GitLab deleted then restored list of online stores infected with skimming software

For at least six months, the online store at the National Republican Senatorial Committee site had “hidden skimming software” in the form of malicious JavaScript code; it was far from the only store which hackers had compromised via exploiting vulnerabilities in unpatched versions of ecommerce platforms, such as Magento. In fact, at least 5,925 stores were unwittingly participating in online skimming attacks run by multiple cybercriminal groups. Dutch researcher Willem de Groot estimated that 85 stores are compromised daily.To read this article in full or to leave a comment, please click here

Big Black Friday prize: Virtual reality gaming systems?

A fresh infusion of virtual reality gaming systems such as Sony PlayStation VR could make these hot Black Friday 2016 shopping items, but don't expect to get off too easy on prices. Sony this month just started selling PlayStation VR, which starts at $400 just for the headset, so figure on $500 if you want the bundle of headset/camera/controllers (and you'll need a PlayStation console too). Then you're going to need some games as well. PlayStation VR joins the Oculus Rift and HTC VIVE, both of which became available earlier this year, going beyond the less elaborate VR viewers such as Google Cardboard and Samsung Gear VR.To read this article in full or to leave a comment, please click here

One of the better explanations of SDN

Stumbled upon this via HighScalability:

Every time I feel like I'm "out of touch" with the hip new thing, I take a weekend to look into it. I tend to discover that the core principles are the same [...]; or you can tell they didn't learn from the previous solution and this new one misses the mark, but it'll be three years before anyone notices (because those with experience probably aren't touching it yet, and those without experience will discover the shortcomings in time.)

Yep, that explains the whole centralized control plane ruckus ;) Read also a similar musing by Ethan Banks.

ManagedMethods brings shadow IT and shadow data into the light

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  At the recent Gartner Security & Risk Management Summit, Gartner VP Neil MacDonald spoke about the technology trends for 2016 that provide the most effective business support and risk management. Cloud Access Security Brokers (CASBs) are number one on the list. According to Gartner, companies' use of Software as a Service (SaaS) applications create new challenges to security teams due to limited visibility and control options. CASBs enable businesses to apply much-needed security policies across multiple cloud services.To read this article in full or to leave a comment, please click here

Best Deals of the Week, October 10th – October 14th – Deal Alert

Best Deals of the Week, October 10th - October 14th - Deal AlertCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 10th. All items are highly rated, and dramatically discounted.27% off SanDisk Connect Wireless Stick 200GBThe SanDisk Connect wireless stick is a flash drive with a unique twist -- you can access it wirelessly. Whether it's in your pants pocket, in your bag, or on the picnic table at your campsite, the Connect wireless stick lets you stream media or move files wirelessly with up to three computers, phones or tablets simultaneously. Connections are made via built-in wifi (think "hotspot"), so no external wireless or internet services are needed. A USB connection is also available, if desired. Storage on this model is a generous 200GB. Reviewers on Amazon report at least 8-10 hours of battery life on one charge. This model is currently discounted 27%, from $119.99 down to $87.56. See it now on Amazon.To read this article in full or to leave a comment, please click here

Docker Weekly Roundup | October 9, 2016

 

weekly-roundup.png

It’s time for your weekly roundup! Get caught up on the top Docker news including; expansion into China through a commercial partnership with Alibaba Cloud, announcement of DockerCon 2017, and information on the upcoming Global Mentor Week. As we begin a new week, let’s recap the top five most-read stories of the week of October 9, 2016:

  • Alibaba Cloud Partnership Docker expands into China market through new partnership with the Alibaba Group, the world’s largest retail commerce group. The focus of the partnership is to provide a China-based Docker Hub, enable Alibaba to resell Docker’s commercial offerings, and create a “Docker For Alibaba Cloud”.
  • DockerCon 2017 a three day, conference organized by Docker. This year’s US edition will take place in Austin, TX and continue to build on the success of previous events as it grows and reflects Docker’s established ecosystem and ever-growing community.
  • Global Mentor Week  is a global event series aimed at providing Docker training to both newcomers and intermediate users. Participants will work through self-paced labs that will be available through an online Learning Management System (LMS). There will be different labs for different skill levels, Developers, Ops, Linux and Windows users.

Blade Chassis to End of Row Swithces Connectivity & High Availability Options

Spanning Tree Protocol (STP) free network inside Data Centre is main focus for network vendors and many technologies have been introduced in recent past to resolve STP issues in data centre and ensure optimal link utilization. Advent of switching modules inside blade enclosures coupled with the requirements for optimal link utilization starting right from blade server has made today’s Data Centre network more complex.

In this blog , we will discuss how traditional model of network switches placement (End of Row) can be coupled with blade chassis with different options available for end to end connectivity / high availability.

Network Switches are placed in End of Row and in order to remove STP Multi-Chassis Link Aggregation (MC-LAG) is deployed. Please see one of my earlier blog for understanding of MC-LAG.

Option 1: Rack mounted servers for computing machines, servers have installed multiple NICs in Pass-Though module and Virtual Machines hosted inside servers require Active/Active NIC Teaming.

picture5

Option 2 : Blade Chassis has multiple blade servers and each blade servers has more than 1 NIC (which are connected with blade chassis switches through internal fabric link). Virtul Machines hosted inside blade servers require active/active NIC teaming.

picture6

Option 3 : Blade Chassis Continue reading

Secret Service IT security lambasted by Homeland Security inspector general

For now, the US Secret Service has no reasonable assurance that its information systems are properly secured to protect Law Enforcement Sensitive case management information.That was but one of the conclusions laid at the feet of the US Secret Service today by the Department of Homeland Security’s Inspector General, John Roth in a scathing report on the agency tasked with protecting the President and other important government officials.+More on Network World: Federal cyber incidents grew an astounding 1,300% between 2006 and 2015+To read this article in full or to leave a comment, please click here

Secret Service IT security lambasted by Homeland Security inspector general

For now, the US Secret Service has no reasonable assurance that its information systems are properly secured to protect Law Enforcement Sensitive case management information.That was but one of the conclusions laid at the feet of the US Secret Service today by the Department of Homeland Security’s Inspector General, John Roth in a scathing report on the agency tasked with protecting the President and other important government officials.+More on Network World: Federal cyber incidents grew an astounding 1,300% between 2006 and 2015+To read this article in full or to leave a comment, please click here

Secret Service IT security lambasted by Homeland Security inspector general

For now, the US Secret Service has no reasonable assurance that its information systems are properly secured to protect Law Enforcement Sensitive case management information.That was but one of the conclusions laid at the feet of the US Secret Service today by the Department of Homeland Security’s Inspector General, John Roth in a scathing report on the agency tasked with protecting the President and other important government officials.+More on Network World: Federal cyber incidents grew an astounding 1,300% between 2006 and 2015+To read this article in full or to leave a comment, please click here

Really, CNN? Trump and Obama?

My brother has the CNN app on his iPhone and tells me the network just sent him this bit of rather startling news: Uh … one can assume the twins starting a new life are the formerly conjoined Anias and Jadon McDonald.And Obama was addressing his rebuff to Trump.To read this article in full or to leave a comment, please click here

Sony’s $399 PlayStation VR headset rolls out October 13, backed by dozens of games

After months of slowly rolling out information, Sony has finally announced the final crucial details you need to know about the PlayStation VR. Sony’s new VR headset will roll out on October 13 and there will be 50 VR-friendly games released for the PlayStation VR in 2016. Sony announced pricing back in March and reiterated it during E3. The headset as a stand-alone device costs $399, but to actually use it you also need a PlayStation Camera ($40-$60) and a set of PlayStation Move controllers ($25) bringing the real price closer to $500. You’ll also need a PlayStation 4 console, naturally.To read this article in full or to leave a comment, please click here

The time travel paradox of artificial intelligence

Kurt Vonnegut’s novel Slaughterhouse Five and J.K.Rowling’s series of Harry Potter novels describe the time travel paradox. Traveling through time changes the future from the point in time where the traveler arrived. The personal assistant that will arrive at some time in the future will change humans from that point in time forward, but in a more impactful way than GPS.Artificially intelligent personal assistants will be part of our lives Google and Facebook have recruited the best artificial intelligence (AI) and machine learning talent in the world to build personal assistants in small increments.To read this article in full or to leave a comment, please click here

Docker Distributed System Summit videos & podcast episodes

Following LinuxCon Europe in Berlin last week, we organized a first of its kind Docker event called Docker Distributed Systems Summit. This two day event was an opportunity for core Docker engineers and Docker experts from the community to learn, collaborate, problem-solve and hack around the next generation of distributed systems in areas such as orchestration, networking, security and storage.

More specifically, the goal of the summit was to dive deep into Docker’s infrastructure plumbing tools and internals: SwarmKit, InfraKit, Hyperkit, Notary, libnetwork, IPVS, Raft, TUF and provide attendees with the working knowledge of how to leverage these tools while building their own systems.

We’re happy to share with you all the videos recordings, slides and audio files available as #dockercast episodes!

Youtube playlist

Podcast playlist

All the slides from the summit are available on the official Docker slideshare account.

Please join us in giving a big shout out to our awesome speakers for creating and presenting the following projects:

  1. InfraKit: A toolkit for creating and managing declarative, self-healing infrastructure
  1. Heart of the SwarmKit: Store, Topology Continue reading

Stuff The Internet Says On Scalability For October 14th, 2016

Hey, it's HighScalability time:

 

A pattern from the collective unconscious of the universe. Scott Kelly's brilliant Year in Space Photos.

 

If you like this sort of Stuff then please support me on Patreon.

  • $1.5 million: new iOS hack bug bounty; 120 Terabits per second: Google and Facebook's submarine cable between Los Angeles with Hong Kong; 142,000: IT jobs lost last month;  $17 billion: cost of recall to Samsung; $4.1 Billion: IRS detected identity theft tax fraud; 1956: first mention of P vs NP by Kurt Gödel to John von Neumann; 1 million HTTP requests per second: DDoS attacks coming from IoT cameras; 90 petaflops: capacity of volunteer computing; 500 msec: time it takes the brain to integrate all sensory data into consciousness;

  • Quotable Quotes:
    • @GreatDismal: Silicon Valley fantasy that our universe is a simulation is actually the fantasy that our universe is a *sucessful startup*
    • @gblache: Being POTUS must be like inheriting a 240 year old code base and being asked to fix it in 4 years while half your team tries to sandbag you.
    • chrissnell: I'm a huge believer in colocation/on-prem in the post-Kubernetes era. I manage technical Continue reading