Up and Running with oVirt 4.1 and Gluster Storage

Last month, the oVirt Project shipped version 4.1 of its open source virtualization management system. With a new release comes an update to this howto for running oVirt together with Gluster storage using a trio of servers to provide for the system's virtualization and storage needs, in a configuration that allows you to take one of the three hosts down at a time without disrupting your running VMs.

If you're looking instead for a simpler, single-machine option for trying out oVirt, your best bet is the oVirt Live ISO. This is a LiveCD image that you can burn onto a blank CD or copy onto a USB stick to boot from and run oVirt. This is probably the fastest way to get up and running, but once you're up, this is definitely a low-performance option, and not suitable for extended use or expansion.

Read on to learn about my favorite way of running oVirt.

oVirt, Glusterized

Prerequisites

Hardware: You’ll need three machines with 16GB or more of RAM and processors with hardware virtualization extensions. Physical machines are best, but you can test oVirt using nested KVM as well. I've written this howto using VMs running on my "real" oVirt+Gluster Continue reading

iPhone 8 release date may be delayed until November

The iPhone 8 release date may be delayed until November of 2017, according to a new report from Bloomberg. Echoing similar reports we've seen sprout up over the past few months, the report relays that Apple's 2017 iPhone lineup will showcase three brand new devices. Of course, there will be revamped iPhones in the form of a new iPhone 7s and iPhone 7s Plus. But without question, the main attraction in Apple's upcoming iPhone lineup will be its 5.8-inch iPhone 8 that will likely wow users with an edge-to-edge OLED display.As tends to be the case, tremendous mobile innovations aren't always straight-forward affairs, which is to say that Apple is seemingly encountering a few roadblocks in its effort to get the iPhone 8 ready for production. As we highlighted not too long ago, Apple is seeing low yields on the iPhone 8 display, likely due to its desire to embed the home button and the Touch ID sensor into the display itself. While other companies like Samsung have sleek looking edgeless displays, the iPhone 8 will perhaps be the only flagship device with an advanced fingerprint recognition sensor embedded right into the display.To read this article in Continue reading

My personal highlights of 2016 for the Asia-Pacific Bureau and what’s coming up in 2017

The year 2016 was indeed a successful year for the Internet Society (ISOC) Asia-Pacific (APAC) Team. We were able to leverage many opportunities throughout the year across the region, and together with our members, chapters and partners, we worked towards ensuring that the Internet kept growing and evolving.

For me personally, there were a couple of things that stood out. One was InterCommunity 2016 where we had 11 nodes located throughout the region engaged in robust intra-regional discussions on topical issues.

Rajnesh Singh

Liveblog: DockerCon 2017 Day 2 Keynote

This is a liveblog of the day 2 keynote (general session) of DockerCon 2017 in Austin, TX. For a look at what was announced or discussed in the day 1 keynote yesterday, see this liveblog. You can also see all DockerCon 2017-related posts by browsing the posts tagged with “DockerCon2017” (see the links at the bottom of this page). Before the keynote starts, there’s some nice live music playing; a welcome change (in my opinion) from yesterday’s video game.

At 9:03am, Ben Golub takes the stage to kick off the day 2 general session. He starts off by reviewing some proposed Docker logos, with a hint toward an announcement at the end of the session (presumably around changing Docker’s logo).

Golub then transitions into the meat of the general session presentation, which (understandably) is focused on Docker in the enterprise. He reviews the usual slide with notable logos from Docker customers. He also discusses some results from a company called ETR, which (apparently) shows Docker is “off the charts” in terms of adoption and market penetration within the enterprise. Golub also debunks the bi-modal IT structure model, saying that Docker’s customers only want one thing: speed (as in moving faster, Continue reading

Trump’s cybersecurity mystery: 90 days in, where’s the plan?

On Jan. 6, weeks before he was due to become president, Donald Trump sat down with U.S. intelligence officials for a two-hour briefing at Trump Tower on cyberattacks conducted during the U.S. election. The meeting resulted in a pledge: a plan to counter cyberattacks against the U.S. within 90 days of taking office.On Wednesday, President Trump marks his 90th day in office with no sign of a report or indication that one is on the way. That’s a surprise, given the recent string of successful, high-profile cyberattacks against the federal government.To read this article in full or to leave a comment, please click here

Trump’s cybersecurity mystery: 90 days in, where’s the plan?

On Jan. 6, weeks before he was due to become president, Donald Trump sat down with U.S. intelligence officials for a two-hour briefing at Trump Tower on cyberattacks conducted during the U.S. election. The meeting resulted in a pledge: a plan to counter cyberattacks against the U.S. within 90 days of taking office.On Wednesday, President Trump marks his 90th day in office with no sign of a report or indication that one is on the way. That’s a surprise, given the recent string of successful, high-profile cyberattacks against the federal government.To read this article in full or to leave a comment, please click here

FPGAs To Shake Up Stodgy Relational Databases

So you are a system architect, and you want to make the databases behind your applications run a lot faster. There are a lot of different ways to accomplish this, and now, there is yet another — and perhaps more disruptive — one.

You can move the database storage from disk drives to flash memory, You can move from a row-based database to a columnar data store that segments data and speeds up accesses to it. And for even more of a performance boost, you can pull that columnar data into main memory to be read and manipulated at memory

FPGAs To Shake Up Stodgy Relational Databases was written by Timothy Prickett Morgan at The Next Platform.

15% off Lorell Sit-to-Stand Monitor Riser – Deal Alert

This adjustable desk riser offers a healthy addition to any desk that allows you to sit or stand while you work. The large, 31" x 20" work surface accommodates two monitors or a monitor and a laptop. Its ergonomic keyboard tray moves up and down with the desk and be adjusted out/in to the most comfortable position. Five height adjustments (up to over 16" above your desk) allow a comfortable standing position. A gas spring will allow you to effortlessly move the desk up and down, even with your computer equipment. The riser is fully assembled for use right out of the box. It averages 4.5 out of 5 stars from over 325 people on Amazon (read reviews), where its typical list price of $169.99 has been reduced 15% to $144.48. See the deal now on Amazon.To read this article in full or to leave a comment, please click here

6 steps for setting up a server room for your small business

NOTE: This story was originally published in September 2013 and updated in April 2017.Bringing IT in-house and setting up dedicated on-premises servers can be intimidating for a small business, especially given the recent focus on online services. Moreover, resources designed to help tend to assume a medium-sized or enterprise installation, which may not necessarily work well for setting up a small server room or even a closet for a branch office.With some understanding of the basics, though, setting up your own server room for your small business network need not be an arcane process. Here are some tips for getting started.Rack-mount equipment makes sense It's not uncommon for small businesses to begin operation by stacking server hardware and network appliances on a desk or shelf. Though such a deployment is inexpensive, the pile of equipment invariably expands into an unmanageable mess with the growth of the company. Exposed equipment is also completely open to physical tampering and is a ticking time bomb for accidents such as coffee spills, dust or even workers tripping over wires.To read this article in full or to leave a comment, please click here

6 steps for setting up a server room for your small business

NOTE: This story was originally published in September 2013 and updated in April 2017.Bringing IT in-house and setting up dedicated on-premises servers can be intimidating for a small business, especially given the recent focus on online services. Moreover, resources designed to help tend to assume a medium-sized or enterprise installation, which may not necessarily work well for setting up a small server room or even a closet for a branch office.With some understanding of the basics, though, setting up your own server room for your small business network need not be an arcane process. Here are some tips for getting started.Rack-mount equipment makes sense It's not uncommon for small businesses to begin operation by stacking server hardware and network appliances on a desk or shelf. Though such a deployment is inexpensive, the pile of equipment invariably expands into an unmanageable mess with the growth of the company. Exposed equipment is also completely open to physical tampering and is a ticking time bomb for accidents such as coffee spills, dust or even workers tripping over wires.To read this article in full or to leave a comment, please click here

Informatica CEO talks of why data quality is key to successful digital transformation

If you want to be successful in your digital transformation initiatives, clean up your data first. That’s the message from Anil Chakravarthy, CEO of Informatica, whose master data management products help companies get a 360-degree view of customers, suppliers and other key assets. In this installment of the IDG CEO Interview Series, Chakravarthy spoke with Chief Content Officer John Gallant about the data quality and integration issues that hamstring innovation and digital transformation efforts. He also discussed how the nearly 25-year-old company’s decision to go private in 2015 was spurred by its own digital transformation strategy.To read this article in full or to leave a comment, please click here(Insider Story)

Experts contend Microsoft canceled Feb. updates to patch NSA exploits

Microsoft delayed its February security update slate to finish patching critical flaws in Windows that a hacker gang tried to sell, several security experts have argued."Looks like Microsoft had been informed by 'someone,' and purposely delayed [February's] Patch Tuesday to successfully deliver MS17-010," tweeted Matt Suiche, founder of Dubai-based security firm Comae Technologies.MS17-010, one of several security bulletins Microsoft issued in March, was just one of several cited Friday by the Redmond, Wash. developer when it said it had already patched most of the vulnerabilities exploited by just-leaked hacking tools.Those tools -- 12 different Windows exploits -- had been included in a large data dump made April 14 by a hacker group dubbed Shadow Brokers, which is believed to have ties to Russia. The exploits, as well as a trove of documents, had been stolen from the National Security Agency (NSA), Shadow Brokers claimed.To read this article in full or to leave a comment, please click here

Experts contend Microsoft canceled Feb. updates to patch NSA exploits

Microsoft delayed its February security update slate to finish patching critical flaws in Windows that a hacker gang tried to sell, several security experts have argued."Looks like Microsoft had been informed by 'someone,' and purposely delayed [February's] Patch Tuesday to successfully deliver MS17-010," tweeted Matt Suiche, founder of Dubai-based security firm Comae Technologies.MS17-010, one of several security bulletins Microsoft issued in March, was just one of several cited Friday by the Redmond, Wash. developer when it said it had already patched most of the vulnerabilities exploited by just-leaked hacking tools.Those tools -- 12 different Windows exploits -- had been included in a large data dump made April 14 by a hacker group dubbed Shadow Brokers, which is believed to have ties to Russia. The exploits, as well as a trove of documents, had been stolen from the National Security Agency (NSA), Shadow Brokers claimed.To read this article in full or to leave a comment, please click here

Facebook’s Caffe2 AI tools come to iPhone, Android, and Raspberry Pi

New intelligence can be added to mobile devices like the iPhone, Android devices, and low-power computers like Raspberry Pi with Facebook's new open-source Caffe2 deep-learning framework.Caffe2 can be used to program artificial intelligence features into smartphones and tablets, allowing them to recognize images, video, text, and speech and be more situationally aware.It's important to note that Caffe2 is not an AI program, but a tool allowing AI to be programmed into smartphones. It takes just a few lines of code to write learning models, which can then be bundled into apps.The release of Caffe2 is significant. It means users will be able to get image recognition, natural language processing, and computer vision directly on their phone. That task is typically offloaded to remote servers in the cloud, with smartphones then connecting to it.To read this article in full or to leave a comment, please click here

At $175, this ransomware service is a boon to cybercriminals

Cybercriminals have another easy-to-use ransomware kit to add to their arsenals, thanks to a new variant called Karmen that hackers can buy on the black market for $175.A Russian-speaking user called DevBitox has been advertising the ransomware in underground forums, security firm Recorded Future said in a blog post on Tuesday.  Karmen is what experts call ransomware-as-a-service -- a particularly worrisome trend. Amateur hackers with little technical know-how can buy access to them, and in return, they’ll receive a whole suite of web-based tools to develop their own ransomware attacks.To read this article in full or to leave a comment, please click here

At $175, this ransomware service is a boon to cybercriminals

Cybercriminals have another easy-to-use ransomware kit to add to their arsenals, thanks to a new variant called Karmen that hackers can buy on the black market for $175.A Russian-speaking user called DevBitox has been advertising the ransomware in underground forums, security firm Recorded Future said in a blog post on Tuesday.  Karmen is what experts call ransomware-as-a-service -- a particularly worrisome trend. Amateur hackers with little technical know-how can buy access to them, and in return, they’ll receive a whole suite of web-based tools to develop their own ransomware attacks.To read this article in full or to leave a comment, please click here