Docker Forks the Open Source Bubble

The magic of open source.

If I’ve heard this once, I’ve heard it a thousand times.

Put the software “out there,” and someone, somewhere, will add features because they need or want them, fix bugs because they’ve run into them, and generally just add value to the software you’ve created for free.

This is why, I’m told, open source is so much better than open standards—isn’t open standards just another name for a bogged down, broken process where vendors try to run in fourteen different directions at once? Where customers really aren’t heard for the din of careers being made, and technical solutions far too often take a back seat to political considerations? Open source is going to ride in and save the day, I’m told, making all complex software free and better.

reaction-02Unicorns. No, seriously. Or maybe you prefer frogs on stilts. It doesn’t work this way in the real world. If any project, whether it be an open source project or an open standard, gains enough community buy-in, it will succeed. If any project, whether it be an open source project or an open standard, doesn’t gain community buy-in, it is dead—no matter which company supports it, Continue reading

Last.fm breach from 2012 affected 43 million users

Stolen data obtained from music site Last.fm back in 2012 has surfaced, and it looks like hackers made off with accounts belonging to more than 43 million users.That's according to LeakedSource, a repository for data breaches that obtained a copy of the stolen data. Included in the trove are users' names, email addresses and passwords secured with an aging hashing algorithm called MD5, LeakedSource reported in a blog post on Thursday.Last.fm hasn’t responded so far to a request for comment. The music service reported the breach four years ago and asked all its users to change their passwords immediately. It never made clear how many accounts were affected, however, or the hashing method it used to secure the passwords.To read this article in full or to leave a comment, please click here

Last.fm breach from 2012 affected 43 million users

Stolen data obtained from music site Last.fm back in 2012 has surfaced, and it looks like hackers made off with accounts belonging to more than 43 million users.That's according to LeakedSource, a repository for data breaches that obtained a copy of the stolen data. Included in the trove are users' names, email addresses and passwords secured with an aging hashing algorithm called MD5, LeakedSource reported in a blog post on Thursday.Last.fm hasn’t responded so far to a request for comment. The music service reported the breach four years ago and asked all its users to change their passwords immediately. It never made clear how many accounts were affected, however, or the hashing method it used to secure the passwords.To read this article in full or to leave a comment, please click here

NSX, and its new chief, take center stage at VMWorld

July 23, 2012 was a big day for VMware. It was the day the company, which up until then had been known mostly for bringing server virtualization to the enterprise, entered the networking market. By spending $1.26 billion to buy startup Nicira, VMware got something else too: Martin Casado, considered one of the forefathers of the software defined networking movement. Fast forward to Feb. 24, 2016 and it was another big day for VMware. It was the day Casado left the company for a position at Venture capital firm Andreessen Horowitz. Thrust into the spotlight to replace Casado on the day of his amicable departure was Rajiv Ramaswami, a former executive at Broadcom and Cisco who now leads VMware's networking and security business unit. This week at VMWorld in Las Vegas Ramaswami and VMware's network virtualization product, NSX, took center stage.To read this article in full or to leave a comment, please click here

Survey reveals desire and constraints of enterprise network modernization

There’s broad recognition among enterprises of the need for network modernization, but many decision-makers are constrained by the prospect of capital equipment outlays, proving a solid return on investment, or fear of being locked into a proprietary solution. Those are key findings in a soon to be published survey conducted by IDG Research Services. One third of IT decision-makers think it’s highly likely their organizations will modernize their network connectivity strategies over the next year and another 46 percent indicate there’s some likelihood. Today, virtually every enterprise places a premium on flexibility and agility, and few are willing to commit to long-term, costly outlays for network technology that can’t adapt to their future needs.To read this article in full or to leave a comment, please click here

Survey reveals desire and constraints of enterprise network modernization

There’s broad recognition among enterprises of the need for network modernization, but many decision-makers are constrained by the prospect of capital equipment outlays, proving a solid return on investment, or fear of being locked into a proprietary solution. Those are key findings in a soon to be published survey conducted by IDG Research Services. One third of IT decision-makers think it’s highly likely their organizations will modernize their network connectivity strategies over the next year and another 46 percent indicate there’s some likelihood. Today, virtually every enterprise places a premium on flexibility and agility, and few are willing to commit to long-term, costly outlays for network technology that can’t adapt to their future needs.To read this article in full or to leave a comment, please click here

“Guccifer” gets 52 months in prison for hacking crimes

The U.S. Department of Justice today said Marcel Lazar, aka hacker “Guccifer,” was sentenced today to 52 months in prison for unauthorized access to a protected computer and aggravated identity theft.+More on Network World: FBI: Bank robbery? There’s an app for that+Lazar, originally from Romania, was extradited to the U.S. earlier this year and was awaiting this sentencing for breaking into the email and social media accounts of various U.S. officials including former U.S. Secretary of State Colin Powell as well as a the daughter of former President George H.W. Bush.To read this article in full or to leave a comment, please click here

“Guccifer” gets 52 months in prison for hacking crimes

The U.S. Department of Justice today said Marcel Lazar, aka hacker “Guccifer,” was sentenced today to 52 months in prison for unauthorized access to a protected computer and aggravated identity theft.+More on Network World: FBI: Bank robbery? There’s an app for that+Lazar, originally from Romania, was extradited to the U.S. earlier this year and was awaiting this sentencing for breaking into the email and social media accounts of various U.S. officials including former U.S. Secretary of State Colin Powell as well as a the daughter of former President George H.W. Bush.To read this article in full or to leave a comment, please click here

BrandPost: Bringing Flexibility to the WAN

By Joe Faranetta MPLS (multi-protocol label switching) VPNs have long been recognized as a preferred option for dedicated, high performance connectivity over a wide area network (WAN), such as linking data centers or branch offices that require high volume and reliability. But smaller groups and individual workers typically were offloaded to the public internet, primarily utilizing the IPsec suite of protocols to create a VPN link. The MPLS VPN is a high-speed, single-carrier-operated network. An enterprise can directly link any of its MPLS VPN sites directly and at high speeds, without going through the public internet routing process where data packets can travel circuitous routes and often require retransmission of lost packets.To read this article in full or to leave a comment, please click here

Iris scans as ID grow in use

Iris scanner technology is emerging in smartphones, including the new Samsung Note 7, but is expected to come soon to cars and ATM machines to verify a user’s identity.Experts say an iris scan can be more reliable than a fingerprint scan, which is a big reason it is expected to be used in more devices in coming years. Each iris, the colorful part of the eye that forms a ring around the pupil, is unique and therefore a good biometric indicator.Samsung’s Android 6-based Note 7, which shipped on Aug. 19, takes advantage of the technology as well as the Windows 10 Mobile-based HP Elite X3.To read this article in full or to leave a comment, please click here

DJI’s handheld gimbal promises cinematic images from smartphones

DJI says smartphone users will be able to shoot smoother, more cinematic video with a new handheld gadget that packs video stabilization technology used on the company's drones.The Osmo Mobile, which was announced at the IFA trade show in Berlin on Thursday, combines a three-axis camera gimbal with a larger handle and smartphone mount.In a demonstration, the device indeed produced much smoother shots than when shooting smartphone video handheld. And I could tell it was working to keep the smartphone steady because I could feel a low-level vibration in the handle while using it. It was the gimbal continuously readjusting to compensate for shakes and small movements of my hand.To read this article in full or to leave a comment, please click here

Keezel’s wireless device protects hotel Wi-Fi , home IoT connections

In cryptography, the "man in the middle" is usually an attacker -- but when Keezel wants to get between you and the Wi-Fi connection in your hotel or your home, it's for your own good.After a long crowdfunding campaign, the company is getting ready to ship its Wi-Fi security device, also called Keezel, in October. Any orders it picks up at the IFA trade show in Berlin this week will be fulfilled from a second production run in November, said Keezel CEO Aike Muller.One problem Keezel aims to solve is that hotel and other public Wi-Fi services are often unencrypted, leaving your data wide open to eavesdropping by others in the area. If there is authentication, it's often only for billing purposes, and performed by a captive portal after the traffic has gone over the air in the clear.To read this article in full or to leave a comment, please click here

Keezel’s wireless device protects hotel Wi-Fi , home IoT connections

In cryptography, the "man in the middle" is usually an attacker -- but when Keezel wants to get between you and the Wi-Fi connection in your hotel or your home, it's for your own good.After a long crowdfunding campaign, the company is getting ready to ship its Wi-Fi security device, also called Keezel, in October. Any orders it picks up at the IFA trade show in Berlin this week will be fulfilled from a second production run in November, said Keezel CEO Aike Muller.One problem Keezel aims to solve is that hotel and other public Wi-Fi services are often unencrypted, leaving your data wide open to eavesdropping by others in the area. If there is authentication, it's often only for billing purposes, and performed by a captive portal after the traffic has gone over the air in the clear.To read this article in full or to leave a comment, please click here

Docker Online Meetup #42: Docker Captains Share Tips & Tricks for Using Docker 1.12

For this week’s Docker Online Meetup, Docker Captains Ajeet Singh Raina, Viktor Farcic and Bret Fisher shared their tips and tricks for built In Docker orchestration.

Ajeet talked about the best ways to use Docker 1.12 Service Discovery and shared key takeaways. Viktor talked about best practices for setting a Swarm cluster and integrating it with HAProxy. Bret concluded the meetup with a presentation on Docker 1.12 command options and aliases including cli aliases for quick container management; the shortest path to secure production-ready swarm; how to use cli filters for easier management of larger swarms; and docker remote cli security setup.

 

 

Want to learn more about Docker 1.12 and orchestration? Check out these resources: