Announcing Docker Global Mentor Week 2016

Building on the the success of the Docker Birthday #3 Celebration and Training events earlier this year, we’re excited to announce the Docker Global Mentor Week November 14-19, 2016. This global event series aims to provide Docker training to both newcomers and intermediate Docker users. More advanced users will have the opportunity to get involved as mentors to further encourage connection and collaboration within the community.

mentor

The Docker Global Mentor Week is your opportunity to either #learndocker or help others #learndocker. Participants will work through self paced labs that will be available through an online Learning Management System (LMS). We’ll have different labs for beginners and intermediate users, Developers and Ops and Linux or Windows users.

Are you an advanced Docker user?

We are recruiting a network of mentors to help guide learners work through the labs. Mentors will be invited to attend local events to help answer questions attendees may have while completing the self-paced beginner and intermediate labs. To help mentors prepare for their events, we’ll be sharing the content of the labs and hosting a Q&A session with the Docker team before the start of the global mentor week.

 

Sign up as a Mentor!

 

With over 250 Docker Continue reading

IDG Contributor Network: With Wivity, connecting IoT devices anywhere in the world is a snap

Pocketknives are amazing! All the tools you need in one handy form.Designing products to easily adapt to the need isn’t easy. Internet of Things (IoT) devices are no exception. How can they be designed to connect regardless of their location?Wivity, the pocketknife for IoT connectivity, has the answer.Its compact IoT modems readily adapt to connection as needed. Wivity modems work worldwide across different networks—without requiring different designs for every region. They support Wi-Fi, 3G, 4G, LTE, SIGFOX, LoRaWAN and satellite connections.To read this article in full or to leave a comment, please click here

Azure roundup: FPGAs, new VMs and fresh Europe regions

Microsoft's big Ignite conference for IT pros wrapped up at the end of September, and that means the company dumped a ton of new cloud capabilities to attract people to Azure. Here's the run-down on all the major news you need to know about:Azure data centers in Germany and the UK go live In its continuing quest to expand the global reach of its public cloud platform, Microsoft announced the general availability of four new Azure regions: two in the U.K. and two in Germany. The UK data centers are fairly standard cloud regions, but data in the German DCs is under the control of T-Systems International, a German company that's a subsidiary of tech giant Deutsche Telekom.To read this article in full or to leave a comment, please click here

Backdoor dubbed Pork Explosion lets attackers go hog wild on Android phones

A backdoor in Android firmware provided by manufacturer Foxconn allows attackers to root devices to which they have physical access, according to a security researcher and barbecue enthusiast who dubbed the vulnerability Pork Explosion.Jon Sawyer (who also goes by jcase online) discovered the vulnerability at the end of August, and publicized it on his blog on Wednesday, a day after smartphone vendor Nextbit, which was one of the most heavily affected OEMs, released a fix for the problem.+ALSO ON NETWORK WORLD: Hardcore fans mourn the death of Nexus by denouncing the Pixel + Darkweb marketplaces can get you more than just spam and phishTo read this article in full or to leave a comment, please click here

What is MANRS and does your network have it?

While the internet itself was first envisioned as a way of enabling robust, fault-tolerant communication, the global routing infrastructure that underlies it is relatively fragile. A simple error like the misconfiguration of routing information in one of the 7,000 to 10,000 networks central to global routing can lead to a widespread outage, and deliberate actions, like preventing traffic with spoofed source IP addresses, can lead to distributed denial of service (DDoS) attacks.The Internet Society (ISOC), a cause-driven nonprofit organization that seeks to promote the open development, evolution and use of the Internet and the parent organization of the Internet Engineering Task Force (IETF) standards body, is moving to change that. In 2014, ISOC introduced its Mutually Agreed Norms for Routing Security (MANRS) initiative. Today ISOC announced that the initiative membership has more than quadrupled in its first two years, growing from its initial nine network operators to 42 network operators today.To read this article in full or to leave a comment, please click here

What is MANRS and does your network have it?

While the internet itself was first envisioned as a way of enabling robust, fault-tolerant communication, the global routing infrastructure that underlies it is relatively fragile. A simple error like the misconfiguration of routing information in one of the 7,000 to 10,000 networks central to global routing can lead to a widespread outage, and deliberate actions, like preventing traffic with spoofed source IP addresses, can lead to distributed denial of service (DDoS) attacks.The Internet Society (ISOC), a cause-driven nonprofit organization that seeks to promote the open development, evolution and use of the Internet and the parent organization of the Internet Engineering Task Force (IETF) standards body, is moving to change that. In 2014, ISOC introduced its Mutually Agreed Norms for Routing Security (MANRS) initiative. Today ISOC announced that the initiative membership has more than quadrupled in its first two years, growing from its initial nine network operators to 42 network operators today.To read this article in full or to leave a comment, please click here

What is MANRS and does your network have it?

While the internet itself was first envisioned as a way of enabling robust, fault-tolerant communication, the global routing infrastructure that underlies it is relatively fragile. A simple error like the misconfiguration of routing information in one of the 7,000 to 10,000 networks central to global routing can lead to a widespread outage, and deliberate actions, like preventing traffic with spoofed source IP addresses, can lead to distributed denial of service (DDoS) attacks.The Internet Society (ISOC), a cause-driven nonprofit organization that seeks to promote the open development, evolution and use of the Internet and the parent organization of the Internet Engineering Task Force (IETF) standards body, is moving to change that. In 2014, ISOC introduced its Mutually Agreed Norms for Routing Security (MANRS) initiative. Today ISOC announced that the initiative membership has more than quadrupled in its first two years, growing from its initial nine network operators to 42 network operators today.To read this article in full or to leave a comment, please click here

The OPM breach report: A long time coming

If you want to have even a chance of defeating cyber attacks, you have to be quick.So, in hindsight, there is no mystery why the federal government’s Office of Personnel Management (OPM) was a loser to attackers who exfiltrated personal data – including in many cases detailed security clearance information and fingerprint data – of more than 22 million current and former federal employees.Hackers, said to be from China, were inside the OPM system starting in 2012, but were not detected until March 20, 2014. A second hacker, or group, gained access to OPM through a third-party contractor in May 2014, but was not discovered until nearly a year later.To read this article in full or to leave a comment, please click here

The OPM breach report: A long time coming

If you want to have even a chance of defeating cyber attacks, you have to be quick.So, in hindsight, there is no mystery why the federal government’s Office of Personnel Management (OPM) was a loser to attackers who exfiltrated personal data – including in many cases detailed security clearance information and fingerprint data – of more than 22 million current and former federal employees.Hackers, said to be from China, were inside the OPM system starting in 2012, but were not detected until March 20, 2014. A second hacker, or group, gained access to OPM through a third-party contractor in May 2014, but was not discovered until nearly a year later.To read this article in full or to leave a comment, please click here

White House releases money for small-satellite broadband, smart cities

The U.S. government will invest tens of millions of dollars in smart-city technologies and in small-satellite broadband as part of a US$300 million package focused on innovation.The package of new investments, announced Thursday, will include $65 million in government funding and $100 million in private funding for smart cities technologies. Two new government grant programs will focus on easing traffic congestion and on creating new on-demand mobility services, including smartphone-enabled car sharing, demand-responsive buses, and bike-sharing.To read this article in full or to leave a comment, please click here

WiFi data – The new gold mine!

The number one role of network data is to improve the operational performance of the network and ultimately drive business objectives. Data analytics provide insights on network functionality and user habits that network managers have never had before. With these insights, enterprises can make decisions network infrastructure, uncover answers for hard-to-solve problems and use IT resources more effectively.

President Obama targets nasty space weather response with Executive Order

President Barack Obama today issued an Executive Order that defines what the nation’s response should be to a catastrophic space weather event that takes out large portions of the electrical power grid, resulting in cascading failures that would affect key services such as water supply, healthcare, and transportation.+More on Network World: NASA: Top 10 space junk missions+To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to make the most of your blended workforce

More and more American companies are realizing the benefits of having a blended workforce, where freelancers and full-time staff work together on corporate projects. In fact, 40 percent of top-performing American companies hire freelancers.So many of these companies are putting these freelancers to work on teams with full-time employees that teamwork is one of the main qualities employers look for when engaging freelancers.+ Also on Network World: Is outdated legislation holding back the gig economy? +To read this article in full or to leave a comment, please click here

IDG Contributor Network: The big picture of digital transformation (an introduction)

One of the very first questions I typically ask executives who are newly committed to start “digitally transforming” their business is to actually define “digital transformation.” While definitions vary, what really strikes me is that almost always, they tend to have a gross underappreciation of what this transformation entails. + Also on Network World: IT talent biggest roadblock to digital transformation + Executives typically align around one or possibly two of the following, but they fail to grasp that it takes all of them eventually changing (albeit these can be managed in phases or as multiple tracks of work):To read this article in full or to leave a comment, please click here

Docker Announces Expansion To China Through Commercial Partnership with Alibaba Cloud

The containerization movement fueled by Docker has extended across all geographic boundaries since the very beginning. Some of Docker’s earliest success stories were from Chinese based, web-scale companies running Docker in production before Docker had released its 1.0 version. Additionally, through the grass roots efforts of the development community, we have thriving Docker Meetups in 20 of China’s largest cities. This is a testament to the innovative spirit within the Chinese developer community because the ability to deliver great community content from Docker Hub has been highly constrained. That is why a partnership with China’s largest public cloud provider is so significant. Docker, in concert with Alibaba Cloud, is going to deliver a China-based instance of Docker Hub to ensure optimal access and performance to the thousands of Dockerized images that will serve as the foundation of a new generation of distributed applications in China.  

In addition to formally providing Dockerized content on Docker Hub to China, Docker is commercially partnering with Alibaba to address the substantial demand for running enterprise applications in containers.  A June 2016 Alibaba Cloud survey indicates that more than 80% respondents are already using or plan to use containers. Together Alibaba Cloud and Continue reading

11% off 1byone Halloween Fog Machine, 1200W High Output – Deal Alert

Step your Halloween game up with this powerful but lightweight 1200W fog machine that pumps out 3,500 cubic feet of creepy fog per minute. That's enough thick fog to easily fill a garage, a pathway, or a porch, but the output density is adjustable with multiple settings. It averages 4 out of 5 stars on Amazon from over 600 people (read reviews). Its typical list price of $92.99 has been reduced 11% to $82.99 (see it on Amazon). If you just don't need that much fog, 1byone has a 400W model that is a #1 best seller and currently discounted 13% to just $34.99 (see it on Amazon). For either model, you'll also want to pick up this fog juice. Frequently bought with the fog machine (but not required) is this remote timer that lets you automate on/off and duration of fogginess.To read this article in full or to leave a comment, please click here