Docker in Production: A History of Failure
My first encounter with docker goes back to early 2015. Docker was experimented with to find out whether it could benefit us. At the time it wasn’t possible to run a container [in the background] and there wasn’t any command to see what was running, debug or ssh into the container. The experiment was quick, Docker was useless and closer to an alpha prototype than a release.
Fast forward to 2016. New job, new company and docker hype is growing like mad. Developers here have pushed docker into production projects, we’re stuck with it. On the bright side, the run command finally works, we can start, stop and see containers. It is functional.
Plumbing the Cloud for Containers
Container systems are becoming easier to install, but setting up and managing production container platforms can still be challenging. In his presentation at CloudNativeCon in Seattle, Michael Friis, Product Manager at Docker, will explain what it takes to install and maintain container platforms on public clouds and describe some important considerations for choosing load balancers, logging, and storage solutions. Here, Friis gives us a preview of his talk and shares some recommended practices.
- AWS reveals on-premises Linux test environment
Keys to NFVI Components Selection
In this series on network functions virtualization (NFV), we’ve been spending time talking about some of the pitfalls and challenges involved in adopting NFVI components – and how to plan for deployment. This week we’re going to spend some time breaking down what to look for in moving to NFV hardware components.
The information I have gathered is based on feedback from various service providers and product experts on how to get NFVI ready for prime time. They have identified many of the key areas to look for in NFV hardware components.
Aaron Swartz Day and International Hackathon: Scheduled Speakers
In San Francisco, we have a hackathon going on, with an upstairs, where speakers are going on, and a downstairs, where code and society are being “hacked” on.
- Keynote: Collaboration Beyond Code by Jilayne Lovejoy, Principal Open Source Counsel, ARM
Ten dozen Embedded Linux Conference and IoT Summit videos
Videos of ten dozen talks and keynotes from last month’s Embedded Linux Conference and IoT Summit in Berlin are now available for free streaming on YouTube.
The videos span a wide range of topics relating to developing, deploying, and maintaining embedded devices and Internet-of-things gizmos that incorporate various forms of embedded Linux, Android. and other open source software. ELCE 2016 and the colocated IoT Summit featured more than 150 conference sessions, and offered “an extended scope to include user-space developers, the people building applications on embedded Linux,” says the Linux Foundation. The LF promotes the annual event as “the preeminent space for kernel, systems and user space developers to collaborate and learn.”
- Security advisories for Friday
Netherlands to trial Internet voting [Ed: terrible idea, for many reasons.]
The Dutch government will this year test the possibilities of voting via the Internet. The test will include citizens abroad: the pilot, by the Ministry of the Interior, will involve the city of The Hague, which manages the registration of citizens abroad.
The city recently invited citizens to take part in the tests - a simulated election. Participants will be able to vote for fictitious political parties and candidates. The pilot is intended to test security measures, and to check if Internet voting reliable.
U.S. boosting cyber defenses, but not police presence, for election
Federal and state authorities are beefing up cyber defenses against potential electronic attacks on voting systems ahead of U.S. elections on November 8, but taking few new steps to guard against possible civil unrest or violence.
The threat of computer hacking and the potential for violent clashes is darkening an already rancorous presidential race between Democrat Hillary Clinton and Republican Donald Trump, amid fears that Russia or other actors could spread political misinformation online or perhaps tamper with voting.
10 ways to make sure your remote workers are being safe
With an ever-expanding mobile workforce, infosec teams are increasingly tasked with extending cybersecurity safeguards beyond the physical and virtual walls of their organizations. With endpoints not only increasing but on the move, the challenge is real. In addition to implementing the appropriate technical defenses, there is an important aspect to protecting corporate data and systems: Asking end-users to get involved.
Did the Mirai Botnet Really Take Liberia Offline?
KrebsOnSecurity received many a missive over the past 24 hours from readers who wanted to know why I’d not written about widespread media reports that Mirai — a malware strain made from hacked “Internet of Things” (IoT) devices such as poorly secured routers and IP cameras — was used to knock the entire country of Liberia offline. The trouble is, as far as I can tell no such nationwide outage actually occurred.
First, a quick recap on Mirai: This blog was taken offline in September following a record 620 Gpbs attack launched by a Mirai botnet. The source code for Mirai was leaked online at the end of September. Since then, the code has been forked several times, resulting in the emergence of several large Mirai-based botnets. In late October, many of the Internet’s top destinations went offline for the better part of a day when Mirai was used to attack Internet infrastructure firm Dyn.
"If you have a Linux computer which is over 6 months old, then I advise you to keep reading .. Designed by an elite team of Linux developers, Scanguard™ provides users with a simple one click solution which will scan your computer for the latest threats plus give your computer a much needed speed boost"submitted by /u/khz6955