mirror of
https://github.com/LCTT/TranslateProject.git
synced 2024-12-26 21:30:55 +08:00
Merge remote-tracking branch 'LCTT/master'
This commit is contained in:
commit
6c71d195a6
@ -0,0 +1,75 @@
|
|||||||
|
[#]: collector: (lujun9972)
|
||||||
|
[#]: translator: (geekpi)
|
||||||
|
[#]: reviewer: (wxy)
|
||||||
|
[#]: publisher: (wxy)
|
||||||
|
[#]: url: (https://linux.cn/article-10734-1.html)
|
||||||
|
[#]: subject: (14 days of celebrating the Raspberry Pi)
|
||||||
|
[#]: via: (https://opensource.com/article/19/3/happy-pi-day)
|
||||||
|
[#]: author: (Anderson Silva (Red Hat) https://opensource.com/users/ansilva)
|
||||||
|
|
||||||
|
树莓派使用入门:庆祝树莓派的 14 天
|
||||||
|
======
|
||||||
|
|
||||||
|
> 在我们关于树莓派入门系列的第 14 篇也是最后一篇文章中,回顾一下我们学到的所有东西。
|
||||||
|
|
||||||
|
![][1]
|
||||||
|
|
||||||
|
### 派节快乐!
|
||||||
|
|
||||||
|
每年的 3 月 14 日,我们这些极客都会庆祝派节。我们用这种方式缩写日期: `MMDD`,3 月 14 于是写成 03/14,它的数字上提醒我们 3.14,或者说 [π][2] 的前三位数字。许多美国人没有意识到的是,世界上几乎没有其他国家使用这种[日期格式][3],因此派节几乎只适用于美国,尽管它在全球范围内得到了庆祝。
|
||||||
|
|
||||||
|
无论你身在何处,让我们一起庆祝树莓派,并通过回顾过去两周我们所涉及的主题来结束本系列:
|
||||||
|
|
||||||
|
* 第 1 天:[你应该选择哪种树莓派?][4]
|
||||||
|
* 第 2 天:[如何购买树莓派][5]
|
||||||
|
* 第 3 天:[如何启动一个新的树莓派][6]
|
||||||
|
* 第 4 天:[用树莓派学习 Linux][7]
|
||||||
|
* 第 5 天:[教孩子们用树莓派学编程的 5 种方法][8]
|
||||||
|
* 第 6 天:[可以使用树莓派学习的 3 种流行编程语言][9]
|
||||||
|
* 第 7 天:[如何更新树莓派][10]
|
||||||
|
* 第 8 天:[如何使用树莓派来娱乐][11]
|
||||||
|
* 第 9 天:[树莓派上的模拟器和原生 Linux 游戏][12]
|
||||||
|
* 第 10 天:[进入物理世界 —— 如何使用树莓派的 GPIO 针脚][13]
|
||||||
|
* 第 11 天:[通过树莓派和 kali Linux 学习计算机安全][14]
|
||||||
|
* 第 12 天:[在树莓派上使用 Mathematica 进行高级数学运算][15]
|
||||||
|
* 第 13 天:[如何为树莓派社区做出贡献][16]
|
||||||
|
|
||||||
|
![Pi Day illustration][18]
|
||||||
|
|
||||||
|
我将结束本系列,感谢所有关注的人,尤其是那些在过去 14 天里从中学到了东西的人!我还想鼓励大家不断扩展他们对树莓派以及围绕它构建的所有开源(和闭源)技术的了解。
|
||||||
|
|
||||||
|
我还鼓励你了解其他文化、哲学、宗教和世界观。让我们成为人类的是这种惊人的 (有时是有趣的) 能力,我们不仅要适应外部环境,而且要适应智力环境。
|
||||||
|
|
||||||
|
不管你做什么,保持学习!
|
||||||
|
|
||||||
|
--------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
via: https://opensource.com/article/19/3/happy-pi-day
|
||||||
|
|
||||||
|
作者:[Anderson Silva (Red Hat)][a]
|
||||||
|
选题:[lujun9972][b]
|
||||||
|
译者:[geekpi](https://github.com/geekpi)
|
||||||
|
校对:[wxy](https://github.com/wxy)
|
||||||
|
|
||||||
|
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
||||||
|
|
||||||
|
[a]: https://opensource.com/users/ansilva
|
||||||
|
[b]: https://github.com/lujun9972
|
||||||
|
[1]: https://opensource.com/sites/default/files/styles/image-full-size/public/lead-images/raspberry-pi-juggle.png?itok=oTgGGSRA
|
||||||
|
[2]: https://www.piday.org/million/
|
||||||
|
[3]: https://en.wikipedia.org/wiki/Date_format_by_country
|
||||||
|
[4]: https://linux.cn/article-10611-1.html
|
||||||
|
[5]: https://linux.cn/article-10615-1.html
|
||||||
|
[6]: https://linux.cn/article-10644-1.html
|
||||||
|
[7]: https://linux.cn/article-10645-1.html
|
||||||
|
[8]: https://linux.cn/article-10653-1.html
|
||||||
|
[9]: https://linux.cn/article-10661-1.html
|
||||||
|
[10]: https://linux.cn/article-10665-1.html
|
||||||
|
[11]: https://linux.cn/article-10669-1.html
|
||||||
|
[12]: https://linux.cn/article-10682-1.html
|
||||||
|
[13]: https://linux.cn/article-10687-1.html
|
||||||
|
[14]: https://linux.cn/article-10690-1.html
|
||||||
|
[15]: https://linux.cn/article-10711-1.html
|
||||||
|
[16]: https://linux.cn/article-10731-1.html
|
||||||
|
[17]: /file/426561
|
||||||
|
[18]: https://opensource.com/sites/default/files/uploads/raspberrypi_14_piday.jpg (Pi Day illustration)
|
@ -1,65 +0,0 @@
|
|||||||
[#]: collector: (lujun9972)
|
|
||||||
[#]: translator: (hopefully2333)
|
|
||||||
[#]: reviewer: ( )
|
|
||||||
[#]: publisher: ( )
|
|
||||||
[#]: url: ( )
|
|
||||||
[#]: subject: (Enhanced security at the edge)
|
|
||||||
[#]: via: (https://www.networkworld.com/article/3388130/enhanced-security-at-the-edge.html#tk.rss_all)
|
|
||||||
[#]: author: (Anne Taylor https://www.networkworld.com/author/Anne-Taylor/)
|
|
||||||
|
|
||||||
Enhanced security at the edge
|
|
||||||
======
|
|
||||||
The risks presented by edge computing environments necessitates that companies pay special attention to security measures.
|
|
||||||
![iStock][1]
|
|
||||||
|
|
||||||
It’s becoming a cliché to say that data security is a top concern among executives and boards of directors. The problem is: the problem just won’t go away.
|
|
||||||
|
|
||||||
Hackers and attackers are ever finding new ways to exploit weaknesses. Just as companies start to use emerging technologies like artificial intelligence and machine learning to protect their organizations in an automated fashion, [so too are bad actors][2] using these tools to further their goals.
|
|
||||||
|
|
||||||
In a nutshell, security simply cannot be overlooked. And now, as companies [increasingly adopt][3] edge computing, there are new considerations to securing these environments.
|
|
||||||
|
|
||||||
**More risks at the edge**
|
|
||||||
|
|
||||||
As a [Network World article][4] suggests, edge computing places a new focus on physical security. That’s not to dismiss the need to secure data in transit. However, it’s the actual physical sites and equipment that deserve special attention.
|
|
||||||
|
|
||||||
For example, edge hardware is often situated in larger corporate or wide-open spaces, sometimes in highly accessible, shared offices and public areas. Ostensibly, this is to take advantage of the cost savings and faster access associated with data not having to travel back and forth to the data center.
|
|
||||||
|
|
||||||
However, without any level of access control, this equipment is at risk of both malicious actions and simple human error. Imagine an office cleaner accidentally turning off a device, and the resulting effects of subsequent downtime.
|
|
||||||
|
|
||||||
Another risk is “Shadow edge IT.” Sometimes non-IT staff will deploy an edge site to quickly launch a project, without letting the IT department know this site is now connecting to the network. For example, a retail store might take the initiative to install its own digital signage. Or, a sales team could apply IoT sensors to TVs and deployed them on-the-fly at a sales demo.
|
|
||||||
|
|
||||||
In these cases, IT may have little or no visibility into these devices and edge sites, leaving the network potentially exposed.
|
|
||||||
|
|
||||||
**Securing the edge**
|
|
||||||
|
|
||||||
An easy way to avoid these risks is to deploy a micro data center (MDC).
|
|
||||||
|
|
||||||
> “Most of these [edge] environments have historically been uncontrolled,” [said Kevin Brown][5], SVP Innovation and CTO for Schneider Electric’s Secure Power Division. “They might be a Tier 1, but likely a Tier 0 type of design — they’re like open wiring closets. They now need to be treated like micro data centers. You need to be able to manage them as you would a mission-critical data center.”
|
|
||||||
|
|
||||||
Just as it sounds, this solution is a secure, self-contained enclosure that includes all the storage, processing, and networking that’s required to run applications both indoors and outdoors. It also includes the necessary power, cooling, security, and management tools.
|
|
||||||
|
|
||||||
The best part is the high level of security. The unit is enclosed, with locking doors, to prevent unauthorized access. And with the right vendor, the MDC can be customized to include surveillance cameras, sensors, and monitoring technology for remote digital management.
|
|
||||||
|
|
||||||
As companies increasingly take advantage of the benefits of edge computing, it’s critical they also take advantage of security solutions to protect their data and environments.
|
|
||||||
|
|
||||||
Discover how to best secure your edge computing environment at [APC.com][6].
|
|
||||||
|
|
||||||
--------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
via: https://www.networkworld.com/article/3388130/enhanced-security-at-the-edge.html#tk.rss_all
|
|
||||||
|
|
||||||
作者:[Anne Taylor][a]
|
|
||||||
选题:[lujun9972][b]
|
|
||||||
译者:[译者ID](https://github.com/译者ID)
|
|
||||||
校对:[校对者ID](https://github.com/校对者ID)
|
|
||||||
|
|
||||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
|
||||||
|
|
||||||
[a]: https://www.networkworld.com/author/Anne-Taylor/
|
|
||||||
[b]: https://github.com/lujun9972
|
|
||||||
[1]: https://images.idgesg.net/images/article/2019/04/istock-1091707448-100793312-large.jpg
|
|
||||||
[2]: https://www.csoonline.com/article/3250144/6-ways-hackers-will-use-machine-learning-to-launch-attacks.html
|
|
||||||
[3]: https://www.marketwatch.com/press-release/edge-computing-market-2018-global-analysis-opportunities-and-forecast-to-2023-2018-08-20
|
|
||||||
[4]: https://www.networkworld.com/article/3224893/what-is-edge-computing-and-how-it-s-changing-the-network.html
|
|
||||||
[5]: https://www.youtube.com/watch?v=1NLk1cXEukQ
|
|
||||||
[6]: https://www.apc.com/us/en/solutions/business-solutions/edge-computing.jsp
|
|
@ -1,77 +0,0 @@
|
|||||||
[#]: collector: (lujun9972)
|
|
||||||
[#]: translator: (geekpi)
|
|
||||||
[#]: reviewer: ( )
|
|
||||||
[#]: publisher: ( )
|
|
||||||
[#]: url: ( )
|
|
||||||
[#]: subject: (14 days of celebrating the Raspberry Pi)
|
|
||||||
[#]: via: (https://opensource.com/article/19/3/happy-pi-day)
|
|
||||||
[#]: author: (Anderson Silva (Red Hat) https://opensource.com/users/ansilva)
|
|
||||||
|
|
||||||
庆祝 Raspberry Pi 的 14 天
|
|
||||||
======
|
|
||||||
|
|
||||||
在我们关于树莓派入门系列的第 14 篇也是最后一篇文章中,回顾一下我们学到的所有东西。
|
|
||||||
|
|
||||||
![][1]
|
|
||||||
|
|
||||||
**派节快乐!**
|
|
||||||
|
|
||||||
每年的 3 月 14 日,我们这些极客都会庆祝派节。我们用这种方式缩写日期 MMDD,March 14 于是写成 03/14,它的数字上提醒我们 3.14,或者说 [π][2] 的前三位数字。许多美国人没有意识到的是,世界上几乎没有其他国家使用这种[日期格式][3],因此派节几乎只适用于美国,尽管它在全球范围内得到了庆祝。
|
|
||||||
|
|
||||||
无论你身在何处,让我们一起庆祝树莓派,并通过回顾过去两周我们所涉及的主题来结束本系列:
|
|
||||||
|
|
||||||
* 第 1 天:[你应该选择哪种树莓派?][4]
|
|
||||||
* 第 2 天:[如何购买树莓派][5]
|
|
||||||
* 第 3 天:[如何启动新的树莓派][6]
|
|
||||||
* 第 4 天:[用树莓派学习 Linux][7]
|
|
||||||
* 第 5 天:[5 种教孩子用树莓派编程的方法][8]
|
|
||||||
* 第 6 天:[你可以用树莓派学习的 3 种流行编程语言][9]
|
|
||||||
* 第 7 天:[如何更新树莓派][10]
|
|
||||||
* 第 8 天:[如何使用树莓派娱乐][11]
|
|
||||||
* 第 9 天:[在树莓派上玩游戏][12]
|
|
||||||
* 第 10 天:[让我们实物化:如何在树莓派上使用 GPIO 引脚][13]
|
|
||||||
* 第 11 天:[通过树莓派了解计算机安全][14]
|
|
||||||
* 第 12 天:[在树莓派上使用 Mathematica 进行高级数学运算][15]
|
|
||||||
* 第 13 天:[为树莓派社区做出贡献][16]
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
![Pi Day illustration][18]
|
|
||||||
|
|
||||||
我将结束本系列,感谢所有关注的人,尤其是那些在过去 14 天里从中学到了东西的人!我还想鼓励大家不断扩展他们对树莓派以及围绕它构建的所有开源(和闭源)技术的了解。
|
|
||||||
|
|
||||||
我还鼓励你了解其他文化、哲学、宗教和世界观。让我们成为人类的是这种惊人的 (有时是有趣的) 能力,我们不仅要适应外部环境,而且要适应智力环境。
|
|
||||||
|
|
||||||
不管你做什么,保持学习!
|
|
||||||
|
|
||||||
--------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
via: https://opensource.com/article/19/3/happy-pi-day
|
|
||||||
|
|
||||||
作者:[Anderson Silva (Red Hat)][a]
|
|
||||||
选题:[lujun9972][b]
|
|
||||||
译者:[geekpi](https://github.com/geekpi)
|
|
||||||
校对:[校对者ID](https://github.com/校对者ID)
|
|
||||||
|
|
||||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
|
||||||
|
|
||||||
[a]:
|
|
||||||
[b]: https://github.com/lujun9972
|
|
||||||
[1]: https://opensource.com/sites/default/files/styles/image-full-size/public/lead-images/raspberry-pi-juggle.png?itok=oTgGGSRA
|
|
||||||
[2]: https://www.piday.org/million/
|
|
||||||
[3]: https://en.wikipedia.org/wiki/Date_format_by_country
|
|
||||||
[4]: https://opensource.com/article/19/3/which-raspberry-pi-choose
|
|
||||||
[5]: https://opensource.com/article/19/3/how-buy-raspberry-pi
|
|
||||||
[6]: https://opensource.com/article/19/3/how-boot-new-raspberry-pi
|
|
||||||
[7]: https://opensource.com/article/19/3/learn-linux-raspberry-pi
|
|
||||||
[8]: https://opensource.com/article/19/3/teach-kids-program-raspberry-pi
|
|
||||||
[9]: https://opensource.com/article/19/3/programming-languages-raspberry-pi
|
|
||||||
[10]: https://opensource.com/article/19/3/how-raspberry-pi-update
|
|
||||||
[11]: https://opensource.com/article/19/3/raspberry-pi-entertainment
|
|
||||||
[12]: https://opensource.com/article/19/3/play-games-raspberry-pi
|
|
||||||
[13]: https://opensource.com/article/19/3/gpio-pins-raspberry-pi
|
|
||||||
[14]: https://opensource.com/article/19/3/learn-about-computer-security-raspberry-pi
|
|
||||||
[15]: https://opensource.com/article/19/3/do-math-raspberry-pi
|
|
||||||
[16]: https://opensource.com/article/19/3/contribute-raspberry-pi-community
|
|
||||||
[17]: /file/426561
|
|
||||||
[18]: https://opensource.com/sites/default/files/uploads/raspberrypi_14_piday.jpg (Pi Day illustration)
|
|
64
translated/tech/20190409 Enhanced security at the edge.md
Normal file
64
translated/tech/20190409 Enhanced security at the edge.md
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
[#]: collector: (lujun9972)
|
||||||
|
[#]: translator: (hopefully2333)
|
||||||
|
[#]: reviewer: ( )
|
||||||
|
[#]: publisher: ( )
|
||||||
|
[#]: url: ( )
|
||||||
|
[#]: subject: (Enhanced security at the edge)
|
||||||
|
[#]: via: (https://www.networkworld.com/article/3388130/enhanced-security-at-the-edge.html#tk.rss_all)
|
||||||
|
[#]: author: (Anne Taylor https://www.networkworld.com/author/Anne-Taylor/)
|
||||||
|
|
||||||
|
增强边缘计算的安全性
|
||||||
|
======
|
||||||
|
边缘计算环境带来的安全风险迫使公司必须特别关注它的安全措施。
|
||||||
|
|
||||||
|
说数据安全是高管们和董事会最关注的问题已经是陈词滥调了。但问题是:数据安全问题不会自己消失。
|
||||||
|
|
||||||
|
骇客和攻击者一直在寻找利用漏洞的新方法。就像公司开始使用人工智能和机器学习等新兴技术来自动化地保护他们的组织一样,攻击者们也在使用这些技术来达成他们的目的。
|
||||||
|
|
||||||
|
简而言之,安全问题是一定不能忽视的。现在,随着越来越多的公司开始使用边缘计算,如何保护这些边缘计算环境,需要有新的安全考量。
|
||||||
|
|
||||||
|
**边缘计算的风险更高**
|
||||||
|
|
||||||
|
正如 Network World 中一篇文章所建议的,边缘计算的安全架构应该将重点放在物理安全上。这并不是说要忽视,保护传输过程中的数据这一点。而是说,实际情况里的物理环境和物理设备更加值得关注。
|
||||||
|
|
||||||
|
例如,边缘计算的硬件设备通常位于大公司或者广阔空间中,有时候是在很容易进入的共享办公室和公共区域里。从表面上看,这节省了成本,能更快地访问到相关的数据,而不必在后端的数据中心和前端的设备之间往返。
|
||||||
|
|
||||||
|
但是,如果没有任何级别的访问控制,这台设备就会暴露在恶意操作和简单人为错误的双重风险之下。想象一下办公室的清洁工意外地关掉了设备,以及随之而来的设置停机所造成的后果。
|
||||||
|
|
||||||
|
另一个风险是 “Shadow edge IT”。有时候非 IT 的工作人员会部署一个边缘站点来实现快速启动项目,却没有及时通知 IT 部门这个站点正在连接到网络。例如,零售商店可能会主动安装他们自己的数字标牌,或者,销售团队会将物联网传感器应用到电视中,并在销售演示中实时地部署它们。
|
||||||
|
|
||||||
|
在这种情况下,IT 部门很少甚至完全看不到这些设备和边缘站点,这就使得网络可能暴露在外。
|
||||||
|
|
||||||
|
**保护边缘计算环境**
|
||||||
|
|
||||||
|
部署微型数据中心是规避上述风险的一个简单方法。(MDC)
|
||||||
|
|
||||||
|
“在历史上,大多数这些[边缘]环境都是不受控制的,”施耐德电气安全能源部门的首席技术官和创新高级副总裁 Kevin Brown 说。“它们可能是第一级,但很可能是第 0 级类型的设计-它们就像开放的配件柜。它们现在需要像微型数据中心一样的对待。你管理它需要像管理关键任务数据中心一样”
|
||||||
|
|
||||||
|
单说听起来的感觉,这个解决方案是一个安全,独立的机箱,它包括在室内和室外运行程序所需的所有存储空间,处理性能和网络资源。它同样包含必要的电源、冷却、安全和管理工具。
|
||||||
|
|
||||||
|
最重要的部分是高级别的安全性。这个装置是封闭的,有上锁的们,以防止非法入侵。通过合适的供应商,DMC 可以进行定制,包括用于远程数字化管理的监控摄像头、传感器和监控技术。
|
||||||
|
|
||||||
|
随着越来越多的公司开始利用边缘计算的优势,他们必须利用安全解决方案的优势来保护他们的数据和边缘环境。
|
||||||
|
|
||||||
|
在 APC.com 上了解保护你的边缘计算环境的最佳方案。
|
||||||
|
|
||||||
|
--------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
via: https://www.networkworld.com/article/3388130/enhanced-security-at-the-edge.html#tk.rss_all
|
||||||
|
|
||||||
|
作者:[Anne Taylor][a]
|
||||||
|
选题:[lujun9972][b]
|
||||||
|
译者:[hopefully2333](https://github.com/hopefully2333)
|
||||||
|
校对:[校对者ID](https://github.com/校对者ID)
|
||||||
|
|
||||||
|
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创编译,[Linux中国](https://linux.cn/) 荣誉推出
|
||||||
|
|
||||||
|
[a]: https://www.networkworld.com/author/Anne-Taylor/
|
||||||
|
[b]: https://github.com/lujun9972
|
||||||
|
[1]: https://images.idgesg.net/images/article/2019/04/istock-1091707448-100793312-large.jpg
|
||||||
|
[2]: https://www.csoonline.com/article/3250144/6-ways-hackers-will-use-machine-learning-to-launch-attacks.html
|
||||||
|
[3]: https://www.marketwatch.com/press-release/edge-computing-market-2018-global-analysis-opportunities-and-forecast-to-2023-2018-08-20
|
||||||
|
[4]: https://www.networkworld.com/article/3224893/what-is-edge-computing-and-how-it-s-changing-the-network.html
|
||||||
|
[5]: https://www.youtube.com/watch?v=1NLk1cXEukQ
|
||||||
|
[6]: https://www.apc.com/us/en/solutions/business-solutions/edge-computing.jsp
|
Loading…
Reference in New Issue
Block a user