Apply for a Docker Scholarship and learn how to code!

Today, Docker is proud to announce the launch of the Docker Scholarship Program in partnership with Reactor Core to improve opportunities for underrepresented groups in the tech industry! With the help of the community, we surpassed our goal for the DockerCon 2016 Bump Up Challenge unlocking $50,000 to fund three full tuition scholarships.

 

docker-react.png

 

The Docker Scholarship Program is part of our continued work to improve opportunities for women and underrepresented groups throughout the global Docker ecosystem and encourage inclusivity in the larger tech community.

Docker’s Goal

The goal of the Docker scholarship program is to strengthen the broader tech community by making it more diverse and inclusive to traditionally underrepresented groups. We aim to achieve that goal by providing financial support and mentorship to three students at Reactor Core’s partner schools, Hack Reactor and Telegraph Academy.

Our Partnership with Hack Reactor and Telegraph Academy

Docker believes in the power of innovation and pushing our current technological boundaries. As a driver of innovation, we embrace our role in  advancing opportunities for underrepresented groups in the tech industry. Hack Reactor and Telegraph Academy share in our vision of empowering people and creating more opportunities for every member of our community. Continue reading

OPSEC: Using a fake name for a dark web marketplace purchase

Have you ever wanted to order something online, perhaps from a dark web marketplace, but didn’t want to give your real name? Someone claiming to be an attorney addressed the subject during an OPSEC discussion on Reddit’s DarkNetMarkets.A computer science professor of mine once advised the class to never use your real name online. He wasn’t suggesting we go all out with fake names, but to continually tweak your "real" name such as changing the spelling, shortening it, using nicknames, adding A through Z as a middle initial, etc. That way you see who is tracking you and who is selling your information. If Joey Z Doe gets snail mail or email after registering to purchase something from an online marketplace, then you know that site is selling your information. If you get too wild with the naming convention, then the transaction cannot go through a traditional credit card payment, since it’s too far from a match.To read this article in full or to leave a comment, please click here

OPSEC: Using a fake name on the delivery address for a dark web marketplace purchase

Have you ever wanted to order something online, perhaps from a dark web marketplace, but didn’t want to give your real name? Someone claiming to be an attorney addressed the subject during an OPSEC discussion on Reddit’s DarkNetMarkets.A computer science professor of mine once advised the class to never use your real name online. He wasn’t suggesting for us to go all out with fake names, but to continually tweak your ‘real’ name such as changing the spelling, shortening it, using nicknames, adding A through Z as a middle initial, etc. That way you see who is tracking you and who is selling your information. If Joey Z Doe gets snail mail or email after registering to purchase something from an online marketplace, then you know that site is selling your information. If you get too wild with the naming convention, then the transaction cannot go through a traditional credit card payment since it’s too far from a match.To read this article in full or to leave a comment, please click here

OPSEC: Using a fake name on the delivery address for a dark web marketplace purchase

Have you ever wanted to order something online, perhaps from a dark web marketplace, but didn’t want to give your real name? Someone claiming to be an attorney addressed the subject during an OPSEC discussion on Reddit’s DarkNetMarkets.A computer science professor of mine once advised the class to never use your real name online. He wasn’t suggesting for us to go all out with fake names, but to continually tweak your ‘real’ name such as changing the spelling, shortening it, using nicknames, adding A through Z as a middle initial, etc. That way you see who is tracking you and who is selling your information. If Joey Z Doe gets snail mail or email after registering to purchase something from an online marketplace, then you know that site is selling your information. If you get too wild with the naming convention, then the transaction cannot go through a traditional credit card payment since it’s too far from a match.To read this article in full or to leave a comment, please click here

14 essential Windows 10 keyboard shortcuts

There are plenty of ways to navigate Windows 10, but sometimes using keyboard shortcuts is the most convenient and can save time and effort.You can click on the start button or tap it with your finger on a touchscreen to access the power controls or you can just hit the Windows button on the keyboard without lifting a hand.+More on Network World: 11 hidden tips and tweaks for Windows 10+Once shortcuts make it into your muscle memory they require no thought and can make your time at the computer more efficient. Here’s 10 you’ll want to know.To read this article in full or to leave a comment, please click here

53% off J5 Tactical V1-Pro Ultra Bright 3 Mode Flashlight – Deal Alert

Heavy duty, compact and tough as nails. Perhaps the last flashlight you'll ever need. That's how J5 Tactical describes their V1-Pro. A super bright 300 lumens LED produces an intense beam of light up to 600 feet with high, low and strobe modes. It can take a beating, is weather resistant, and works for hours on a single AA battery. With nearly 6,000 reviews on Amazon, it averages 4.5 out of 5 stars (read reviews). Its typical list price of $29.95 has been reduced by 53% to $13.95. See the discounted J5 Tactical V1-Pro flashlight now on Amazon.To read this article in full or to leave a comment, please click here

Maker of web monitoring software can be sued, says court

The maker of so-called spyware program WebWatcher can be sued for violating state and federal wiretap laws, a U.S. appeals court has ruled, in a case that may have broader implications for online monitoring software and software as a service.The U.S. Court of Appeals for the Sixth Circuit rejected WebWatcher vendor Awareness Technologies' motion to dismiss a lawsuit against the company. The appeals court overturned a lower court ruling granting the motion to dismiss.The appeals court, in a 2-1 decision Tuesday, rejected Awareness' claims that WebWatcher does not intercept communications in real time, in violation of the U.S. wiretap act, but instead allows users to review targets' communications. While plaintiff Javier Luis' lawsuit doesn't address real-time interception of communications, his allegations "give rise to a reasonable inference" of that happening, Judge Ronald Lee Gilman wrote.To read this article in full or to leave a comment, please click here

Maker of web monitoring software can be sued, says court

The maker of so-called spyware program WebWatcher can be sued for violating state and federal wiretap laws, a U.S. appeals court has ruled, in a case that may have broader implications for online monitoring software and software as a service.The U.S. Court of Appeals for the Sixth Circuit rejected WebWatcher vendor Awareness Technologies' motion to dismiss a lawsuit against the company. The appeals court overturned a lower court ruling granting the motion to dismiss.The appeals court, in a 2-1 decision Tuesday, rejected Awareness' claims that WebWatcher does not intercept communications in real time, in violation of the U.S. wiretap act, but instead allows users to review targets' communications. While plaintiff Javier Luis' lawsuit doesn't address real-time interception of communications, his allegations "give rise to a reasonable inference" of that happening, Judge Ronald Lee Gilman wrote.To read this article in full or to leave a comment, please click here

Repeat After Me

callandresponse

Thanks to Tech Field Day, I fly a lot. As Southwest is my airline of choice and I have status, I tend to find myself sitting the slightly more comfortable exit row seating. One of the things that any air passenger sitting in the exit row knows by heart is the exit row briefing. You must listen to the flight attendant brief you on the exit door operation and the evacuation plan. You are also required to answer with a verbal acknowledgment.

I know that verbal acknowledgment is a federal law. I’ve also seen some people blatantly disregard the need to verbal accept responsibility for their seating choice, leading to some hilarious stories. But it also made me think about why making people talk to you is the best way to make them understand what you’re saying

Sotto Voce

Today’s society full of distractions from auto-play videos on Facebook to Pokemon Go parks at midnight is designed to capture the attention span of a human for a few fleeting seconds. Even playing a mini-trailer before a movie trailer is designed to capture someone’s attention for a moment. That’s fine in a world where distraction is assumed and people try Continue reading

How Lyft gets a lift from Amazon’s cloud

Back in 2012, two engineers built the first prototype of ride-hailing app Lyft over the course of three weeks. They hosted it on three virtual machines in Amazon Web Services’ cloud and on May 31 of that year the first-ever Lyft ride was processed.Today, Lyft provides nearly 14 million rides per month and the company continues to run its infrastructure operations from AWS’s cloud, according to CTO Chris Lambert. “The only difference now… We’re taking advantage of many more Amazon technologies,” said Lambert, at a recent AWS Summit in New York, describing the company’s timeline of using the cloud. (See video of Lambert's AWS Summit talk below.)To read this article in full or to leave a comment, please click here

Expect iPhone 7, not iPhone 7 Pro this time around

Apple watchers at Japan's Mac Otokara website affirm based on "reliable sources," that Apple indeed will call its upcoming smartphones the iPhone 7 and 7 Plus, passing on a possible iPhone 7 Pro. There have been rumors that Apple would deliver three new phones in September, with the iPhone 7 Pro featuring a dual-lens camera. It appears now that Apple will stick with two new phones, including the dual-lens camera in the iPhone 7 Plus. MORE: Best iPhone 7 Design Concepts of 2016To read this article in full or to leave a comment, please click here

IDG Contributor Network: Traffic flows better with Digi IoT-based traffic management

What would you do to avoid getting stuck in traffic? Some commuters leave at dawn to beat rush-hour traffic. Unfortunately, there are no shortcuts. Literally. Congestion costs every U.S. household $1,700 annually, according to a recent study by The Economist. These costs result from the time wasted by drivers and the fuel burned by idling cars while stuck in traffic jams. IoT traffic management systems provide relief by remotely adjusting traffic lights to speed traffic flows.  Architecting the solution The traffic management solution design follows a proven IoT design model.To read this article in full or to leave a comment, please click here

More on operationalizing threat intelligence

Coming out of Black Hat a few weeks ago, it’s pretty frightening what’s going on with cyber threats. Overall malware volume is down, but the number of variants has gone up precipitously. In fact, according to the Webroot threat report, about 97 percent of all malware variants are seen only one time. In other words, they are designed to target and attack specific organizations.Yes, enterprise organizations are bolstering defenses with anti-malware gateways and next-generation endpoint security tools, but they are also doubling down on threat intelligence. According to ESG research, 27 percent of enterprise organizations plan to spend significantly more on their threat intelligence programs over the next 12 to 18 months, while another 45 percent say they will spend somewhat more on their threat intelligence programs during this same timeframe.To read this article in full or to leave a comment, please click here

More on Operationalizing Threat Intelligence

Coming out of Black Hat a few weeks ago, it’s pretty frightening what’s going on with cyber-threats.  Overall malware volume is down but the number of variants has gone up precipitously.  In fact, according to the Webroot threat report, about 97% of all malware variants are seen only one time.  In other words, they are designed to target and attack specific organizations.Yes, enterprise organizations are bolstering defenses with anti-malware gateways and next-generation endpoint security tools but they are also doubling down on threat intelligence.  According to ESG research, 27% of enterprise organizations plan to spend significantly more on their threat intelligence programs over the next 12 to 18 months while another 45% say they will spend somewhat more on their threat intelligence programs during this same timeframe (note: I am an ESG employee).To read this article in full or to leave a comment, please click here

More on Operationalizing Threat Intelligence

Coming out of Black Hat a few weeks ago, it’s pretty frightening what’s going on with cyber-threats.  Overall malware volume is down but the number of variants has gone up precipitously.  In fact, according to the Webroot threat report, about 97% of all malware variants are seen only one time.  In other words, they are designed to target and attack specific organizations.Yes, enterprise organizations are bolstering defenses with anti-malware gateways and next-generation endpoint security tools but they are also doubling down on threat intelligence.  According to ESG research, 27% of enterprise organizations plan to spend significantly more on their threat intelligence programs over the next 12 to 18 months while another 45% say they will spend somewhat more on their threat intelligence programs during this same timeframe (note: I am an ESG employee).To read this article in full or to leave a comment, please click here

VMware NSX Technology Partner Ecosystem Session Guide #VMworld 2016

Looking to learn more about how VMware is collaborating with industry leaders and emerging startups to solve customer problems around a range of strategic initiatives and use cases? We have sessions covering strategic initiatives like security, automation, and application continuity, as well as more tactical use cases like micro-segmentation, IT automating IT, disaster recovery, and more. Our rich partner ecosystem is continuing to grow, and our partners will highlight the benefits of their integrated offerings.

Browse the list of the partner sessions below, and then check out the schedule builder on VMworld.com to organize your week. We’re looking forward to seeing you at VMworld US 2016.

Monday, August 29

Time Partner Session ID Session Title
12:30 PM VMware NET7834 Technical Partner Overview: Intro to VMware NSX
1:00 PM – 2:00 PM Brocade NET9460-SPO Use Cases for Software-Defined Data Center with NSX: Transform to Digital Business by Deploying Multi-tenant Agile Network in SDDC Environment
1:00 PM – 2:00 PM Netscout NET9973-SPO Accelerating Digital Transformation in Software-Defined Environments
2:30 PM – 3:30 PM HPE NET7656-SPO Accelerating SDDC Through Mainstream Adoption of Network Virtualization
4:00 PM – 5:00 PM Palo Alto Networks SEC9972-SPO Deep Dive: Secure your Multi-tenant Cloud with Palo Alto Continue reading

VMware NSX Customer Session Guide – #VMworld 2016

Considering rounding out your adoption of the three pillars of the Software-Defined Data Center with network virtualization? Want to see how others have done it? We have more than three dozen unique customers eager to share their experiences about how VMware NSX gave them the power to virtualize their networks and take their operations and businesses to new heights.

We have a range of engaging session formats, from short quick talks to customer discussion panels to customer breakout sessions, to help you see and hear how a wide variety of organizations have put VMware NSX to work for them.

So take a look at the list of the customer sessions below, and then check out the schedule builder on VMworld.com to organize your week. We’re looking forward to seeing you at VMworld US 2016.

Sunday, August 28

Time Type Session ID Session Title
1:00 PM – 1:30 PM Quick Talk NET9382-QT A Software-Defined Data Center in Overseas Bases and Military Operations
2:00 PM – 2:30 PM Quick Talk NET8769-QT Hyper-convergence in Healthcare: The Key to Doing More with Less
3:00 PM – 3:30 PM Quick Talk NET9004-QT Virtually Unstoppable: Scaling NSX to Bridge the Gap between Security & Cloud Continue reading