passwords, and managing all of them can be nearly impossible. 1Password is a multiplatform app designed to solve your problems.
- What is 1Password? 1Password is a password management app that stores all your login information behind one master password. It is available for iOS, macOS, Android, and Windows.
- Why does 1Password matter? Password hacking continues to grow in sophistication, making complex, hard-to-crack passwords essential. 1Password can auto generate random passwords, greatly increasing account security.
- Who does 1Password affect? 1Password affects anyone who uses the internet. Secure passwords are essential in the internet age, and 1Password makes managing them incredibly simple.
- When is 1Password happening? 1Password has been on the market for 10 years and continues to grow in sophistication and ease of use.
- How do I make use of 1Password? Interested users can download 1Password at its website, in the App Store for iOS, and Google Play for Android.
What is 1Password?
1Password is an app used for managing the multitude of passwords each of us has nowadays. Put simply, it’s a secure vault where you can put passwords, credit card numbers, and other sensitive personal information.
1Password uses a single logon for access to all stored passwords, and users can also use their fingerprints to log in on applicable devices.
Users who want to share information among family members will find 1Password particularly useful: it has a family sharing system built right in. Administrators can share select information with certain family members, enabling parents and children to access shared accounts.
Apps are available for iOS, Android, Windows, and macOS. The desktop versions of the app can also automatically sign in to secured accounts if a user is logged in to 1Password.
Why does 1Password matter?
Information security has always been an arms race, and if anything it has only become more intense. It’s hackers vs. infosec professionals in a constant competition to one up each other: that’s why apps like 1Password are so important.
1Password can’t guarantee you’ll never be compromised but it’s a good start. The app itself uses AES-256 encryption, which is incredibly strong and nearly impossible to crack. It is made even more secure with the use of fingerprint scanning technology like TouchID: If you’re not the one with your phone 1Password isn’t getting unlocked.
To round matters out, 1Password will automatically generate complicated random passwords for you. Since it is automatically filling them out itself you won’t need to worry about forgetting them.
In short, 1Password matters because hackers are getting better and better at cracking weak passwords.
Who does 1Password affect?
How many passwords does the average internet user have? It’s hard to know how many are unique, but the average US email address has 130 accounts registered to it. Anyone with even a fraction of that many accounts is affected by 1Password.
It is very tempting to reuse passwords or vary new ones just slightly, and that’s a serious security risk. 1Password can do a lot to nullify that risk on both mobile devices and traditional computers.
When is 1Password happening?
How can I make use of 1Password?
1Password is free to download and use, though some of its more advanced features will cost you money. Premium features can be unlocked for a one-time $9.99 purchase. Additional functions include:
- Additional categories (in addition to passwords, credit cards, and personal IDs)
- The ability to create custom fields in a stored item
- An Apple Watch app
- One-time password generation (available only on supported websites)
- Custom password organization and tagging
- The ability to create multiple storage vaults
A family plan with access for five people costs $4.99 per month and is billed annually.
Authors: Jessica Hartmann, Martina Schüßler‐Lenz, Attilio Bondanza, Christian J Buchholz
DOI 10.15252/emmm.201607485 | Published online 01.08.2017
EMBO Molecular Medicine (2017) e201607485
In recent years, an increasing emphasis has been put on cancer treatment in the field of change in the patient’s immune response. One of the promising therapies is called CAR T-cells therapy. The essence of this process is in three steps:
1, T-cells are gathered from the patient’s or donor’s blood
2, T-cells are genetically engineered by an artificially constructed recognition receptor (Chimeric Antigen Receptor, CAR)
3, the genetically modified T-cells (that are able to detect and kill the cancer cells due to their new receptors) are returned to the patient (usually infused intravenously)
Although the first clinical study with CAR T-cells was carried out about 20 years ago, the number of trials has been increasing every year for the past 10 years. Majority of trials was made in the USA and in China. In Europe, such studies are mainly conducted in the UK, Germany and France. There are many reasons why making far fewer CAR T therapeutic clinical trials in Europe compared to the USA. Just a few of them: lack of places where high quality and consistent CAR T-cells can be produced in Europe, different EU states use different application forms and different approval timelines, the rules on clinical trials are not fully synchronized in Europe.
CAR T-cell therapy is particularly effective for malignant B-cell diseases. The best result is achieved when patients are suffered from acute lymphoid leukemia. However, only modest successes were reported when non-Hogdkin lymphoma or chronic lymphocytic leukemia were treated with this therapy.
Of course, CAR T-cell therapy may have many serious side effects, for example: neurotoxicity, CRS (Cytokine-Release Syndrome), TLS (Tumor Lysis Syndrome), acute anaphylaxia, B-cell aplasia.
Continue reading: HERE
The FDA (Food and Drug Administration) has released the well known standard 21 CFR PART 11, which governs how affected systems should handle electronic records and signatures. The scope of this standard extends to all companies within the food, clinical or pharmaceutical industries.
The question is if a web-based training system (also called Learning Management System or LMS for short) is required to be compliant with Part 11 or not. There is no clear answer to this question however; just as it is the case with any type of system (be it web-based or not) it depends on two main factors:
- What the system is/will be used for.
- If the system’s output (electronic or paper) will be used as official records.
If the system is/will be used to train employees and the electronic records of this process will be the proof of completion, compliance with Part 11 is required.
On the other hand, if compliance is not required, it may still be a good idea to verify if the employed system would confirm with Part 11 or not. The standard itself was created for the purpose of information security and the general requirements of confidentiality, integrity and availability (also known as CIA) are represented in it. The same view is employed here as is in many standards regarding information security.
More information and resources on the subject can be found here:
MeDRA (Medical Dictionary for Regulatory Activities) is an internationally used medical dictionary developed by the ICH in the 1990s which will be widely utilized during pharmaceutical regulatory processes. One of its scopes of use is the data coding of adverse events and adverse reactions. MedRA has been translated into English, Japanese, Czech, Dutch, French, German, Hungarian, Italian, Portuguese and Spanish.
The great advantage of MedDRA is that it organises adverse events reported by clinical investigators into a standard format, making it possible to discover groups and relationships between cases that seem unique at first. This can be used for statistical reporting purposes during the creation of tables and listings. MedRA is structured into various hierarchical groups, arranged from very specific to very general. Based on its hierarcy, a specific event is listed under various connecting groups. The hierarchical groups are as follows:
Among the groups, SOC (System Organ Classes) includes the most general terms, while LLT (Lowest Level Terms) describe fully specific events. Beyond the scope of a given analysis, MedRA has contributed to the standardization of medical databases and hence to a better assessment of diseases.
Do you keep hearing about cloud hosting and wonder how it differs from a regular hosting plan? Perhaps you just built a new site and are wondering if you should give the cloud a try?
Cloud hosting is a more reliable, scalable, and secure option than a regular shared hosting plan. But shared hosting is, usually, cheaper and easier to set up.
In this article, Lucero Del Alba will cover everything from control panel options, migration issues, and the pros and cons of each option. We’ll get to see what each option is about and —hopefully! — help to you decide whether it’s better for you to stick with shared hosting, or if you should switch to a cloud plan.
Once Upon a Time on a Shared Hosting Plan …
Traditionally, when we needed to put a site online, we’d buy a domain, get a hosting plan, and FTP the site from our computer to the web. We grew so used to it that it became second nature.
We would typically have features such as a very comprehensive control panel, statistics, and email hosting for the domains registered on that account, among other things. But also some hard limitations, such as a certain amount of disk space, a given bandwidth, and a fraction of the CPU and the server memory.
For many brochure, portfolio, blog and small business sites, that’s perfectly adequate. But for many businesses, it’s not ideal. And even for a freelancer maintaining a couple of simple sites, it’s possible to run out of resources for a given site from time to time. (It’s no fun being asked by a client why the site is down.)
The VPS and Dedicated Server
One way of upgrading is to buy a bigger, slightly more expensive plan with a little more resources, in the form of a VPS (virtual private server). And if that doesn’t cut it, you can rent a dedicated server — that is, a full rack on a hosting company’s data center.
With a dedicated server, you get all of the server resources in a non-shared environment for, let’s say, $100 a month. Yes, about a 20x more expensive than a basic shared hosting plan — but hey, you wanted the whole thing, didn’t you?
Whether you’ve stuck with shared hosting or jumped into the world of the VPS or dedicated server, it has probably all worked just fine, and you may never have contemplated trying anything else. Believe it or not, though, there’s now a generation of web developers that barely know what FTP is, having never used it.
… and Then the Cloud Hosting Plan Came Up
When Amazon Web Services (AWS) was first introduced, everything was new and it seemed like you needed to take an intensive course before you were able to start operating with this cloud infrastructure.
But things have changed since then. Not only have more providers come onto the scene, but also more solutions that can be used out-of-the-box, including cloud hosting.
Continue reading on SitePoint!