IoT vendors talk open buildings, black hats and a jam conspiracy

Welcome to what we’re hoping is the first in a long string of regular updates from the world of IoT; everything from security to platform news will be fair game, and the aim is to help you be better grounded in the rapidly expanding Internet of Things space.Schneider’s building open thingsSchneider Electric, the Andover, Mass.,-based building-infrastructure manufacturer, recently rolled out a new open framework for IoT implementations, dubbing the product EcoStruxure Building.[ Check out our corporate guide to addressing IoT security. ] It’s a software platform that makes it easy for sensors and controllers to talk to each other, even in complicated, large-scale building projects where there could be a lot of both types of devices.To read this article in full, please click here

BrandPost: How IoT is Impacting DNS, and Why It’s Scaring Both CISOs and Networking Pros

What impact is the internet of things having on enterprise networks and the way we use DNS? For many network and security pros today, the answer is “no clue,” due to the lack of source address validation combined with the explosive growth of IoT, expected to hit more than 75 billion connected devices by 2025[2].From embedded sensors laced with unknown code to devices that can exfiltrate data from otherwise secure networks, IoT devices are already leading a new wave of cyberthreats, from sensors designed with little or no thought towards security to network connectivity relying on default passwords, that can lead to cameras that query SQL databases. This blog post looks at some of the dangers with a view to how DNS can help stop them before they do harm.To read this article in full, please click here

Until we meet again…

As I wrap up my tenure at the the helm of the Internet Society on September 1,  I want to thank each and all of you for your engagement, support and friendship.  The last five years have been exhilarating—getting to know you, learning so much from you and acting together — to make the Internet better.

You have made a critical difference in strengthening and growing the Internet Society. The organization is now over 100 staff strong, serving on every continent but Antarctica.  We have grown to 126 Chapters in 108 countries, with 8 global Special Interest Groups (SIGs). The Online Trust Alliance (OTA) has joined our organizational membership and we have new and vibrant partnerships with civil society and human rights organizations. The IETF has adopted a new structure to better serve its administration. Our
youth outreach and our engagement with the Internet Hall of Fame honorees and ISOC alumni have allowed us to look to the future as we gain wisdom from those who shaped the Internet and the Internet Society. More policy makers and governmental organizations look to us for our reports, research and expertise allowing for increased dialogue and collaboration at a time when it is Continue reading

Populating New Namespaces Using Heptio Ark

Heptio Ark is a tool designed to backup and restore Kubernetes cluster resources and persistent volumes. As such, it enables users to do a bunch of very useful things like copy cluster resources across cloud providers or replicate environments for development, staging, testing, QA, etc. In this post, I’ll share a slightly different use case for Ark: populating resources into new Kubernetes namespaces.

Kubernetes namespaces, if you’re not familiar, are a way to scope resource names and provide a way to divide cluster resources between multiple resources via resource quotas (see the Kubernetes documentation on namespaces for more details). As such, when you create a new Kubernetes namespace, it’s empty. However, you may have a need or desire to have certain things present in every namespace within a cluster—for example, perhaps you have a set of ExternalName Services that point to resources outside the cluster to make it easier for applications and developers to integrate with external resources. Maybe you have a ConfigMap that developers can use to configure their applications. It could be that you want a particular secret to be present in all new namespaces so that developers don’t need to worry about managing certain credentials. In such Continue reading

What do you believe now that you didn’t five years ago? Centralized wins. Decentralized loses.

 

 

Decentralized systems will continue to lose to centralized systems until there's a driver requiring decentralization to deliver a clearly superior consumer experience. Unfortunately, that may not happen for quite some time.

I say unfortunately because ten years ago, even five years ago, I still believed decentralization would win. Why? For all the idealistic technical reasons I laid out long ago in Building Super Scalable Systems: Blade Runner Meets Autonomic Computing In The Ambient Cloud.

While the internet and the web are inherently decentralized, mainstream applications built on top do not have to be. Typically, applications today—Facebook, Salesforce, Google, Spotify, etc.—are all centralized.

That wasn't always the case. In the early days of the internet the internet was protocol driven, decentralized, and often distributed—FTP (1971), Telnet (<1973), FINGER (1971/1977),  TCP/IP (1974), UUCP (late 1970s) NNTP (1986), DNS (1983), SMTP (1982), IRC(1988), HTTP(1990), Tor (mid-1990s), Napster(1999), and XMPP(1999).

We do have new decentalized services: Bitcoin(2009), Minecraft(2009), Ethereum(2104), IPFS(2015), Mastadon(2016), and PeerTube(2018). We're still waiting on Pied Piper to deliver the decentralized internet

On an evolutionary timeline decentralized systems are neanderthals; centralized systems are the humans. Neanderthals came first. Humans may have interbred with neanderthals, humans may have even killed off the neanderthals, but Continue reading

Learn More About Docker at VMworld 2018

The Docker team will be at VMworld in Las Vegas next week (Aug. 26-30) to interact with IT leaders and virtualization administrators and share the latest on Docker Enterprise – the leading enterprise-ready container platform that supports your choice of technology stacks, application types, operating systems and infrastructure. Register today to get a guided tour of Docker Enterprise.

 

Secure Your Legacy, Protect Your Future – See How Docker Works for Windows Server Migrations

Come by Booth #2513 near the Mobility Zone to learn more about container platforms and how Docker Enterprise is the only solution that can help IT migrate applications from Windows Server 2008 to Windows Server 2016 – without recoding!

Windows Server 2008 is approaching End of Support which means security and maintenance patches will be discontinued. Don’t risk your business critical apps with an unpatched and unsupported operating system. Discover the simplest way to move off of Windows Server 2008 (and even Windows Server 2003) with a proven methodology using Docker Enterprise and  purpose-built containerization. With Docker, you can:

  • Eliminate legacy app security risks and improve reliability
  • Make your apps portable and cloud-ready
  • Cut costs by 50% from increased server consolidation and operational efficiencies

Stop by, talk to our Continue reading