New Approach to Innovation – A Collaborative Ecosystem
Data is one of the most important resources for the economy in the present age. And what’s more, AI is now bringing new value to society at a significant pace.
Message from Chairperson
On the opening of Rakuten Technology Conference 2017
This year happily marks the 11th anniversary of Rakuten Technology Conference which we have been hosting since 2007 thanks to your continued support. This conference is planned and operated by Rakuten engineers each year with a theme relative to innovation trends.
This blog explains the details of Ingress, which is one of the ways to expose Pods running in K8S cluster to outside the world, what is Ingress and it’s fundamental concept and major features.
By the end, you will learn what you benefit from Ingress.
Rakuten’s Journey to HTTPS – Lessons So Far
Rakuten group is currently migrating its services to HTTPS; any service that uses HTTP is being migrated to HTTPS. This includes not just websites but also our mobile applications and other services we offer, for example ad and content services. This work is still ongoing, however globally over 80% of Rakuten’s services had completed their migration by March 2017. We wanted to share our lessons for managing such a large scale migration.
Hello, World, this is Yu-Lu “Chris” Liu, I am the Office Manager of the IT Security Engineering Office, the technical security team at Rakuten, Inc. (hereby Rakuten). I am also a member of Rakuten-CERT. I would like to share about our on-going activities with universities. We believe we are nourishing the next generation of security pioneers, and contributing to society while protecting Rakuten’s users.
In recent times, as our reliance on technology increases, so does the threat of online cybercrimes.Online Criminals are dedicated to stealing your online personal information and identification. Important details like user IDs, passwords, credit card or bank information as well as personal information are all at risk of theft from cybercriminals. These online thieves utilize phishing emails, or fraudulent websites as their methods of attack. Whether through email or the web, cybercriminals are sophisticated in making their attacks appear as if they are legitimate websites or messages. The even utilize phishing email schemes, to appear as though they are sent from Rakuten. One real-world example of this is an email that appeared to be sent from Rakuten with the email subject “Congratulations”. These cybercriminals attempted to lure the user with a promise of a prize by inputting their personal information into a fraudulent website. These falsified websites are artistically deceitful as they are often meticulously modeled after Rakuten, utilizing Rakuten’s logo, merchandise photos and descriptions taken directly from one of Rakuten’s services. These websites even feature an e-commerce shopping basket, helping to craft the illusion they are a legitimate service. Of course, no order will ever actually ship. This occurrence becoming more and more common has made all users question the safety and security of online services.