Home Blog Page 716

The Cloud Security Alliance Publishes Its Best Practices for Big Data Security

Big Data is a boon for businesses worldwide, but the benefits come at a cost. The more data companies store, the more vulnerable they are to potential security breaches. And data breaches can be enormously expensive when they occur. IBM’s 2016 Cost of Data Breach report found that the average consolidated total cost of a data breach grew from $3.8 million to $4 million in the last year, which makes securing their data an important goal for any company that’s invested in it.

Targeting those companies, the Cloud Security Alliance (CSAreleased a new report on Friday offering 100 best practices for Big Data and cloud security.

Read more at Silicon Angle

Docker Usage Rises, But High Portability Pointless for Most

Docker containers are a powerful and popular development option in the cloud. But, while many IT teams are turning to containers, few can fully take advantage of the technology.

The adoption of Docker — and containers in general — within AWS environments continues to rapidly increase. However, reports show that abandonment rates align with adoption rates, which is interesting for those looking at Docker’s potential.

Docker usage has quintupled in a single year — following the patter of most-hyped technologies, according to a recent study by Datadog, a monitoring and analytics platform. But this raises some questions: Can this growth be sustained? And, if so, what will be the likely patterns of adoption?

Read more at Tech Target

Self-Hosted Alternatives to Popular Services

Most of us use online services like Gmail, Dropbox, Skype, Evernote etc. on a daily basis without having control over the service. There are many benefits to using self-hosted software as opposed to hosted services, one of them being that you have full control over the software and data you are using. Now it’s easier than ever to find a self-hosted alternative to your favorite online service and have complete control over it. This is an ultimate list of 100+ self-hosted alternatives to popular online services that you can use on your Linux server. The article will help you understand the differences between hosted and self-hosted versions and it will help you find the right alternative for you.

Containers Debunked: DevOps, Security and Why Containers Will Not Replace Virtual Machines

The tech industry is full of exciting trends that promise to change the face of the industry and business as we know it, but one that is gaining a huge amount of focus is containers.

However, problems lie with the technology and threaten to root itself deep in the mythology about it, namely the misconceptions over what the technology is, what can be done with it, and the idea that they replace virtual machines.

Lars Herrmann, GM, Integrated Solutions at Red Hat spoke to CBR about five common misconceptions, but first the benefits.

Herrmann, said: “Containerisation can be an amazingly efficient way to do DevOps, so it’s a very practical way to get into a DevOps methodology and process inside an organisation, …”

Read more at CBR 

2016 LiFT Scholarship Winner Tetevi Placide Ekon: Learning Computer Science Online

Tetevi Placide Ekon is a graduate student studying civil engineering at the 2iE Institute for Water and Environmental Engineering in Burkina Faso. He was one of 14 aspiring IT professionals to receive a 2016 Linux Foundation Training (LiFT) scholarship, announced this month.   

Since receiving his bachelor’s degree in water and environmental engineering and moving onto graduate school, he has nurtured a passion for computer science, and especially open source. Tetevi has completed free courses covering Linux, Apache big data systems and more, and he plans to use this scholarship to pursue more advanced training.

Tetevi Placide Ekon, LiFT scholarship recipient
Linux.com: Can you tell me more about yourself and where you are from?

Tetevi Ekon: I am 24 years old, and am studying civil engineering in Burkina-Faso (West Africa) but I am from a neighbouring country to Burkina-Faso: Togo. Both of those countries are French-speaking countries but because my father lives and works in Ghana (English-speaking country), I can speak both English and French.  

Linux.com: Why do you love IT?

Tetevi: I think from as long as I can remember I’ve always loved computers and everything that is related to them in any way. Computer science would have been my major at school but since my father is a civil engineer, that career path seemed like a better choice.

Linux.com: How did you develop that interest/passion?

Tetevi: Although I chose civil engineering over computer science, my love for computers didn’t vanish and in December 2014, I discovered the existence of MOOCs through platforms like Coursera, Edx, Udacity …  I would have loved to do a double major in CS and Civil engineering but that option wasn’t available at my college so MOOCs seemed to be a good way to learn all the CS skills I wanted.

In addition those MOOCs were free and taught by professors from top institutions like MIT, Harvard, and Stanford. All I had to do was a bit of time management and I could actually acquire solid skills in CS while still completing my major in civil engineering. That’s how I really got into programming and all the CS stuff.

Linux.com: How do you plan to use your LiFT scholarship?

Tetevi: I will be taking the “Developing Linux Device Drivers” course. I really am thankful for this scholarship for allowing me to take a course on such an interesting topic as device drivers; a course I never would have been able to take any other way. I have even already received the manual for the course.

Linux.com: How will the scholarship help you achieve your dream of becoming an IT professional?

Tetevi: I am planning on completing this course and then taking the LFCE exam. I’ve taken an operating systems course from Udacity and I really enjoyed that very much. I love the idea of low-level programming and am planning on taking additional low-level programming courses after “Developing Linux Drivers.” As for jobs, I really don’t know what opportunities will come out of a Linux Certified Engineer Certification but I do hope it helps me land a very fulfilling job in the IT world.   

Linux.com: What is your experience with Linux?

Tetevi: I have Linux installed on a virtual machine on my Mac, and I use it most of the time for my online courses. I can program in all the C family programming languages and I do it through an editor, which means I use the Linux terminal to run and debug the programs I write: kind of forces you to learn the “Linux Programming Language” … plus my favorite editor is vim.

Doing my online course assignments on Linux, has made me realise the OS wasn’t that hard to use and, since some of those courses can be really intense (HW/SF Interface from Coursera, Algorithm Toolbox from Coursera, Big Data with Apache from Edx …), it really forces you to learn how the whole Linux system is organised, which is why I have done the LFS101x course through EdX; a course that greatly helped.

Linux.com: Why did you learn Linux?

Tetevi: Linux is present almost anywhere and computer science is present in every discipline; so I think learning more about the Linux system is important for anybody’s future and I certainly am not an exception. I like programming and I am graduate student in Engineering; I think mastering the Linux system is just a must-do for me.

Linux.com: What is your dream job?

Tetevi: I have recently discovered that one of my best qualities is my ability to learn new things very fast. For a long time, I have tried to figure out what was that one thing I can be the very best at in the world, and I really think now that if such a thing exists it must be my ability to learn at a very fast pace.  At first, that sounded a little small of a quality to me but then I realised that in the IT and software world, that was far from being a small quality. I also realised my ability to master a subject is also greatly impacted by my level of interest in the specific subject. I just love IT and anything related to it. I think what IT people are able to do is just amazing, and I am determined to become one of them and a very sharp one.

 

Whether you’re looking to prep for the Linux Foundation Certified System Administrator (LFCS) exam or just looking for some bite-sized ebook tutorials to help you get more familiar with Linux, our free Linux sysadmin tutorial series is for you. Sign up now!

 

Evolving a Best-of-Breed IoT Framework by Gregory Burns

https://www.youtube.com/watch?v=siT2TPnTRHY

The Open Connectivity Consortium and the AllSeen Alliance have made different architectural choices but at a conceptual level there are more similarities than differences. The Open Connectivity Foundation has been formed to reconcile some of the main differences with the goal of developing a best-of-breed platform that evolves on the OIC specification with the addition of selected features from AllJoyn. This talk compares the OIC and AllJoyn approaches and also some of the lessons learned over the last six years. 

Researchers Reveal SDN Security Vulnerability, Propose Solution

Three Italian researchers have published a paper highlighting a security vulnerability in software-defined networking (SDN) that isn’t intrinsic to legacy networks. It’s not a showstopper, though, and they propose a solution to protect against it.

“It” is a new attack they call Know Your Enemy (KYE), through which the bad guys could potentially collect information about a network, such as security tool configuration data that could, for example, reveal attack detection thresholds for network security scanning tools. Or the collected information could be more general in nature, such as quality-of-service or network virtualization policies.

Read more at Virtualization Review

NV Gains Momentum for a Secure DMZ

NV technologies make it possible to employ virtual firewalls that can be attached to specific applications and segregate them based on risk. This is the concept of building a secure DMZ in the data center. The end result is that the virtual firewall is not only capable of examining every packet associated with a specific application, but keeping track of what specific firewall rules are associated with a particular application becomes much simpler.

When deployed in concert with an SDN platform, building a secure DMZ simplifies network security overall. Instead of having to depend on multiple routers and switches strewn across the enterprise, control over network functionality becomes concentrated in the SDN controller.

Read more at SDx Central

Report: DOD Must Embrace Open-Source Software

The Defense Department increasingly relies on software for everything from weapons systems to accounting, but it is failing to capitalize on the power of open-source software, according to a report from the Center for a New American Security.

In “Open Source Software and the Department of Defense,” CNAS argues that a number of cultural factors, biases and regulatory barriers are keeping DOD from embracing open-source options. 

“Unfortunately, software development is not currently a high-profile, high-priority topic in the discussion about diminishing U.S. military technical superiority,” the report states. “It should be.”

Read more at FCW

How Google Does Open Source

TORONTO — Marc Merlin has been working as an engineer at Google since 2002 and has seen (and done) a lot of open source and Linux work during that time. Speaking at the LinuxCon North America event this week, Merlin provided a standing room only audience with an overview how Google uses and contributes to open source.

“Google wouldn’t be around today without open source software,” Merlin said.

Merlin noted that in its early days Google had limited resources to contribute back to open source. Additionally the first generation of Google’s software was all written to be for internal-use and wasn’t originally designed to be open source. He added that it’s not easy to open source software, after the fact.

Read more at Datamation