Docker wants to help put old enterprise apps into containers

Docker is offering enterprises an easier on-ramp to using containers with a new consulting program aimed at taking a legacy application and migrating it to a container in five days.The idea behind the program is to show companies the concrete benefits of moving older applications over to containers, without asking them to undergo a massive transformation effort. Docker is working with Cisco, Avanade, Microsoft, and Hewlett Packard Enterprise on the Modernize Traditional Applications program, which will focus on migrating an application to modern infrastructure and getting it set up inside a containerized environment.To read this article in full or to leave a comment, please click here

DHS warns on immigration spoofing scam

You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Today the U.S. Department of Homeland Security issued a fraud alert saying criminals have been using the agency’s Hotline as part of a spoofing scam to steal personal information.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here

DHS warns on immigration spoofing scam

You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Today the U.S. Department of Homeland Security issued a fraud alert saying criminals have been using the agency’s Hotline as part of a spoofing scam to steal personal information.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here

Riverbed absorbs WIFi vendor Xirrus, reaches for the edge of the network

Network management company Riverbed Technology today announced its intent to acquire enterprise Wi-Fi equipment vendor Xirrus for an undisclosed fee.Riverbed touted that the acquisition, which it expects to close by the end of the month, will expand its software-defined WAN solution, and integrate Xirrus’ robust Wi-Fi products into the broader Riverbed ecosystem.+ALSO ON NETWORK WORLD: New FCC web portal opens for 5G experimenters + Trump's cybersecurity mystery: 90 days in, where's the plan?To read this article in full or to leave a comment, please click here

39% off Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux, Paperback – Deal Alert

The Raspberry Pi's most famous feature is its adaptability. It can be used for thousands of electronic applications (See: "How to build a Raspberry Pi retrogaming emulation console"). This book, Exploring Raspberry Pi, is the innovators guide to bringing Raspberry Pi to life. The book favors engineering principles over a 'recipe' approach to give you the skills you need to design and build your own projects. You'll understand the fundamental principles in a way that transfers to any type of electronics, electronic modules, or external peripherals, using a "learning by doing" approach that caters to both beginners and experts. The book begins with basic Linux and programming skills, and helps you stock your inventory with common parts and supplies. Next, you'll learn how to make parts work together to achieve the goals of your project, no matter what type of components you use. The companion website provides a full repository that structures all of the code and scripts, along with links to video tutorials and supplementary content that takes you deeper into your project. The list price has been reduced 39% on Amazon, from $35 to $21.40. See this deal now on Amazon. A complete Raspberry Pi Continue reading

IPv6 Extensions Are Already Dead

In this wiki entry disguised as a RFC 7872, “Observations on the Dropping of Packets with IPv6 Extension Headers in the Real World” highlights IPv6 Extension Headers are effectively unusable since internet providers are dropping IPv6 fragment and failing to support Extension Headers.  In IPv6, an extension header is any header that follows the initial 40 […]

The post IPv6 Extensions Are Already Dead appeared first on EtherealMind.

Twitter’s porn problem is ‘trending’

News this morning that former New England Patriots player Aaron Hernandez reportedly had committed suicide sent the murderer’s name to the top of Twitter’s “trending” list. Clicking on it brought back a string of tweets that was positively littered with graphic pornography. Twitter How much porn? I reported and blocked at least a half-dozen tweets and my rough estimate would be that about 1 in 50 were obscene (the flow has since receded to a trickle). I have been a daily, heavy user of Twitter since 2008 and this is by no means the first time I have encountered porn there. And, yes, it has previously been noticeable in instances where fast-breaking news makes the trending list. However, today’s deluge was by far the most concentrated and, well, offensive.   To read this article in full or to leave a comment, please click here

Twitter’s porn problem is ‘trending’

News this morning that former New England Patriots player Aaron Hernandez reportedly had committed suicide sent the murderer’s name to the top of Twitter’s “trending” list. Clicking on it brought back a string of tweets that was positively littered with graphic pornography. Twitter How much porn? I reported and blocked at least a half-dozen tweets and my rough estimate would be that about 1 in 50 were obscene (the flow has since receded to a trickle). I have been a daily, heavy user of Twitter since 2008 and this is by no means the first time I have encountered porn there. And, yes, it has previously been noticeable in instances where fast-breaking news makes the trending list. However, today’s deluge was by far the most concentrated and, well, offensive.   To read this article in full or to leave a comment, please click here

Surveys show high hopes, deep concerns about IoT

Industrial IoT's big future is starting to become a reality, but many companies still don't think they're ready for it.Those are some of the findings in surveys released on Tuesday by the Business Performance Innovation Network and the Eclipse IoT Working Group. They reflect the views of hundreds of executives and developers from a range of industries.More than half of the executives think their industries are already adopting IoT through either pilots or large-scale deployments, and 57 percent are at least in the planning stages themselves, BPI Network said. About 350 executives from around the world responded to the survey by BPI Network, an organization of business leaders.To read this article in full or to leave a comment, please click here

Surveys show high hopes, deep concerns about IoT

Industrial IoT's big future is starting to become a reality, but many companies still don't think they're ready for it.Those are some of the findings in surveys released on Tuesday by the Business Performance Innovation Network and the Eclipse IoT Working Group. They reflect the views of hundreds of executives and developers from a range of industries.More than half of the executives think their industries are already adopting IoT through either pilots or large-scale deployments, and 57 percent are at least in the planning stages themselves, BPI Network said. About 350 executives from around the world responded to the survey by BPI Network, an organization of business leaders.To read this article in full or to leave a comment, please click here

Oracle adds attention analytics to its data cloud with Moat buy

Oracle's online advertising analytics platform will soon know even more about what you are watching, where and when: The company has agreed to buy Moat, which aims to track how much attention consumers are paying to online media.Moat's platform tracks browsing and viewing habits on desktop and mobile devices, and even connected TVs. It touts its ability to separate out non-human traffic so advertisers don't pay for clicks from bots, and to quantify the audibility and visibility of ads.Oracle plans to add Moat's information about viewing habits to Oracle Data Cloud, which provides analytics tools and data about what consumers do and buy to marketers and publishers. Moat will continue to operate as an independent platform within that division, Oracle said Wednesday.To read this article in full or to leave a comment, please click here

The Agility and Flexibility of Docker including Oracle Database and Development Tools

A company’s important applications often are subjected to random and capricious changes due to forces well beyond the control of IT or management.  Events like a corporate merger or even a top programmer on an extended vacation can have an adverse impact on the performance and reliability of critical company infrastructure.

During the second day keynote at DockerCon 2017 in Austin TX, Lily Guo and Vivek Saraswat showed a simulation of how to use Docker Enterprise Edition and its application transformation tools to respond to random events that threaten to undermine the stability of their company critical service.

The demo begins as two developers are returning to work after an extended vacation.  They discover that, during their absence, their CEO has unexpectedly hired an outside contract programmer to rapidly code and introduce an entire application service that they know nothing about.  As they try to build the new service, however, Docker Security Scan detects that a deprecated library has been incorporated by the contractor.  This library is found to have a security vulnerability which violates the company’s best practice standards.  As part of Docker Enterprise Edition Advanced, Docker Security Scan automatically keeps track of code contributions and acts as a Continue reading

Facebook beats Apple to the punch with AR announcement

Ahead of Apple’s rumored augmented reality (AR) product announcement due at the end of the summer, Facebook has turned its attention to AR with the announcement of the Camera Effects Platform at its annual F8 developer conference yesterday.The announcement included compelling demonstrations of the technology’s potential. Mark Zuckerberg described a long-term path to cross-platform AR, which contradicts the specialized proprietary hardware decisions decided by almost every other AR company including Apple if rumors are true.  To read this article in full or to leave a comment, please click here

Demystifying network analytics

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Network analytics is key to helping IT proactively deliver great user experiences, but analytics for the enterprise access network is complicated. Besides the array of connectivity options, the heterogeneous mix of client devices and the different application models to accommodate, there are volumes of relevant input data that can be used, such as:

  • Actual data packets generated by real clients
  • Synthetic data packets generated by simulated clients
  • Real-time metrics and traps from infrastructure
  • Logs/configuration from infrastructure and servers
  • Flow data from infrastructure
  • APIs from application servers
Figure 1. How network data is used today.  Is this really analytics? Nyansa

Figure 1. How network data is used today. Is this really analytics?

To read this article in full or to leave a comment, please click here

Demystifying network analytics

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Network analytics is key to helping IT proactively deliver great user experiences, but analytics for the enterprise access network is complicated. Besides the array of connectivity options, the heterogeneous mix of client devices and the different application models to accommodate, there are volumes of relevant input data that can be used, such as: Actual data packets generated by real clients Synthetic data packets generated by simulated clients Real-time metrics and traps from infrastructure Logs/configuration from infrastructure and servers Flow data from infrastructure APIs from application servers Nyansa Figure 1. How network data is used today. Is this really analytics?To read this article in full or to leave a comment, please click here

Introducing the Modernize Traditional Apps Program

Today at DockerCon, we announced the Modernize Traditional Applications (MTA) Program to help enterprises make their existing legacy apps more secure, more efficient and portable to hybrid cloud infrastructure.  Collaboratively developed and brought to market with partners Avanade, Cisco, HPE, and Microsoft, the MTA Program consists of consulting services, Docker Enterprise Edition, and hybrid cloud infrastructure from partners to modernize existing .NET Windows or Java Linux applications in five days or less.  Designed for IT operations teams, the MTA Program modernizes existing legacy applications without modifying source code or re-architecting the application.

Modernize Traditional Apps with Docker

The First Step In The Microservices Journey

In working with hundreds of our enterprise IT customers the last couple years, when we sit down with them one of the first questions they inevitably ask is, “What is the first step we should take toward microservices?”

Through experience we have found that, for the vast majority of them, the best answer is, “Start with what you have today – with your existing applications.”   Why is this the right place for them to start?  Because it recognizes two realities facing enterprise IT organizations today: existing applications consume 80% of IT budgets, and most IT organizations responsible for existing Continue reading

Bypass Microsoft’s update block for Windows 7, 8.1 PCs running Kaby Lake, Ryzen

Although Microsoft blocked Windows updates to Windows 7 and 8.1 PCs powered by new CPUs, one unhappy user found a way around the block so devices with next-generation processors can continue to get security updates for the older operating systems.Microsoft warned users several times that they needed to jump on the Windows 10 bandwagon. That didn’t go over very well, so Microsoft extended Windows 7 and 8.1 support on some Skylake-powered devices.To read this article in full or to leave a comment, please click here

Bypass Microsoft’s update block for Windows 7, 8.1 PCs running Kaby Lake, Ryzen

Although Microsoft blocked Windows updates to Windows 7 and 8.1 PCs powered by new CPUs, one unhappy user found a way around the block so devices with next-generation processors can continue to get security updates for the older operating systems.Microsoft warned users several times that they needed to jump on the Windows 10 bandwagon. That didn’t go over very well, so Microsoft extended Windows 7 and 8.1 support on some Skylake-powered devices.To read this article in full or to leave a comment, please click here