18 things you should know about using Linux tools in Windows 10

Last year Microsoft added an unusual new feature to Windows 10: Linux support. The Windows Subsystem for Linux (WSL) — sometimes called Bash on Windows — is “Microsoft’s implementation of a Linux-compatible infrastructure that runs atop and within the Windows kernel,” senior program manager Rich Turner tells CIO.com. That means running Linux binaries without leaving Windows.“Bash on Windows offers a toolset for developers, IT administrators and other tech professionals that want or need to run Linux command-line tools alongside their Windows tools and applications,” Turner explains. Developed with the help of Canonical (and a large community of Linux users), it’s not there to turn Linux into Windows, or Windows into Linux. It’s just that some Linux tools are so ubiquitous for development and deployment that it’s useful to be able to use them without spinning up a virtual machine (VM). That’s one of the reasons Macs are so popular with developers: MacOS is based on BSD, which is UNIX, so it can run Linux tools like Bash. And now, so can Windows 10.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Data virtualization: Like rocket fuel for your mainframe

It goes without saying that mainframes are powerful. These computers can perform more operations per second than any other commercial system, which is why most banks (not to mention many government agencies, insurance companies, retailers and other businesses that manage massive amounts of data) rely on Big Iron for their indispensable data analytics functions.And to say analytics are indispensable is underselling their value. Data analysis is an absolutely integral part of the new economy, and any organization seeking an edge needs an edge in analytics. Mainframes are a good match to provide the speed that leading companies are looking for, but many companies are still held back by their software.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Data virtualization: Like rocket fuel for your mainframe

It goes without saying that mainframes are powerful. These computers can perform more operations per second than any other commercial system, which is why most banks (not to mention many government agencies, insurance companies, retailers and other businesses that manage massive amounts of data) rely on Big Iron for their indispensable data analytics functions.And to say analytics are indispensable is underselling their value. Data analysis is an absolutely integral part of the new economy, and any organization seeking an edge needs an edge in analytics. Mainframes are a good match to provide the speed that leading companies are looking for, but many companies are still held back by their software.To read this article in full or to leave a comment, please click here

Hottest news from OpenStack Summit

OpenStack Summit convenes in BostonImage by OpenStack Twice a year the OpenStack community gathers for its Summit in which users, vendors and the programmers that build the open source IaaS cloud computing software talk about OpenStack’s progress and plan future releases. This week more than 5,000 attendees from 63 countries descended on Boston and more than 100 sponsoring companies released myriad products and services. Here are some of the highlights.To read this article in full or to leave a comment, please click here

VMware unveils the latest nervous system for enterprise IoT

The internet of things seems tailor-made for management headaches. Having thousands of tiny devices distributed across a city or a company is hard enough. Then there's the whole infrastructure supporting them, including network connections and edge gateways.Some big players, including General Electric, Nokia, and Cisco's Jasper division, have products and services for running all this. Now VMware is taking on the challenge with VMware Pulse IoT Center, a solution that draws on two platforms the company already sells.To read this article in full or to leave a comment, please click here

IBM’s new PowerAI tools automate image recognition

IBM is trying to remove some of the complications related to image recognition with new tools to automate critical machine learning tasks.A major update of the company's PowerAI tools has a feature called AI Vision, an auto tuner that makes it easy to identify and classify pictures. It will also speed up image recognition by breaking down tasks over multiple clusters.AI Vision plays a big role in automating machine learning by creating a tuned model, said Sumit Gupta, vice president of machine learning.The software abstracts machine learning, and developers don't need knowledge of low-level access to frameworks to tune, train, and deploy image recognition models. It's much like programming a game to take advantage of GPUs without deep knowledge of low-level APIs.To read this article in full or to leave a comment, please click here

50% off Logitech G602 Gaming Wireless Mouse with 250 Hour Battery Life – Deal Alert

With up to 250 hours of battery life, G602 redefines the laws of wireless gaming. From the pinpoint accuracy of the exclusive Delta Zero sensor technology to the extra high durability primary switches, you can count on G602 to dominate boss after boss.  The Logitech G602 gaming mouse averages 4.3 out of 5 stars from over 2,000 reviewers on Amazon (see reviews), where their typical list price of $79.99 has been reduced to $39.99. See the deal now on Amazon.To read this article in full or to leave a comment, please click here

Reaction: Offensive Destruction of Attack Assets

It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to “do something.” The something that seems to be emerging is, however, not necessarily the best possible “something.” Specifically, governments are now talking about attempting to “wipe out” the equipment used in attacks—

Berlin was studying what legal changes were needed to allow authorities to purge stolen data from third-party servers, and to potentially destroy servers used to carry out cyber attacks. “We believe it is necessary that we are in a position to be able to wipe out these servers if the providers and the owners of the servers are not ready to ensure that they are not used to carry out attacks,” Maassen said. —Reuters

“Wiping out” (destroying?) a server because the owner cannot ensure the server will be used in a way the government agrees with—sounds like a good idea, right? And how do we make certain such laws are not extended to destroy the servers Continue reading

Microsoft takes its databases worldwide with Cosmos DB

Developers will have an easier time scaling their applications to meet global needs with a database product Microsoft updated on Wednesday. Called Cosmos DB, the service lets developers store data that can be replicated across any of the company’s 34 Azure public cloud regions.Cosmos is an expansion of DocumentDB, a managed NoSQL database service that Microsoft launched in 2015. Its key innovation is a feature that lets developers pick between five consistency models that range from "strong" to "eventual" consistency.To read this article in full or to leave a comment, please click here

DockerCon Europe Registration and Call for Proposals are OPEN

DockerCon 2017 in Austin was amazing! We are still on a high from the energy and excitement that is created when 5,500 members of the Docker Community are in one place. Containers are everywhere, and the learning, inspiration and networking that those four days brings is unrivaled. We welcomed amazing speakers, made tons of meaningful connections and are already geared up to do it again for DockerCon Europe: October 16 – 19th in Copenhagen! Early Bird registration is now open, hurry up and get your ticket before they sell out.

 

Register for DockerCon Europe!

 

DockerCon Europe 2017

In addition, today we opened the DockerCon Copenhagen Call for Papers. We hope that you were inspired by the Moby Project and LinuxKit announcements and are looking forward to your submissions on the following:

Using Docker

Has Docker technology made you better at what you do? Is Docker an integral part of your company’s tech stack? Do you use Docker to do big things?

By giving concrete, first-hand examples, tell us about your Docker usage, share your challenges and what you learned along the way, and inspire us on how to use Docker to accomplish real tasks. When attendees leave your session, they should understand Continue reading

Bot-generated comments swamp FCC, urging overturn of net neutrality

Some supporters of a U.S. Federal Communications Commission plan to repeal its recent net neutrality rules have apparently resorted to dirty tricks.An apparent bot-generated campaign has posted more than 83,400 comments on the FCC's website supporting the agency's plan to gut its own net neutrality rules.A handful of people whose names are on the bot-generated comments have denied making the comments, according to a report by ZDNet. The 83,400 comments, filed to the FCC's comment system between Monday and Wednesday, all contain the same text, reading in part:To read this article in full or to leave a comment, please click here

Bot-generated comments swamp FCC, urging overturn of net neutrality

Some supporters of a U.S. Federal Communications Commission plan to repeal its recent net neutrality rules have apparently resorted to dirty tricks.An apparent bot-generated campaign has posted more than 83,400 comments on the FCC's website supporting the agency's plan to gut its own net neutrality rules.A handful of people whose names are on the bot-generated comments have denied making the comments, according to a report by ZDNet. The 83,400 comments, filed to the FCC's comment system between Monday and Wednesday, all contain the same text, reading in part:To read this article in full or to leave a comment, please click here

Datanauts 083: Diving Deep Into vSphere Host Resources

Today on the Datanauts we explore the depths of vSphere 6.5 host resources to help you maximum performance of your virtual infrastructure and provide a deeper understanding of essentials such as CPU, memory, storage, and Non-Uniform Memory Access (NUMA). Our guests are Frank Denneman and Niels Hagoort, authors of the forthcoming book vSphere 6.5 Host Resources Deep Dive. The post Datanauts 083: Diving Deep Into vSphere Host Resources appeared first on Packet Pushers.

Microsoft finally bans SHA-1 certificates in Internet Explorer and Edge

The Tuesday updates for Internet Explorer and Microsoft Edge force those browsers to flag SSL/TLS certificates signed with the aging SHA-1 hashing function as insecure. The move follows similar actions by Google Chrome and Mozilla Firefox earlier this year.Browser vendors and certificate authorities have been engaged in a coordinated effort to phase out the use of SHA-1 certificates on the web for the past few years, because the hashing function no longer provides sufficient security against spoofing.SHA-1 (Secure Hash Algorithm 1) dates back to 1995 and has been known to be vulnerable to theoretical attacks since 2005. The U.S. National Institute of Standards and Technology has banned the use of SHA-1 by U.S. federal agencies since 2010, and digital certificate authorities have not been allowed to issue SHA-1-signed certificates since Jan. 1, 2016, although some exemptions have been made -- for example, for outdated payment terminals.To read this article in full or to leave a comment, please click here