Today, we are excited to announce our new Docker Captains! Docker Captains are technology experts and leaders in their communities who are passionate about sharing their Docker knowledge with others. Individuals are awarded the distinction of Docker Captain because of their technical expertise, content and technical contributions to the community and outstanding engagement with Docker’s users.
The New Captains Class


Follow the Captains
Follow all of the Captains on twitter. Also check out the Captains GitHub repo to see what projects they have been working on.
Learn more about each Captain
Docker Captains are eager to bring their technical expertise to new audiences both offline and online around the world – don’t hesitate to reach out to them via the social links on their Captain profile pages. You can filter the captains by location, expertise, and more.
Alex Iankoulski
Alex has 20+ years of experience in the software industry. He is currently a Principal Software Architect for Data Science and Analytics at Baker Hughes, a GE Company where he focuses on enabling deep learning scientists and analytics experts to bring algorithms and new modeling techniques from prototype to production using containers. He believes that good tools get out of Continue reading
Google did its best to impress this week at its annual IO conference. While Google rolled out a bunch of benchmarks that were run on its current Cloud TPU instances, based on TPUv2 chips, the company divulged a few skimpy details about its next generation TPU chip and its systems architecture. The company changed from version notation (TPUv2) to revision notation (TPU 3.0) with the update, but ironically the detail we have assembled shows that the step from TPUv2 to what we will call TPUv3 probably isn’t that big; it should probably be called TPU v2r5 or something like that. …
Tearing Apart Google’s TPU 3.0 AI Coprocessor was written by Timothy Prickett Morgan at The Next Platform.
Broadcom may not have wanted to be in the Arm server chip business any more, but its machinations since it was acquired by Avago Technology two years ago have certainly sent ripples through that nascent market. It did it in the wake of buying Broadcom, and now it looks like it is doing it again with Qualcomm.
Before it shelled out a stunning $37 billion to buy Broadcom, best known for its datacenter switch ASICs but also an Arm server chip wannabe at the time, Avago was a conglomerate that made chips for optical networking, server networking, and storage controllers …
What Qualcomm’s Exit From Arm Server Chips Means was written by Timothy Prickett Morgan at The Next Platform.
Many Chinese service providers are reliant upon ZTE’s optical gear for their transport networks and backhaul. And switching to another vendor is not that easy.
With service-mesh technologies, such as Envoy and Istio, web services can effectively talk to each other and become building blocks to create applications.
One analyst said Ciena was the source of the current price war in the optical networking space.
The telecom will cut costs and employees as it attempts to evolve its legacy networks and fend off regulatory impact.
The software moves workloads between on-premises data centers and the cloud and allows customers to automate where their data lives.
Creating a safer and trusted Internet MUST involve education building and awareness raising. This is one message that came up at the women’s event during the 2018 Africa Internet Summit held in Dakar.
“Education should target mothers who do not always believe that they can have an important role in the Internet world and who are the ones educating the future generation of women in tech. Also, we should educate developers of applications used on the Internet to consciously include safety by design, as well as governments to enact cyber laws that protect their citizens,” one of the participants stated during her presentation. With this, they meant that not only individuals, but also companies and governments have an important role in building a safer and trusted Internet.
Raising awareness of Internet safety was another point raised by many of the participants. “In school, we are taught to use computers and the Internet, but we are not taught about how to use the Internet safely,” one participant stressed. The attendees called for educational systems to change. They also suggested addressing online privacy and safety concerns so girls can be aware from the very beginning.
Privacy of personal data was another important Continue reading
In January 2018, the Internet Society Nepal Chapter organized the first Nepal School on Internet Governance (npSIG) in collaboration with the Forum for Digital Equality. The initiative offered an intensive two-day learning course covering a wide list of topics at the Institute of Engineering Pulchowk in Kathmandu. The initiative helped participants to identify global and regional issues and facilitate the understanding of several aspects of Internet Governance, including access, diversity, security, privacy, IoT, and human rights within the Nepalese policy framework. The schedule included theoretical sessions, roleplays, and attendee engagement activities. All brilliant speakers presentations are available on sig.org.np for further consultation.
One of the major objectives of npSIG was to raise awareness among young people about Internet Governance issues and to promote their participation in the discussion. The speakers inspired analysis, critical thinking and motivated the audience to design effective questions and take action.
The opening speech delivered by Baburam Aryal, Chairperson at the Forum for Digital Equality, enhanced the understanding of the Internet Governance concept, which in Nepal is in the very early stages of development. The establishment of a proper ecosystem is complex as Continue reading
The post BGP and Traffic Engineering Mechanisms for WISPs appeared first on Noction.
A colleague just received an “Urgent Security Alert – Action Requested” email from Nest. At first glance it looked like either a phishing attempt or one of the way-too-often breach notifications we all receive these days. Instead, it was a real alert notifying him that the password he uses for his Nest account had been compromised in a data breach – not at Nest but somewhere else. Nest encouraged him to update to a unique password and enable two-step verification (additional authentication beyond a password, usually referred to as multi-factor authentication).
While it’s not clear exactly how Nest determined that the password was compromised, it could have come from security researcher Troy Hunt’s recently updated Pwned Passwords service (part of his “have i been pwned?” site). Via this service, you can enter a password to see if it matches more than half a billion passwords that have been compromised in data breaches. A hashed version of the full list of passwords can also be downloaded to do local or batch processing. (“Pwned” is video gamer talk for “utterly defeated,” as in “Last time we played, I pwned him.”)
Hunt created this service in response to the National Continue reading