Weekly Roundup: Top 5 Docker Articles for this week

Here’s the buzz from this week we think you should know about! We shared a preview of Microsoft’s Docker container monitoring, reviewed the Docker Engine security feature set, and delivered a quick tutorial for getting 1.12.1 running on Raspberry Pi 3. As we begin a new week, let’s recap our top five most-read stories for the week of August 21, 2016:

 

43c0a3aa-5abd-4ec8-ae52-80a3cb61d837.jpg
 

  • Docker security: the Docker Engine has strong security default for all containerized applications.
  • Securing the Enterprise: how Docker’s security features can be used to provide active and continuous security for a software supply chain.
  • Container Monitoring: Microsoft previews open Docker container monitoring. Aimed at users who want a simplified view of containers’ usage, to diagnose issues whether containers are running in the cloud or on-premises by Sam Dean.  

Weekly roundup: Top 5 #Docker stories of the week
Click To Tweet


The post Weekly Continue reading

Debunking the most common big data backup and recovery myths

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.Big data has become a priority for most organizations, which are increasingly aware of the central role data can play in their success.  But firms continue to struggle with how to best protect, manage and analyze data within today's modern architectures. Not doing so can result in extended downtime and potential data loss costing the organization millions of dollars.Unlike traditional data platforms (Oracle, SQL*Server, etc.), which are managed by IT professionals, big data platforms (Hadoop, Cassandra, Couchbase, HPE Vertica, etc.) are often managed by engineers or DevOps groups and there are some common misconceptions around big data backup and recovery that need to be cleared up.  To read this article in full or to leave a comment, please click here

Fake resumes, jobs, lead to real guilty plea in H-1B fraud case

A Virginia couple has pled guilty to H-1B fraud charges in a scheme that made them millions, the U.S. Department of Justice announced Thursday.A married couple -- Raju Kosuri, 44, and Smriti Jharia, 45 -- created a visa-for-sale system involving some 900 H-1B visa petitions over a multi-year period, according to the U.S. attorney in the Eastern District of Virginia.Court records detail an elaborate operation that required a series of fictions to pull off.Through a series of shell companies that purported to provide IT staffing and services to corporate clients, the defendants H-1B visa petitions on behalf of workers. These workers had to pay the visa fees, legal and administrative costs -- as much as $4,000 -- in violation of the visa program's rules.To read this article in full or to leave a comment, please click here

Got big data? Check out these 100 best practices for keeping it secure

Big data is best known for its volume, variety, and velocity -- collectively referred to as the "3 Vs" -- and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud Security Alliance on Friday released a new report offering 100 best practices.As its name would suggest, the CSA focuses on promoting the use of security best practices within the cloud computing world; corporate members include VMware, Microsoft, AWS, and Red Hat. In an earlier report, the CSA broke down big data security risks into a set of the top 10 major challenges. Now, for each of those, it presents 10 best practices designed to help enterprises keep their information safe.To read this article in full or to leave a comment, please click here

Got big data? Check out these 100 best practices for keeping it secure

Big data is best known for its volume, variety, and velocity -- collectively referred to as the "3 Vs" -- and all three of those traits make security an elusive goal. Targeting companies grappling with that challenge, the Cloud Security Alliance on Friday released a new report offering 100 best practices.As its name would suggest, the CSA focuses on promoting the use of security best practices within the cloud computing world; corporate members include VMware, Microsoft, AWS, and Red Hat. In an earlier report, the CSA broke down big data security risks into a set of the top 10 major challenges. Now, for each of those, it presents 10 best practices designed to help enterprises keep their information safe.To read this article in full or to leave a comment, please click here

BrandPost: Bringing flexibility to the WAN

MPLS (multi-protocol label switching) VPNs (Virtual Private Network) have long been recognized as a preferred option for dedicated, high performance connectivity over a wide area network (WAN), such as linking data centers or branch offices that require high volume and reliability. Often these MPLS VPNs would use a broadband internet connection, either DSL, Cable or LTE, as a backup option.  It has become more common recently to leverage that broadband for internet offload.  In fact, the broadband internet is also being used as the primary VPN link for many locations and is even being combined with single user remote access options.  Regardless of the use case for the broadband VPN, it uses the IPSec protocol to encrypt the VPN traffic to keep it secure. To read this article in full or to leave a comment, please click here

Distil Networks uses device fingerprints to detect malicious web bots

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Who's that coming to your website? Is it friend or foe? Is it a customer wanting to buy your products, or someone or something wanting to steal your web content? Is it a community member that wants to post a relevant comment, or a spammer intent on planting junk links and content in your open comments section? Is it a real person clicking on an ad, or a web bot driving up fraudulent clicks?Web applications are increasingly being subjected to automated threats such as click fraud, comment spam, content scraping, abusive account creation, and more. These and other illicit or unwanted activities are described in detail in the OWASP Automated Threat Handbook for Web Applications.To read this article in full or to leave a comment, please click here

Distil Networks uses device fingerprints to detect malicious web bots

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Who's that coming to your website? Is it friend or foe? Is it a customer wanting to buy your products, or someone or something wanting to steal your web content? Is it a community member that wants to post a relevant comment, or a spammer intent on planting junk links and content in your open comments section? Is it a real person clicking on an ad, or a web bot driving up fraudulent clicks?Web applications are increasingly being subjected to automated threats such as click fraud, comment spam, content scraping, abusive account creation, and more. These and other illicit or unwanted activities are described in detail in the OWASP Automated Threat Handbook for Web Applications.To read this article in full or to leave a comment, please click here

5 security practices hackers say make their lives harder

Whether they identify as white hats, black hats or something in-between, a majority of hackers agree that no password is safe from them — or the government for that matter. Regardless of where they sit with respect to the law, hackers mostly agree that five key security measures can make it a lot harder to penetrate enterprise networks.At the Black Hat USA 2016 conference in Las Vegas earlier this month, Thycotic, a specialist in privileged account management (PAM) solutions, surveyed more than 250 attendees who self-identified as hackers (respondents remained anonymous). Eighty-four percent of respondents identified as white hat hackers — security researchers that help organizations uncover and remediate vulnerabilities. And 15 percent identified as black hat hackers, who penetrate networks with criminal intent.To read this article in full or to leave a comment, please click here

5 security practices hackers say make their lives harder

Whether they identify as white hats, black hats or something in-between, a majority of hackers agree that no password is safe from them — or the government for that matter. Regardless of where they sit with respect to the law, hackers mostly agree that five key security measures can make it a lot harder to penetrate enterprise networks.At the Black Hat USA 2016 conference in Las Vegas earlier this month, Thycotic, a specialist in privileged account management (PAM) solutions, surveyed more than 250 attendees who self-identified as hackers (respondents remained anonymous). Eighty-four percent of respondents identified as white hat hackers — security researchers that help organizations uncover and remediate vulnerabilities. And 15 percent identified as black hat hackers, who penetrate networks with criminal intent.To read this article in full or to leave a comment, please click here

Autonomic offerings set to transform IT, but outsourcing customers beware

Wipro has Holmes, Tata Consultancy Services introduced Ignio, Syntel is selling Synbots. HCL Systems calls its Dry Ice. And Infosys is promoting Mana. With traditional IT outsourcing revenue streams at risk to automation, a number of IT service providers are responding by developing their own homegrown systems which are designed to perform routine tasks and operations otherwise performed by humans.The good news is that CIOs now have a number of automation options to choose from. The bad news? The array of choices can be confusing and the unproven systems can be risky. It may not be immediately clear how these new automation options from traditional IT service providers differ from the solutions of the more well-established robotic systems companies like IPSoft or BluePrism.To read this article in full or to leave a comment, please click here

Cloud player Rackspace goes private in $4.3B deal

A private equity firm has signed an agreement to buy major cloud player Rackspace for $4.3 billion.Rackspace announced today that Apollo Global Management, a U.S.-based investment manager, will acquire the company in a deal that will give Rackspace shareholders $32 per share."Our board, with the assistance of independent advisors, determined that this transaction, upon closing, will deliver immediate, significant and certain cash value to our stockholders," said Graham Weston, co-founder and chairman of Rackspace, in a statement. "We are also excited that this transaction will provide Rackspace with more flexibility to manage the business for long-term growth and enhance our product offerings."To read this article in full or to leave a comment, please click here

iPhone 7’s headphone jack removal draws critique from Woz

The big rumor surrounding Apple’s iPhone 7 is that it will completely abandon the 3.5mm headphone jack, a familiar port that has been around in one form or another for decades on end. Needless to say, Apple’s decision won’t be met without controversy. While alternatives like lightning-based audio and Bluetooth do exist, getting rid of a port that’s ubiquitous and as exceedingly reliable as the headphone jack is undoubtedly a risky move.Recently, Apple co-founder Steve Wozniak chimed in on the iPhone 7 and articulated that Apple may be going down the wrong path. During an interview with the Australian Financial Review, Woz said that Bluetooth technology isn't yet suitable as a replacement to a wired headphone solution.To read this article in full or to leave a comment, please click here

Docker Labs Repo Continues to Grow

Back in May, we launched the Docker Labs repo in an effort to provide the community with a central place to both learn from and contribute to Docker tutorials. We now have 16 separate labs and tutorials, with 16 different contributors, both from Docker and from the community. And it all started with a birthday party.

Back in March, Docker celebrated it’s third birthday with more than 125 events around the world to teach new users how to use Docker. The tutorial was very popular, and we realized people would like this kind of content. So we migrated it to the labs repository as a beginner tutorial. Since then, we’ve added tutorials on using .NET and Windows containers, Docker for Java developers, our DockerCon labs and much more.

 

 

Today we wanted to call out a new series of tutorials on developer tools. We’re starting with three tutorials for Java Developers on in-container debugging strategies. Docker for Mac and Docker for Windows introduced improved volume management, which allows you to debug live in a container while using your favorite IDE.

We try our best to continuously update these tutorials and add new ones but definitely welcome external Continue reading