? Open Sourcing the Docker Hub CLI Tool

At Docker, we are committed to making developer’s lives easier, and maintaining and extending our commitment to the Open Source community and open standards for many of our projects. We believe building new capabilities into the Docker Platform in partnership with our developer community and in full transparency leads to much better software.

Last December, we announced the release of a new experimental Docker Hub CLI tool, also known as hub-tool. This new CLI lets you explore, inspect and manage your content on Docker Hub as well as work with your teams and manage your account. We demonstrated it during the last Docker Community All Hands in December 2020.

This tool is already available with Docker Desktop, so if you are a Windows or Mac user you can try it now. For Linux users, we are pleased to announce that we open sourced the hub-tool code, and it can be found at https://github.com/docker/hub-tool. You can download the binary directly on the release page.

With the open sourcing of hub-tool we have also cut a new v0.3.0 release which includes the following new features:

  • Added an optional argument to the account info command to check the status of Continue reading

ExaGrid updates and streamlines its backup appliances

I'm a sucker for the underdog, so shame on me for focusing on the big guys for so long. It's time to change that with some news from ExaGrid, a competitor of Dell EMC and HP Enterprise in the data backup appliance market.Earlier this month, ExaGrid announced it has increased the capacity of its Tiered Backup Storage appliances while also reducing its offerings from nine systems to seven. Appliances of any size can be mixed and matched in a cluster of up to 32 appliances.ExaGrid also changed the naming convention of the appliances to better reflect their capacity. For example, the discontinued bottom-of-the-line EX3000 had 3TB of full backup capacity, while the new bottom-end appliance is the EX6, with 6TB of full backup capacity storage.To read this article in full, please click here

BGP: What is border gateway protocol, and how does it work?

Finding the best way to get from Point A to Point B is easy if you’re drawing a straight line on a piece of paper, but when Point A is your computer and Point B is a website halfway around the world, things get a bit trickier.In the latter case, Border Gateway Protocol (BGP), the routing protocol used by the global internet, is used to find the best path by weighing the latest network conditions based on reachability and routing information. BGP manages how data packets get delivered between the large networks that make up the internet and makes it possible for the internet as we know it to operate efficiently.What is Border Gateway Protocol? BGP has been called the glue of the Internet and the postal service of the internet. One comparison likens BGP to GPS applications on mobile phones. If you were driving from Boston to Los Angeles, the GPS app decides the best route possible using existing knowledge of road conditions, traffic jams, and whether you want to travel on a toll road. Sometimes, the shortest path is not always the best path. BGP is like having a continuously updated map of the internet from Continue reading

ExaGrid updates and streamlines its backup appliances

I'm a sucker for the underdog, so shame on me for focusing on the big guys for so long. It's time to change that with some news from ExaGrid, a competitor of Dell EMC and HP Enterprise in the data backup appliance market.Earlier this month, ExaGrid announced it has increased the capacity of its Tiered Backup Storage appliances while also reducing its offerings from nine systems to seven. Appliances of any size can be mixed and matched in a cluster of up to 32 appliances.ExaGrid also changed the naming convention of the appliances to better reflect their capacity. For example, the discontinued bottom-of-the-line EX3000 had 3TB of full backup capacity, while the new bottom-end appliance is the EX6, with 6TB of full backup capacity storage.To read this article in full, please click here

Data Privacy Day 2021 – Looking ahead at the always on, always secure, always private Internet

Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet
Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet

Welcome to Data Privacy Day 2021! Last year at this time, I was writing about how Cloudflare builds privacy into everything we do, with little idea about how dramatically the world was going to change. The tragedy of the COVID-19 pandemic has reshaped the way we go about our daily lives. Our dependence on the Internet grew exponentially in 2020 as we started working from home, attending school from home, and participating in online weddings, concerts, parties, and more. So as we begin this new year, it’s impossible to think about data privacy in 2021 without thinking about how an always-on, always secure, always private Internet is more important than ever.

The pandemic wasn’t the only thing to dramatically shape data privacy conversations last year. We saw a flurry of new activity on data protection legislation around the globe, and a trend toward data localization in a variety of jurisdictions.

I don’t think I’m taking any risks when I say that 2021 looks to be another busy year in the world of privacy and data protection. Let me tell you a bit about what that looks like for us at Cloudflare. We’ll be spending a lot of time in Continue reading

Businesses Can’t Afford to Lose Trust in the Encrypted Economy, and Neither Can You

End-to-end encrypted platforms have become an important means to establish online trust for businesses and individuals globally – and law enforcement/intelligence services are struggling to keep up.

Their unfamiliarity and uncertainty is reflected in the ambiguity of political discourse on the subject. On one hand, the European Union endorses strong encryption within data protection laws such as GDPR. On the other, attempts to intercept end-to-end-encrypted communication between suspicious parties resurface over and over again.

The Council Resolution on Encryption, adopted by the Council of the European Union, is the latest example. Politicians continue to strive for both strong end-to-end encryption and getting targeted access to information when – from a security and technology standpoint – the two concepts are at odds. Symbiosis is only possible in political rhetoric.

As the co-founder of an end-to-end encrypted cloud service, I am deeply concerned at how demands for access to encrypted data will affect the security of thousands of businesses and the millions of clients who rely on them in the EU and worldwide.

The Digital Economy Is at Risk

Our digital economy depends on the widespread use of strong encryption. This includes end-to-end encryption, within organizations of all shapes and sizes.

Continue reading

Build Virtual Lab Topology: VirtualBox Support

When I blogged about release 0.2 of my lab-building tool, Kristian Larsson was quick to reply: “now do vrnetlab”. You could guess what my reply was (hint: “submit a pull request”), but I did realize I’d have to add multi-provider support before that would make sense.

Release 0.3 adds support for multiple virtualization providers. You can run six different platforms on vagrant-libvirt (assuming you build the boxes), and I added rudimentary support for Vagrant provider for VirtualBox:

Build Virtual Lab Topology: VirtualBox Support

When I blogged about release 0.2 of my lab-building tool, Kristian Larsson was quick to reply: “now do vrnetlab”. You could guess what my reply was (hint: “submit a pull request”), but I did realize I’d have to add multi-provider support before that would make sense.

Release 0.3 adds support for multiple virtualization providers. You can run six different platforms on vagrant-libvirt (assuming you build the boxes), and I added rudimentary support for Vagrant provider for VirtualBox:

Elixir Notes: Functions

A function is a unit of code that does a thing. With Elixir being a functional language, functions are a core tenant of the language. Elixir has both named functions and anonymous functions. Named Functions Functions are defined in Elixir with the def keyword. Anonymous Functions ...

Elixir Notes: Modules

A module is a collection of functions that can be used to organize your code in a manner similar to namespacing. Modules are defined in Elixir with the defmodule keyword. Considerations Modules must start with an uppercase [A-Z] CamelCase is the formatting convention...

The Future of Network Engineering; some possibilities through 2040 and beyond

Incident 1: October, 2006 Sydney Australia – Simply put, someone hit me with a tough question. Totally out of the box and very much to the point, so to the point that it took me years to swallow the impact. The question was an innocent one asked by one of the sharpest software engineers I […]

The post The Future of Network Engineering; some possibilities through 2040 and beyond appeared first on Packet Pushers.

Serious 10-year-old flaw in Linux sudo command; a new version patches it

Linux users should immediately patch a serious vulnerability to the sudo command that, if exploited, can allow unprivileged users gain root privileges on the host machine.Called Baron Samedit, the flaw has been “hiding in plain sight” for about 10 years, and was discovered earlier this month by researchers at Qualys and reported to sudo developers, who came up with patches Jan. 19, according to a Qualys blog. (The blog includes a video of the flaw being exploited.)To read this article in full, please click here

Serious 10-year-old flaw in Linux sudo command; a new version patches it

Linux users should immediately patch a serious vulnerability to the sudo command that, if exploited, can allow unprivileged users gain root privileges on the host machine.Called Baron Samedit, the flaw has been “hiding in plain sight” for about 10 years, and was discovered earlier this month by researchers at Qualys and reported to sudo developers, who came up with patches Jan. 19, according to a Qualys blog. (The blog includes a video of the flaw being exploited.)To read this article in full, please click here

The Hedge Podcast #66: Daniel Migault and the ADD Working Group

The modern DNS landscape is becoming complex even for the end user. With the advent of so many public resolvers, DNS over TLS (DoT) and DNS over HTTPS (DoH), choosing a DNS resolver has become an important task. The ADD working group will, according to their page—

…focus on discovery and selection of DNS resolvers by DNS clients in a variety of networking environments, including publicnetworks, private networks, and VPNs, supporting both encrypted and unencrypted resolvers.

In this episode of the Hedge, Daniel Migault joins Alvaro Retana and Russ White to discuss Requirements for Discovering Designated Resolvers, draft-box-add-requirements-02.

download

Day Two Cloud 082: You Don’t Need A Service Mesh

Today's Day Two Cloud podcast speaks with the creator of the Envoy proxy, Matt Klein, about the challenges of networking, load balancing, and service discovery in microservices architectures. The upshot? Depending on what you're trying to do and why, you may not need a service mesh. You may not need microservices. Sometimes a VM is just right.