Get involved with the Moby Project by attending upcoming Moby Summits!

Last month at DockerCon, we introduced the Moby Project: an open-source project sponsored by Docker to advance the software containerization movement. The idea behind the project is to help the ecosystem take containers mainstream by providing a library of components, a framework for assembling them into custom container-based systems and a place for all container enthusiasts to experiment and exchange ideas. Going forward, Docker will be assembled using Moby, see Moby and Docker or the diagram below for more details.

Moby Project

Moby Summit at DockerCon 2017

Knowing that that a good number of maintainers, contributors and advanced Docker users would be attending DockerCon, we decided to organize the first Moby Summit in collaboration with the Cloud Native Computing Foundation (CNCF). The summit was a small collaborative event for container hackers who are actively maintaining, contributing or generally involved or interested in the design and development of components of the Moby project library in particular: LinuxKit, containerd, Infrakit, SwarmKit, libnetwork and Notary.

Here’s what we covered during the first part of the summit:

  • 0:05 – Opening words by Patrick Chanezon
  • 9:05 – Moby Project Q&A with Solomon Hykes and Justin Cormack
  • 60:14 – Quick update on containerd by Michael Continue reading

How to conduct an IoT pen test

Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network are outside of the fortress? With the flurry of Internet of Things devices, is it harder to conduct a pen test with that many devices and end points?Claud Xiao, principal security researcher, Unit 42 at Palo Alto Networks, said for just testing some network services on IoT devices in a black box way, the difficulty level and the steps are similar with regular pen testing. But if you're discovering vulnerabilities via analyzing firmware or via analyzing wireless communications (e.g., Bluetooth or ZigBee), that's much harder.To read this article in full or to leave a comment, please click here

How to conduct an IoT pen test

Penetration testing was much like taking a battering ram to the door of the fortress. Keep pounding away and maybe find a secret backdoor to enter through. But what happens if pieces of the network are outside of the fortress? With the flurry of Internet of Things devices, is it harder to conduct a pen test with that many devices and end points?Claud Xiao, principal security researcher, Unit 42 at Palo Alto Networks, said for just testing some network services on IoT devices in a black box way, the difficulty level and the steps are similar with regular pen testing. But if you're discovering vulnerabilities via analyzing firmware or via analyzing wireless communications (e.g., Bluetooth or ZigBee), that's much harder.To read this article in full or to leave a comment, please click here

Get 63% off This 76-in-1 Precision Tool Set For Smartphones, Laptops and Electronics – Deal Alert

This 76-piece repair kit contains everything you need to work on your smartphone, tablet, laptop, stereo, or anything else that requires precision instruments. Everything from screwdrivers, to a suction cup to a plastic spudger, whatever that might be. This kit is highly rated and a #1 best seller on Amazon, where its typical list price of $69.99 has been reduced 63% to $25.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

CCNA Wireless – CCNA Wireless Notes Chapter 2

ITU-R

A telecommunications regulatory body that regulates or decides how different parts of the RF spectrum may be used. Countries can also have own regulatory bodies that regulate the spectrum within the country. Maintains spectrum in three different regions:

Region 1: Europe, Africa, Northern Asia
Region 2: North and South America
Region 3: Southern Asia and Australiasa

Most bands in the RF spectrum are tightly regulated and require a license. Using a frequency in a licensed range requires an organization to submit an application to the regulatory body.

ITU-R allocated two two ranges for Industrial, Scientific and Medical (ISM) use:

2.400 to 2500 GHz
5.725 to 5.825 GHz

ISM bands are unlicensed and anyone can use them.

Unlicensed bands are more vulnerable to interference and noise due to them being more accessible.

FCC

Federal Communications Commission (FCC) regulates RF frequencies, channels and transmission power within the US but other countries may also follow the rules of the FCC. FCC has allocated Unlicensed National Information Infrastructure (U-NII) in addition to the ISM band. Consists of four bands in the 5 GHz band.

U-NII-1 5.15 to 5.25 GHz
U-NII-2 5.25 to 5.35 GHz
U-NII-2 Extended Continue reading

Eight steps to the GDPR countdown

One year from today, the recently passed regulation known as “GDPR” (General Data Protection Regulation) goes into effect. While EU-specific, it can still dramatically affect how businesses that work with personal data of citizens and residents of the EU. GDPR was approved a year ago and will be going into effect in another year. It applies directly to organizations within the EU, but also applies to organizations outside the EU if they 1) offer goods and services to the EU, 2) monitor the behavior EU subjects, or 3) process or retain personal data of EU citizens and residents. And the regulation can place very serious fines and sanctions for non-compliance.To read this article in full or to leave a comment, please click here

IDG Contributor Network: SAP sets a course for the future

At its massive customer conference held last week in Orlando, SAP made it clear that it was charting a new course for the future. In announcing Leonardo — what it calls a digital innovation system — and in interviews with company executives, the message was unambiguous: SAP is an important part of the enterprise digital transformation story.While the messaging around Leonardo was a bit muddled and at times felt like a bucket of buzzwords, it represents a decisive step forward in its effort to transform the company from a legacy, back-office technology player into the enterprise’s digital transformation platform and enabler of choice. According to its press release, the goal of Leonardo is to, “enable customers to rapidly innovate and scale that innovation to redefine their business for the digital world.”To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT devices-as-a-service through Angaza’s SMS based installment payment plan

Can rent-to-buy plans make IoT devices affordable for thousands who need them, but can't afford to buy one?Solar panels can help African farmers with lighting and power, but are often out of reach. How can the purchase price be split into small installment payments that are manageable. How can IoT enable such a business model? How can low-cost devices communicate when both cellular and radio based transmitters aren't viable? How are such devices distributed and payments collected across a vast continent?Angaza’s approach combines IoT devices enabled with SMS based installment payments. BackgroundAround 1.2 billion people live without access to electricity. Off-grid energy appliances and services can address this issue, especially in developing countries. The Global Off-Grid Lighting Association (GOGLA) expects the off-grid energy and appliance market to be a $50 billion per year opportunity.To read this article in full or to leave a comment, please click here

Donald Trump uses an iPhone with a single app: Twitter

Among the many things we know about Donald Trump, his love of Twitter is perhaps his most comical passion. Whereas previous Presidents and even current politicians tend to tweet sparingly, Trump has a deep affinity for the social networking app and is prone to firing off tweetstorms and incendiary tweets at any given time. In the run-up to the 2016 U.S. Presidential election, for example, Trump made headlines when he went after former Miss Universe Alicia Machado on Twitter at 3 in the morning.Given Trump's love for all things Twitter, it remained unclear if Trump would continue his Tweeting ways once assuming the Oval Office. At the time, many people speculated that the responsibilities of being President, not to mention the strict security guidelines the President has to follow with respect to electronic devices, would result in Trump effectively kissing his Twitter stardom goodbye. Not to fear, Trump hasn't slowed down his tweeting since becoming President earlier this year.To read this article in full or to leave a comment, please click here

Logistics in Application Path of Neural Networks

Accurately forecasting resource demand within the supply chain has never been easy, particular given the constantly changing nature of the data over periods of time.

What may have been true in measurements around demand or logistics one minute might be entirely different an hour, day or week later, which can throw off a short-term load forecast (STLF) and lead to costly over- or under-estimations, which in turn can lead to too much or too little supply.

To improve such forecasts, there are multiple efforts underway to create new models that can more accurately predict load needs, and while they have

Logistics in Application Path of Neural Networks was written by Jeffrey Burt at The Next Platform.

Cisco to network engineers: Get comfortable with software. It’s here to stay

The shift to software-defined networks (SDN) was the catalyst to usher in a whole new way of running networks—and that’s through software. Some may argue that network engineers have been using software for decades, as every good router jockey had a laptop filled with scripts and templates that could be cut and pasted into the command line interface. This ad hoc model is highly error prone and not scalable, which is why human error still accounts for much of the downtime with respect to networks. Historically, Cisco hasn’t exactly helped its customers be more proficient with software. Oh sure, it had programs such as the Cisco Technology Developer Program (CTDP) that were targeted at developers, but what about the network engineer? The person who wants to do his job more efficiently? For that audience, Cisco didn’t have an answer. To read this article in full or to leave a comment, please click here

Cisco to network engineers: Get comfortable with software. It’s here to stay

The shift to software-defined networks (SDN) was the catalyst to usher in a whole new way of running networks—and that’s through software. Some may argue that network engineers have been using software for decades, as every good router jockey had a laptop filled with scripts and templates that could be cut and pasted into the command line interface. This ad hoc model is highly error prone and not scalable, which is why human error still accounts for much of the downtime with respect to networks. Historically, Cisco hasn’t exactly helped its customers be more proficient with software. Oh sure, it had programs such as the Cisco Technology Developer Program (CTDP) that were targeted at developers, but what about the network engineer? The person who wants to do his job more efficiently? For that audience, Cisco didn’t have an answer. To read this article in full or to leave a comment, please click here

Less Is More – Why The IPv6 Switch Is Missing

At Cloudflare we believe in being good to the Internet and good to our customers. By moving on from the legacy world of IPv4-only to the modern-day world where IPv4 and IPv6 are treated equally, we believe we are doing exactly that.

"No matter what happens in life, be good to people. Being good to people is a wonderful legacy to leave behind." - Taylor Swift (whose website has been IPv6 enabled for many many years)

Starting today with free domains, IPv6 is no longer something you can toggle on and off, it’s always just on.

How we got here

Cloudflare has always been a gateway for visitors on IPv6 connections to access sites and applications hosted on legacy IPv4-only infrastructure. Connections to Cloudflare are terminated on either IP version and then proxied to the backend over whichever IP version the backend infrastructure can accept.

That means that a v6-only mobile phone (looking at you, T-Mobile users) can establish a clean path to any site or mobile app behind Cloudflare instead of doing an expensive 464XLAT protocol translation as part of the connection (shaving milliseconds and conserving very precious battery life).

That IPv6 gateway is set by a simple Continue reading