First Look at the DockerCon San Francisco 2018 Agenda

From June 12th – 15th, San Francisco will welcome 6,000+ developers, sysadmins, architects, VP of Apps and other IT leaders to get hands-on with the latest innovations in the container ecosystem at DockerCon 2018. Today, we are excited to share a first look at the DockerCon Agenda. We’ve brought back some of your favorite from past DockerCons and are also thrilled to welcome many first time DockerCon speakers to the stage. Here is a first look at some of our favorites sessions:

 

DockerCon

Customers in Production  

Use case sessions highlight how companies are using Docker to modernize their infrastructure and build, manage and secure  distributed applications. These sessions are heavy on business value, ROI and production implementation advice, and learnings.

  • Building your NoSQL ship: How an Enterprise transitioned from a RDBMS to NoSQL DB using Agile and Docker by Jonell Taylor, Metlife
  • Black Friday and 100K Deployments Per Year by Srikanth Bulusu & Sanjoy Mukherjee, JCPenney
  • Packaging Software for Distribution on the Edge with Docker and Windows Server
    Peter Ngai, GE Digital

Using Docker

Using Docker sessions are introductory sessions for Docker users, dev and ops alike. Filled with practical advice, learnings, and insight, these sessions will Continue reading

What is 802.11ax Wi-Fi, and what will it mean for 802.11ac

Each new Wi-Fi standard has brought significant improvements in performance, with the most recent, 802.11ac, offering an impressive theoretical maximum rate of 1.3Gbps.  Unfortunately, these gains have not been enough to keep pace with demand, leading to that exasperated cry heard across airports, malls, hotels, stadiums, homes and offices: “Why is the wireless so slow?”The IEEE is taking another crack at boosting Wi-Fi performance with a new standard called 802.11ax or High-Efficiency Wireless, which promises a fourfold increase in average throughput per user.RELATED: Can MU-MIMO really boost wireless capacity? 802.11: Wi-Fi standards and speeds explained Wi-Fi 2018: What does the future look like? 802.11ax is designed specifically for high-density public environments, like trains, stadiums and airports. But it also will be beneficial in Internet of Things (IoT) deployments, in heavy-usage homes, in apartment buildings and in offices that use bandwidth-hogging applications like videoconferencing.To read this article in full, please click here

What is 802.11ax Wi-Fi, and what will it mean for 802.11ac

Each new Wi-Fi standard has brought significant improvements in performance, with the most recent, 802.11ac, offering an impressive theoretical maximum rate of 1.3Gbps.  Unfortunately, these gains have not been enough to keep pace with demand, leading to that exasperated cry heard across airports, malls, hotels, stadiums, homes and offices: “Why is the wireless so slow?”The IEEE is taking another crack at boosting Wi-Fi performance with a new standard called 802.11ax or High-Efficiency Wireless, which promises a fourfold increase in average throughput per user.RELATED: Can MU-MIMO really boost wireless capacity? 802.11: Wi-Fi standards and speeds explained Wi-Fi 2018: What does the future look like? 802.11ax is designed specifically for high-density public environments, like trains, stadiums and airports. But it also will be beneficial in Internet of Things (IoT) deployments, in heavy-usage homes, in apartment buildings and in offices that use bandwidth-hogging applications like videoconferencing.To read this article in full, please click here

EVPN’s 4 critical benefits for digital transformation

Digital transformation demands more of everything: speed, throughput, agility and scalability. That’s why organizations are rethinking traditional layer 2 switched data center architectures and moving towards intelligent layer 3 routed network designs. With a layer 3 architecture, your data center can use proven routing protocols to simplify troubleshooting, facilitate upgrades, scale efficiently and converge traffic.

But what about the applications, storage appliances and multi-tenant environments that still require traditional layer 2 connectivity? Legacy protocols that enable layer 2 traffic to run over a layer 3 routed infrastructure have significant limitations that become serious obstacles when the data center must scale, accommodate multiple vendors’ systems or support multi-tenancy. Fortunately, there’s a scalable, simple, non-proprietary solution. Enter EVPN.

Cumulus’ unique Virtual eXtensible Local Area Network (VXLAN) Ethernet Virtual Private Network (EVPN) solution offers unmatched interoperability and efficiency. By adding VXLAN distributed routing, Cumulus EVPN undoes all of the complications of layer 2 connectivity and frees you from reliance on proprietary controllers. Looking for proof that EVPN delivers on that promise? We’ve got plenty of evidence, so here’s four major advantages of utilizing EVPN to meet the demands of digital transformation.

1) Accommodate growth without disruption

With Cumulus EVPN, you can quickly and Continue reading

memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations

ASERT Threat Summary: memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations Date/Time: 27022018 2325UTC Title/Number: memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations – February 2018 – v1.4. Severity: Critical Distribution: TLP WHITE (see <https://www.us-cert.gov/tlp>) Categories: Availability Authors: Roland Dobbins & Steinthor Bjarnason Contributors: Keshav […]

memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations

ASERT Threat Summary: memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations Date/Time: 27022018 1645UTC Title/Number: memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations – February 2018 – v1.3. Severity: Critical Distribution: TLP WHITE (see <https://www.us-cert.gov/tlp>) Categories: Availability Authors: Roland Dobbins & Steinthor Bjarnason Contributors: Luan Nguyen, […]

Sponsored Post: Clover, Triplebyte, Exoscale, Symbiont, Loupe, Etleap, Aerospike, Scalyr, Domino Data Lab, MemSQL

Who's Hiring? 

  • Clover is looking for seasoned software engineers to help us solve the most complicated problem in the world: healthcare. We're using sophisticated data analytics, custom software, and machine learning to coordinate care and build a clearer model of our member's health and risk factors. We are on a mission to help seniors and low-income members live healthier while keeping costs down. This is an opportunity for those who want to be at the intersection of health and technology and thrive in a collaborative environment as well as the freedom of self-direction. If you're interested, please directly apply here!

  • Triplebyte now hires software engineers for top tech companies and hundreds of the most exciting startups like Apple, Dropbox, Mixpanel, and Instacart. They identify your strengths from an online coding quiz and let you skip resume and recruiter screens at multiple companies at once. It's free, confidential, and background-blind. Apply here.

  • Symbiont is a New York-based financial technology company building new kinds of computer networks to connect independent financial institutions together and allow them to share business logic and data in real time. This involves developing a distributed system which is also decentralized, and which allows for the creation Continue reading

BrandPost: Delivering “Always-On” Technology to Meet the Demands of Today’s Business

Virtually every small and medium-sized business is now driven by digital technologies. From our phones and PCs to the critical business applications that form the basis of business operations, our workday has become dependent on devices and the systems they are connected to. In addition to supporting employees, our customers and partners are constantly interacting with our systems. Outages are unacceptable. If our systems go down, business stops. This impacts employees, partners, and customers. And it’s not just an inconvenience; it costs the business money.Unfortunately, many businesses with 100-1,000 employees are using legacy server rooms or data centers that were built in the days before “always-on” became the requirement. A decade ago, downtime was hidden from customers and partners, and employees could work around a problem, staying somewhat productive. That’s no longer the case. Downtime is a disaster. And in many cases, downtime can result in lost data and corrupt systems, making the cost of recovery even greater. In some industries, data lost during an outage also creates a “compliance event,” which is never “career enhancing” for an IT professional.To read this article in full, please click here

CEO Succession at the Internet Society – Status update (Feb 2018)

This is a status update on where we are in the CEO search process. In my last note to the community, I explained that we were finishing the selection of a search firm to support us during the process and that we were planning to launch an open call for candidates in February.

After issuing an RFP and conducting a set of interviews with several firms, the CEO Search Committee selected a search firm. The selected firm is Perrett Laver.

Based on, among other things, all the community feedback we have received on the following email address (you can still send your input to that address), the CEO Search Committee has developed a draft job description:

[email protected]

In order to refine the job description and to make sure we gather all the input we need, the search firm is going to conduct informational interviews with the leadership of our communities. Accordingly, they are going to interview the chairs of the OMAC (Organization Advisory Council), the ChAC (Chapters Advisory Council), and the IETF (the chairs of the IAB and the IAOC will also be interviewed). ISOC’s executive team (staff) will also be interviewed. You can also talk with Continue reading

The New HPE Sheriff Lays Down The Hybrid IT Law

There is a new sheriff in town at Hewlett Packard Enterprise – that would be chief executive officer Antonio Neri – and that means a new way of looking at the books and therefore steering the business. No, we didn’t mean that the other way around.

In opening up its books for the first quarter of its fiscal 2018 year, which ended in January, we can see some important things about HPE’s business, and at the same time, we have lost some visibility about core parts of its business.

First of all, the books have been reclassified significantly in the

The New HPE Sheriff Lays Down The Hybrid IT Law was written by Timothy Prickett Morgan at The Next Platform.

Startup Concertio offers AI-optimized server configuration

For about as long as there has been personal computers, there has been an aftermarket of system optimization software. Even MS-DOS, which was about as basic as an operating system gets, had QEMM to get the most out of your 640K of memory. These days, there is a healthy market of Windows optimization utilities to speed up your PC.For servers, though, it gets a little more complicated. Actually, it gets very complicated. Not only does each server have to operate at peak efficiency on its own, but it then has to interact with the network, with other servers, and potentially with a public cloud service provider.Also on Network World: What will AI mean to the traditional data center? And usage models change over time. There might be peak use times when certain processes are not run, such as backups, and slow times of day when other tasks can be run. So an optimal configuration at one point in the day is not optimal at a different time of the day.To read this article in full, please click here

Startup Concertio offers AI-optimized server configuration

For about as long as there has been personal computers, there has been an aftermarket of system optimization software. Even MS-DOS, which was about as basic as an operating system gets, had QEMM to get the most out of your 640K of memory. These days, there is a healthy market of Windows optimization utilities to speed up your PC.For servers, though, it gets a little more complicated. Actually, it gets very complicated. Not only does each server have to operate at peak efficiency on its own, but it then has to interact with the network, with other servers, and potentially with a public cloud service provider.Also on Network World: What will AI mean to the traditional data center? And usage models change over time. There might be peak use times when certain processes are not run, such as backups, and slow times of day when other tasks can be run. So an optimal configuration at one point in the day is not optimal at a different time of the day.To read this article in full, please click here

Getting Started: Using New Kerberos Feature in Ansible Tower

Getting Started Kerberos

Welcome to another post in our Getting Started series. In our previous post, we discussed how you can set up and use LDAP in your Red Hat Ansible Tower instance. In this post we are going to discuss a new feature in regard to Windows authentication with Kerberos. Before we get started, please note that these changes will not affect the current configuration you are using if you have previously used Kerberos with Ansible Tower. Your setup should function the same way as before.

Using Kerberos to Connect to Windows

Using Kerberos with Ansible and Ansible Tower to connect to your Windows hosts before the release of Ansible 2.3 required some prior scaffolding tasks be set up before you were able to fully use it. The necessary packages for Kerberos are still required to be on the machine that Ansible Tower is installed on. The documentation on the required materials and configuration changes can be found here if you are just starting out or need a refresher.

The main change that comes to using Kerberos with Ansible and Ansble Tower is how Ansible manages Kerberos “tokens” or “tickets." Ansible Tower defaults to automatically managing Kerberos tickets (as Continue reading

International Cooperation Needed to Create an “Increasingly Beneficial Internet”

New norms of behavior are needed for Internet users, and it’s time for governments, companies, other organizations, and individuals to work together to define those standards, Internet advocates say.

Even as the Internet gives more and more people new ways to express themselves and improve their standard of living, it also creates problems that demand international and multistakeholder cooperation, speakers at the Global Internet and Jurisdiction Conference 2018 in Ottawa, Canada, said Monday.

The Internet has driven forward the ideas of globalization and equal opportunity for everyone, but technological advances have also created complexity that many people weren’t prepared for, said Kathy Brown, president and CEO of Internet Society.

“We now face enormous challenges as the pace of change has accelerated faster than did our human institutions, societal and existing global agreements,” she said during the first day of the conference.

Many governments have looked toward heavy regulation and censorship as a way to deal with this complex environment, Brown added.

Governments in some countries “are doubling down on what they know how to do — shut it down, shut it off, censor users, regulate creators,” she added. “The global Internet community, itself, is in danger of splintering into predictable commercial, Continue reading