BrandPost: Is Your IT Environment a Barrier to the Cloud?

The promise of cloud services as the means of delivering applications and services is quite attractive. However, in the rush to adopt cloud services, a few myths have been created that can lead to bad decisions and botched implementations. One myth that has created more problems than most is the belief that, by using the cloud, a company doesn’t have to worry about its on-premises IT infrastructure or the support systems for it.The assertion that cloud service providers “handle everything” is not really true. They provide access to the services as long as your equipment can get you to their data center. While this may reduce the load on your servers and potentially your storage hardware, in many instances using the cloud creates a need for new networking hardware to support much higher wide-area network (WAN) utilization both in terms of number of users and the amount of data traffic. When companies want to use multiple network carriers for cost, reliability, and performance issues, the result may be more network hardware than initially expected.To read this article in full, please click here

Space Invaders – Consumer Grade IoT in the Enterprise

I used to love the old Space Invaders arcade game – waves of enemy attackers came in faster and faster while you tried to defend your base. With experience you could learn their tactics and get pretty adept at stopping them. For today’s enterprise IT staff, consumer-grade IoT devices must certainly feel like those space invaders of old.

There’s good news and bad news about these new creatures in the enterprise. The good news is that they don’t start with mal-intent and can be profiled well enough to confine their activity. The bad news is that they’re coming in waves, often slipping under the radar, and the consequences can be much bigger than getting blasted and placing a few more quarters in the slot.

To help enterprise IT staff deal with this new wave we released “The Enterprise IoT Security Checklist: Best Practices for Securing Consumer-Grade IoT in the Enterprise” today, outlining best practices for securing consumer-grade IoT in the enterprise. The Checklist includes ten actions, based roughly in chronological order from purchase, through installation, to ongoing support, meant to raise awareness of the common vulnerabilities presented by these devices and how to address them.

Many of these Continue reading

How to do math on the Linux command line

Can you do math on the Linux command line? You sure can! In fact, there are quite a few commands that can make the process easy and some you might even find interesting. Let's look at some very useful commands and syntax for command line math.expr First and probably the most obvious and commonly used command for performing mathematical calculations on the command line is the expr (expression) command. It can manage addition, subtraction, division, and multiplication. It can also be used to compare numbers. Here are some examples:Incrementing a variable $ count=0 $ count=`expr $count + 1` $ echo $count 1 Performing a simple calculations $ expr 11 + 123 134 $ expr 134 / 11 12 $ expr 134 - 11 123 $ expr 11 * 123 expr: syntax error <== oops! $ expr 11 \* 123 1353 $ expr 20 % 3 2 Notice that you have to use a \ character in front of * to avoid the syntax error. The % operator is for modulo calculations.To read this article in full, please click here

BrandPost: Adaptive Network Webinar Series

Check out our webinar series – hear from industry analysts to learn about the Adaptive Network and gain insights on network transformation at the speed of business.Live Webinar: Harness the Power of Automation through Intent-Based Policy Date / Time: Tuesday, April 17, 2018, 11:00 a.m. New York/ 4:00 p.m. LondonOverview:Network providers are struggling to keep pace with escalating demand. Rapid traffic increases and the threat of network performance failures have put a premium on automation. But it's important for providers to maintain control of their networks as they automate. How can an automation platform help remove obstacles and still give the control providers need to accelerate the business?To read this article in full, please click here

New marketplace for FPGA custom apps launches

A French company called Accelize has launched AccelStore, an app store specifically around providing custom programmed applications for FPGA accelerators.FPGAs are dedicated processors known for doing two things: very fast processing, and being reprogrammable. CPUs have to be general-purpose processors that run an OS, but an FPGA has the luxury of doing a dedicated task, so the architecture is different.The problem is that while FPGAs are reprogrammable to do new, specific tasks, they aren’t that easy to program. In fact, it’s often pretty hard to do. That’s Accelize’s sales pitch. Rather than writing the code to reprogram the FPGAs in your servers, it has the templates for you.To read this article in full, please click here

New marketplace for FPGA custom apps launches

A French company called Accelize has launched AccelStore, an app store specifically around providing custom programmed applications for FPGA accelerators.FPGAs are dedicated processors known for doing two things: very fast processing, and being reprogrammable. CPUs have to be general-purpose processors that run an OS, but an FPGA has the luxury of doing a dedicated task, so the architecture is different.The problem is that while FPGAs are reprogrammable to do new, specific tasks, they aren’t that easy to program. In fact, it’s often pretty hard to do. That’s Accelize’s sales pitch. Rather than writing the code to reprogram the FPGAs in your servers, it has the templates for you.To read this article in full, please click here

Running Docker on Docker Enterprise Edition 2.0

Did you know that Docker Hub has millions of users pulling roughly one billion container images every two weeks — and it all runs on Docker Enterprise Edition?

Docker Enterprise Edition 2.0 may now be available to commercial customers who require an enterprise-ready container platform, but the Docker operations team has already been using it in production for some time. As part of our commitment to delivering high quality software that is ready to support your mission-critical applications, we leverage Docker Enterprise Edition 2.0 as the platform behind Docker Hub and our other SaaS services, Docker Store, and Docker Cloud.

Some organizations call it “dogfooding;” some call it “drinking your own champagne.” Whatever you call it, the importance of this program is to be fully invested in our own container platform and share in the same operational experiences as our customers.

Our Migration to Kubernetes

One of the main features of this latest release is the integration of Kubernetes so we wanted to make sure we are leveraging this capability. Working closely with our SaaS team leads, we chose a few services to migrate to Kubernetes while keeping others on Swarm.

For people already running Docker EE, Continue reading

Announcing Docker Enterprise Edition 2.0

 

We are excited to announce Docker Enterprise Edition 2.0 – a significant leap forward in our enterprise-ready container platform. Docker Enterprise Edition (EE) 2.0 is the only platform that manages and secures applications on Kubernetes in multi-Linux, multi-OS and multi-cloud customer environments. As a complete platform that integrates and scales with your organization, Docker EE 2.0 gives you the most flexibility and choice over the types of applications supported, orchestrators used, and where it’s deployed. It also enables organizations to operationalize Kubernetes more rapidly with streamlined workflows and helps you deliver safer applications through integrated security solutions. In this blog post, we’ll walk through some of the key new capabilities of Docker EE 2.0.

Eliminate Your Fear of Lock-in

As containerization becomes core to your IT strategy, the importance of having a platform that supports choice becomes even more important. Being able to address a broad set of applications across multiple lines of business, built on different technology stacks and deployed to different infrastructures means that you have the flexibility needed to make changes as business requirements evolve. In Docker EE 2.0 we are expanding our customers’ choices in a few ways:

VMware AppDefense Introduces Least Privilege Security for Containerized Applications

Summary: VMware AppDefense continues to advance with new capabilities, new partnerships, international expansion, and increasing customer adoption

 

As worldwide spending on IT security continues to climb, the odds of falling victim to a data breach have risen to 1 in 4. Despite a multitude of security products on the market and large budgets to purchase them, businesses are not significantly safer. The commoditization of cyber crime has made it possible for virtually anyone with a computer to launch a sophisticated attack against a company and new attacks are being developed every day. This means the continued focus on chasing threats remains relatively ineffective to stamping out the broader challenges facing IT security.

This is a scary prospect for CISOs who are faced with securing the applications and data living in increasingly dynamic, distributed IT environments. And as more businesses embrace modern, agile application development processes, the problem of implementing security at the speed of the business is exacerbated – security is often seen as an obstacle to progress.

We created VMware AppDefense to address these very issues, with a unique approach that leverages the virtualization layer to protect applications by “ensuring good” rather than “chasing bad”. AppDefense leverages VMware’s Continue reading

GPUs Mine Astronomical Datasets For Golden Insight Nuggets

As humankind continues to stare into the dark abyss of deep space in an eternal quest to understand our origins, new computational tools and technologies are needed at unprecedented scales. Gigantic datasets from advanced high resolution telescopes and huge scientific instrumentation installations are overwhelming classical computational and storage techniques.

This is the key issue with exploring the Universe – it is very, very large. Combining advances in machine learning and high speed data storage are starting to provide hitherto unheard of levels of insight that were previously in the realm of pure science fiction. Using computer systems to infer knowledge

GPUs Mine Astronomical Datasets For Golden Insight Nuggets was written by James Cuff at The Next Platform.