Home Blog Page 800

The Democratization of Containerization

https://www.youtube.com/watch?v=DpITUaDSUck?list=PLGeM09tlguZQ17kXq679jthIhf12Tkat9

Docker catalyzed the software industry, causing it to reach a new level of innovation and growth. Docker’s success, however, was unforeseen, said Scott Johnston in his keynote talk at Collaboration Summit. Looking back, the key elements were: Accessibility, Portability, and Openness.

3 Reasons Docker and Containerization Lit Up Application Development [Video]

Docker was the flame that catalyzed innovation in application development, according to Scott Johnston, senior vice president of product management and design at Docker. However, that success was entirely unforeseen.

“I wish I could say that we had a premeditated mindset three years ago when we released Docker,” Johnston said in his keynote at last month’s Collaboration Summit. “But we did not.” Looking back, he sees three main reasons for Docker’s success: Accessibility, Portability, and Openness.

Docker has become one of the major players in container management and deployment, and, in his keynote — called “The Democratization of Containerization” — Johnston shared some of the thoughts that led to the creation of Docker, its success, and what has to happen next.

“Software is eating the world,” said Johnston, referencing a recurring theme at the summit and describing how software has disrupted long-established businesses and industries, starting with books, travel, and real estate, followed by media, hospitality, and even cars. “You have to be concerned about how software will disrupt your business,” he said.

And, according to Johnston, although interpretive languages like Ruby and Python, methodologies like Agile, Lean, and Kanban, and collaborative technologies and methods have made software development easier, the work doesn’t stop when you commit and check in the app. “You have to transcend the application pipeline beyond development, beyond QA, into staging, into operations, and into ongoing maintenance.” He went on to say that until the team works across the entire lifecycle, you don’t see the full potential of applications.

Industry Growth and What’s Next

Then, three years ago, Johnston recalled, Docker entered the conversation. He reflected on why Docker was the flame that catalyzed this industry and caused it to take off to a new level of innovation and growth. The reasons boil down to accessibility, portability, and openness, Johnston explained.

  • Accessible: By making the tools available at the command line, “You can get very powerful isolation and resource management, without having to know anything about kernels.”

  • Portable: “That image inside a Docker container, its only dependency is a Linux kernel. So it can go from developer’s laptop running Linux to a server in the data center running Linux on OpenStack, to a server in Amazon cloud running Linux, all without change.” Among other benefits, said Johnson, “It started an ecosystem where ISVs felt confident putting their software into the Docker containers and into the Docker image format, because they knew they didn’t have to go back and redo a build for Red Hat, for Ubuntu, for Debian.”

  • Open: Openness, Johnston said, “made it possible for developers and sys admins to download and start to use Docker, and it allows for massive community contributions.” Also, he pointed out, Docker includes an API for plug-ins — for different stacks for file systems, networking, storage, etc.

What’s next, said Johnston, is taking each of these features to the next level.

For Accessible 2.0, “We have to continue to make it accessible for those not in this [keynote] room… reference architectures and reference stacks are exactly what we need to do to get that next wave of the market adopting our solution,” Johnston said.

One particularly exciting development, he noted, is the enabling of Windows to use containers and microservices. Johnston said that recently a customer with 10,000 Visual Studio developers asked him point blank whether he should retrain them all on Java and Linux. Johnston answered, “No, if you want to take advantage of microservices, this new cloud native computing model, it’s coming with Microsoft.”

Portable 2.0, according to Johnston, reflects the fact that “a single container does not a full application make. Applications are combinations of containers, and applications need networking and storage and security.”

Finally, comes Open 2.0, which involves continuing activities like evolving de facto standards and building reference stacks, Johnston said, citing the work of the Open Container Initiative (OCI) and Cloud Native Computing Foundation.

The steps must be accomplished, Johnston concluded, “so that we, our users, our customers, and this entire industry can get the benefits of this decade-long disruption.”

Watch Scott Johnston’s full keynote, below.

https://www.youtube.com/watch?v=DpITUaDSUck?list=PLGeM09tlguZQ17kXq679jthIhf12Tkat9

 

linux-com_ctas_may2016_v2_collab.png?itok=Mj86VQnX

DevOps Model, A Profile in CIO Leadership, Change Management

Take it from IT leaders who have been there: Adopting a DevOps model will require strong leadership, exceptional people skills, a high tolerance for failure and financial savvy. 

CTO Alexander Pluim described his company’s situation as typical: An enterprise technology system has issues, no one is sure what is going wrong, but each worker is positive it isn’t his fault. Fortunately for Pluim, CTO at Amsterdam-based BVA Auctions, he realized the reason for his team’s predicament. 

“When I looked at people behind their desks, trying to guess on their own without communicating with the other disciplines, I was amazed,” he said. The different disciplines — developers, DBAs, IT operations folks — had no insight into what the others were doing.

Read more at TechTarget

F5’s Latest Updates Give a Nod to Developers

As virtual appliances become a bigger part of its business, F5 is tweaking some of its products to better fit the concept of developers programming the network.

The company has separated its orchestration tool from its management tool. The latter, which involves monitoring the network and making sure features such as high availability are viable, is still within the purview of networking people. But orchestration and provisioning of services is becoming more of a programmer’s job. “It turns out they’re used by different people,” says Lori MacVittie, F5’s principal technical evangelist. “The folks who are, day-to-day, managing devices and managing certificates, just checking the health of the devices in the network, are not the same people who are doing orchestration.”

Read more at SDx Central

Building and Scaling the Fastly Network, Part 1: Fighting the FIB

This post is the first in a series detailing the evolution of network software at Fastly. We’re unique amongst our peers in that from inception, we’ve always viewed networking as an integral part of our product rather than a cost center. We rarely share what we do with the wider networking community however, in part because we borrow far more from classic systems theory than contemporary networking practice.

Building abstractions

Before delving further, it is important to disambiguate that while we write software for networks, we shy away from using the term software-defined networking (SDN) to describe what we do.

Read more at Fastly

Fifty Shades of Open

Open source. Open access. Open society. Open knowledge. Open government. Even open food. Until quite recently, the word “open” had a fairly constant meaning. The over-use of the word “open” has led to its meaning becoming increasingly ambiguous. This presents a critical problem for this important word, as ambiguity leads to misinterpretation.

“Open” has been applied to a wide variety of words to create new terms, some of which make sense, and some not so much. When we started writing this essay, we thought our working title was simply amusing. But the working title became the actual title, as we found that there are at least 50 different terms in which the word “open” is used, encompassing nearly as many different criteria for openness. In this essay we will attempt to make sense of this open season on the word “open.”

Read more at First Monday

Univa Manages Enterprise Container Workloads on Kubernetes Distros

Today Univa announced Navops Command, a ground breaking software suite that implements sophisticated workload placement and advanced policy management for enterprises to take full advantage of containers on any Kubernetes distribution. 

In addition, Navops provides the unique ability to better maximize utilization of shared resources and manage service applications running at scale. Navops Command’s ability to run on any Kubernetes distribution means that customers can choose to work with any number of vendors participating in the CNCF (Cloud Native Computing Foundation), like RedHat’s OpenShift, Navops Launch or CoreOS’s Tectonic, and still get the benefit of Command’s advanced policy management.

Read more at insideHPC.

Symantec Antivirus Security Flaw Exposes Linux, Mac, and Windows

Security holes in antivirus software are nothing new, but holes that exist across multiple platforms? That’s rare… but it just happened. Google’s Tavis Ormandy has discovered a vulnerability in Symantec’s antivirus engine (used in both Symantec- and Norton-branded suites) that compromises Linux, Mac and Windows computers. If you use an early version of a compression tool to squeeze executables, you can trigger a memory buffer overflow that gives you root-level control over a system.

The kickers are that it’s both easy to launch the exploit and particularly vicious in most cases. As Symantec is intercepting system input and output, you only need to email a file — the victim doesn’t even need to read the email, just the act of AV scanning it is a trigger — or send a web link to wreck someone’s day.

Read more at Engadget 

Patch Now: Google and JetBrains Warn Developers of Buggy IDE

Google has emailed Android developers advising them to update Android Studio, the official Android IDE, to fix security bugs. Other versions of the JetBrains IntelliJ IDE, on which Android Studio is based, are also affected.

The bugs are related to the built-in web server in the IDE. A cross-site request forgery (CSRF) flaw means that if the IDE is running and the developer visits a malicious web page in any browser, scripts on the malicious web page could access the local file system.

Read more at The Register

 

From PSKs to Blockchain: Ideas for Solving the IoT Security Dilemma

Security and data privacy spending for the Internet of Things (IoT) will increase this year to $348 million, according to Gartner. Why and how are companies upping their IoT security investments? Here’s a look.

As industry interest in IoT grows, there’s no question that security has now become a major part of the IoT conversation. “IoT security has gone from being the No. 2 to the No. 1 barrier to IoT adoption,” says analyst Christian Renaud of 451 Research. One of the biggest issues is that traditional security strategies don’t necessarily work for IoT devices, due to hardware constraints. For example, as Juniper employee Aditya Chaturvedi explained in a recent blog post, authenticating devices via cryptographic certificates, a technique widely used for applications on the Web, is not feasible for all IoT devices — because some lack the storage capacity and power to handle certificates.

Read more at SDx Central