DockerCon Hallway Track Is Back – Schedule One Today

 

 

The Hallway Track is coming back to DockerCon Europe in Barcelona. DockerCon Hallway Track is an innovative platform that helps you find like-minded people to meet one-on-one and schedule knowledge sharing conversations based on shared topics of interest. We’ve partnered with e180 to provide the next level of conference attendee networking. Together, we believe that some of the most valuable conversations can come from hallway encounters, and that we can unlock greatness by learning from each other. After the success at past DockerCons, we’re happy to grow this idea further in Barcelona.

DockerCon is all about learning new things and connecting with the community. The Hallway Track will help you meet and share knowledge with Docker Staff, other attendees, Speakers, and Docker Captains through structured networking.

To participate in Hallway Tracks:

  1. Explore the Market – where all participants post the knowledge offers of topics they are willing to share, or questions they want to brainstorm.
  2. Pick a topic from the list (and/or create your own offer or question).
  3. Schedule your Hallway Tracks and meet in person at the Hallway Track Lounge!

If you are interested in attending DockerCon please register soon! If you are already registered and want Continue reading

Meeting Four of the Canadian Multistakeholder Process: Enhancing IoT Security

The Canadian Multistakeholder Process: Enhancing IoT Security meeting takes place in Ottawa today, November 20th, from 1PM-5PM EST.

This is the fourth session in a year-long series. The meetings have been convened to develop recommendations for a set of norms/policy to secure the Internet of Things in Canada and are a joint initiative of The Internet Society; Innovation, Science and Economic Development; the Canadian Internet Registration Authority; CANARIE; and CIPPIC.

Today’s session will build on the progress of the working groups, which were established during the second meeting: Consumer Education & Awareness, Labeling, and Network Resiliency. (Read the third multistakeholder meeting report.)

Register for the event or watch the livestream!

The post Meeting Four of the Canadian Multistakeholder Process: Enhancing IoT Security appeared first on Internet Society.

BiB 058: Build Workflows Around Unstructured Data With Igneous

I had a briefing with Igneous earlier this month. Who’s Igneous? Igneous is focused on providing “as-a-service” solutions for unstructured data, including storage, backup & archival, global metadata indexing, and data workflow management. In this briefing, Igneous discussed recent announcements around their DataProtect, DataDiscover, and DataFlow services

The post BiB 058: Build Workflows Around Unstructured Data With Igneous appeared first on Packet Pushers.

BrandPost: Deliver an Exceptional Experience with Aruba 802.11ax

The all-electric powertrain Tesla model S provides a ludicrous acceleration. The car’s most performance-centric model, the P100D, uses its 100-kWh battery and two electric motors to achieve the highest speed—0-60 mph in 2.5 seconds, 762 horsepower, and 687 pound-feet of torque. It can comfortably seat five people with a sizable trunk while making the snowy drive to the mountains safe and comfortable. The sheer power, beauty, and luxury of a Tesla has been a recurring theme as we launch our first series of 802.11ax access points at Aruba.Introducing the latest 802.11ax access pointsPowerful, reliable, and high capacity are what you get from Aruba’s new 510 series 802.11ax (now known as Wi-Fi 6) campus access points. As more mobile and IoT devices rely on wireless access, networks have to accommodate a broad mix of devices, applications, and services. And that is even more challenging, especially now that we have very low tolerance for a bad user experience. Any voice delay or video jitter is no longer acceptable. So, before we jump into the 510 series, let’s see what 802.11ax is all about.To read this article in full, please click here

Interview with Kevin Olivieri, Digital Content and Social Media Manager at Juniper Networks

In this inverview, I sit down with Kevin Olivieri, Digital Content and Social Media Manager at Juniper Networks. We discuss social media trends, thoughts around building out a social media and branding strategy, analysis of different social media platforms and analytics tools, and the democratization of video content. To top it off, we even get …

CAA Records and Site Security

The little green lock—now being deprecated by some browsers—provides some level of comfort for many users when entering personal information on a web site. You probably know the little green lock means the traffic between the host and the site is encrypted, but you might not stop to ask the fundamental question of all cryptography: using what key? The quality of an encrypted connection is no better than the quality and source of the keys used to encrypt the data carried across the connection. If the key is compromised, then entire encrypted session is useless.

So where does the key pair come from to encrypt the session between a host and a server? The session key used for symmetric cryptography on each session is obtained using the public key of the server (thus through asymmetric cryptography). How is the public key of the server obtained by the host? Here is where things get interesting.

The older way of doing things was for a list of domains who were trusted to provide a public key for a particular server was carried in HTTP. The host would open a session with a server, which would then provide a list of domains where Continue reading

The Week in Internet News: The Bottom Line of IoT Security

The cost of IoT breaches: Companies struggling with Internet of things security are seeing a monetary impact, says WeLiveSecurity.com. About a quarter of companies struggling with IoT security have reported losses of at least US $34 million in the last two years, according to a recent survey.

International cyber deal: French President Emmanuel Macron called on other nations to join his country in an international pact against malicious activity online, reports ITworldCanada.com. Nations signing the Paris Call for Trust and Security in Cyberspace would agree to “condemn malicious cyber activities in peacetime, notably the ones threatening or resulting in significant, indiscriminate or systemic harm to individuals and critical infrastructure and welcome calls for their improved protection.” The pact, advanced at the Internet Governance Forum in Paris, was signed by 51 other countries, 224 companies, and 92 non-profits and advocacy groups. But the U.S., Russia, and China declined, ZDNet notes.

Booted from social media: In a three-week period, Chinese censors have deleted nearly 10,000 social media accounts operated by the country’s residents, reports the South China Morning Post via Yahoo News. Accounts shut down include those of a talk show celebrity and an entertainment blogger. The Continue reading

AMD’s road to the data center and HPC isn’t as long as you think

Last week, AMD announced it was ready to take on Nvidia in the GPU space for the data center, a market the company had basically ignored for the last several years in its struggle just to survive. But now, buoyed by its new CPU business, AMD is ready to take the fight to Nvidia.It would seem a herculean task. Or perhaps Quixotic. Nvidia has spent the past decade tilling the soil for artificial intelligence (AI) and high-performance computing (HPC), but it turns out AMD has a few things in its favor.[ Learn who's developing quantum computers. ] For starters, it has a CPU and GPU business, and it can tie them together in a way Nvidia and Intel cannot. Yes, Intel has a GPU product line, but they are integrated with their consumer CPUs and not on the Xeons. And Nvidia has no x86 line.To read this article in full, please click here

AMD’s road to the data center and HPC isn’t as long as you think

Last week, AMD announced it was ready to take on Nvidia in the GPU space for the data center, a market the company had basically ignored for the last several years in its struggle just to survive. But now, buoyed by its new CPU business, AMD is ready to take the fight to Nvidia.It would seem a herculean task. Or perhaps Quixotic. Nvidia has spent the past decade tilling the soil for artificial intelligence (AI) and high-performance computing (HPC0, but it turns out AMD has a few things in its favor.[ Learn who's developing quantum computers. ] For starters, it has a CPU and GPU business, and it can tie them together in a way Nvidia and Intel cannot. Yes, Intel has a GPU product line, but they are integrated with their consumer CPUs and not on the Xeons. And Nvidia has no x86 line.To read this article in full, please click here

Tools: MacOS Mojave Dark Mode with Safari in Reader mode is blissful

I don’t always work in Dark Mode on Mojave but I’m is liking a lot more than I expected. I guess I’m using it about 70% of the time. In particular, I use the Reader feature from Safari to block out the distractions and other bits of branding ‘chrome’ that make it difficult to read. […]

The post Tools: MacOS Mojave Dark Mode with Safari in Reader mode is blissful appeared first on EtherealMind.