Webinar recap: Docker 101 for federal government

Docker is driving a movement for IT teams across all industries to modernize their applications with container technology. Government agencies, like private sector companies face similar pressures to accelerate software development while reduce overall IT costs and adopting new technologies and practices like cloud, DevOps and more.

This webinar titled “Docker 101 for the Federal Government” features Andrew Weiss, Docker Federal Sales Engineer and breaks down the core concepts of Docker and how it applies to government IT environments and unique regulatory compliance requirements. The presentation highlights how Docker Enterprise Edition can help agencies build a secure cloud-first government.

Docker Federal

Watch the on-demand webinar to learn how Docker is transforming the way government agencies deliver secure, reliable, and scalable services to organizations and citizens.

Here are the questions from the live session:

Q: Is Docker Datacenter available both hosted and as a cloud offering?

A: Docker Datacenter is now a part of Docker Enterprise Edition (EE) – providing integrated container management and security from development to production. Docker EE provides a unified software supply chain for all apps—commercial off the shelf, homegrown monoliths to modern microservices written for Windows or Linux environments on any server, VM or cloud. Docker EE Continue reading

Microsoft’s Docs.com is sharing dangerously sensitive personal files and information

If you use Microsoft’s Docs.com to store personal documents, stop reading this and make sure you aren’t inadvertently leaking your private information to the world.Microsoft sets any documents uploaded to the document sharing site as public by default—though it appears that many users aren’t aware of it. That means anyone can search Docs.com for sensitive personal information that wasn’t manually set private. PCWorld found social security numbers, health insurance ID numbers, bank records, job applications, personal contact details, legal correspondence, and drivers license numbers with just a few minutes of searching.To read this article in full or to leave a comment, please click here

Microsoft’s Docs.com is sharing dangerously sensitive personal files and information

If you use Microsoft’s Docs.com to store personal documents, stop reading this and make sure you aren’t inadvertently leaking your private information to the world.Microsoft sets any documents uploaded to the document sharing site as public by default—though it appears that many users aren’t aware of it. That means anyone can search Docs.com for sensitive personal information that wasn’t manually set private. PCWorld found social security numbers, health insurance ID numbers, bank records, job applications, personal contact details, legal correspondence, and drivers license numbers with just a few minutes of searching.To read this article in full or to leave a comment, please click here

Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Earlier this year Fortinet hired its first chief information security officer (CISO). The timing makes sense, as the company has grown into a leading security vendor with an integrated, security fabric vision that few competitors can match.As Fortinet continues to expand its presence in the federal and critical infrastructure markets, CISO Philip Quade brings the credentials and background needed to help lead the strategy. Prior to joining Fortinet, Quade was the NSA director’s special assistant for cyber and chief of the NSA Cyber Task Force. Before that, he was chief operating officer of the Information Assurance Directorate at the NSA.I recently talked with Quade regarding his new role and the challenges the United States and businesses in general face with respect to security.To read this article in full or to leave a comment, please click here

Fortinet CISO on securing critical infrastructure: ‘We can no longer bring a knife to a gunfight’

Earlier this year Fortinet hired its first chief information security officer (CISO). The timing makes sense, as the company has grown into a leading security vendor with an integrated, security fabric vision that few competitors can match.As Fortinet continues to expand its presence in the federal and critical infrastructure markets, CISO Philip Quade brings the credentials and background needed to help lead the strategy. Prior to joining Fortinet, Quade was the NSA director’s special assistant for cyber and chief of the NSA Cyber Task Force. Before that, he was chief operating officer of the Information Assurance Directorate at the NSA.I recently talked with Quade regarding his new role and the challenges the United States and businesses in general face with respect to security.To read this article in full or to leave a comment, please click here

Hitachi reveals new AI for real-time identity detection and tracking

Hitachi announced it has developed a new image analysis system that uses artificial intelligence (AI) for real-time people tracking and detection. The AI can detect an individual in real time by combining over 100 external characteristics and then track that person using wide-area security and surveillance systems.Systems that capture facial images and color of clothing have previously been deployed in public areas, but according to Hitachi, it is difficult for security staff to find and track a person based on an eyewitness account or poor surveillance camera footage.To read this article in full or to leave a comment, please click here

Hitachi reveals new AI for real-time identity detection and tracking

Hitachi announced it has developed a new image analysis system that uses artificial intelligence (AI) for real-time people tracking and detection. The AI can detect an individual in real time by combining over 100 external characteristics and then track that person using wide-area security and surveillance systems.Systems that capture facial images and color of clothing have previously been deployed in public areas, but according to Hitachi, it is difficult for security staff to find and track a person based on an eyewitness account or poor surveillance camera footage.To read this article in full or to leave a comment, please click here

21% off Roku Premiere+ Streaming Media Player – Deal Alert

Get powerful performance, stunning 4K and HDR picture quality, and an advanced remote for an amazing streaming experience. The new Roku Premiere+ is for HD & 4K Ultra HD TVs. It delivers ultra-smooth quad-core streaming, brilliant 4K resolution at 60fps, vibrant HDR color, access to 450,000+ movies and TV episodes across 4,500+ paid or free channels, and a handy point anywhere remote.  The Roku Premiere+ list price has been reduced a significant 21% to $79. See the deal now on Amazon.To read this article in full or to leave a comment, please click here

46% off HDMI Female to Female Coupler 2-Pack, Gold Plated High Speed Adapter – Deal Alert

Here's an adapter that's always good to have on hand. Pop one of them on the end of an HDMI cable and extend your back-of-the-tv HDMI port around front where it's easier to access. Or use them to couple multiple HDMI cables together for extended reach. Supports 3D and 4k signals. The list price of $10.99 has been reduced 46% to just $5.89 for the two-pack. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

The Questions We Ask of Networks

The Questions We Ask of Networks Two weeks ago, a blog entitled Towards Machine Learning in Networking: Benefits Begin Now discussed machine learning in networking, and was based on a podcast given on the same topic. It was fun to have some discussion about what the next steps are, and how close we may be to networks that “machine learn” (ML)... Read more →

15% off Xbox One S 1TB Console, Halo Wars 2 Bundle – Deal Alert

Real-time strategy makes an explosive return to the Halo universe with Halo Wars 2: Ultimate Edition, included as a full game download for Xbox One and Windows 10. This bundle also comes with the Halo Wars 2: Season Pass, featuring six months of additional content, plus Halo Wars: Definitive Edition, an enhanced version of the real-time strategy classic-all as full game downloads for Xbox One and Windows 10 PC. Watch 4K Blu-ray movies and stream Netflix in 4K Ultra HD. Experience richer, more luminous colors in games and video with HDR. And play a growing library of Xbox 360 games with advanced features like Game DVR and in-home streaming to Windows 10. The bundle's price has been discounted, for now, to $299 on Amazon. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

China Making Swift, Competitive Quantum Computing Gains

Chinese officials have made no secret out of their desire to become the world’s dominant player in the technology industry. As we’ve written about before at The Next Platform, China has accelerated its investments in IT R&D over the past several years, spending tens of billions of dollars to rapidly expand the capabilities of its own technology companies to better compete with their American counterparts, while at the same time forcing U.S. tech vendors to clear various hurdles in their efforts to access the fast-growing China market.

This is being driven by a combination of China’s desire to increase

China Making Swift, Competitive Quantum Computing Gains was written by Nicole Hemsoth at The Next Platform.

9 lies programmers tell themselves

Programmers have pride with good reason. No one else has the power to reach into a database and change reality. The more the world relies on computers to define how the world works, the more powerful coders become.Alas, pride goeth before the fall. The power we share is very real, but it’s far from absolute and it’s often hollow. In fact, it may always be hollow because there is no perfect piece of code. Sometimes we cross our fingers and set limits because computers make mistakes. Computers too can be fallible, which we all know from too much firsthand experience.[ Find out how to get ahead with our career development guide for developers. | The art of programming is changing rapidly. We help you navigate what’s hot in programming and what’s going cold. | Keep up with hot topics in programming with InfoWorld’s App Dev Report newsletter. ] Of course, many problems stem from assumptions we programmers make that simply aren’t correct. They’re usually sort of true some of the time, but that’s not the same as being true all of the time. As Mark Twain supposedly said, “It ain’t what you don’t know that gets you into Continue reading

6 soft skills employers should be looking for in tech talent

Forget experience and hard skills -- tomorrow's best talent will need soft skills, and it's fact that sourcing and recruiting pros need to be prepared to address."From our own LinkedIn research last May, we know that, of 291 hiring managers we surveyed, their employers struggle to find candidates with the right soft skills for 59 percent of their open jobs, and 58 percent said the lack of soft skills among candidates was 'limiting their company's productivity,'" says Jennifer Shappley, senior director of talent acquisition at LinkedIn at a presentation at SourceCon, held earlier this month in Anaheim, Calif.To read this article in full or to leave a comment, please click here

SDN solves a lot of network problems, but security isn’t one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.That's a lot of power, yet developers still don't have security at the forefront of their minds when building SDN products, which is why there are weaknesses in SDN that can compromise enterprise security.To read this article in full or to leave a comment, please click here

SDN solves a lot of network problems, but security isn’t one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.That's a lot of power, yet developers still don't have security at the forefront of their minds when building SDN products, which is why there are weaknesses in SDN that can compromise enterprise security.To read this article in full or to leave a comment, please click here

SDN solves a lot of network problems, but security isn’t one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.Software defined networking (SDN) holds lots of promises. By consolidating the control planes of multiple devices into a single controller, that controller becomes the omnipotent decision maker over the entire network.That's a lot of power, yet developers still don't have security at the forefront of their minds when building SDN products, which is why there are weaknesses in SDN that can compromise enterprise security.To read this article in full or to leave a comment, please click here

BrandPost: The Smart Business Case for Open-Network Automation

Lines of business demand agility, and IT teams that utilize legacy infrastructure and operations face hard limits on how agile they can be. Automating and integrating networking tasks streamlines operations and makes the network much easier to manage, minimizing downtime caused by human error while increasing organizational agility and efficiency. But implementing network-wide automation that also integrates with cross-domain technologies presents three primary challenges.Challenge 1: Vendor Lock-in. Vendor-specific network automation solutions may not completely address your organization’s unique automation needs and they lock you into the vendor's strategy and goals rather than your own. The result is often a flawed approach that doesn’t align and support your organization’s business and technical objectives.To read this article in full or to leave a comment, please click here