Home Blog Page 817

IBM Launches Blockchain Cloud Services for Government, Healthcare Sectors

IBM announced Friday it is launching its own framework for running blockchain networks along with new services on the IBM Cloud designed to meet security and regulatory compliance.

Blockchain, best known as the technology behind bitcoin, is a distributed, encrypted database architecture that is considered immune from tampering. In a nutshell, a blockchain logs all transactions on a bitcoin network and stores them in blocks that update a balance and data such as payments, confirmations and orders.

Read more at ZDNet

 

How to Install and Configure Conky

At first blush, Conky is a system monitor that will display pertinent information on your desktop. When you peel past the top layer, you will see Conky is actually much more than that. Not only can Conky display information about your CPU, memory, swap, disk space, temperature, top, upload, download, system messages… it can display things like world time, calendars, email notifications, weather, battery status… the list goes on and on.

Conky works in conjunction with themes. A theme instructs Conky what to display and how to display it. If you look around the Internet (e.g., Deviant Art), you’ll find tons of Conky themes to display just about any bit of information you need with many variations on the look and feel.

I will show you how to install Conky and then how to make use of one of the many themes to configure Conky to suit your needs. I’ll be installing Conky on Ubuntu GNOME.

Installation

Because we’re working with a Ubuntu-based distribution, the installation of Conky couldn’t be easier. Here are the steps for installation:

  1. Open up a terminal window ([Ctrl]+[Alt]+[t] does the trick nicely)

  2. Issue the command sudo apt-get install conky-all

  3. Type your sudo password and hit Enter

  4. When prompted, accepted the installation by typing y

  5. Allow the installation to complete

Figure 1: Out of the box Conky theme.
Conky relies on the .conkyrc file for configuration options. Out of the box, this file is not created. Because of this, what Conky does is read the /etc/conky/conky.config file (when no ~/.conkyrc file is present). When you run Conky without a .conkyrc file in your home directory, a standard Conky theme appears (Figure 1).

Adding a Theme

Naturally, you’re not going to want to stick with that generic out-of-the-box theme. I will demonstrate by showing how to add a clock theme to Conky. This isn’t just any old clock theme, however. As a writer, I love words, and this clock theme created by a Deviant Art user, mowgli-writes, displays world time in text. Let’s install that and then configure it to meet our needs.

To install the qlocktwo-conky theme, you need to follow these instructions:

  1. Download the qlocktwo-conky file (from Deviant Art) into your ~/Downloads folder

  2. Open your file manager and navigate to ~/Downloads

  3. Right-click on the qlocktwoconky_mowglimod zip file and select Extract Here

  4. In the ~/Downloads folder, you should now see a file called qlocktwo, right-click that folder, select Rename, and rename it .conkyrc

  5. If you cannot see the .conkyrc file, hit [Ctrl]+[h] to show hidden files

  6. Right-click the .conkyrc file and select Move to…

  7. Select your home folder as the destination for the .conkyrc file

If you’d rather handle the above via the command line, the steps would be (after you’ve downloaded the file to ~/Downloads):

  1. Open a terminal window

  2. Change to your Downloads directory with the command cd Downloads

  3. Unzip the file with the command unzip qlocktwoconky_mowglimod*.zip

  4. Rename the qlocktwo file with the command mv qlocktwo .conkyrc

  5. Move the .conkyrc file with the command mv .conkyrc ~/

With the .conkyrc file in place, run Conky with the command conky. Because I’m demonstrating on GNOME, you can hit the key combination [Alt]+[F2] and then enter conky in the run dialog. Conky will start up with the currently installed Theme (Figure 2).

Figure 2: Conky running with the Qlocktwo-Conky theme.

Configuring Conky

Let’s continue with our usage of the Clocktwo-Conky theme (for simplicity’s sake). Out of the box, that theme is pretty sweet, but maybe you want to, for example, move the theme to the right-hand side of your screen. With Conky, you cannot simply click and drag a theme where you want it. Instead, you have to configure the placement of the theme on your desktop. Fortunately, Conky includes some standard variables that allow you to make various and sundry configuration changes to a theme.

With placement, Conky uses the alignment variable with the following options:

  • Top left: tl

  • Top right: tr

  • Top middle: tm

  • Bottom left: bl

  • Bottom right: br

  • Bottom middle: bm

  • Middle left: ml

  • Middle middle: mm

  • Middle right: mr

If you want to get more refined with your theme positioning, you can use the following variables:

  • gap_x: Gap, in pixels, from the left or right side of the screen

  • gap_y: Gay, in pixels, from the bottom or top of the screen

So, if you want the Qlocktwo Conky theme to reside on the right-hand side of your screen, open up the .conkyrc file, located the alignment mm line and change it to alignment mr. Save and close the file and restart Conky to place the theme on the right-hand side of your screen (Figure 3).

Figure 3: Our Conky theme, placed where we want it.

Get GUI

If you don’t much care for working from the command line, there is a GUI tool, called Conky Manager, that you can install and use. Here’s how to install this handy app:

  • Open up a terminal window

  • Add the necessary repository with the command sudo add-apt-repository ppa:teejee2008/ppa

  • Update apt with the command sudo apt-get update

  • Install Conky Manager by issuing the command sudo apt-get install conky-manager

Run Conky Manager with the command conky-manager. When the app opens, you’ll see a simple-to-use window (Figure 4) that allows you to easily import theme packs, customize themes, and more. When you install the Conky Manager app, it will install several predefined themes that you can select from.

Figure 4: The new background thanks to selecting a theme from Conky Manager.

If you’ve installed a theme, prior to installing Conky Manager, you’ll need to move the ~/.conkyrc file into the newly created ~/.conky folder. When you do this, Conky Manager will recognize the theme and allow you to load it and work with it (Figure 5).

Figure 5: Our Qlocktwo theme loaded into Conky Manager.
Once you select a theme, from within Conky Manager, you can then click the edit button and that theme’s configuration file will open up in your default text editor, so you can configure the file to suit your needs.

Conky Rocks

At this point, you’re ready to dive deeper into the waters of Conky. Do a search for Conky Themes, and you’ll find plenty to choose from. Play around with the various options, and you’ll soon have Conky rocking on your desktop, doing exactly what you need. Although some Conky configuration files can get a bit complex, with a little effort, you’ll soon be a master of Conky.

 

Auto-Scale Everything

If you’ve never received a message like this from your cloud provider, consider yourself lucky, because you will eventually:

Dear Amazon EC2 Customer,
One or more of your Amazon EC2 instances is scheduled for maintenance on 2016–01–01 for 2 hours starting at 05:00 UTC. During this time, the following instances in the us-east-1 region will be unavailable and then rebooted:

i-abcd1234

Your instance will return to normal operations after maintenance is complete.

This is essentially saying the node in question will be completely useless for two hours. Worse, AWS will sometimes notify us that our machine will be retired completely. Or, worst of all, a node might encounter an unscheduled issue. Our team maintains an infrastructure of over 500 AWS EC2 nodes, so events like this are not irregular.

Read more at FullContact Engineering

Coming Soon to PowerShell: Docker Controls, Courtesy of Microsoft

Microsoft is hard at work making Docker a first-class citizen on Windows. It has already integrated Docker more closely with Windows’ internals and made Docker’s CLI run well. Now, the company is providing a first, early peek at a PowerShell module for the Docker Engine on Windows.

The project follows guidelines laid down by the Docker Remote API and uses the Docker Engine REST interface to execute commands. In other words, there’s no magic or unorthodox extension of Docker; it interfaces with the Docker Engine in precisely the same manner as the native client.

Read more at InfoWorld

Encrypted Network Traffic Comes at a Cost

Emily Ratliff, Sr. Director of Infrastructure Security at The Linux Foundation, writes that the use of encryption over the Internet is growing. Fueled by Edward Snowden’s revelations on the extent of NSA and GCHQ content monitoring, encryption is now increasingly provided by the big tech companies as part of their standard product offerings. It’s effectiveness can be seen in the continuing demands by different governments for these same tech companies to provide government backdoors for that encryption. Encryption works: it safeguards privacy.

Against this background, the use of Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to encrypt network traffic is likely to grow dramatically. … 

A10 Networks‘ Rene Paap, who expects 67% of all network traffic to be encrypted by the end of this year, thinks this will place an intolerable demand on existing firewalls – effectively reducing the performance of the average firewall by 81%.

Read more at SecurityWeek

OpenStack for NFV Applications: SR-IOV and PCI Passthrough

Network Function Virtualisation (NFV) initiatives in the telecommunication industry require specific OpenStack functionalities enabled. Without entering into the details of the NFV specifications, the goal in OpenStack is to optimise network, memory and CPU performance on the running instances.

In this article we’ll see Single Root I/O Virtualisation (SR-IOV) and PCI-Passthrough, which are commonly required by some Virtual Network Functions (VNF) running as instances on top of OpenStack. 

Read more at TrickyCloud

The Perfect Server – Debian 8.4 Jessie (Apache2, BIND, Dovecot, ISPConfig 3.1)

This tutorial shows how to prepare a Debian Jessie server (with Apache2, BIND, Dovecot) for the installation of ISPConfig 3.1. The web hosting control panel ISPConfig 3 allows you to configure the following services through a web browser: Apache web server, Postfix mail server, Dovecot IMAP/POP3 server, MySQL, BIND nameserver, PureFTPd, SpamAssassin, ClamAV, and many more.

How to Use Awk to Filter Text or Strings Using Pattern Specific Actions

In the third part of the Awk command series, we shall take a look at filtering text or strings based on specific patterns that a user can define.

Sometimes, when filtering text, you want to indicate certain lines from an input file or lines of strings based on a given condition or using a specific pattern that can be matched. Doing this with Awk is very easy, it is one of the great features of Awk that you will find helpful….

Read more at Tecmint

OpenDaylight as an NFV Controller

The OpenDaylight and OPNFV Projects: An Update as of Brahma/Beryllium

By Dave Neary of Red Hat and SeniorTechnical Marketing Manager of OpenDaylight and OPNFV, Alan Sardella

In discussing our use cases, we’ve noticed that a key domain for OpenDaylight (ODL) is Cloud and NFV. ODL is closely tied to NFV and accordingly works very closely with the Open Platform for NFV (OPNFV), a related project with the Linux Foundation that concentrates on providing a carrier-grade, integrated, open source platform to accelerate the introduction of new NFV products and services.

OpenDaylight an important upstream community and key component of the OPNFV platform.

The OPNFV community is working on establishing focused community groups to describe community engagement practices, identify community leaders, and manage contributions toward those communities.

With regard to OPNFV integration, the OPNFV project creates blueprints for needed OpenDaylight functions, acts in conjunction with community members from OpenDaylight which transitions upstream for community review and discussion. One key example of this is that  

OPNFV helps ODL refine and develop features (and fix bugs) as an SDN controller for NFV.  

The latest OPNFV release, Brahmaputra, includes the Beryllium release of ODL.  

Multiple OPNFV projects, including Doctor, Promise, Multisite, Copper, HA, IPv6, Escalator, are have worked with or are planning blueprints addressing ODL capabilities. Additionally, the CPerf(controller performance) project has active members from both ODL and OPNFV.  

In the recent Beryllium release, there were many enhancements focused on Cloud and NFV. We focused on coexistence between multiple controller instances and applications such as SFC and L2VPN. Other enhancements to cloud networking include Distributed Virtual Routing (DVR), which avoids a single point of failure by including Layer 3 routing information on each node. We also added clustering support for an end-to-end, highly available SDN controller for OpenStack.

Relevant applications include traffic engineering, cloud network virtualization, L2/L3 VPNs with DC interconnectivity, SFC, network QoS, monitoring and analytics. Larger use cases include virtual CPE.

In the upcoming Boron release, we will be continue to enhance our coexistence support. We will also be enabling Layer 2 gateways with hardware-based VXLAN tunnel endpoints (HW-VTEP) for Layer 2 segment bridging in either the physical or virtual domains–this will permit end to end Layer 2 VPNs. Other key areas of focus will be on policy and on vector packet processing (VPP) and honeycomb enablement, enabling high performance flow management.

Communication sector users continue to increase in number, including many major service providers: Orange, China Mobile, AT&T, T-Mobile, Comcast, KT Corporation, Telefonica,TeliaSonera, China Telecom, Deutsche Telekom, and Globe Telecom. Many of these provide membership on ODL’s advisory board.   

And the future is bright–as OpenDaylight continues to capture the imagination of a growing user base, the next step will be to see increased adoption for production workloads.

A note about authors:

Dave Neary works on SDN and NFV community strategy as a member of Red Hat’s Open Source and Standards team. He is an active participant in OPNFV, a project whose goal is to promote NFV as a core use-case to upstream projects such as OpenStack and OpenDaylight. He is also an active community participant in the OpenDaylight project.

Alan Sardella runs product and technical marketing for the OpenDaylight and OPNFV projects.

This article was originally published at OpenDaylight.org.


 

No Exit: The Case for Moving Security Information Front and Center

The Open Web Application Security Project (OWASP) was founded in 2001. This non-profit organization seeks to educate and inform developers on secure development practices, and provides developers with tools to create web applications securely. One of their flagship projects is the Top 10 list of web application security flaws. The goal of the Top 10 list is to raise awareness about problems that exist with vulnerabilities in web applications and to educate developers about how to find and avoid the vulnerabilities.

The OWASP Top 10 list is extremely well known; it is impossible to walk through the show floor at a security conference without encountering at least some mention of the top 10 list. The Top 10 list is cited several times by the PCI Security Standards Council Penetration Testing Guidance and has been used as an acceptance test criteria for contract fulfillment for public procurement.

Read more at SecurityWeek.