5 Minutes with the Docker Captains

Docker Captain is a distinction that Docker awards select members of the community that are both experts in their field and are passionate about sharing their Docker knowledge with others.

captains-final+title

This week we are highlighting 3 of our outstanding Captains who are making September one filled with Docker learnings and events. Read on to learn more about how they got started, what they love most about Docker, and why Docker.

Alex Ellis

Alex is a Principal Application Developer with expertise in the full Microsoft .NET stack, Node.js and Ruby. He enjoys making robots and IoT-connected projects with Linux and the Raspberry PI microcomputer. He is a writer for Linux User and Developer magazine and also produces tutorials on Docker, coding and IoT for his tech blog at alexellis.io.

As a Docker Captain, how do you share that learning with the community?

I started out by sharing tutorials and code on my blog alexellis.io and on Github. More recently I’ve attended local meet-up groups, conferences and tech events to speak and tell a story about Docker and cool hacks. I joined Twitter in March and it’s definitely a must-have for reaching people.

Why do you like Docker?

Docker Continue reading

IBM shows how fast its brain-like chip can learn

Developing a computer that can be as decisive and intelligent as humans is on IBM's mind, and it's making progress toward achieving that goal.IBM's computer chip called TrueNorth is designed to emulate the functions of a human brain. The company is now running tests and benchmarking TrueNorth to demonstrate how fast and power efficient the chips can be compared to today's computers.The results of the head-to-head contest are impressive. IBM says TrueNorth can engage in deep learning and make decisions based on associations and probabilities, much like human brains. It can do so while consuming a fraction of the power used by chips in other computers for the same purpose.To read this article in full or to leave a comment, please click here

The massive Yahoo hack ranks as the world’s biggest — so far

When Yahoo said on Thursday that data from at least 500 million user accounts had been hacked, it wasn't just admitting to a huge failing in data security -- it was admitting to the biggest hack the world has ever seen.Until Thursday, the previous largest known hack was the 2008 breach that hit almost 360 million MySpace accounts, according to a ranking by the "Have I been pwned" website. Like the Yahoo breach, the hack was only publicly disclosed this year after data was offered on a hacker forum.And only three breaches had ranked above the 100 million level:LinkedIn reported a loss of 167 million email addresses and passwords. They were originally stolen in 2012 but not publicly disclosed until 2016, again after the data was offered on an underground "dark market" site.To read this article in full or to leave a comment, please click here

The massive Yahoo hack ranks as the world’s biggest — so far

When Yahoo said on Thursday that data from at least 500 million user accounts had been hacked, it wasn't just admitting to a huge failing in data security -- it was admitting to the biggest hack the world has ever seen.Until Thursday, the previous largest known hack was the 2008 breach that hit almost 360 million MySpace accounts, according to a ranking by the "Have I been pwned" website. Like the Yahoo breach, the hack was only publicly disclosed this year after data was offered on a hacker forum.And only three breaches had ranked above the 100 million level:LinkedIn reported a loss of 167 million email addresses and passwords. They were originally stolen in 2012 but not publicly disclosed until 2016, again after the data was offered on an underground "dark market" site.To read this article in full or to leave a comment, please click here

Google Fiber push advances in Nashville

Google Fiber won a victory in Nashville as the city's Metro Council approved an ordinance called “One Touch Make Ready,” that would speed up the company's fiber-optic cable installations.The ordinance, passed Wednesday night by a voice vote, gives Google Fiber and other ISPs quicker access to utility poles for deploying fast broadband with fiber-optic cable.Without the measure, each ISP has had to send out a separate crew to a utility pole to move its own line to make room for a new one. The ordinance would permit a single company to make the wire adjustments on a pole instead of waiting for existing providers — competitors like Comcast or AT&T-- to make the changes, which could take months.To read this article in full or to leave a comment, please click here

Google Fiber push advances in Nashville

Google Fiber won a victory in Nashville as the city's Metro Council approved an ordinance called “One Touch Make Ready,” that would speed up the company's fiber-optic cable installations.The ordinance, passed Wednesday night by a voice vote, gives Google Fiber and other ISPs quicker access to utility poles for deploying fast broadband with fiber-optic cable.Without the measure, each ISP has had to send out a separate crew to a utility pole to move its own line to make room for a new one. The ordinance would permit a single company to make the wire adjustments on a pole instead of waiting for existing providers — competitors like Comcast or AT&T-- to make the changes, which could take months.To read this article in full or to leave a comment, please click here

Yahoo data breach affects at least 500 million users

A massive breach at Yahoo compromised account details from at least 500 million users, and the company is blaming the attack on state-sponsored hackers.Names, email addresses, telephone numbers, and hashed passwords may have been stolen as part of the hack, which occurred in late 2014, Yahoo said.The company reported the breach on Thursday, after a stolen database from the company went on sale on the black market last month.However, the hacker behind the sale claimed that the stolen database involved only 200 million users and was likely obtained in 2012.To read this article in full or to leave a comment, please click here

Yahoo data breach affects at least 500 million users

A massive breach at Yahoo compromised account details from at least 500 million users, and the company is blaming the attack on state-sponsored hackers. Names, email addresses, telephone numbers, and hashed passwords may have been stolen as part of the hack, which occurred in late 2014, Yahoo said. The company reported the breach on Thursday, after a stolen database from the company went on sale on the black market last month. However, the hacker behind the sale claimed that the stolen database involved only 200 million users and was likely obtained in 2012.To read this article in full or to leave a comment, please click here

Homeland Security issues call to action on IoT security

U.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to “accelerate everything you’re doing” to secure the internet of things. As the Assistant Secretary for Cyber Policy at DHS says, IoT security is a public safety issue that involves protecting both the nation’s physical and cyber infrastructures.Acknowledging a growing national dependency on the internet of things, be it in the medical, utility or transportation fields, Silvers says IoT has his department’s full attention. And a straightforward undertaking it is not, he says.To read this article in full or to leave a comment, please click here

Homeland Security issues call to action on IoT security

U.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to “accelerate everything you’re doing” to secure the internet of things. As the Assistant Secretary for Cyber Policy at DHS says, IoT security is a public safety issue that involves protecting both the nation’s physical and cyber infrastructures.Acknowledging a growing national dependency on the internet of things, be it in the medical, utility or transportation fields, Silvers says IoT has his department’s full attention. And a straightforward undertaking it is not, he says.To read this article in full or to leave a comment, please click here

Federal cyber incidents grew an astounding 1,300% between 2006 and 2015

That’s one amazingly scary number: Since 2006 cyber incidents involving the Federal government have grown 1,300%.Another Government Accountability Office report on Federal cybersecurity out this week offers little in the way of optimism for the cyber-safeguard of the massive resources the government has control over.+More on Network World: Network security weaknesses plague federal agencies+“Federal information systems and networks are inherently at risk. They are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the myriad of operating systems, applications, and devices comprising the systems and networks. Compounding the risk, systems used by federal agencies are often riddled with security vulnerabilities—both known and unknown. For example, the national vulnerability database maintained by the Mitre Corporation has identified 78,907 publicly known cybersecurity vulnerabilities and exposures as of September 15, 2016, with more being added each day,” the GAO wrote.To read this article in full or to leave a comment, please click here

Federal cyber incidents grew an astounding 1,300% between 2006 and 2015

That’s one amazingly scary number: Since 2006 cyber incidents involving the Federal government have grown 1,300%.Another Government Accountability Office report on Federal cybersecurity out this week offers little in the way of optimism for the cyber-safeguard of the massive resources the government has control over.+More on Network World: Network security weaknesses plague federal agencies+“Federal information systems and networks are inherently at risk. They are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing, and protecting the myriad of operating systems, applications, and devices comprising the systems and networks. Compounding the risk, systems used by federal agencies are often riddled with security vulnerabilities—both known and unknown. For example, the national vulnerability database maintained by the Mitre Corporation has identified 78,907 publicly known cybersecurity vulnerabilities and exposures as of September 15, 2016, with more being added each day,” the GAO wrote.To read this article in full or to leave a comment, please click here

Site that leaked Colin Powell’s emails dumps First Lady’s passport

The site that leaked Colin Powell's stolen emails has also allegedly obtained a scan of Michelle Obama's passport. On Thursday, the site DCLeaks began circulating the passport image on Twitter and leaking it to the press. The image includes the U.S. First Lady's alleged passport number. The site tweeted out the scan after obtaining stolen emails it claims are from a White House aide named Ian Mellul. The files, which are posted on DCLeaks, appear to come from Mellul's Gmail account and date back to February 2015.Although DCLeaks claims to be the work of "American hacktivists," some security experts suspect that the site is a front for Russian state-sponsored hackers.  To read this article in full or to leave a comment, please click here

Site that leaked Colin Powell’s emails dumps First Lady’s passport

The site that leaked Colin Powell's stolen emails has also allegedly obtained a scan of Michelle Obama's passport. On Thursday, the site DCLeaks began circulating the passport image on Twitter and leaking it to the press. The image includes the U.S. First Lady's alleged passport number. The site tweeted out the scan after obtaining stolen emails it claims are from a White House aide named Ian Mellul. The files, which are posted on DCLeaks, appear to come from Mellul's Gmail account and date back to February 2015.Although DCLeaks claims to be the work of "American hacktivists," some security experts suspect that the site is a front for Russian state-sponsored hackers.  To read this article in full or to leave a comment, please click here

Citigroup is cutting costs by making storage simpler

Citigroup is using software-defined storage to build an infrastructure that could last 25 years – while generations of hardware come and go.The financial services company needs to transform its storage architecture to deal with growing and changing demands, says Dan Maslowski, global head of storage and engineered systems. By simplifying its architecture, Citigroup expects to slash its operational expenses, which make up most of its storage costs.Citigroup’s need for storage is growing so fast that if costs don’t go down, the company’s spending on storage might eat up its entire IT budget in a few years, Maslowski told an audience at the Storage Developer Conference in Santa Clara, California, on Tuesday.To read this article in full or to leave a comment, please click here