Samsung’s Tizen 3.0 to take on Android and iOS starting in September

Many alternative mobile operating systems like Firefox have fallen by the wayside while Android and iOS continue to dominate, but Samsung's Tizen has survived.After years of inactivity, Tizen is now back on the map with a major OS upgrade. A new version of the OS -- Tizen 3.0 -- was announced this week at the Samsung Developers Conference in San Francisco.Tizen 3.0 is a big technological upgrade that should make it compatible with some of the latest smartphones and tablets. Other improvements prime the OS for installation in smart appliances, wearables, in-car entertainment systems, drones, TVs, and virtual reality headsets.Tizen 3.0 will be a 64-bit capable OS, like iOS and Android. It will work on devices with some of the latest 64-bit ARM and x86 processors.To read this article in full or to leave a comment, please click here

Running docker containers with native L2 networking & DHCP

A container normally comes up on the docker0 bridge with an IP from the static docker pool. This can be configured by editing docker options and restarting docker engine.
License: CC from Docker Blog / Dave Tucker

There are cases where a container needs to come up on a pre-existing bridge or a user defined bridge. This can be achieved by giving the --net option during docker run or configuring docker daemon options pre to docker engine boot. Creating an image with dhclient installed in it & programmed to start automatically is one way of doing l2-dhcp from the physical network infrastructure. There are other ways of doing this - macvlan, ipvlan or manually plugging in a veth pair between the docker container namespace and the host network stack. I will describe the former method here. macvlan and veth pair addition methods are described here [Cr1].

Step 1: Build a docker image with the required set of tools. An example is given below. This installs dhclient, netutils and iputils along with running sshd. User root’s password is set to centos using the start.sh script. Dockerfile & script source attributed to maxamillion (github link)

Dockerfile
 FROM centos:latest  
MAINTAINER Continue reading

With some advanced preparation, you can survive a ransomware attack  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  You know it's bad when a cyber crime wave makes victims out of U.S. police departments. Law enforcement agencies in at least seven states have been blackmailed by cyber attackers using ransomware. Data on departmental computers has been encrypted by malware and held hostage, with the demand that a ransom be paid in bitcoins. Unaccustomed to giving in to criminals, many of the agencies refused to pay and subsequently lost access to their information forever.Cyber criminals also have been targeting U.S. hospitals. In one high profile case, a California hospital lost access to its critical patient records for a week until a ransom worth about $17,000 was paid. Experts estimate this particular facility was losing as much as $100,000 a day in just one department because it wasn't able to perform CT scans without access to its data.To read this article in full or to leave a comment, please click here

With some advanced preparation, you can survive a ransomware attack  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  You know it's bad when a cyber crime wave makes victims out of U.S. police departments. Law enforcement agencies in at least seven states have been blackmailed by cyber attackers using ransomware. Data on departmental computers has been encrypted by malware and held hostage, with the demand that a ransom be paid in bitcoins. Unaccustomed to giving in to criminals, many of the agencies refused to pay and subsequently lost access to their information forever.Cyber criminals also have been targeting U.S. hospitals. In one high profile case, a California hospital lost access to its critical patient records for a week until a ransom worth about $17,000 was paid. Experts estimate this particular facility was losing as much as $100,000 a day in just one department because it wasn't able to perform CT scans without access to its data.To read this article in full or to leave a comment, please click here

OneNote gets easy video embedding and many more new features

Microsoft has announced a veritable bonanza of new features for its OneNote note-taking software across multiple platforms, providing added functionality for people who rely on it to organize their thoughts. First and foremost, Microsoft made it easier to save online videos for later use inside OneNote. Users can now add a link to one of a handful of popular video services inside OneNote for Windows 10, Mac, and iOS, and Microsoft's software will automatically embed the linked video into the notebook for easy playback later. Users of Microsoft's note-taking software on the iPad can now rearrange audio recordings, images, text, shapes, and any other item on a page by touching and dragging them. To help with that, Microsoft added a lasso tool so that users can select groups of objects and move them around as one unit. To read this article in full or to leave a comment, please click here

CIA: Learn how to make invisible ink, photos – from 1918

The CIA unearths some pretty interesting materials and this week it was touting the oldest once-classified documents in is collection. The mostly cryptic documents, from 1917 and 1918 describe secret writing techniques are believed to be the only remaining classified documents from the World War I era. Any documents describing secret writing fall under the CIA’s purview to declassify, the agency noted. +More on Network World: The hot art in the CIA’s cool art collection+  The CIA website noted that one file outlines the chemicals and techniques necessary for developing certain types of secret writing ink and a method for opening sealed letters without detection. Another communication dated June 14, 1918 – written in French – discloses the formula the German’s used to produce invisible ink.To read this article in full or to leave a comment, please click here

CIA: Learn how to make invisible ink, photos – from 1918

The CIA unearths some pretty interesting materials and this week it was touting the oldest once-classified documents in is collection. The mostly cryptic documents, from 1917 and 1918 describe secret writing techniques are believed to be the only remaining classified documents from the World War I era. Any documents describing secret writing fall under the CIA’s purview to declassify, the agency noted. +More on Network World: The hot art in the CIA’s cool art collection+  The CIA website noted that one file outlines the chemicals and techniques necessary for developing certain types of secret writing ink and a method for opening sealed letters without detection. Another communication dated June 14, 1918 – written in French – discloses the formula the German’s used to produce invisible ink.To read this article in full or to leave a comment, please click here

As tablet sales take a dive, analysts expect smartphone vendors to launch convertibles

The traditional tablet may not be dying, but it’s increasingly being relegated to the low end of the market, according to an IDC report released Thursday. Users are migrating toward convertibles instead, and the vendors are following.IDC said worldwide tablet sales fell 14.7 percent to just 39.6 million units during the first quarter of 2016. Excluding some seasonal holiday upticks, tablet sales have generally declined from their all-time high in the fourth quarter of 2013, when worldwide sales reached 78.6 million units. IDC analyst Jitesh Ubrani said traditional slate tablets still dominate the market with 87.6 percent of all units sold. Increasingly, though, they’ve become “synonymous with the low end of the market,” IDC said in its report. The firm said it believes the market for iPads will continue, but only as replacements, not as new customers purchasing an iPad for the first time.To read this article in full or to leave a comment, please click here

25% off Logitech MX Anywhere 2 Wireless Mobile Mouse – Deal Alert

The MX Anywhere 2 from Logitech is designed to track accurately on virtually any surface you need it to -- from your desk, to an airplane seat, to even a piece of glass. Easy-Switch technology allows you to pair up to three Windows or Mac devices at the same time, and switch between them with the touch of the button. The sculpted shape supports your hand and is designed to feel comfortable for hours on end.  And the MX 2 Anywhere charges quickly. A one-minute charge gets you an hour, and a full charge can last up to two months depending on usage. Over 300 reviewers give this unit an average of 4 out of 5 stars on Amazon (read reviews), and with the 25% discount you can buy it now for $59.99. Learn more about the Logitech MX Anywhere 2 on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: What will customers buy next?

Finding the sweet spot for your sensors is a challenge in many IoT projects. Collect too little data, and there isn’t enough to act on. Collect too much data, and the costs might jeopardize your project. So, where is the sweet spot for your application? GoalA retail store chain was looking for an affordable retail analytics system. It needed to track people's movements to help improve the store layout and learn more about customers' shopping behavior. The solution had to be easy to deploy, be discreet and not require any changes from shoppers. The solution was designed on the fact that most shoppers would have mobile phones, which could be used as an approximate count for the number of people in the store and could also help track their movements as they moved from one Wi-Fi hotspot to another.A "People Sensor" was designed using the principle that mobile phones share their MAC address with Wi-Fi hotspots as part of the "handshake process" in order to obtain connectivity. ( MAC addresses are not associated with a specific individual or a mobile phone number, helping to preserve privacy. ) The sensor was built by modifying the firmware Continue reading

73% off Tribe Premium Water Resistant Cell Phone Armband – Deal Alert

Tribe's armband cell phone holder regularly lists for $29.99, but with this 73% discount you can buy it now for just $7.98. It averages 4.5 stars out of 5 from over 4,700 people on Amazon (read reviews). Tribe's band is designed for activity. It's water-resistant, ultra-light, and made of high quality neoprene so it can flex, twist and bend without stretching or losing its shape. It features a key holder, as well as a reflective strip for increased outdoor visibility. Your touchscreen remains fully functional and accessible through the band's plastic cover. The armband accommodates just about any arm size from 8 to 16-inches. Phone support as follows: Apple iPhone SE, 6/6S (4.7"), 5/5s/5c, Samsung S4, S3, S2, HTC.To read this article in full or to leave a comment, please click here

Communications platform as a service is a digital enabler

Digital transformation has become a top-of-mind initiative for CIOs and business leaders for almost all companies in all verticals. It’s no wonder, as a recent ZK Research study found that digital organizations are 26 percent more profitable than their digitally immature peers.Another interesting data point is that by 2019, 65 percent of workers will use a mobile device first for business purposes. Going digital means shifting to a mobile-first strategy.Becoming a mobile-first organization is more than just building a bunch of standalone mobile applications that customers or workers can use. The process of switching between applications on a desktop is inconvenient, but most users manage. On a mobile device, having to constantly flip between applications while trying to remember data or cut and paste data is inefficient and can make users less productive.To read this article in full or to leave a comment, please click here

Microsoft, Google sweeten cloud freebies

Microsoft and Google each this week increased incentives offered for joining their cloud platforms, highlighting the aggressive nature of this battle for market share.It’s not uncommon for cloud computing providers to offer free services. In the IaaS market all the big providers have free service tiers that allow customers to test their products before paying for them. The expanded freebies announced this week by these vendors goes beyond that though.+ MORE AT NETWORK WORLD: Free cloud storage options | How to store all your photos in the cloud for free +To read this article in full or to leave a comment, please click here

Bolder Battle Lines Drawn At Extreme Scale Computing Borders

The race to reach exascale computing has been a point of national ambition in the United States, which is currently home to the highest number of top-performing supercomputers in the world. But without focused effort, investment, and development in research and the vendor communities, that position is set to come under fire from high performance computing (HPC) developments in China and Japan in particular, as well as elsewhere around the globe.

This national priority of moving toward ever-more capable supercomputers as a source of national competitiveness in manufacturing, healthcare, and other segments was the subject of a detailed report that

Bolder Battle Lines Drawn At Extreme Scale Computing Borders was written by Nicole Hemsoth at The Next Platform.

Developers leak Slack access tokens on GitHub, putting sensitive business data at risk

Developers from hundreds of companies have included access tokens for their Slack accounts in public projects on GitHub, putting their teams' internal chats and other data at risk.Slack has become one of the most popular collaboration and internal communication tools used by companies because of its versatility. The platform's API allows users to develop bots that can receive commands or post content from external services directly in Slack channels, making it easy to automate various tasks.Many developers post the code for their Slack bots -- some of which are small personal projects -- on GitHub, but fail to remove the bots' access tokens. Some developers even include private tokens associated with their own accounts in the code.To read this article in full or to leave a comment, please click here

Developers leak Slack access tokens on GitHub, putting sensitive business data at risk

Developers from hundreds of companies have included access tokens for their Slack accounts in public projects on GitHub, putting their teams' internal chats and other data at risk.Slack has become one of the most popular collaboration and internal communication tools used by companies because of its versatility. The platform's API allows users to develop bots that can receive commands or post content from external services directly in Slack channels, making it easy to automate various tasks.Many developers post the code for their Slack bots -- some of which are small personal projects -- on GitHub, but fail to remove the bots' access tokens. Some developers even include private tokens associated with their own accounts in the code.To read this article in full or to leave a comment, please click here