The problem with Linux packaging in large organizations

One of the challenges of implementing and utilizing Linux across a large organization—an organization where there are many different people with significantly different computing needs—is ... packaging.Seriously. Packaging is a big problem.Just as an example:Let's say you are in charge of IT for a 1,000-person organization. Your server needs dictate that you'll need (or at least likely want) a server-oriented Linux distribution with some sort of paid support contract. Easy enough. You can choose Red Hat Enterprise or SUSE Linux Enterprise. Server needs met.RELATED: Review: 5 open source alternatives for routers/firewalls But what about the marketing department? Does an enterprise-grade, server-focused distribution make sense for all of them? Probably not. Maybe you can standardize on one of the media production-focused distributions—or perhaps the community-driven sides of the enterprise distribution you already chose for your servers.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fashion meets technology: A new era in wearables evolution

Disclosure: I am employed by Qualcomm Technologies.Ten years from now, when we read about technology history, 2017 will be seen as a turning point in the evolution of wearables — when fashion met technology. Luxury brands used to think about novel fabrics, materials and designs when discussing technology advancements for their watches, glasses, hand bags and clothing. Now the minds behind the latest fashions consider the richness and responsiveness of their devices as well as the software user experience.Smartwatches are taking center stage in this convergence of style and technology. The arrival of fashion smartwatches began in 2015 with launches from such brands as Fossil, Michael Kors and Tag Heuer. This year, in the days leading up to Baselworld — the premier event for the world’s watch and jewelry industry, celebrating its 100th anniversary — we saw a plethora of smart timepiece announcements. At the show, there were smartwatch introductions from Diesel, Emporio Armani, Fossil, GC, Guess, Hugo Boss, Michael Kors, Misfit, Montblanc, Movado, Tag Heuer and Tommy Hilfiger.To read this article in full or to leave a comment, please click here

Reflections on Three Years on the ISOC Board of Trustees

Editor's Note: At the Internet Society’s Annual General Meeting in June 2017, Gihan Dias will be leaving the Board.  Thank you Gihan for your service and contributions.


Although I have been a Trustee of the Internet Society for three years now, my relationship with ISOC goes back much further – to 1995 when I attended the ISOC networking workshop for developing countries, held in Prague, Czech Republic. It was a really fantastic experience. Not only did we learn how to build the Internet, but we also met many of the people who actually built it!

Gihan Dias

Announcing the Docker Student Developer Kit & Campus Ambassador Program!

For quite some time now we have been receiving daily requests from students all over the world, asking for our help learning Docker, using Docker and teaching their peers how to use Docker. We love their enthusiasm, so we decided it was time to reach out to the student community and give them the helping hand they need!

Docker Education

 

Understanding how to use Docker is now a must have skill for students. Here are 5 reasons why:

  1. Understanding how to use Docker is one of the most important skills to learn if you want to advance in a career in tech, according to Business Insider.
  2. You can just start coding instead of spending time setting up your environment.
  3. You can collaborate easily with your peers and enable seamless group work: Docker eliminates any ‘works on my machine’ issues.
  4. Docker allows you to easily build applications with a modern microservices architecture.
  5. Using Docker will greatly enhance the security of your applications.

Getting Started with Docker

Are you a student who is excited about the prospect of using Docker but still don’t know exactly what Docker is or where to start learning? Now that your finals are over and you have all Continue reading

Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers

The idea of crowdfunding to raise enough money to buy NSA-linked hacking tools from the Shadow Brokers is picking up steam and making some people steam.The price tag for getting hold of stolen Equation Group hacking tools is 100 Zcash. When I started the article about the Shadow Brokers revealing details about its June dump of the month subscription service, the cost of 100 Zcash was equal to $22,779. By the time I finished writing, it was equal to $23,251. As I start this article, 100 Zcash is equal to $24,128. By tomorrow, the first day to subscribe to the Shadow Brokers monthly dump service, Zcash will likely cost even more dollars. If you don’t have that kind of money, but want to partake in the spoils of the June dump, then maybe crowdfunding is the way to go?To read this article in full or to leave a comment, please click here

Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers

The idea of crowdfunding to raise enough money to buy NSA-linked hacking tools from the Shadow Brokers is picking up steam and making some people steam.The price tag for getting hold of stolen Equation Group hacking tools is 100 Zcash. When I started the article about the Shadow Brokers revealing details about its June dump of the month subscription service, the cost of 100 Zcash was equal to $22,779. By the time I finished writing, it was equal to $23,251. As I start this article, 100 Zcash is equal to $24,128. By tomorrow, the first day to subscribe to the Shadow Brokers monthly dump service, Zcash will likely cost even more dollars. If you don’t have that kind of money, but want to partake in the spoils of the June dump, then maybe crowdfunding is the way to go?To read this article in full or to leave a comment, please click here

A lack of IoT security is scaring the heck out of everybody

Enterprises aren’t yet managing the risks posed by the swelling wave of IoT technology very well, according to a study released today by the Ponemon Institute.The study, which surveyed 553 enterprise IT decision-makers, found that 78% of respondents thought that it was at least somewhat likely that their organizations would experience data loss or theft enabled by IoT devices within the next two years.+ALSO ON NETWORK WORLD: How John Deere developed one of the best GPS locators in the world + A Skunk Works with tractors: Inside John Deere’s IoT-innovation unitTo read this article in full or to leave a comment, please click here

Machine Learning on Stampede2 Supercomputer to Bolster Brain Research

In our ongoing quest to understand the human mind and banish abnormalities that interfere with life we’ve always drawn upon the most advanced science available. During the last century, neuroimaging – most recently, the Magnetic Resonance Imaging scan (MRI) – has held the promise of showing the connection between brain structure and brain function.

Just last year, cognitive neuroscientist David Schnyer and colleagues Peter Clasen, Christopher Gonzalez, and Christopher Beevers published a compelling new proof of concept in Psychiatry Research: Neuroimaging. It suggests that machine learning algorithms running on high-performance computers to classify neuroimaging data may deliver the most

Machine Learning on Stampede2 Supercomputer to Bolster Brain Research was written by Nicole Hemsoth at The Next Platform.

IDG Contributor Network: Millennials, P2P payments and FinTechs: what banks should be watching in 2017

A 2016 CapGemini study found that customers believed that their banking experience had improved. They were, in general, happy about the experience they received at their retail banks — a credit to the investment and energy that has been put into transforming front end processes and services. Despite those gains, however, there were two worrying signs. Namely the younger generations — millennials — still scored low on customer experience and gains in customer experience didn’t translate into increased profit.So what does that mean for retail banks in 2017? There’s still work be done, and 2017 might just be the year to do it. Here’s our take on the three things that retail banks should double down on in the year ahead.To read this article in full or to leave a comment, please click here

Internet Society and African Union Commission Launch Internet Infrastructure Security Guidelines for Africa

The first ever Internet Infrastructure Security Guidelines for Africa (“the Guidelines”) was launched at the African Internet Summit (AIS2017) in Nairobi, Kenya on 30 May 2017. The Guidelines are developed by the Internet Society jointly with the African Union Commission (AUC) and advances four essential principles of Internet infrastructure security -- Awareness, Responsibility, Cooperation, and adherence to Fundamental Rights and Internet Properties. It aims to help African Union States in approaching their cyber security preparedness and is a significant first step in producing a visible and positive change in the African Internet infrastructure security landscape. 

Dawit Bekele

IDG Contributor Network: What kind of workspaces do employees want?

Chat apps. Hotdesks. Smart machines. In most offices, it’s easy to see how technology is redefining and transforming the modern workplace.But technology isn’t the only force driving changes. Culture plays a significant role, too. For example, today’s employees are less and less inclined to disassociate their work lives from their personal lives. Remember when the stereotype for going to work was “punching in” a timecard and adopting some kind of 9-to-5 work persona (h/t Dolly Parton)? Employees no longer want to be typecast like that; they don’t necessarily want to surrender their identities at the office door.To read this article in full or to leave a comment, please click here