Archive

Category Archives for "Networking"

IBM’s Cleversafe storage platform is becoming a cloud service

If dispersing data among storage nodes can make it more secure and less prone to loss, wouldn’t spreading it across far-flung cloud data centers make it even more so?If so, IBM has the right idea with its Cloud Object Storage service, which uses SecureSlice object storage technology that it acquired by buying Cleversafe last year.The storage-as-a-service offering becomes generally available on Thursday. It lets enterprises use both on-premises gear and the IBM Cloud to store unstructured data objects, which can include things like videos, photos and genomic sequencing data.To read this article in full or to leave a comment, please click here

Microsoft snags Stephen Hawking as keynote speaker

Famed physicist and author Stephen Hawking will deliver a keynote address and a at Microsoft's Future Decoded conference on Nov. 1-2 in London. The conference will focus on doing digital business, exploiting the power of algorithms and data. Hawking will deliver the closing speech on the first day of the event and speak about artificial intelligence and how it might impact people. Hawking, who has a form of amyotrophic lateral sclerosis (ALS), uses a computer-based communication provided by Intel to speak, and actually does use both Microsoft Windows and Skype, according to his web page.To read this article in full or to leave a comment, please click here

Authenticated access to Kubernetes pods

When running a micro-services style application in a public cloud, one of the problems to solve is how to provide access to debug information. At Laserlike, we run our application stack on GKE. Most of the stack consists of golang Pods that run an HTTP listener that serves /debug and /metrics handlers.

For metrics scrapping we use prometheus; and grafana for visualization. Our grafana server is nodePort service behind a GCE Load Balancer which uses oauth2 based authentication for access. This still leaves a gap in terms of access to the pod debug information such as /debug/vars or /debug/pprof.

In order to address this gap, we created a simple HTTP proxy for kubernetes services and endpoints. We deploy this proxy behind a oauth2 authenticator which is then exposed via an external load balancer.

The service proxy uses the kubernetes client library in order to consume annotations on the service objects. For example, the following annotation, instructs the service proxy to expose the debug port of the endpoints of the specified service:

metadata:
  annotations:
    k8s-svc-proxy.local/endpoint-port: "8080"

The landing page on the proxy then displays a set of endpoints:

screen-shot-2016-10-12-at-6-06-37-pm

 


Authenticated access to Kubernetes pods

When running a micro-services style application in a public cloud, one of the problems to solve is how to provide access to debug information. At Laserlike, we run our application stack on GKE. Most of the stack consists of golang Pods that run an HTTP listener that serves /debug and /metrics handlers.

For metrics scrapping we use prometheus; and grafana for visualization. Our grafana server is nodePort service behind a GCE Load Balancer which uses oauth2 based authentication for access. This still leaves a gap in terms of access to the pod debug information such as /debug/vars or /debug/pprof.

In order to address this gap, we created a simple HTTP proxy for kubernetes services and endpoints. We deploy this proxy behind a oauth2 authenticator which is then exposed via an external load balancer.

The service proxy uses the kubernetes client library in order to consume annotations on the service objects. For example, the following annotation, instructs the service proxy to expose the debug port of the endpoints of the specified service:

metadata:
  annotations:
    k8s-svc-proxy.local/endpoint-port: "8080"

The landing page on the proxy then displays a set of endpoints:

screen-shot-2016-10-12-at-6-06-37-pm

 

Cisco fashions tactical ransomware defense

Cisco has taken a look at its security capabilities and those of its partners and come up with a playbook to address ransomware.Ransomware Defense can incorporate a range of Cisco products and address different levels of concern customers might have about ransomware, says Dan Hubbard, the CTO for Cisco’s security business.More on Network World: Cisco Talos: Spam at levels not seen since 2010To read this article in full or to leave a comment, please click here

Feds want to set a trail for future AI advances

Will future developments in the realm of Artificial Intelligence be like the wild west or a more controlled situation? The real answer is probably somewhere in the middle but the government at least would like to see more measured research and development.The White House today issued report on future directions for AI called Preparing for the Future of Artificial Intelligence. In it, the report comes to several conclusions – some obvious and some perhaps less so. For example, it accepts that AI technologies will continue to grow in sophistication and ubiquity, thanks to AI R&D investments by government and industry.To read this article in full or to leave a comment, please click here

Feds want to set a trail for future AI advances

Will future developments in the realm of Artificial Intelligence be like the wild west or a more controlled situation? The real answer is probably somewhere in the middle but the government at least would like to see more measured research and development.The White House today issued report on future directions for AI called Preparing for the Future of Artificial Intelligence. In it, the report comes to several conclusions – some obvious and some perhaps less so. For example, it accepts that AI technologies will continue to grow in sophistication and ubiquity, thanks to AI R&D investments by government and industry.To read this article in full or to leave a comment, please click here

Putin denies any Russian interest in alleged US election hacking

Russian President Vladimir Putin is rejecting claims that his country is behind any U.S. election-related hacking, saying "hysteria" is fueling the allegations."This has nothing to do with Russia's interests," he said on Wednesday at an investors conference in Moscow.Putin made the comments after the U.S. publicly blamed the Russian government last Friday for hacking U.S. officials and political groups in an effort to influence the upcoming presidential election.Stolen documents from those hacks, including sensitive emails, have been leaking online over the past months, potentially hurting the election chances of Democratic presidential candidate Hillary Clinton.To read this article in full or to leave a comment, please click here

Putin denies any Russian interest in alleged US election hacking

Russian President Vladimir Putin is rejecting claims that his country is behind any U.S. election-related hacking, saying "hysteria" is fueling the allegations."This has nothing to do with Russia's interests," he said on Wednesday at an investors conference in Moscow.Putin made the comments after the U.S. publicly blamed the Russian government last Friday for hacking U.S. officials and political groups in an effort to influence the upcoming presidential election.Stolen documents from those hacks, including sensitive emails, have been leaking online over the past months, potentially hurting the election chances of Democratic presidential candidate Hillary Clinton.To read this article in full or to leave a comment, please click here

Microsoft expands HoloLens in six new global markets

Microsoft announced plans to offer its well-hyped HoloLens virtual reality headset in six new markets outside North America after what Microsoft calls "tremendous excitement and interest from developers and commercial customers and partners around the globe."Alex Kipman, technical fellow in the Windows and Devices group, made the announcement in a blog post that the company has opened pre-orders today in the United Kingdom, Ireland, France and Germany, as well as in Australia and New Zealand. The headset will begin shipping in those markets in late November. Interest in augmented reality (AR) and VR products has exploded this year thanks to the shipments of the Oculus Rift and HTC Vive headsets, among many others. Microsoft is late to the market, but the buzz on HoloLens has been enormous. IDC predicts global revenues for the mixed reality (MR) market will grow from $5.2 billion this year to $162 billion in 2020.To read this article in full or to leave a comment, please click here

Reality, Virtually sets record for largest AR/VR hackathon

More than 400 participants, mentors, workshop speakers, judges and sponsors convened at the Reality, Virtually AR/VR hackathon sponsored by the MIT Media Lab last weekend, setting a hackathon record with 75 open-source project submissions.The winners were KidCity VR and Waypoint Rx.KidCity VR, built by Anish Dhesikan, Jacqueline Assar, Theji Jayaratne, Emily Pascual and Kachina Stude, is an HTC Vive educational application for children and parents to play together in virtual reality (VR). The team won $5,000 from Samsung’s Global Innovation Center for the best VR applicationTo read this article in full or to leave a comment, please click here

The Truth About Cybersecurity Certifications

It’s a common trait amongst cybersecurity professionals.  When they meet each other, discuss their qualifications with prospective employers, or print their business cards, there is often an alphabet soup of initials by their names, specifying the many certifications they’ve achieved.Now some of these certifications are certainly worthwhile but over the last few years, the entire industry has gone gaga with dozens of new cybersecurity certifications offered by for-profit organizations.  This has led to a marketing push with a consistent message that more certifications equate to more money, knowledge, and opportunities for cybersecurity professionals.To read this article in full or to leave a comment, please click here

The truth about cybersecurity certifications

It’s a common trait amongst cybersecurity professionals. When they meet each other, discuss their qualifications with prospective employers, or print their business cards, there is often an alphabet soup of initials by their names, specifying the many certifications they’ve achieved.Now, some of these certifications are certainly worthwhile, but over the last few years, the entire industry has gone gaga with dozens of new cybersecurity certifications offered by for-profit organizations. This has led to a marketing push with a consistent message that more certifications equate to more money, knowledge and opportunities for cybersecurity professionals.To read this article in full or to leave a comment, please click here

The Truth About Cybersecurity Certifications

It’s a common trait amongst cybersecurity professionals.  When they meet each other, discuss their qualifications with prospective employers, or print their business cards, there is often an alphabet soup of initials by their names, specifying the many certifications they’ve achieved.Now some of these certifications are certainly worthwhile but over the last few years, the entire industry has gone gaga with dozens of new cybersecurity certifications offered by for-profit organizations.  This has led to a marketing push with a consistent message that more certifications equate to more money, knowledge, and opportunities for cybersecurity professionals.To read this article in full or to leave a comment, please click here

The ultimate data center throne

What happens when fans of the Game of Thrones TV series work at a company that makes power equipment?This: Eaton The Eaton ePDU G3 Throne Behold the Eaton ePDU G3 Throne. Compare it to the original Iron throne, pictured here. Eaton commissioned a North Carolina artists to design the chair and then workers constructed it out of 35 rack power distribution unit. It has a total of 821 outlet receptacles. Now that’s a throne with some power capacity. Check out a slideshow of how the Throne was built here. To read this article in full or to leave a comment, please click here

The ultimate data center throne

What happens when fans of the Game of Thrones TV series work at a company that makes power equipment?This: Eaton The Eaton ePDU G3 Throne Behold the Eaton ePDU G3 Throne. Compare it to the original Iron throne, pictured here. Eaton commissioned a North Carolina artists to design the chair and then workers constructed it out of 35 rack power distribution unit. It has a total of 821 outlet receptacles. Now that’s a throne with some power capacity. Check out a slideshow of how the Throne was built here. To read this article in full or to leave a comment, please click here