Your Docker Agenda for November 2016

November is packed with plenty of great events including over 75 Docker Global Mentor Week local events to learn all about Docker! This global event series aims to provide Docker training to both newcomers and intermediate Docker users. More advanced users will have the opportunity to get involved as mentors to further encourage connection and collaboration within the community. Check out the list of confirmed events below to see if there is one happening near you. Make sure to check back as we’ll be updating this list as more events are announced.

Want to help us organize a Mentor Week training in your city? Email us at [email protected] for more information!

 

New-mentor-image.png
From webinars to workshops, meetups to conference talks, check out our list of events that are coming up in November!

Official Docker Training Courses

View the full schedule of instructor led training courses here!

Introduction to Docker:

This is a two-day, on-site or classroom-based training course which introduces you to the Docker platform and takes you through installing, integrating, and running it in your working environment.

Nov 15-16: Introduction to Docker with Amazic –  Nieuw-Vennep, The Netherlands

Nov 24-25: Introduction to Docker with Docker Captain Benjamin Continue reading

RHV and DNS

Hi folks, here’s another “pre” post. What I mean by that is that in the process of creating a demo and the surrounding article, I found I needed to create a sidebar article in order to show how configure an important component. In this case, the requirement to fulfill forward and reverse name server resolution in RHV has lead me to create a basic DNS server. In this case, “dnsmasq” is a perfect solution…

Let me be clear here: I am NOT recommending dnsmasq for production DNS. For production I would recommend deploying BIND, Red Hat IdM, or something else. I’m using dnsmasq because I need something for my home lab and I think you might benefit from the configuration I’m using in your home or test lab. I don’t have that many systems, and a lightweight service like dnsmasq will work nicely.

Background

The RHV 4 documentation is very clear about the requirement for FQDN and fully functional DNS. Simply relying on “/etc/hosts” isn’t going to cut it anymore. Dnsmasq will provide a great and simple solution for small labs. For the uninitiated, dnsmasq provides DHCP, TFTP, DNS, and DNS forwarding. We’ll really only be concerned with the DNS Continue reading

Review: Google’s Home invasion

Google Home, the company's new voice-controlled interface to the internet, is hardly the first to appear on the consumer market. But it may be the best -- although "best" may not yet be good enough.To read this article in full or to leave a comment, please click here(Insider Story)

Report: Nearly 90 percent of smartphones worldwide run Android

Android just reached a new milestone in its worldwide dominance over iOS.According to new research from Strategy Analytics, 87.5 percent of smartphones in the world are now running Android. Shipments hit a total of 328.6 million for 3rd quarter of 2016, which is up 10.3 percent up year-on-year. While Android had always been hanging around the 80 percent mark, this latest number is a new high.Comparatively, Apple shipped 45.5 million iPhones, which is down 5.2 percent from the 48 million from last year. The real drop is in "others" (like Blackberry and Windows phone). Last year, 8.2 million units of "other" smartphones were sold in the 3rd quarter. This year, the number is 1.3 million.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Wired internet will be replaced by mobile

Seventy-five percent of internet use will be on mobile devices next year, according to a new study published by ad forecaster Zenith.The firm says that’s just the beginning. It reckons that some places, such as Hong Kong, will have 89 percent of total internet use being performed on mobile by 2018. The United States will marginally trail that at 83 percent in that year.+ Also on Network World: Desktop use off 11% in past year. Winner: smartphones + Smartphone penetration is the cause. Those devices have proliferated rapidly. In 2012, only 23 percent of individuals in Zenith’s 60-studied countries possessed smartphones. That number is now 56 percent and will be 63 percent globally by 2018. Some countries have adopted the devices more spectacularly; for example, Ireland is at 92 percent smartphone penetration.To read this article in full or to leave a comment, please click here

Steve Singh Joins Docker’s Board of Directors

The whole team at Docker would like to welcome Steve Singh, CEO of Concur and Member of SAP’s Executive Board to the Docker family. Steve has accepted a role on Docker’s Board of Directors, bringing his deep experience in building world-class organizations. Steve leads the SAP Business Networks & Applications Group, which brings together teams from Ariba, Fieldglass, Concur, SAP Health, Business Data Network and SMP ERP groups. We had a chance to sit down with Steve to get his thoughts on his appointment to the Docker Board.

mr_s_steven_singh_2514941

 

How and why did you initially become involved with Docker?

I was certainly aware of Docker. There were also a number of groups across SAP that were using Docker. When a member of the Docker board approached me about joining the company’s Board of Directors, I learned a fair bit more about the market opportunity Docker was pursuing and could easily see the importance of the Docker suite for corporate IT and ISV’s. I was also intrigued by the opportunity to support Ben and Solomon in building an enduring business.

 

What led you to joining Docker’s board?

For me, there are two requirements when considering board roles. The first question I Continue reading

Mobile subscriber identity numbers can be exposed over Wi-Fi

For a long time, law enforcement agencies and hackers have been able to track the identity and location of mobile users by setting up fake cellular network towers and tricking their devices to connect to them. Researchers have now found that the same thing can be done much more cheaply with a simple Wi-Fi hotspot.The devices that pose as cell towers are known in the industry as IMSI catchers, with the IMSI (international mobile subscriber identity) being a unique number tied to a mobile subscriber and stored on a SIM card. IMSI catchers can be used for tracking and in some cases, for intercepting calls, but commercial solutions, such as the Stingray used by the FBI, are expensive.To read this article in full or to leave a comment, please click here

Mobile subscriber identity numbers can be exposed over Wi-Fi

For a long time, law enforcement agencies and hackers have been able to track the identity and location of mobile users by setting up fake cellular network towers and tricking their devices to connect to them. Researchers have now found that the same thing can be done much more cheaply with a simple Wi-Fi hotspot.The devices that pose as cell towers are known in the industry as IMSI catchers, with the IMSI (international mobile subscriber identity) being a unique number tied to a mobile subscriber and stored on a SIM card. IMSI catchers can be used for tracking and in some cases, for intercepting calls, but commercial solutions, such as the Stingray used by the FBI, are expensive.To read this article in full or to leave a comment, please click here

Flaw in Wix website builder risked computer worm

Wix, the provider of a widely used cloud-based web development platform, appears to have had a significant bug on its hands that could have paved the way for a computer worm to do serious damage to websites around world.The problem was related to an XSS (cross-site scripting) vulnerability that was found in websites built with Wix, according to Matt Austin, a researcher with Contrast Security.Though Wix says it has fixed the issue, it illustrates how a few lines of bad code can  potentially do widespread damage.XSS vulnerabilities are common, and result from flaws in websites' coding.  Hackers can take advantage of them to trick users' browsers into running malicious scripts that, for example, could download a computer virus or expose the internet cookies that are on their machines. Austin found the same kind of problem in websites from Wix, which builds websites and has 87 million users in Europe, Latin America, Asia.To read this article in full or to leave a comment, please click here

Flaw in Wix website builder risked computer worm

Wix, the provider of a widely used cloud-based web development platform, appears to have had a significant bug on its hands that could have paved the way for a computer worm to do serious damage to websites around world.The problem was related to an XSS (cross-site scripting) vulnerability that was found in websites built with Wix, according to Matt Austin, a researcher with Contrast Security.Though Wix says it has fixed the issue, it illustrates how a few lines of bad code can  potentially do widespread damage.XSS vulnerabilities are common, and result from flaws in websites' coding.  Hackers can take advantage of them to trick users' browsers into running malicious scripts that, for example, could download a computer virus or expose the internet cookies that are on their machines. Austin found the same kind of problem in websites from Wix, which builds websites and has 87 million users in Europe, Latin America, Asia.To read this article in full or to leave a comment, please click here

Join the Black Friday club: BJ’s Wholesale, Sam’s reveal tech deals

Wholesale clubs BJ's and Sam's are among the latest retailers to share their Black Friday plans, and tech deals are aplenty.Black Friday watchers such as BFads and Best Black Friday have been tracking new ads closely.BJ's Wholesale Club Black Friday savings start on Nov. 18 and run through Nov. 29, though note that the stores are closed on Thanksgiving day.MORE: Black Friday isn't dead in 2016 | Dell, Amazon, Newegg beat Black Friday 2016 rushTo read this article in full or to leave a comment, please click here

BrandPost: The Ethernet path to Network on Demand

Ethernet is the network computing gift that keeps on giving. From its inception in 1973 as a 3 megabits/sec copper wired local area network technology, it has evolved to accommodate 40 gigabit/sec and 100 gigabit/sec speeds, fiber optic cabling, and wide area networking. The race is on to reach 400 gigabit/sec speeds and enable more on demand Ethernet-based services.Ethernet has achieved its success based on the foundation of openness and standardization and that is an ongoing process enabling continual innovation. Achieving end-to-end on demand Ethernet services that span multiple service providers is a key element in realizing the promise of software-defined networking (SDN) and network functions virtualization (NFV) for geographically dispersed organizations.To read this article in full or to leave a comment, please click here

Security and Delegation with Ansible Tower, Part 1

Ansible Tower - Security and Delegation 

This is part of a series of posts about how Ansible and Ansible Tower enable you to manage your infrastructure simply, securely, and efficiently.

When we talk about Tower, we often talk in terms of control, knowledge, and delegation. But what does that mean? In previous posts in this series, we've talked about the concept of 'control', as it relates to both managing your infrastructure and managing your automation. Today we're going to explain delegation, and the security aspects that go into that.

DELEGATION - THE BASICS

Ansible Playbooks, out of the box, are pretty simple - you run Ansible as a particular user, you pass it whatever inventory you want to manage, and it uses whatever credentials the executing user happens to have on hand. This is great for getting automating quickly, but what if you want to delegate automation to someone else to run as needed? You need to provide an inventory file for Ansible and Playbook to them (hopefully they don't edit them), and give them credentials (hopefully they won't use them for something else).

That's where the control, knowledge, and delegation features of Ansible Tower come into play.

STEP 1: CREDENTIALS

Ansible Tower securely stores credentials for Continue reading

Advances in In Situ Processing Tie to Exascale Targets

Waiting for a simulation to complete before visualizing the results is often an unappealing prospect for researchers.

Verifying that output matches expectations early in a run helps prevent wasted computation time, which is particularly important on systems in high demand or when a limited allocation is availableIn addition, the growth in the ability to perform computation continues to outpace the growth in the ability to performantly store the results. The ability to analyze simulation output while it is still resident in memory, known as in situ processing, is appealing and sometimes necessary for researchers running large-scale simulations.

In light of

Advances in In Situ Processing Tie to Exascale Targets was written by Nicole Hemsoth at The Next Platform.

Ixia’s Flex Tap Secure+ protects against injection breaches

We’ve probably all used the phrase “too much of anything is a bad thing.” Too much ice cream makes you fat, too many cats and you get called crazy, and too much NFL football on Sunday gets you banned to the doghouse by your wife. + Also on Network World: Network World annual State of the Network survey results + In IT, too much network traffic is certainly a bad thing. We need networks and rely on them to access cloud applications, call people on via videoconferencing and do a whole bunch of other tasks. However, too much traffic and the network becomes unusable and a source of frustration for workers. To read this article in full or to leave a comment, please click here

Ixia’s Flex Tap Secure+ protects against injection breaches

We’ve probably all used the phrase “too much of anything is a bad thing.” Too much ice cream makes you fat, too many cats and you get called crazy, and too much NFL football on Sunday gets you banned to the doghouse by your wife. + Also on Network World: Network World annual State of the Network survey results + In IT, too much network traffic is certainly a bad thing. We need networks and rely on them to access cloud applications, call people on via videoconferencing and do a whole bunch of other tasks. However, too much traffic and the network becomes unusable and a source of frustration for workers. To read this article in full or to leave a comment, please click here

The future of Drupal could be cooking in this lab

Acquia Labs has no illusions of making self-driving cars or shooting things into space like Google X, but the budding applied research arm of enterprise open-source Drupal provider Acquia does have designs on a slew of new applications for what it anticipates will be an increasingly browserless world. Preston So, development manager at Acquia Labs and a 9-year veteran of the Drupal community, shared his vision for Acquia’s skunkworks-plus outfit at the company’s annual Engage event for customers held in Boston this week.To read this article in full or to leave a comment, please click here