The Joy of Deploying Apache Storm on Docker Swarm

This is a guest repost from Baqend Tech on deploying and redeploying an Apache Storm cluster on top of Docker Swarm instead of deploying on VMs. It's an interesting topic because of the experience Wolfram Wingerath called it "a real joy", which is not a phrase you hear often in tech. Curious, I asked what made using containers such a good experience over using VMs? Here's his reply:

Being pretty new to Docker and Docker Swarm, I'm sure there are many good and bad sides I am not aware of, yet. From my point of view, however, the thing that makes deployment (and operation in general) on top of Docker way more fun than on VMs or even on bare metal is that Docker abstracts from heterogeneity and many issues. Once you have Docker running, you can start something like a MongoDB or a Redis server with a single-line statement. If you have a Docker Swarm cluster, you can do the same, but Docker takes care of distributing the thing you just started to some server in your cluster. Docker even takes care of downloading the correct image in case you don't have it on your machine right now. You also Continue reading

IDG Contributor Network: Fight corporate data loss with secure, easy-to-use collaboration tools

The Panama Papers should be a wake-up call to every CEO, COO, CTO and CIO in every company.Yes, it’s good that alleged malfeasance by governments and big institutions came to light. However, it’s also clear that many companies simply take for granted that their confidential information will remain confidential. This includes data that’s shared within the company, as well as information that’s shared with trusted external partners, such as law firms, financial advisors and consultants. We’re talking everything from instant messages to emails, from documents to databases, from passwords to billing records.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fight corporate data loss with secure, easy-to-use collaboration tools

The Panama Papers should be a wake-up call to every CEO, COO, CTO and CIO in every company.Yes, it’s good that alleged malfeasance by governments and big institutions came to light. However, it’s also clear that many companies simply take for granted that their confidential information will remain confidential. This includes data that’s shared within the company, as well as information that’s shared with trusted external partners, such as law firms, financial advisors and consultants. We’re talking everything from instant messages to emails, from documents to databases, from passwords to billing records.To read this article in full or to leave a comment, please click here

Helium goes Green with new IoT environmental sensor

The biggest claim to fame for startup Helium, an Internet of Things company that started in 2013, has been perhaps co-founder Shawn Fanning.Fanning, of course, is the serial entrepreneur who developed Napster and started other companies. But Helium is making a name for itself by expanding from its software beginnings to usher companies into IoT with sensors, software and cloud services. Its goal is to improve company productivity by putting the streams of data collected from sensors to action.Helium is releasing new sensors, applications and development tools as it builds out a comprehensive product line. The company's latest product is a new sensor called Helium Green, which can monitor temperature, humidity, barometric pressure, motion, and light.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Demystifying the Information Centric Network

Information Centric Networking (ICN) is receiving increasing interest in the context of future wireless networks. So, what is ICN? Why is it important and will it have a role in next generation 5G networks? I think it will and for some very good reasons.ICN is a research area that dates back to about 2006 and has been cooking for over a decade. It defines a new way of inter-networking or, as I see it, a very natural next step now for the internet—if it is done right.The principles and essential architecture of today’s internet are rooted in the system that was created for simple file transfers some 40-plus years ago. The internet has, of course, evolved within this restrictive construct, and the media consumption experience you most likely enjoy today is as much a function of carefully choreographed Content Delivery Networks (CDN) as the old internet client-server model. CDNs and the careful management of content (aka information) are essential to the smooth functioning that we perceive today.To read this article in full or to leave a comment, please click here

Control with Ansible Tower, Part 2

tower-control-series-screen.png

This is the second in a series of posts about how Ansible and Ansible Tower enable you to manage your infrastructure simply, securely, and efficiently.

When we talk about Tower, we often talk in terms of Control, Knowledge, and Delegation. But what does that mean?  In this series of blog posts, we'll describe some of the ways you can use Ansible and Ansible Tower to manage your infrastructure.

In our first blog post, we described how Ansible Tower makes it easy to control the way your infrastructure is configured via configuration definition and continuous remediation.

But controlling the configuration of your infrastructure is just one step. You also need control of the components of your infrastructure - your inventory. You need to do day-to-day management tasks on demand. And Ansible Tower makes those easy as well.

INVENTORY - THE BASICS

If you’ve used Ansible, you know about the basics of inventory. A static Ansible inventory is just an INI-style file that describes your hosts and groups, and optionally some variables that apply to your hosts and groups. Here's an example from the Ansible documentation.

{% raw %}
[atlanta]
host1
host2

[raleigh]
host2
host3

[southeast:children]
atlanta
raleigh

[southeast:vars]
nameserver=dns.southeast.example. Continue reading

Biogen: Data Science and Docker Swarm

written by Theo Platt, Associate Director, Biogen and Karl Gutwin, Senior Data Architect, Biogen The Data Sciences department at Biogen has been using Docker and watching the (r)evolution for a couple of years. Last year, as our experience with Docker grew and … Continued

IDG Contributor Network: Was that a tremor?

There’s a 62 percent chance of an earthquake in the San Francisco Bay Area in the next 30 years, according to the U.S. Geological Service. But no one knows when or where the next big one might be. So, when I heard of startup offering an early-warning service for earthquakes, I wanted to learn more.It’s a tough problem to solve. Thousands of widely dispersed sensors are needed, as an earthquake could originate anywhere. To be effective, an early-warning service also needs a dependable communication network and fast analysis. Take a look at what happened when the last "big one" struck the San Francisco Bay Area.To read this article in full or to leave a comment, please click here

Bangladesh Bank cyber-heist hackers used custom malware to steal $81 million

Hackers behind the Bangladesh bank heist created malware to compromise the SWIFT financial system. Security researchers said the malware allowed attackers to modify a database logging the bank’s activity over the SWIFT network, to delete records of outgoing transfer orders and to intercept incoming transfer confirmation messages, and to manipulate both account balance logs and a printer used to make hard copies of the transfer orders.The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a cooperative owned by 3,000 financial institutions. SWIFT software is supposed to securely send and receive information about financial transactions; the messaging platform is reportedly used by 11,000 banks worldwide. SWIFT admitted to Reuters that it was aware of malware targeting its client software “Alliance Access,” which is not used by all 11,000 banks.To read this article in full or to leave a comment, please click here

Bangladesh Bank cyber-heist hackers used custom malware to steal $81 million

Hackers behind the Bangladesh bank heist created malware to compromise the SWIFT financial system. Security researchers said the malware allowed attackers to modify a database logging the bank’s activity over the SWIFT network, to delete records of outgoing transfer orders and to intercept incoming transfer confirmation messages, and to manipulate both account balance logs and a printer used to make hard copies of the transfer orders.The Society for Worldwide Interbank Financial Telecommunication (SWIFT) is a cooperative owned by 3,000 financial institutions. SWIFT software is supposed to securely send and receive information about financial transactions; the messaging platform is reportedly used by 11,000 banks worldwide. SWIFT admitted to Reuters that it was aware of malware targeting its client software “Alliance Access,” which is not used by all 11,000 banks.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Cyberattack prediction to improve drastically

False positives are a scourge in cyberattack detection partly because of the way machine learning detects attacks. It’s done through what’s called anomaly detection where the artificial intelligence (AI) searches for code that isn’t as expected.That “tends to trigger false positives,” says MIT News, writing about a new AI platform that its scientists say will alleviate the trip-ups.The way they want to do it is to simply add humans to the mix. “Distrust of the system” means results have “to be investigated by humans, anyway,” MIT News says.To read this article in full or to leave a comment, please click here

17% off FitBit Aria WiFi Smart Scale – Deal Alert

Fitbit's Aria WiFi smart scale is a great add-on for anyone using a Fitbit to track progress towards their fitness goals. The current 17% discount shaves $22.64 off its regular $129.95 list price, so you can buy it now on Amazon for $107.31 (see this item on Amazon). The Fitbit Aria will accurately track weight, % body fat, and Body Mass Index (BMI) for up to 8 users. Using WiFi, data is automatically uploaded to your Fitbit account, so you can graph and track your progress easily and privately online.The product averages 3.5 out of 5 stars from over 4,500 people on Amazon (see reviews). Click over to Amazon for more information and to review buying options for the discounted Fitbit Aria smart scale.To read this article in full or to leave a comment, please click here

Raspberry Pi beret: An ode to Prince

Confirming that there really are no original ideas left, I had the thought that the Raspberry Pi Foundation might want to come out with Raspberry Pi berets to honor the musician Prince (and his song "Raspberry Beret") in the wake of his recent death. But sure enough, a Google search reveals that someone already came up with this idea a year ago. MORE: RIP Prince, a legendary musician with a complicated Internet history Albeit, the idea was actually a 2015 April Fool's joke on the website Hackaday. "Now, the partnership we’ve all been waiting for: the Raspberry Pi Foundation and [The Artist Formerly Known As... ] are teaming up to produce a line of Pi-based wearable electronics. The first product from this new, fashionable line of electronics is beyond anything you would expect. It’s called the Raspberry Beret, and it’s shaping up to be a Revolution in wearables."To read this article in full or to leave a comment, please click here

Cool products at OpenStack Austin Summit

New productsThe open source cloud computing market descends on Austin, Texas, this week for the OpenStack Summit, the twice a year conference that showcases the platform and plans for its future. Check out some of the coolest products and services from the show.HPE Helion OpenStack 3.0Key features: Helion OpenStack 3.0, HPE’s latest OpenStack platform release, features enhancements designed to deliver improved configurability and tighter controls to maximize operational efficiency, without vendor lock-in, for easier private cloud deployment. More info.To read this article in full or to leave a comment, please click here

New security fabric to unite Fortinet gear with that of other vendors

Fortinet is embarking on a mission for some of its firewalls and other products and those of third-party vendors to work together to boost security across core networks, remote devices and the cloud.Called Fortinet Security Fabric, the architecture relies on direct communications inherent among certain of its own products (such as the FortiGate next-generation firewall, FortiWeb Web application firewall, FortiMail email security and FortiSandbox advanced threat protection system) as well as with those of other vendors via APIs.Each third-party device can participate in sharing information depending on the capabilities of its API, says John Maddison, Fortinet’s senior vice president of products and solutions.To read this article in full or to leave a comment, please click here

Bangladesh Bank attackers used custom malware that hijacked SWIFT software

The hackers who stole US $81 million from Bangladesh's central bank likely used custom malware designed to interfere with the SWIFT transaction software used by many financial institutions.The attackers attempted to transfer $951 million out of Bangladesh Bank's account at the Federal Reserve Bank of New York in February, but most of the transfers were blocked before completion. The attackers did manage to send $81 million to accounts in the Philippines, and that money is still missing.Researchers from BAE Systems have recently come across several malware components that they believe are part of a custom attack toolkit that was likely used in the heist.To read this article in full or to leave a comment, please click here

Bangladesh Bank attackers used custom malware that hijacked SWIFT software

The hackers who stole US $81 million from Bangladesh's central bank likely used custom malware designed to interfere with the SWIFT transaction software used by many financial institutions.The attackers attempted to transfer $951 million out of Bangladesh Bank's account at the Federal Reserve Bank of New York in February, but most of the transfers were blocked before completion. The attackers did manage to send $81 million to accounts in the Philippines, and that money is still missing.Researchers from BAE Systems have recently come across several malware components that they believe are part of a custom attack toolkit that was likely used in the heist.To read this article in full or to leave a comment, please click here

Empty DDoS Threats: Meet the Armada Collective

Beginning in March 2016, we began hearing reports of a gang of cybercriminals once again calling themselves the Armada Collective. The calling card of the gang was an extortion email sent to a wide variety of online businesses threatening to launch DDoS attacks if they weren't paid in Bitcoin.

Scary Wizard Behind the CurtainFrom The Wizard of Oz (1939)

We heard from more than 100 existing and prospective CloudFlare customers who had received the Armada Collective's emailed threats. We've also compared notes with other DDoS mitigation vendors with customers that had received similar threats.

Our conclusion was a bit of a surprise: we've been unable to find a single incident where the current incarnation of the Armada Collective has actually launched a DDoS attack. In fact, because the extortion emails reuse Bitcoin addresses, there's no way the Armada Collective can tell who has paid and who has not. In spite of that, the cybercrooks have collected hundreds of thousands of dollars in extortion payments.

The Threat

The extortion emails sent by the Armada Collective have been remarkably consistent over the last two months. Here's an example:

To: [Victim Org's Role Account]
From: [email protected]
Subject: DDOS ATTACK!!

FORWARD THIS MAIL TO WHOEVER IS IMPORTANT Continue reading