Taking a little off of David Goeckeler's full plate.
This alliance integrates cloud, network, and security companies with Infoblox’s software.
Security breaches are on the upswing, say 67 percent of enterprises surveyed.
Symantec says that Zscaler products infringe on seven of Symantec’s patents across its network security technologies.
Enterprises and service providers are evaluating SD-security solutions today.
Cleaning up after future Dirty COWs.
If you have been using Docker for some time, after the initial phases of building Dockerfiles and running a container here and there, the real work begins in building, deploying and operating multi-container applications in a production environment. Are you operationally ready to take your application to production? Docker Datacenter provides an integrated management framework for your Dockerized environment and applications and when coupled with clear strategies in approaching and resolving anomalies, IT ops teams can be assured in successfully operationalizing Docker.
Let’s use a sports metaphor to approach troubleshooting:
Whether or not you are sports fan, you can appreciate the importance of the planning out any task. This is no different than what you would do for your applications. Health checks are a great way to provide a deeper level of insight into how your application is performing. Since Docker 1.12 there is a new HEALTHCHECK directive. We can use this directive to signal to the Docker Engine whether or not the application is healthy.
There are a two ways to implement the HEALTHCHECK Continue reading
All current systems will be unaffected by the additions of SDN.
Welcome to Technology Short Take #74! The end of 2016 is nearly upon us, and it looks as if there will be only one more Technology Short Take before the end of the year. So, let’s get on with the content—time is short!
Nothing this time, but I’ll stay alert for content to include in the future.
As 2016 comes to a close, we are excited to have participated in a few of the Tech Field Day and inaugural Cloud Field Day events to share the Docker technology with the IT leaders and evangelists that Stephen Foskett and Tom Hollingsworth have cultivated into this fantastic group. The final event was Tech Field Day 12 hosting in Silicon Valley.
In case you missed the live stream, check out videos of the sessions here.
Session 1: Introduction to Docker and Docker Datacenter
Session 2: Securing the Software Supply Chain with Docker
Session 3: Docker for Windows Server and Windows Containers
Session 4: Docker for AWS and Azure
Session 5: Docker Networking Fabric
These are great overviews of the Docker technology applied to enterprise app pipelines, operations, and diverse operating systems and cloud environments. And most importantly, this was a great opportunity to meet some new people and get them excited about what we are excited about.
+1!!! #TFD12 #Docker https://t.co/Zdsuw1emlo
— Alex Galbraith (@alexgalbraith) November 17, 2016
Visit the Tech Field Day site to watch more videos from previous events, read articles written by delegates or view the conversation online.
New #Docker videos from #TFD12 @TechFieldDay w/ @SFoskett @GestaltIT Continue reading
The company has steadily reported revenue increases in the 20 percent range for the past three years.
Some of its customers include TransUnion, Starbucks, Hanes, and Hilton.
Big Monitoring Fabric now monitors clouds, VMs, and containers.
Initial best practices should include requirements to mandate that IoT devices be rendered unusable until users first change default usernames and passwords.This recommendation for changing default passwords is repeated many times. It comes from the way the Mirai worm exploits devices by using hardcoded/default passwords.
Assume, for a moment, that you have a configuration something like this—
Some host, A, is sending queries to, and receiving responses from, a database at C. An observer, B, has access to the packets on the wire, but neither the host nor the server. All the information between the host and the server is encrypted. There is nothing the observer, B, can learn about the information being carried between the client and the server? Given the traffic is encrypted, you might think… “not very much.”
A recent research paper published at CCS ’16 in Vienna argues the observer could know a lot more. In fact, based on just the patterns of traffic between the server and the client, given the database uses atomic operations and encrypts each record separately, it’s possible to infer the key used to query the database (not the cryptographic key). The paper can be found here. Specifically:
We then develop generic reconstruction attacks on any system supporting range queries where either access pattern or communication volume is leaked. These attacks are in a rather weak passive adversarial model, where the untrusted server knows only the underlying query distribution. In particular, to perform our attack Continue reading
This pure-play security company has been around for 28 years.
Having once granted the right to vote on equal terms, the State may not, by later arbitrary and disparate treatment, value one person's vote over that of another.Lessig cites the principle of "one person one vote", but in a new and novel way. He applies in an arbitrary way that devalues some of the votes that have already been cast. Specifically, he claims that votes cast for state electors should now be re-valued as direct votes for a candidate.