Home Blog Page 762

Using Nano-Segmentation Apcera Looks to Bring Cloud Trust to Docker Container Deployment

Highly secure trusted cloud platform provider Apcera, Inc. today announced the release of its own approach to securely managing Docker containers in production at scale. The product is an enterprise-ready orchestration framework called the Apcera Trusted Cloud Platform and it is designed to address today’s gaps in container deployment, management and scalability with an eye for trust and security.

Docker containers continue to ease into the DevOps lifecycle of enterprise application deployment. According to Datadog, a cloud monitoring-firm, research released shows that Docker adoption is up 30 percent in the past 12 months from 8.2 percent of the company’s customers to 10.7 percent. 

Read more at Silicon Angle

Can IBM Really Make a Business Out of Blockchain?

On Tuesday, IBM announced the formal launch of a so-called “Bluemix Garage” in New York, where developers can experiment with financial-tech software and explore new forms of blockchain innovation. 

According to Jerry Cuomo, vice president of blockchain and cloud at IBM, the plan will succeed because the company offers a full-suite of tools that allow developers to get up and running quickly while also benefiting from a mentoring environment at the Bluemix Garage. 

While the initiatives Cuomo described may pan out, the most important choice by IBM will likely prove to be its decision to embrace an open-source development model. Specifically, it is a big contributor of code to theHyperLedger project, a joint collaboration that also involves IntelCisco, and JP Morgan, and it is being shepherded by the Linux Foundation.

Read more at Fortune

MongoDB Launches Atlas, Its New Database-as-a-Service Offering

MongoDB, the company behind the eponymous open source database, is launching Atlas today, its third major revenue-generating service.

Atlas is MongoDB’s database-as-a-service offering that provides users with a managed database service. The service will offer pay-as-you-go pricing and will initially allow users to deploy on Amazon Web Services (AWS), with support for Microsoft Azure and Google Cloud Platform coming later.

Read more at Tech Republic

Red Hat Insights Now Extends to Containers, OpenStack

Red Hat announced a number of enhancement to its analytics platform, including  risk assessment and remediation planning capabilities for virtualization hosts, containers, and OpenStack-based private clouds.

Red Hat Insights provides highly scalable, prescriptive analytics across users hybrid IT infrastructure. It is delivered as a Software-as-a-Service offering and generates tailored remediation steps that can be fully automated. The newest additions and enhancements to Red Hat Insights include:

  • Container workload analysis: Red Hat Insights now offers workload analysis for containers, giving operations the visibility they need to more safely adopt containers.
  • Actionable intelligence for OpenStack private clouds and KVM virtualized environments: Operating at both the infrastructure and guest level, Red Hat Insights now offers real-time, full-stack analysis of OpenStack-based private clouds and Red Hat Enterprise Virtualization environments. 
  • Insights Action Planner: This new feature on the Insights Dashboard enables teams to identify and assign remediation tasks individually or in groups. 
  • Insights Early Access mode: A new opt-in modality gives users visibility into upcoming new features, allowing users to test out functionality, give feedback, and help shape the evolution of Red Hat Insights. 

http://www.redhat.com

Monitoring and Tuning the Linux Networking Stack: Receiving Data

This blog post explains how computers running the Linux kernel receive packets, as well as how to monitor and tune each component of the networking stack as packets flow from the network toward userland programs.

It is impossible to tune or monitor the Linux networking stack without reading the source code of the kernel and having a deep understanding of what exactly is happening. 

This blog post will hopefully serve as a reference to anyone looking to do this.

Read more at PackageCloud

How to Securely and Anonymously Share Files of Any Size Over the Tor Network with OnionShare

Its mid-2016 and there are lots of methods to share files online between you and another person 12 timezones away. Some of them are convenient in that they offer a certain amount of disk…

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

Setting Up an NFS Server and Client on CentOS 7.2

This guide explains how to set up an NFS server and an NFS client on CentOS 7. NFS stands for Network File System; through NFS, a client can access (read, write) a remote share on an NFS server as if it was on the local hard disk.

What is DevOps? John Willis Explains

John Willis is an IT operations veteran of more than 35 years and has been a leader in the DevOps movement from the beginning. He is a co-host of the DevOps Cafe podcast, co-author of the upcoming DevOps Handbook. You can find him presenting about DevOps, most likely with a few Deming quotes, at numerous events worldwide. John is currently working as a Distinguished Researcher at Kosli. He is researching DevOps, DevSecOps, IT risk, modern governance, and audit compliance.

 

John Willis is co-host of the DevOps Cafe podcast and Evangelist at Docker

Linux.com: Why are so many organizations embracing DevOps?

John Willis: There is definitely a lot of cargo cutting going on here. Also, vendors are promoting what I would call agenda-based “DevOps”. That’s the bad news. The good news is there are a lot of people telling us that DevOps patterns enable organizations to be faster, cheaper and safer.

Linux.com: Why are individuals interested in participating?

John: One of the core tenets of DevOps is learning and sharing. Individuals who are passionate about the health and performance of their organization find these patterns personally fulfilling.

Linux.com: What’s the primary advantage of DevOps?

John: Implementing DevOps patterns have shown that organizations can go faster while being more reliable. Based on surveys of IT professionals, the State of DevOps Report has shown that organizations that deploy faster and deliver services more quickly are better at resolving issues and have better change success rates. There have been a number of case studies and experience reports from the DevOps Enterprise Summit that show large enterprises are also moving faster with better reliability.

Linux.com: What is the overwhelming hurdle?

John: Culture, Culture, Culture. Although DevOps can come in many flavors, there are a few principles that seem to be universal. An organization needs to understand some of these principles and be able to adjust and work collaboratively while turning these principles into repeatable patterns.

  1. Small Batch
  2. Source control everything (code, configs, infrastructure as code, container source)
  3. Cross functional ownership of services (done means released)
  4. Automate the service delivery pipeline (continuous integration / continuous delivery) end to toe.

Linux.com: What advice would you give to people who want to get started in DevOps?

John: Attend a DevOps event (DevOpsDays or DevOps Enterprise Summit). As a co-author of the soon to be published DevOps Handbook, we have taken some of the best case studies and experience reports of the past 5 years and aggregated them into this book, so it would be a great way to begin your DevOps journey.

Read previous DevOps Q&As with Kris Buytaert, Michael Ducy, and Patrick Debois.

Subuser Uses Docker Containers to Deliver Desktop Apps for Linux

Subuser is a new application-packaging system that allows Dockerized desktop apps to be run as if they were regular Linux applications. It provides just enough permissions to allow the Dockerized app to interact with the local system — for instance, to work with the X11 display server — while still keeping it locked down.

Creating a Subuser app essentially involves building a Dockerized app, but with one extra ingredient: a permissions.json file that describes what the app in question can and can’t do. For common defaults used in most cases, users can set one flag, basic-common-permissions, and leave it at that.

Read more at InfoWorld

OPNFV Survey Shows Nearly All Telecom Operators on Board with NFV

The Linux Foundation’s OPNFV Project claims 94% of telecom operators have NFV plans, although security, MANO and OSS/BSS remain top concerns

A recent survey released by the Linux Foundation’s Open Platform for NFV Project, found an increasingly small percentage of telecom operators have not yet planned for network functions virtualization.

The survey, which was conducted for OPNFV by Heavy Reading and released at the recent OPNFV Summit, noted 6% of the more than 90 telecom operators questioned did not have an NFV strategy planned at all, down from 14% last September.

Read more at RCR Wireless