Introducing the Docker Store Private Beta

We are very excited to announce the private beta of Docker Store, a marketplace for trusted and validated dockerized software – free, open source and commercial.  

Our goals with Docker Store are designed around bringing Docker users and ecosystem partners together.

  • Provide a scalable self-service system for ISVs to publish and distribute trusted and enterprise-ready content
  • Provide a publishing process that validates software quality, including; security scanning, component inventory, the open-source license usage and use of best practices in image construction.
  • Provide enterprise users with compliant, commercially supported software from trusted and verified publishers, that is packaged as Docker images.  
  • We’ve added powerful search and browsing capabilities, including categorization.

The use and creation of dockerized content has grown exponentially in the last couple of years.  This demand on content and the expanded use of Docker within the enterprise naturally led to the need for more content, entitlement, visibility into security profiles and compliance.


 

Docker Store builds on the Official Images and the popularity of the Docker Hub for community  content by providing an official marketplace that provides workflows for those who wish to create and distribute content and those that wish to download content to build their Continue reading

Docker Datacenter in AWS and Azure in a few clicks

Introducing Docker Datacenter AWS Quickstart and Azure Marketplace Templates production-ready, high availability deployments in just a few clicks.

The Docker Datacenter AWS Quickstart uses a CloudFormation templates and pre-built templates on Azure Marketplace to make it easier than ever to deploy an enterprise CaaS Docker environment on public cloud infrastructures.

The Docker Datacenter Container as a Service (CaaS) platform for agile application development provides container and cluster orchestration and management that is simple, secure and scalable for enterprises of any size. With our new cloud templates pre-built for Docker Datacenter, developers and IT operations can frictionlessly move dockerized applications to an Amazon EC2 or Microsoft Azure environment without any code changes. Now businesses can quickly realize greater efficiency of computing and operations resources and Docker supported container management and orchestration in just a few steps.

 

What is Docker Datacenter?

Docker Datacenter includes Docker Universal Control Plane, Docker Trusted Registry (DTR), CS Docker Engine with commercial support & subscription to align to your application SLAs:

  • Docker Universal Control Plane (UCP), an enterprise-grade cluster management solution that helps you manage your whole cluster from a single pane of glass
  • Docker Trusted Registry (DTR), an image storage solution that helps securely store and manage the Docker Continue reading

Docker for the Enterprise with Docker Datacenter

Businesses today are digital and fundamentally powered by applications – software that drives revenue, engages with customers and runs their operations. The process of making that software has, until recently, been long and cumbersome.  The addition of Docker and containerization, a new software supply chain is enabled to bring agility, portability and control together into the enterprise.  From security and compliance to shipping more software faster to migrating workloads around sites for the best cost to performance ratio, Docker Datacenter is helping businesses transform their software supply chain.

At DockerCon in Seattle, business of all sizes are sharing their stories Dockering for transformation in development, CI and production environments for all kinds of apps.  In this post, I wanted to highlight those companies who are using Docker Datacenter.

 

HealthDirect Australia: Docker in Production, Look No Hands!

Healthdirect Australia was a long time open source Docker user who in the last year transitioned to a Docker Datacenter environment to gain the benefit of having out of the box integrations of a full Docker supported stack.  Scott Coulton, the lead architect (and also Docker Captain and DockerCon speaker!) is the driving force behind deploying and running the applications Continue reading

IDG Contributor Network: Why smartphones struggle with 911

When it comes to 911, a dichotomy of functionality seems to exist. We have apps to organize our lives, link us to friends and summon our favorite pizza delivery dude. Despite this, providing 911 centers anything more than very coarse location granularity remains a challenge.Apps promoting personal safety do exist. They claim to provide access to 911 through virtual panic buttons. Many also notify friends and family, which oddly enough are often in no position to provide any help or assistance. “Oh my gosh! Fletch is in trouble in Cucamonga, California! Let’s do something! Wait, we’re in New Jersey and have no idea who to call in Cucamonga or what to tell them!”To read this article in full or to leave a comment, please click here

This IS your grandma’s Internet: Samsung plans to invest in IoT

In the future, everything will be connected -- even your grandparents.That's what Samsung Electronics is counting on as it draws up a four-year plan to invest US$1.2 billion in U.S. IoT startups and research.The company sees the Internet of things as a way to provide dementia care and to help millions of elderly people live independently, using a range of devices including some akin to fitness trackers."We can keep people out of hospitals and nursing homes," Samsung CEO Oh-Hyun Kwon said at a company event in Washington, D.C., on Tuesday. "As our populations live longer, these benefits and cost savings for society cannot be ignored."To read this article in full or to leave a comment, please click here

Tech groups say FBI shouldn’t be allowed to do mass hacking

Congress should block proposed changes to rules governing U.S. law enforcement investigations that could give law enforcement agencies new authority to hack thousands of computers, several tech and advocacy groups said.Congress should stop the proposed changes, approved by the Supreme Court in April, that would allow judges to issue warrants for hacking and surveillance in cases where investigators don't know the target computer's location, a coalition of 50 tech trade groups, digital rights groups, and tech companies said in a letter sent Tuesday to congressional leaders.To read this article in full or to leave a comment, please click here

Tech groups say FBI shouldn’t be allowed to do mass hacking

Congress should block proposed changes to rules governing U.S. law enforcement investigations that could give law enforcement agencies new authority to hack thousands of computers, several tech and advocacy groups said. Congress should stop the proposed changes, approved by the Supreme Court in April, that would allow judges to issue warrants for hacking and surveillance in cases where investigators don't know the target computer's location, a coalition of 50 tech trade groups, digital rights groups, and tech companies said in a letter sent Tuesday to congressional leaders.To read this article in full or to leave a comment, please click here

Activists fighting expansion of government powers to hack private computers

Rights activists led by the Electronic Frontier Foundation and the Tor Project are rallying similar organizations and their constituents to step up opposition to a rules change backed by the U.S. Justice Department that would grant law enforcement vast new surveillance authorities and undermine anonymity online.Website operators are  being asked to join the effort today by posting banners on their sites.From an EFF press release: EFF and over 40 partner organizations are holding a day of action for a new campaign—noglobalwarrants.org—to engage citizens about the dangers of Rule 41 and push U.S. lawmakers to oppose it. The process for updating these rules—which govern federal criminal court processes—was intended to deal exclusively with procedural issues. But this year a U.S. judicial committee approved changes in the rule that will expand judicial authority to grant warrants for government hacking. …To read this article in full or to leave a comment, please click here

Activists fighting expansion of government powers to hack private computers

Rights activists led by the Electronic Frontier Foundation and the Tor Project are rallying similar organizations and their constituents to step up opposition to a rules change backed by the U.S. Justice Department that would grant law enforcement vast new surveillance authorities and undermine anonymity online.Website operators are  being asked to join the effort today by posting banners on their sites.From an EFF press release: EFF and over 40 partner organizations are holding a day of action for a new campaign—noglobalwarrants.org—to engage citizens about the dangers of Rule 41 and push U.S. lawmakers to oppose it. The process for updating these rules—which govern federal criminal court processes—was intended to deal exclusively with procedural issues. But this year a U.S. judicial committee approved changes in the rule that will expand judicial authority to grant warrants for government hacking. …To read this article in full or to leave a comment, please click here

FireEye: China still spies on U.S. companies, but maybe less

The United States and China forged an agreement last year not to conduct cyber espionage against corporations, but it seems pretty likely that groups based in China have continued to do so. However, it might not all be the fault of the government there, according to a report from security company FireEye. Of 72 groups that FireEye suspects of operating in China or in China’s interests, 13 of them compromised corporate networks in the U.S., Europe and Japan between last fall - when the agreement was reached - and this month, according the report, “Redline Drawn: China Recalculates Its Use of Cyber Espionage”.To read this article in full or to leave a comment, please click here

FireEye: China still spies on U.S. companies, but maybe less

The United States and China forged an agreement last year not to conduct cyber espionage against corporations, but it seems pretty likely that groups based in China have continued to do so. However, it might not all be the fault of the government there, according to a report from security company FireEye. Of 72 groups that FireEye suspects of operating in China or in China’s interests, 13 of them compromised corporate networks in the U.S., Europe and Japan between last fall - when the agreement was reached - and this month, according the report, “Redline Drawn: China Recalculates Its Use of Cyber Espionage”.To read this article in full or to leave a comment, please click here

Measuring Top Supercomputer Performance in the Real World

When we cover the bi-annual listing of the world’s most powerful supercomputers, the metric at the heart of those results, the high performance Linpack benchmark, the gold standard for over two decades, is the basis. However, many have argued the benchmark is getting long in tooth with its myopic focus on sheer floating point performance over other important factors that determine a supercomputer’s value for real-world applications.

This shift in value stands to reason, since larger machines mean more data coursing through the system, thus an increased reliance on memory and the I/O subsystem, among other factors. While raw floating

Measuring Top Supercomputer Performance in the Real World was written by Nicole Hemsoth at The Next Platform.

Owning The Internet Isn’t Cheating, Which Will Make The Iraqi Government Happy

Before students around the world can embrace summer vacation, they must first endure final exams. This time-tested tradition brings late night cram sessions, the regurgitation of facts and figures, nail biting and sweaty palms. For those who work hard, final exams can build character. And for those who started their summer break too early, there’s an easier option: cheating.

As the spouse of a teacher, I know cheating is a major concern in classrooms around the world. Teachers have a variety of tricks to prevent this including watching their students like hawks, giving out different tests, not allowing labeled bottled drinks or even requiring an ID before entering the room.

Of course, some countries take their prevention measures to the extreme. Iraq literally shut off the internet and Algeria blocked Twitter and Facebook. All of this in an effort to prevent cheating. Yikes!

This is a great reminder of a couple of things:

The internet is a tool. A tool is only as valuable as the hands it is in. It can be used for bad purposes. It can also be used to transform the world. I look at stories like how Land O’Lakes is leveraging data to help their Continue reading

First Steps from CCNA R&S SDN to APIs and Programming

On the same day I posted this post, I’m also speaking in a webinar about the new CCNA R&S exams, hosted by the folks at the Cisco Learning Network (CLN).  The new exams have some SDN content. And it always seems like when you talk to networkers about anything that sounds like SDN, the question comes up: should I learn programming?

Today’s question answers a similar question, one that I hope is useful for the specific audience for the webinar. If you assume that programming is a skill you should learn, and you’re currently studying for CCNA R&S, what’s a good path from CCNA learning to then learning programming? That is, what are some good steps to bridge between those Cisco CCNA R&S SDN exam topics and then learning programming?

Continue reading

Microsoft’s new tactic to promote Edge is power efficiency

Microsoft has been anxious to goose interest in Edge, its replacement browser for Internet Explorer that ships with Windows 10. Thus far, while Windows 10 has piled up 300 million installs, it's offered no coattails for Edge. The latest numbers from Net Applications put Edge at just 4.99 percent share.So, the company's newest tactic? Battery power. In a series of its own power consumption tests "in a controlled lab environment," combined with "the real-world energy telemetry from millions of Windows 10 devices," Microsoft claims you can "simply browse longer with Microsoft Edge" than with Chrome, Firefox or Opera on a Windows 10 device.To read this article in full or to leave a comment, please click here

Top U.S. states and cities with unsecured security cameras

In 2014, Insecam listed over 73,000 unsecured security cameras worldwide, with 11,046 of those open security cameras in the U.S. That number is constantly fluctuating. Today, for example, there are 5,064 unsecured cameras in the U.S. In December 2015, over a span of two days, the unprotected cameras in the U.S. changed from 4,104 to 5,604. A fact that does not change is that the U.S. is still number one for unsecured security cameras – having more than any other nation in the world.To read this article in full or to leave a comment, please click here

Top U.S. states and cities with unsecured security cameras

In 2014, Insecam listed over 73,000 unsecured security cameras worldwide, with 11,046 of those open security cameras in the U.S. That number is constantly fluctuating. Today, for example, there are 5,064 unsecured cameras in the U.S. In December 2015, over a span of two days, the unprotected cameras in the U.S. changed from 4,104 to 5,604. A fact that does not change is that the U.S. is still number one for unsecured security cameras – having more than any other nation in the world.To read this article in full or to leave a comment, please click here