5 tips to ace your next tech interview

You may feel confident going into an interview armed with your technical background and education but when it comes to tech jobs -- especially positions for engineers, developers and coders -- technical knowledge won’t be enough to get you through the interview process.To read this article in full or to leave a comment, please click here(Insider Story)

Meet the winners of the Holberton School and Docker hackathon

The last weekend in February, Holberton School and Docker held a joint Docker Hackathon where current students spent 24 hours making cool Docker hacks. Students were joined by Docker mentors who helped them along the way in addition to serving as judges for the final products. 

Here are some highlights from the hackathon.

Third place goes to… Julien, a personal assistant built with Docker and Alexa by Bobby and Larry

In their own words:

After discussing a few ideas, we settled on the idea of doing a Docker/Alexa integration that would abstract away repetitive command line interactions, allowing the user/developer to check the state of her Docker containers, and easily deploy them to production, only using voice commands. Hands free, we would prompt Alexa to interact with our Docker images and containers in various ways (ex1: “spin up image file x on server y”, “list all running containers on server z”, “deploy image a from server x to server y”) and Alexa would do it.

The main technical hurdle of the project was securely communicating between Alexa and our VMs running. To do this we used  the Java JSch library. This class gave us the ability to programmatically shell into Continue reading

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe data from millions of Apple devices in two weeks if the company doesn’t pay them US$150,000. The group, which calls itself Turkish Crime Family, claims to have login credentials for more than 627 million icloud.com, me.com and mac.com email addresses. These are email domains that Apple has allowed for users creating iCloud accounts over the years. Even though the Turkish Crime Family hasn't been in the media spotlight before, its members claim that they've been involved in selling stolen online databases in private circles for the past few years. The group said via email that it has had a database of about 519 million iCloud credentials for some time, but did not attempt to sell it until now. The interest for such accounts on the black market has been low due to security measures Apple has put in place in recent years, it said.To read this article in full or to leave a comment, please click here

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe data from millions of Apple devices in two weeks if the company doesn’t pay them US$150,000. The group, which calls itself Turkish Crime Family, claims to have login credentials for more than 627 million icloud.com, me.com and mac.com email addresses. These are email domains that Apple has allowed for users creating iCloud accounts over the years. Even though the Turkish Crime Family hasn't been in the media spotlight before, its members claim that they've been involved in selling stolen online databases in private circles for the past few years. The group said via email that it has had a database of about 519 million iCloud credentials for some time, but did not attempt to sell it until now. The interest for such accounts on the black market has been low due to security measures Apple has put in place in recent years, it said.To read this article in full or to leave a comment, please click here

Cisco closes AppDynamics deal, increases software weight

Cisco today closed its approximately $3.7 billion deal for application analytics specialist AppDynamics giving the networking giant a nice revenue stream and bolstering its software strategy.The nine-year-old company – which Cisco bought Jan. 24, days before it was to go IPO -- and its almost 1,250 employees become part of Cisco as the 17th acquisition since Chuck Robbins took the CEO reins in 2015.+More on Cisco software from Network World: Has Cisco broken out of the network hardware box?+To read this article in full or to leave a comment, please click here

Cisco closes AppDynamics deal, increases software weight

Cisco today closed its approximately $3.7 billion deal for application analytics specialist AppDynamics giving the networking giant a nice revenue stream and bolstering its software strategy.The nine-year-old company – which Cisco bought Jan. 24, days before it was to go IPO -- and its almost 1,250 employees become part of Cisco as the 17th acquisition since Chuck Robbins took the CEO reins in 2015.+More on Cisco software from Network World: Has Cisco broken out of the network hardware box?+To read this article in full or to leave a comment, please click here

Cisco closes AppDynamics deal, increases software weight

Cisco today closed its approximately $3.7 billion deal for application analytics specialist AppDynamics giving the networking giant a nice revenue stream and bolstering its software strategy.The nine-year-old company – which Cisco bought Jan. 24, days before it was to go IPO -- and its almost 1,250 employees become part of Cisco as the 17th acquisition since Chuck Robbins took the CEO reins in 2015.+More on Cisco software from Network World: Has Cisco broken out of the network hardware box?+To read this article in full or to leave a comment, please click here

Facial recognition in public restroom required if you want toilet paper

When you gotta go, you gotta go, but there may be a line in public restrooms. Usually those lines don’t have anything to do with surveillance. Let’s hope a new biometric authentication trial in China doesn’t roll out here, or else you would have to stop in public bathrooms in front of a device that uses facial recognition and wait for your allotted amount of toilet paper to be dispensed. Too bad, so sad if the 24-inch strip of toilet paper isn’t enough. The dispenser will not spit out more paper to the same person until after nine minutes have passed. Why would this creepy type of surveillance be deployed in public restrooms? To combat toilet paper theft.To read this article in full or to leave a comment, please click here

Facial recognition in public restroom required if you want toilet paper

When you gotta go, you gotta go, but there may be a line in public restrooms. Usually those lines don’t have anything to do with surveillance. Let’s hope a new biometric authentication trial in China doesn’t roll out here, or else you would have to stop in public bathrooms in front of a device that uses facial recognition and wait for your allotted amount of toilet paper to be dispensed. Too bad, so sad if the 24-inch strip of toilet paper isn’t enough. The dispenser will not spit out more paper to the same person until after nine minutes have passed. Why would this creepy type of surveillance be deployed in public restrooms? To combat toilet paper theft.To read this article in full or to leave a comment, please click here

63% off Anker Quick Charge 3.0 39W Dual USB Car Charger – Deal Alert

Dual ports pump out 39W of power to simultaneously charge power-hungry USB devices at full speed. Charge compatible devices up to 80% in just 35 minutes with Quick Charge 3.0. Patented PowerIQ and VoltageBoost deliver high-speed charging to non-Quick Charge devices. Anker's Quick Charge Dual USB Car Charger is discounted right now to just $21.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Datanauts 076: Understanding AWS Vs. Azure

The Datanauts talk with Eric Shanks about the differences between AWS and Azure, how organizations choose a public cloud provider, the reasons application architecture are so critical, and how to deal with worries about cloud lock-in. The post Datanauts 076: Understanding AWS Vs. Azure appeared first on Packet Pushers.

US lawmakers question police use of facial recognition tech

Reacting to concerns about the mass collection of photographs in police databases, U.S. lawmakers plan to introduce legislation to limit the use of facial recognition technology by the FBI and other law enforcement organizations.The FBI and police departments across the country can search a group of databases containing more than 400 million photographs, many of them from the drivers' licenses of people who have never committed a crime. The photos of more than half of U.S adults are contained in a series of FBI and state databases, according to one study released in October.To read this article in full or to leave a comment, please click here

US lawmakers question police use of facial recognition tech

Reacting to concerns about the mass collection of photographs in police databases, U.S. lawmakers plan to introduce legislation to limit the use of facial recognition technology by the FBI and other law enforcement organizations.The FBI and police departments across the country can search a group of databases containing more than 400 million photographs, many of them from the drivers' licenses of people who have never committed a crime. The photos of more than half of U.S adults are contained in a series of FBI and state databases, according to one study released in October.To read this article in full or to leave a comment, please click here

Video: Software Secures the World

Martin Casado doesn’t have a proper job since he left VMware. This gives him times to think deeply about the future of IT security as part of his role of wasting investors money at A16Z and considering where the next advances or futures will be. This video makes a lot of sense to me.

Once upon a time, we thought of security measures as being built like a wall around a medieval city. Then, as threats grew in complexity, we began to think of it more like securing a city or nation-state. Finally, security grew alike to aerial warfare — mobile, quick, wide-ranging. Each of these new modes for thinking about security represented a major misalignment between the security threats that had evolved and our strategies/tactics for dealing with them.
Now we are once again at another such major misalignment — thanks largely to the cloud and new complexity — requiring both a shift in how we think about and respond to threats. But we also have security “overload” given the vast size of our systems and scale of notifications.
How do security threats develop? How should CEOs and CSOs think of planning for them? What role will AI and Continue reading

Roadblocks, Fast Lanes for China’s Enterprise IT Spending

The 13th Five Year Plan and other programs to bolster cloud adoption among Chinese businesses like the Internet Plus effort have lit a fire under China’s tech and industrial sectors to modernize IT operations.

However, the growth of China’s cloud and overall enterprise IT market is far slower than in other nations. while there is a robust hardware business in the country, the traditional view of enterprise-class software is still sinking in, leaving a gap between hardware and software spending. Further, the areas that truly drive tech spending, including CPUs and enterprise software and services, are the key areas

Roadblocks, Fast Lanes for China’s Enterprise IT Spending was written by Nicole Hemsoth at The Next Platform.

Container Namespaces – How to add networking to a docker container

I've discussed how we can network a docker container directly with the host's networking stack bypassing docker0, the default bridge docker creates for you. That method involves asking docker to create a port on a user defined bridge and from the inside configuring the container to ask for an IP by DHCP. A more advanced way of achieving this is to bring up a docker container without networking and later configure the stack out-of-band of docker. This approach is one of the methods used by Calico for example to network containers and I've spoken about that here.

Today, lets deep dive into adding interfaces to a container manually and in-turn gain some insight into how all of this works. Since this discussion is going to revolve around network namespaces I assume you have some background in that area. If you are new to the concept of namespaces and network namespaces,  I recommend reading this.


Step 1: We will first bring up a docker container without networking. From docker docs, using the --network none when running a docker container leaves out container interface creation for that docker instance. Although docker skips network interface creation it brings up the container with Continue reading

Why Apple dropped iPad’s price to lowest yet

Apple this week is releasing its most affordable iPad to date. The refreshed 9.7-inch iPad, which packs a Retina screen and Apple’s A9 chip in a device that effectively replaces the iPad Air 2, is priced at $329 with 32GB of storage.The $70 price drop makes the entry-level iPad more competitive, particularly among schools that can now snag the tablet for under $300 at educational pricing. Businesses that are motivated by price and don’t require more advanced features in the iPad Pro will also be giving the iPad another look as a result of these changes, according to Avi Greengart, research director at GlobalData.To read this article in full or to leave a comment, please click here