Docker San Francisco Meetup #50: Swarm Mode

Last Wednesday was Docker’s 50th meetup in San Francisco! There was an awesome turnout from the local Docker community to see Docker’s own Nishant Totla and Dongluo Chen and their talk on Swarm Mode.

Nishant and Dongluo gave a talk entitled ‘Using Docker Swarm Mode and healthchecks to Deploy Applications Without Loss’ where they demonstrated how to do service upgrades without impacting your application.

 

They explained that Docker swarm mode enables users to manage their applications with service primitives and the healthcheck feature provides health indications for a container. Coming up in the Docker 1.13 release, Docker Swarm can connect healthcheck results with load balancers to implement no-loss service upgrade. Check out the talk including Nishant’s demo in the video below.

 

 

Want to learn more about the Docker platform and Docker’s open source projects?



New blog post w/ Continue reading

When DR fails

Someone hacked into my main server. I have a small organization, and the server was an old Apple Xserve 10.6.7 chosen because it’s not the usual host. Now it’s time to scratch security through obscurity off the list.So let’s do a rudimentary recover. Forensics will have to wait.I went to a hosting company to spin up httpd and mail. They’re already my registrar. Pretty big organization.And they don’t have 24/7 support.Since this happened on a Saturday, I was already in trouble. I chose one of their hosting plans. It costs a rudimentary $60 for a web server plus mail. It uses the famous CPanel hosting.To read this article in full or to leave a comment, please click here

When DR fails

Someone hacked into my main server. I have a small organization, and the server was an old Apple Xserve 10.6.7 chosen because it’s not the usual host. Now it’s time to scratch security through obscurity off the list.So let’s do a rudimentary recover. Forensics will have to wait.I went to a hosting company to spin up httpd and mail. They’re already my registrar. Pretty big organization.And they don’t have 24/7 support.Since this happened on a Saturday, I was already in trouble. I chose one of their hosting plans. It costs a rudimentary $60 for a web server plus mail. It uses the famous CPanel hosting.To read this article in full or to leave a comment, please click here

Chasing The Dream Of Code HPC Once, Run Anywhere

In many ways, enterprises and hyperscalers have it easy. Very quickly in the wake of its announcement more than two decades ago, the Java programming language, a kind of virtualized C++, became the de facto standard for coding enterprise applications that run the business. And a slew of innovative storage and data analytics applications that have transformed computing were created by hyperscalers in Java and often open sourced so enterprises could use them.

The HPC community – and it is probably more accurate to say the many HPC communities – has it a bit tougher because they use a variety

Chasing The Dream Of Code HPC Once, Run Anywhere was written by Timothy Prickett Morgan at The Next Platform.

Diamonds could be building blocks for quantum computers

Diamonds are among the most expensive gems in the world, but they could also serve as a building block for quantum computers.Because diamonds are structurally sound, researchers believe they could eliminate some of the challenges involved in making stable quantum computers.The potential of quantum computers is enormous -- they could bring massive gains in computational power and ultimately replace today's PCs and servers.But universal quantum computers are still decades away, partly because of the complexity involved in building such systems. Quantum computers are considered notoriously unstable, but researchers working on ways to resolve existing material, programming, and hardware challenges.To read this article in full or to leave a comment, please click here

Microsoft patent hints at a more human-like Cortana

A newly discovered Microsoft patent hints that Microsoft is developing more personalized, "human-like" responses for Cortana, so she sounds less generic and speaks to the user directly using personal information.  The patent describes how user-specific information and contextual information is retrieved by querying a user profile database and one or more services, which generates a personalized greeting based on user-specific information, such as user inferences and interests, and the contextual information to generate the personalized greetings for presentation by the digital assistant on the client device. To read this article in full or to leave a comment, please click here

Best Deals of the Week, October 31st – November 4th – Deal Alert

Best Deals of the Week, October 31st - November 4thCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 24th. All items are highly rated, and dramatically discounted.43% off NETGEAR AC750 WiFi Range ExtenderBoost the range of your existing WiFi and create a stronger signal in hard-to-reach areas with a WiFi range extender like this one from Netgear, which is highly rated and currently discounted 43% on Amazon. . This compact AC750 wall-plug WiFi booster delivers AC dual band WiFi up to 750 Mbps, and is small and discreet, easily blending into your home decor. Well over 13,000 people have reviewed the AC750 on Amazon (read reviews) and have given it an average of 4 out of 5 stars. Right now its list price of $70 has been reduced to $40. See it now on Amazon.To read this article in full or to leave a comment, please click here

Best Deals of the Week, October 31st – November 4th – Deal Alert

Best Deals of the Week, October 31st - November 4thCheck out this roundup of the best deals on gadgets, gear and other cool stuff we have found this week, the week of October 24th. All items are highly rated, and dramatically discounted.43% off NETGEAR AC750 WiFi Range ExtenderBoost the range of your existing WiFi and create a stronger signal in hard-to-reach areas with a WiFi range extender like this one from Netgear, which is highly rated and currently discounted 43% on Amazon. . This compact AC750 wall-plug WiFi booster delivers AC dual band WiFi up to 750 Mbps, and is small and discreet, easily blending into your home decor. Well over 13,000 people have reviewed the AC750 on Amazon (read reviews) and have given it an average of 4 out of 5 stars. Right now its list price of $70 has been reduced to $40. See it now on Amazon.To read this article in full or to leave a comment, please click here

BGP Tools for the DFZ (1)

Why isn’t inbound load balancing working the way I expect? Why are users having a hard time reaching my web site? What is that strange advertisement I see in my local routing table, and where does it lead? The Default Free Zone (DFZ), the land where there is no default route from the edge of the Internet to the core, can seem like an intimidating place to work. There are, however, a number of tools that can help you discover what is going on with your routes, where routes are coming from, and other information. This short series of posts will provide an overview of these tools, and some use cases along the way to help you understand how and where to use them.

Note: throughout this series, I’m going to be using the LinkedIn AS number and routes, as well as the AS numbers of other public companies for illustration. I’m deviating from my normal practice of using addresses and AS numbers reserved for documentation in order to make it possible for readers to perform the same actions and get something like the same results. Do not use these addresses or AS numbers in your network!

Let’s start by Continue reading

US election day faces specter of cyberattacks

Don't be surprised if hackers make their presence felt on U.S. Election Day. Distributed denial-of-service attacks and high-profile leaks are among the tactics they might use if they try to influence Tuesday's vote. Cybersecurity experts stress it would be incredibly difficult to hack the U.S. election. The system itself is distributed across the country over thousands of voting jurisdictions, making it hard to tamper with on a wide scale.     But hackers could still attempt to sow chaos on Election Day in other ways. The tools and infrastructure to do so are already in place.To read this article in full or to leave a comment, please click here

US election day faces specter of cyberattacks

Don't be surprised if hackers make their presence felt on U.S. Election Day. Distributed denial-of-service attacks and high-profile leaks are among the tactics they might use if they try to influence Tuesday's vote. Cybersecurity experts stress it would be incredibly difficult to hack the U.S. election. The system itself is distributed across the country over thousands of voting jurisdictions, making it hard to tamper with on a wide scale.     But hackers could still attempt to sow chaos on Election Day in other ways. The tools and infrastructure to do so are already in place.To read this article in full or to leave a comment, please click here

How to reduce Windows 10’s on-disk footprint

While certain areas of the Windows file structure may be off-limits to direct action — most notably, deleting files inside the C:\Windows (or %windir%) folder — that doesn’t mean that savvy Windows admins and power users can’t selectively prune excess or obsolete files. You just need the right tools.To read this article in full or to leave a comment, please click here(Insider Story)

No, Apple and Microsoft aren’t trading places

For the past couple of weeks, the interwebs have been buzzing with talk that Microsoft and Apple have somehow switched positions in the tech world. The formerly staid folks in Redmond, so the theory goes, are now the cool technology innovators, while the once audacious corps in Cupertino has been reduced to milking existing cash cows.The idea got rolling in reaction to a provocative post by legendary entrepreneur Steve Blank, who compared Tim Cook’s regime as Apple’s designated caretaker following Steve Jobs to the long, slow decline at Microsoft under Steve Ballmer, Bill Gate’s designated replacement. And the meme took off with the dueling announcements of Microsoft’s slick new Surface Studio computer and Apple’s underwhelming update of its Macbook Pro laptop. To read this article in full or to leave a comment, please click here

Hackers can abuse LTE protocols to knock phones off networks

When you travel between countries, the mobile operators that temporarily provide service to your phone need to communicate with your operator back home. This is done over a global interconnection network where most traffic still uses an ageing protocol, called SS7, that's known to be vulnerable to location tracking, eavesdropping, fraud, denial of service (DoS), SMS interception and other attacks.With the advance of Long-Term Evolution (LTE) networks, some roaming traffic is switching to a newer protocol, called Diameter, that's more secure than SS7 in theory, but which still allows for attacks if it's not deployed with additional security mechanisms.To read this article in full or to leave a comment, please click here

Hackers can abuse LTE protocols to knock phones off networks

When you travel between countries, the mobile operators that temporarily provide service to your phone need to communicate with your operator back home. This is done over a global interconnection network where most traffic still uses an ageing protocol, called SS7, that's known to be vulnerable to location tracking, eavesdropping, fraud, denial of service (DoS), SMS interception and other attacks.With the advance of Long-Term Evolution (LTE) networks, some roaming traffic is switching to a newer protocol, called Diameter, that's more secure than SS7 in theory, but which still allows for attacks if it's not deployed with additional security mechanisms.To read this article in full or to leave a comment, please click here