Saturday February 13, 2016

Slashdot: New Metallic Glass Creates Potential For Smart Windows

(posted on Saturday February 13, 2016 at 14:12 AWST)

frank249 writes: A B.C. engineering lab has created metal-coated glass that transmits up to 10 per cent more light than conventional glass and opens the door to windows that function as electronics. The most immediate use of the technology is to create windows that can be programmed to absorb or reflect heat, depending on the needs of a building's occupants. Adding electronic control to windows will allow you to change the amount of light and heat passing through to more effectively use the energy provided by the sun naturally, Lead investigator Kenneth Chau credit films like Iron Man or Star Trek with providing them inspiration. "There is a dream that we can make glass smarter," he said. "These films give us concepts to strive for; the hard work is uncovering the science to make it happen." All those hours spent watching Star Trek are now starting to look like a "pretty good investment," he said. The results were published this week in the journal Scientific Reports.

Read more of this story at Slashdot.

Slashdot: LinkedIn Is Open Sourcing Their Testing Frameworks

(posted on Saturday February 13, 2016 at 11:24 AWST)

destinyland writes: LinkedIn is open sourcing their testing frameworks, and sharing details of their revamped development process after their latest app required a year and over 250 engineers. Their new paradigm? "Release three times per day, with no more than three hours between when code is committed and when that code is available to members," according to a senior engineer on LinkedIn's blog. This requires a three-hour pipeline where everything is automated, from committing code to releasing it into production, along with automated analyses and testing. "Holding ourselves to this constraint ensures we won't revert to using manual validation to certify our releases."

Read more of this story at Slashdot.

DFES Emergency Alerts: Bushfire ALL CLEAR for the southern part of Uduc, including Wokalup, in the Shire of Harvey

DFES Emergency Alerts (posted on Saturday February 13, 2016 at 11:23 AWST)

Category: Fire
Alert Summary: An ALL CLEAR advice has been issued for people the area south of Forestry Road and Uduc Road, west of Hocart Road and South Western Highway, north of Mitchell Road and Treasure Road and east of Forrest Highway. This includes Wokalup townsite, Thornton Housing Estate and Myalup Freshwater Lakes Estate in the Shire of Harvey.
Content:

The following alert has been issued by the Department of Fire and Emergency Services (DFES).

Bushfire ALL CLEAR for the southern part of Uduc, including Wokalup, in the Shire of Harvey

ALERT LEVEL: 

An ALL CLEAR advice has been issued for people in the area south of Forestry Road and Uduc Road, west of Hocart Road and South Western Highway, north of Mitchell Road and Treasure Road and east of Forrest Highway.

This includes Wokalup townsite, Thornton Housing Estate and Myalup Freshwater Lakes Estate in the Shire of Harvey.

 

The bushfire that was burning in the area no longer poses a danger to the community.

Firefighters have worked tirelessly together with other agencies since the fire was reported.

The danger has passed but you need to remain vigilant in case the situation changes.

WHAT TO DO: 

Drive slowly and with caution due to emergency services personnel working in the area. 

ROAD CLOSURES:

No roads are closed, however speed restrictions remain on Boonilup/Rodgers Road between East Break Road and Waller Road due to Western Power crews working to repair damaged infrastructure.

Avoid the area and be aware of fire and other emergency services personnel working on site.

Road information may also be available by calling Main Roads WA on 138 138 or visiting www.mainroads.wa.gov.au.

WHAT FIREFIGHTERS ARE DOING: 

Firefighters will continue to monitor the area. 

EXTRA INFORMATION:

The fire was reported at 2.30pm on 7 February 2016.

The size of the fire is approximately 1120 hectares.

The cause of the fire is unknown.

The Shire of Harvey is managing the fire.

 

No further updates will be issued. 

Publication Time: 13/02/2016 11:21 AM

DFES Emergency Alerts: Bushfire ADVICE for The Lakes in the Shires of Mundaring and Northam

DFES Emergency Alerts (posted on Saturday February 13, 2016 at 09:55 AWST)

Category: Fire
Alert Summary: A bushfire ADVICE remains for people in an area bounded by Great Eastern Highway, Great Southern Highway, and Wariin Road in The Lakes in the Shires of Mundaring and Northam
Content:

*Please note changes to road closure information and what firefighters are doing.

The following alert has been issued by the Department of Fire and Emergency Services (DFES).

Bushfire ADVICE for The Lakes in the Shires of Mundaring and Northam

ALERT LEVEL:

A bushfire ADVICE remains for people in an area bounded by Great Eastern Highway, Great Southern Highway, and Wariin Road in The Lakes in the Shires of Mundaring and Northam

There is no threat to lives or homes but there is smoke in the area 

Although there is no immediate danger you need to be aware and keep up to date in case the situation changes.

The bushfire is burning in bushland near Great Southern Highway.

BUSHFIRE BEHAVIOUR:

The bushfire is stationary.

It is contained and controlled.

WHAT TO DO:

Be extremely careful when driving through the area.

Turn your headlights on and drive slowly.

Watch for emergency services personnel and follow their directions.

If you cannot see clearly, pull over, keep your headlights and hazard lights on, and wait until the smoke clears. 

If you have a respiratory condition and you have been affected by smoke you should contact your local doctor or call Health Direct on 1800 022 222. 

ROAD CLOSURES:

Avoid the area and be aware of fire and other emergency services personnel working on site.

Great Southern Highway is now open and speed restrictions between Great Eastern Highway and Wariin Road have been lifted.

Road information may also be available from Main Roads WA by calling 138 138 or visiting www.mainroads.wa.gov.au 

WHAT FIREFIGHTERS ARE DOING:

15 volunteer Bush Fire Service firefighters are on the scene.

Firefighters are patrolling the area and mopping up.

EXTRA INFORMATION:

The incident was reported at 3.06pm on 10 February 2016 

The cause of the fire is suspicious.

People are asked to report any suspicious behaviour to Police Crime Stoppers on 1800 333 000

The Shire of Mundaring is managing the fire.

KEEP UP TO DATE:

Visit www.dfes.wa.gov.au, call 13 DFES (13 3337), follow DFES on Twitter @dfes_wa or listen to news bulletins.

The next update will be provided by 4pm today, 13 February 2016, unless the situation changes.

Publication Time: 13/02/2016 9:51 AM

DFES Emergency Alerts: Bushfire ADVICE for John Tognela Rest Area on Forrest Highway, east of Lake Clifton in the Shire of Waroona

DFES Emergency Alerts (posted on Saturday February 13, 2016 at 09:22 AWST)

Category: Fire
Alert Summary: A bushfire ADVICE remains for people in an area bounded by Codsford Road, Old Bunbury Road (off Dorsett Road), Southern Estuary Road, Forrest Highway and Kooljerrenup Nature Reserve, near John Tognela Rest Area on Forrest Highway, east of Lake Clifton in the Shire of Waroona.
Content:

*Please note changes under alert level. Firefighters will be conducting pocket burning which may generate smoke in the area.

A bushfire ADVICE remains for people in an area bounded by Codsford Road, Old Bunbury Road (off Dorsett Road), Southern Estuary  Road, Forrest Highway and Kooljerrenup Nature Reserve, near John Tognela Rest Area on Forrest Highway, east of Lake Clifton in the Shire of Waroona.

There is no threat to lives or homes but there is a lot of smoke in the area.

Although there is no immediate danger you need to be aware and keep up to date in case the situation changes.

The fire burning is between Forrest Highway and Old Bunbury Road, on the western side of Forrest Highway. 

Firefighters will be burning unburnt pockets which may generate smoke in the area.

Smoke may impact people travelling on the Forrest Highway.

BUSHFIRE BEHAVIOUR:

The bushfire is stationary. 

It is contained and controlled.

WHAT TO DO:

Stay alert and monitor your surroundings.

Watch for signs of a bushfire, especially smoke and flames.

Read through your bushfire survival plan.

If you do not have a plan decide what you will do if the situation gets worse.

IF DRIVING

Be extremely careful when driving through the area.

Turn your headlights on and drive slowly.

Watch for emergency services personnel and follow their directions.

If you cannot see clearly, pull over, keep your headlights and hazard lights on, and wait until the smoke clears. 

If you have a respiratory condition and you have been affected by smoke you should contact your local doctor or call Health Direct on 1800 022 222. 

EVACUATION CENTRE:  

The evacuation centre at the Waroona Recreation Centre on Miller Street, Waroona is now closed.

ROAD CLOSURES:

No roads are closed.

Motorists are asked to drive with caution, avoid the area and be aware of fire and other emergency services personnel working on site.

Road information may also be available by calling Main Roads WA on 138 138 or visiting www.mainroads.wa.gov.au.

WHAT FIREFIGHTERS ARE DOING: 

Firefighters are patrolling the area, extinguishing hot spots and strengthening containment lines.

EXTRA INFORMATION:

The incident was reported at 11.05am Friday 12 February 2016.

The fire has burnt approximately 10 hectares. 

The cause of the fire is suspicious

People are asked to report any suspicious behaviour to Police Crime Stoppers on 1800 333 000.

The Shire of Waroona is managing the fire.

KEEP UP TO DATE:

Visit www.dfes.wa.gov.au, call 13 DFES (13 3337), follow DFES on Twitter @dfes_wa, listen to ABC local radio, or news bulletins.

The next update will be provided by 4.00pm today,  Saturday 13 February 2016 unless the situation changes.

Publication Time: 13/02/2016 9:18 AM

Slashdot: Ubisoft Talks Splitscreen and the Division

(posted on Saturday February 13, 2016 at 08:39 AWST)

SlappingOysters writes: Ubisoft's next entry in the Tom Clancy series is pushing at the boundaries of three genres, mixing the RPG, the squad-based shooter and the MMO into The Division. The game features drop-in, drop-out co-op in a near-future, post-pandemic New York that seamlessly allows players to transition from PvE to PvP environments without any menus or lobbies. However, despite its co-op gameplay, The Division does not support splitscreen. Finder.com.au recently ran an extensive hands-on with the game, as well as an interview with Ubisoft Massive's creative director Magnus Jansén regarding the decision to forgo splitscreen co-op.

Read more of this story at Slashdot.

Slashdot: Google Is Shutting Down Picasa In Favor of Photos

(posted on Saturday February 13, 2016 at 07:55 AWST)

Google has been steadily migrating its resources towards the Photos ecosystem since the company first announced it at last years I/O developers conference. Today, Google announced that it will shut down Picasa. Starting May 1st, Google will start phasing out Picasa from its product lineup, moving over to Google Photos.

Read more of this story at Slashdot.

Slashdot: Smartphones May Soon Provide Earthquake Warnings

(posted on Saturday February 13, 2016 at 07:14 AWST)

sciencehabit writes: When it comes to an earthquake, just a few seconds' warning could make the difference between life and death. But many earthquake-prone countries lack the seismic networks that would give their citizens the lead time to find cover or shut down critical utilities. Now, a group of enterprising engineers is looking at a substitute network: smartphones. Using smartphones' built-in accelerometers, researchers have invented an app, released today, that they say can detect strong earthquakes seconds before the damaging seismic waves arrive. MyShake, as the app is called, could become the basis for an earthquake warning system for the world's most vulnerable regions.

Read more of this story at Slashdot.

Slashdot: Researchers Improve Efficiency of Plug-in Hybrid Electric Vehicles By Almost 12%

(posted on Saturday February 13, 2016 at 06:46 AWST)

hypnosec writes: A new study has put forward claims that by working on and improving the energy management system (EMS) that decides when the switch from 'all-electric' mode to 'hybrid' mode in plug-in hybrid electric vehicles, efficiency of these vehicles can be improved by as much as 12 per cent. Researchers have shown in their lab tests that blended discharge strategies wherein power from the battery is used throughout the trip, have proven to be more efficient at minimizing fuel consumption and emissions.

Read more of this story at Slashdot.

Slashdot: US Copyright Law Forces Wikimedia To Remove the Diary of Anne Frank

(posted on Saturday February 13, 2016 at 06:23 AWST)

Today, the Wikimedia Foundation announced its removal of The Diary of Anne Frank from Wikisource, a digital library of free texts. According to the United States' Digital Millennium Copyright Act, works are protected for 95 years from the date of publication, meaning Wikimedia is not allowed to host a copy of the book before 2042. Rogers, the Legal Counsel for the Wikimedia Foundation, says this is just one of the many examples of the overreach of the United States' current copyright law. He goes on to say, "Our removal serves as an excellent example of why the law should be changed to prevent repeated extensions of copyright terms."

Read more of this story at Slashdot.

Slashdot: French Court Rules That Facebook Can Now Be Sued in France

(posted on Saturday February 13, 2016 at 05:41 AWST)

An anonymous reader writes: A Paris court of appeal has ruled in favor of a French complainant whose account was suspended, because he linked to an image of the 1866 Gustav Courbet nude 'L'Origine du monde', currently residing at the Musee d'Orsay. The appeals court not only agreed that the user's suspension by Facebook constitutes censorship, but the ruling itself negates Facebook's insistence that all legal challenges take place in its native California.

Read more of this story at Slashdot.

Slashdot: Ask Slashdot: Do You Still Have a Pager? Do You Find It Useful?

(posted on Saturday February 13, 2016 at 04:59 AWST)

New submitter Chance Callahan writes: I am starting a business, helping a friend with his own startup, and volunteering regularly with a major political campaign (#feelthebern). One thing I have noticed is that my phone likes to die at the most inconvenient times and leaves me out of touch with people. With the business I'm starting requiring clients to be able to get ahold me quickly, I have been seriously considering getting a two-way pager. It's much easier swap out a AA battery once a month then to worry "will client X be able to get ahold me in the event of an emergency?" So, Slashdot, the million dollar question is, in the age of cell phones, do you have a pager? Do you still find it useful? Do any other "dead-tech" tools still play a big role for your communications? For example, fax machines are still big in Japan, and a lot of people keep landlines, too.

Read more of this story at Slashdot.

Slashdot: Fresh Wayland Experiences With Weston, GNOME, KDE and Enlightenment

(posted on Saturday February 13, 2016 at 04:18 AWST)

jones_supa writes: Software developer Pavlo Rudyi has written a blog post about his experiences with the various desktop environments currently supporting Wayland. The results are not a big surprise, but nevertheless it is great to see the continued interest in Wayland and the ongoing work by many different parties in ensuring that Wayland will eventually be able to dominate the Linux desktop. To summarize, Pavlo found Weston to be "good," GNOME is "perfect," KDE is "bad," and Enlightenment is "good." He also created a video from his testing. Have you done any testing? What's your experience?

Read more of this story at Slashdot.

Slashdot: iPhones Bricked By Setting Date To Jan 1, 1970

(posted on Saturday February 13, 2016 at 03:46 AWST)

lightbox32 writes: Beware of a hoax circling the interwebs, which can be seen by setting your iPhone's date to January 1, 1970. Many people are reporting that doing so will brick the device. It's unclear what exactly causes the issue, but could be related to how iOS stores date and time formats. Jan. 1, 1970 is a value of zero or less than zero, which would make any process that uses a time stamp to fail. Apple is aware of the issue and is looking into it.

Read more of this story at Slashdot.

Slashdot: UK GHCQ Is Allowed To Hack

(posted on Saturday February 13, 2016 at 03:09 AWST)

An anonymous reader writes: A security tribunal has just decreed that hacking by the UK security agency GCHQ is legal. [The case was launched after revelations by Edward Snowden about the extent of US and UK spying. Campaigners Privacy International claimed GCHQ's hacking operations were too intrusive]. The legal challenge that they were violating European law was rejected.

Read more of this story at Slashdot.

Slashdot: Scientists Say Goodbye to Philae Comet Lander

(posted on Saturday February 13, 2016 at 02:31 AWST)

Today, scientists from the German Aerospace Center (DLR) announced that they are saying goodbye to Philae, the comet lander that is currently perched on Comet 67P/Churyumov-Gerasimenko as it races toward the sun. According to Stephan Ulamec, Philae's project manager, "Unfortunately, the probability of Philae re-establishing contact with our team at the DLR Lander Control Center is almost zero." Philae first made history when it successfully landed on a comet in fall of 2014, but problems soon began when commands were not able to reach the robot.

Read more of this story at Slashdot.

pfSense: pfSense Partner Interview: Amica Technology

(posted on Saturday February 13, 2016 at 02:06 AWST)

Amica Technology is the Select Partner of pfSense® in the UK. As of this writing, Netgate and pfSense is working closely with Amica to facilitate official pfSense training in the UK in April.  We recently sat down with Chris Howard and his team to talk about the product and other opportunities to work together in 2016 and beyond.

amica

You are the Managing Director of Amica Technology. Tell us a little bit about your company.

Amica Technology is primarily a Managed Service Provider, based near Bournemouth on the South Coast on England. We have two remote offices, one in London and one in Yorkshire. We are passionate about customer service and never talk jargon to our clients unless they ask us to. We are also an ethical company. Because of these things we have achieved a very fast growth rate. We are still a fairly small company with just 17 staff, but we operate very efficiently so we are able to support a lot of clients.

What made you want to become an official pfSense partner in the UK?

To put it simply, we love the product. When we come across a product that we love, we immediately try to get on board with it because there is nothing easier to sell or support than a product that you are passionate about. Our clients are delighted because we’re saving them money with their firewall solutions. It’s a win-win situation.

Since becoming an official partner, how has your business performed?

Fantastically! 20% of our business is providing leased lines to businesses. Using pfSense as the gateway helps us to lower the monthly cost because our initial firewall investment has been smaller. We pass these savings straight onto the client and there are smiles all round.

How has the pfSense team enabled your business to succeed?

The partner support is great. Ingrid is so amazing to deal with and helps us to get things done and move forward. Chad’s marketing skills are superb and we see each other as an extension of each other’s team. Scott and the rest of the team are so knowledgeable about the product that it gives us the confidence to work with them.

What benefits does a customer realize by purchasing official pfSense products?

Initially it’s cost. Because the initial outlay and total cost of ownership are so low, it’s a no-brainer for most companies. Then people realize how easy the pfSense is to work with and they are pleased that they made the decision. We find that most people can do basic changes to the firewall with no support from us at all, and our clients that have attended the pfSense training suddenly become firewall experts. Once you’ve used pfSense, you very quickly forget about Cisco, Juniper, Sophos, etc.

What are the benefits of purchasing an official pfSense product from Amica?

Amica not only sell the products, but we also have a full design and implementation service. Many of our clients are able to install the products themselves, but for the ones that can’t we usually have an initial conversation over the telephone or face-to-face where we chat through what is required. Then we provide a quotation for the number of hours required for configuration and/or implementation. We’re straight-talking, honest and transparent. We love what we do and we want our clients to enjoy IT.

Explain your “service after the sale” approach.

Our support team are always there waiting to help with any problem you may face. We also offer maintenance contracts with 24×7 service level agreements for companies that require extra peace of mind. Our network architects can design and implement any custom configuration changes either remotely or on-site.

 

 

Comments

Slashdot: OCZ Toshiba Breaks 30 Cents Per GB Barrier With New Trion 150 SSD

(posted on Saturday February 13, 2016 at 01:47 AWST)

MojoKid writes: OCZ's Trion 150 SSD is an update to the company's Trion 100, which was the first drive from OCZ to feature TLC NAND and all in-house, Toshiba-built technology. As its branding suggests, the new Trion 150 kicks things up a notch over the Trion 100, thanks to some cutting-edge Toshiba 15nm NAND flash memory and a tweaked firmware, that combined, offer increased performance and lower cost over its predecessor. In testing, the Trion 150 hits peak reads and writes well north of 500MB/sec like most SATA-based SSDs but the kicker is, at its higher densities, the drive weighs in at about 28 cents per GiB. This equates to street prices of $70 for a 240GB drive, $140 for 480GB and $270 for a 960GB version. It's good to see mainstream solid state storage costs continuing to come down.

Read more of this story at Slashdot.

Slashdot: Did a Timer Error Change the Outcome of a Division I College Basketball Game?

(posted on Saturday February 13, 2016 at 01:06 AWST)

New submitter javakah writes: Controversy has erupted from the February 10th basketball game between Boise State and Colorado State, and speculation is that a timer may have made an incorrect assumption about the number of frames per second the game was recorded in, and ultimately lead to an erroneous result. With the game tied in overtime, Boise State had the ball out-of-bounds with 0.8 seconds left on the game clock. The ball was thrown in-bounds, the shot went in, and the game clock showed that the Boise State player got the shot off with 0.4 seconds left. However there was a problem: the game clock did not start until a fraction of a second after the in-bounds player touched the ball. Referees decided to use video replay to examine whether the player had gotten the shot off within 0.8 seconds or not. To do this, they used a timer embedded in the video replay system. This embedded timer indicated that 1.3 seconds had passed between the time that the in-bounds player touched the ball and when he got the shot off. (Read more, below.)

Read more of this story at Slashdot.

Friday February 12, 2016

Ubuntu Security Notices: Telco Demos With Juju: APIdaze

(posted on Friday February 12, 2016 at 23:27 AWST)

From Big Data to web services, there is so much that can be made with our service modeling tool Juju. As we count down to Mobile World Congress, we’ll be diving into the telco focused Juju solutions that make deploying innovative SaaS services simple.

APIdaze provides an API for building telecom services and web applications. Using the REST API, developers can collect phone numbers, make calls, send SMS, fax, manage SIP accounts, and more. APIdaze recently joined the Charm Partner Programme and are currently charming both APIdaze.io and Widget4Call. The combination of their API solutions with the ease of Juju Charms will enable users to create, deploy, scale and integrate telecom and web applications within minutes.

One example of a telecom application enabled by APIdaze is the click-to-call service Widget4Call. Widget4Call is a simple HTML & JavaScript code that can be inserted into a website to allow users to contact companies at the click of a button. Enabling a quick solution for inquiries on the web can reduce cart abandonment as well as leading to an increase in sales.

But what about the configuration stage? If a service operator was to install this service, the API would most likely need to be replicated on the operator’s infrastructure. With Juju, instancing the web server becomes an incredibly simple process. Just how simple? See for yourself in this video demonstration from TADsummit Lisbon.

Comments

Ubuntu Security Notices: Voting begins for OpenStack Austin talks

(posted on Friday February 12, 2016 at 21:45 AWST)

We’ve submitted several talks to the OpenStack Summit in Austin. We’ve listed them all below with links to where to vote for each talk so if you think they are interesting – please vote for them!


Mark Baker

Understanding updates to the Ubuntu Cloud Archive

Speaker: Mark Baker

Over 2000 organisations build OpenStack clouds using packages fromthe Ubuntu Cloud Archive and with all projects following the same release cycle it was easy for end users to know what versions to expect from releases and updates. Now with the advent of Core and Big Tent in Liberty, OpenStack projects are free to follow their own schedule posting stable updates, milestones, release candidates or final releases when ready. In this talk Mark Baker, OpenStack Product Manager at Canonical will explain how the Cloud Archive will be maintained and updated in light of these changes so that end users know what to expect and when. If you use the Cloud Archive and want to know more or have string feleings about how yupdates should be managed come along!

Vote Now


James Page

Why should I consider a converged architecture for my OpenStack cloud?

Speaker: James Page

The typical approach to architecting an OpenStack cloud deployment separates the deployment of the control plane of the cloud onto dedicated server infrastructure, providing physical separation from storage and compute services providing resources to tenants of the cloud. This approach has some limitations in terms of flexibility, fault tolerance and scalability.

The Ubuntu OpenStack converged cloud architecture treats the control plane of the cloud as a discrete set of services. By spreading those services as far and wide as possible (including on storage and compute servers), we can achieve an high level of resilience, improve fault tolerance and increase the scalability of the individual components of the control plane an OpenStack cloud with no ‘special place’ for control plane services.

Vote Now


Corey Bryan

Deploying Openstack from Source to Scalable Multi-Node Environments

Speaker: Corey Bryant

OpenStack is a complex system with many moving parts. DevStack has provided a solid foundation for developers and CI to test OpenStack deployments from source, and has been an essential part of the gating process since OpenStack’s inception.

DevStack typically presents a single-node OpenStack deployment, which has testing limitations as it lacks the complexities of real, scalable, multi-node OpenStack deployments.

Ubuntu now addresses the complexity of multi-node service orchestration of OpenStack deployments and has the ability to deploy OpenStack from source rather than from binary packages.

Come and hear about how we’ve implemented this feature for Ubuntu OpenStack, how to use it yourself, and even see a live deployment of OpenStack Newton from source!

Vote Now


James Page

Multi-unit OpenStack cloud deployment using LXD containers on your laptop

Speaker: James Page

Testing OpenStack deployments without having access to multiple pieces of physical server infrastructure can be challenging; Find out how to use LXD (the container hypervisor for Linux) with Juju (the service modelling tool from Canonical) to deploy OpenStack in LXC containers on your laptop, simulating a real world multi-node deployment with Open vSwitch overlay networking and running KVM instances without the overhead of nested virtualization.

Vote Now


Accelerating Production OpenStack using Low-Latency, Peer-to-Peer Storage and Networking

Brian FrommeStephen Bates
Speakers: Brian Fromme (Canonical) & Stephen Bates (Microsemi Corporation)

Enterprise workloads in OpenStack require low-latency, high-performance storage and networking to achieve real-world performance objectives. Specific workloads can benefit from accelerated network speeds and lower latency between VMs and their block storage. PCIe-based flash storage further accelerates the storage layer.

To satisfy real-world performance needs, CPU offloading is required. In this session, Microsemi and Canonical will show how production OpenStack performance can be accelerated through the use of Peer-to-Peer (p2p) communication between all PCIe devices including RDMA capable NICs and NVM Express SSDs. Technical details of the PCIe implementation will be described. A focus on database acceleration will be shown.This presentation is targeted at a technical OpenStack architect.

Vote Now


Deploying Agile and Secure OpenStack Networks for organizations with highly sensitive data (E.g. Telco/Government)

Mark BakerMike MeskillAli Khayam
Speakers: Mark Baker (Canonical), Mike Meskill (Awnix) & Ali Khayam (CTO Office)

The need to secure data and tightly control access to resources and administrative functions while remaining agile and responsive to internal customer and business/mission needs is the #1 requirement for companies and government organizations today, and needs to be designed into every phase of the cloud lifecycle, from deployment, to configuration to operations. These requirements are applicable to all organizations, but especially important in organizations with highly sensitive data and services, such as telecommunication companies and government entities. While respecting these requirements, the upbring of the cloud should be fully automatable and complete in few minutes. The deployed cloud solution should then satisfy a wide range of requirements from DDoS attacks prevention to separation of tenant and provider networks, perimeter endpoint security and encryption in-flight.

This session will cover security at scale with OpenStack and Software Defined Networks.

Vote Now


Confronting Complexity – The Number One Barrier to Enterprise Adoption

Mark BakerKenny Johnstongeneric-speaker-icon
Speakers: Mark Baker (Canonical), Kenny Johnston (Rackspace) & Keiichiro Tokunaga (Fujitsu)

We’ve all heard it before. OpenStack is too complex. There are too many projects, governance procedures, and communities to keep up with. There are too many deployment architectures, tools and configurations to get started quickly. Complexity costs. It requires me to have an entire team of OpenStack professionals which I simply can’t afford. In survey after survey Enterprises evaluating OpenStack site complexity as the number one barrier to adoption.

What is the OpenStack community doing to confront this complexity? What more can we do? How will this concern improve or dissipate over coming releases? With a coordinated effort, how could we make OpenStack easy understand, evaluate, and cost effective to deploy and operate?

Vote Now


Tom Callway

Making the economics of OpenStack work

Speakers: Tom Callway

For OpenStack to become the way to organisations to deploy, manage and scale applications in the next decade, the economics need to stack up. How do the economics of OpenStack compare to existing virtualisation solutions or using public cloud platforms? As organisations look at the ever increasing options for workload and service delivery, this talk examines the costs of OpenStack today, how it measures up against the alternatives and what OpenStack users can do to improve the economics of running applications.

Vote Now


A little of what you fancy: multi-hypervisor cloud deployment with Hyper-V, KVM and LXD

James PageGabriel Adrian Samfira
Speakers: James Page (Canonical) & Gabriel Adrian Samfira (Cloudbase)

For clouds running mixed operating system workloads, sometimes the right choice of hypervisor is not to always use KVM; Learn how to deploy and use OpenStack clouds that make use of multiple hypervisors in a single compute region in a seamless way, providing the ability to deploy each type of workload on the best hypervisor choice.

Vote Now


Ryan Beisner

Modeling, Copying and Pasting an OpenStack Cloud

Speakers: Ryan Beisner

What exactly is your OpenStack cloud’s topology? How many machines? How many containers? Which services are deployed, and where? What are the configurations of each service? Can you re-deploy or reproduce that cloud topology? OpenStack has no notion of a cloud. Users have a need to describe their particular cloud deployment in a repeatable, consistent way. In this talk we will describe modeling, documenting, redeploying and reproducing OpenStack deployments — and why that is useful.

Vote Now


Ryan Beisner

Master on Metal

Speakers: Ryan Beisner

Devstack can deploy OpenStack from source, true. But how do specific OpenStack commit levels stack up in your rack? In this talk we will describe our experience in repeatedly and consistently deploying OpenStack, from source, to bare metal — and why that is useful. Master, specific tags or your repos.

Vote Now


Ryan Beisner

How I Deployed 14,000 OpenStack Clouds in 12 Months (And Tested Them)

Speakers: Ryan Beisner

Automating the deployment and validation of a multi-dimensional matrix of operating system, OpenStack release, topology, configuration and substrate. This talk describes open source toolsets, testing approaches and validation methodologies as they relate to validating pre-production systems and functional test environments. Attendees can expect to gain a high-level understanding of how to gain vast leverage over a daunting task, with a very low person-to-machine ratio, and perhaps leverage that knowledge to improve their own processes.

Vote Now


Is bigger really better?

Billy Olsengeneric-speaker-icon
Speakers: Billy Olsen & Jill Rouleau

In today’s OpenStack deployments you are faced with a multitude of decisions to make such as which database, hypervisor, network, block storage, object storage, etc. In this talk, we consider the ‘Micro Cloud’ architecture, in which many small clouds are deployed instead of one large cloud and explore the advantages and disadvantages of both architectures.

Vote Now


Tycho Andersen

Getting containers for free

Speakers: Tycho Andersen

The performance and density advantages containers offer are well understood. The security model and restrictions on workloads are not well understood. Fortunately, there has been a lot of buzz about the advantages, but without a clear understanding of the security model and execution environment, operators are not well positioned to decide whether or not containers are right for them. In this talk, I’ll cover both of these topics, so as to shed some light for operators trying to make an informed decision on containers.

Vote Now


Bill Bauman

Application abstraction enables application scalability

Speakers: Bill Bauman

As cloud computing infrastructure scales, the applications that run there need to scale as well. In order to scale apps, just like infrastructure, a certain amount of abstraction must take place. Much like virtualization and intelligently manged machine containers have created an abstraction layer from hardware, OpenStack clouds need a simliar approach to abstracting the applications themselves. The benefits of app abstraction enable hyperscale and hyper-dynamic deployment of complex, enterprise workloads in clouds. Traditional scripting and configuration management approaches no longer meet the needs of a modern, OpenStack cloud.

This session will discuss Juju Charms and Puppet Application Orchestration, and how they both illustrate the imperative for a model-based approach to the application lifecycle in an OpenStack cloud.

Vote Now


Bill Bauman

Testing real world OpenStack deployments

Speakers: Gema Gomez-Solano

Desperate times require desperate measures. Testing real world OpenStack deployments is no easy task and doing so in a repeatable and reliable manner can become complicated really fast. Deploying reliably? Testing virtualised? In Containers? What test cases?

This is the story of my journey from nothing to testing OpenStack upgrades in an automated and reliable fashion. The ups, the downs and the desperation along with the tips and tricks that will help you get there sooner.

Vote Now


Nicolas Thomas

OpenStack Yoga training : how distributed can OpenStack for NfV go?

Speakers: Nicolas Thomas

NfV deployments must be able to cope with distributed networks: Point of presence, multi domain/region/zone.

What is the maximum distance allowed between compute and control ? Storage and control ? Distance between redundant unit of control services ? How can developer test appreciate impact without accessing a Tier 1 SP network ?

Vote Now


Greg Lutostanski

Baby Steps: Get Your Deploy Scripts Bulletproof

Speakers: Greg Lutostanski

With so many architectural options available for OpenStack it’s hard to have your cloud exactly the same as everyone else’s, because frankly you have different workloads. Great, but that puts the burden of testing and maintaining squarely on your shoulders. As consumers of OpenStack we need to know we can stand up our cloud with minimal headache and make sure everything is rock solid. A walkthrough of how I run my little CI farm for my deployments — both on bare metal and triple-O, which open source tools I lean heavily on, and what to do when something starts failing.

Vote Now


Deploying OpenStack (and more!) from the ToR switch

David DuffeyFernando Sanchez
Speakers: David Duffey (Canonical) & Fernando Sanchez (PLUMgrid)

Whitebox switches are rapidly changing the way we manage datacenter networks. Large data-centers are developing their own network software and operating systems. We will demonstrate a new, modern, open source operating system that disaggregates the core operating system distribution from the network control software (i.e. disaggregate the NOS) and provides atomic updates and application isolation and security running on switch. In this presentation, we will demonstrate this flexibility by running an OpenStack installer on the ToR switch to deploy OpenStack with SDN to a rack of machines. We will also demonstrate how to deploy network operating systems, network control software, and applications to bare metal switches.

Vote Now


How bcache can be utilized in an OpenStack environment

Matt RaeJosh McJilton
Speakers: Matt Rae & Josh McJilton

Bcache allows one or more SSDs to act as a cache for one or more slower hard disk drives. We will demonstrate scenarios of bcache used within OpenStack environments to provide SSD like performance to slower block devices.

Vote Now

Comments

DFES Fire Danger Ratings: ​Severe fire danger advice for the Goldfields Midlands on Saturday

DFES Fire Danger Ratings (posted on Friday February 12, 2016 at 16:53 AWST)

Category: Fire Danger Rating
Alert Summary: A Severe Fire Danger Rating has been forecast for Saturday 13 February 2016 for the Goldfields.
Content:

A Severe Fire Danger Rating has been forecast for Saturday 13 February 2016 for the Goldfields.

 

This includes the local government districts of:  

City of Kalgoorlie-Boulder local government area – western part

Shire of Coolgardie

Shire of Dundas – western part

Shire of Laverton – south western corner

Shire of Leonora

Shire of Menzies – central part

Shire of Sandstone – part adjacent to Leonora Shire

Shire of Wiluna – south western corner

Bushfires can threaten suddenly and without warning. Stay alert and watch for signs of fire, especially smoke and flames. Have your bushfire survival plan and kit ready.

Keep up to date with bushfire information through local radio, websites and TV. Do not wait for a warning before you act. If you see flames call triple zero.

These are very hot, dry and windy conditions for a bush or grass fire.


If a fire starts and takes hold: 

It will be unpredictable, move very fast and difficult for firefighters to bring under control. 

Spot fires will start and move quickly. Embers may come from many directions. 


If you live in or near bush with high fuel loads then you are at risk and need to act: 

Read through your bushfire survival plan. If you do not have one decide what you will do if a fire starts. 

If you are not prepared to the highest level, leaving bushfire risk areas early in the day is your safest option. 

Homes that are prepared to the highest level, have been constructed to bushfire protection levels and are actively defended may provide safety. 

You must be physically and mentally prepared to defend in these conditions. 

To find out what the Fire Danger Rating means to you visit www.dfes.wa.gov.au or call 9395 9300 during normal office hours.


Check the Fire Danger Rating for your area by visiting www.bom.gov.au or call 1300 659 213 (call charges apply).

Publication Time: 12/02/2016 4:52 PM
Expiration Time: 14/02/2016 12:00 AM

DFES Fire Danger Ratings: ​Extreme fire danger advice for parts of the Midwest Gascoyne on Saturday

DFES Fire Danger Ratings (posted on Friday February 12, 2016 at 16:37 AWST)

Category: Fire Danger Rating
Alert Summary: An Extreme Fire Danger Rating has been forecast for Saturday 13 February 2016 for coastal parts of the Midwest Gascoyne.
Content:

An Extreme Fire Danger Rating has been forecast for Saturday 13 February 2016 for coastal parts of the Midwest Gascoyne.

 

This includes the local government districts of:  

Shire of Carnarvon - coastal part

Shire of Shark Bay - coastal part

Severe fire danger advice for parts of the Midwest Gascoyne on Saturday


A Severe Fire Danger Rating has been forecast for Saturday 13 February 2016 for the inland parts of the Midwest Gascoyne.

 

This includes the local government districts of: 

Shire of Carnarvon – inland part

Shire of Cue

Shire of Meekatharra

Shire of Menzies – the far western part

Shire of Mount Magnet

Shire of Murchison

Shire of Sandstone

Shire of Shark Bay – inland part

Shire of Upper Gascoyne

Shire of Wiluna – western edge and the south western tip

Shire of Yalgoo

Bushfires can threaten suddenly and without warning. Stay alert and watch for signs of fire, especially smoke and flames. Have your bushfire survival plan and kit ready.

Keep up to date with bushfire information through local radio, websites and TV. Do not wait for a warning before you act. If you see flames call triple zero.

These are very hot, dry and windy conditions for a bush or grass fire.


If a fire starts and takes hold: 

It will be unpredictable, move very fast and difficult for firefighters to bring under control. 

Spot fires will start and move quickly. Embers may come from many directions. 


If you live in or near bush with high fuel loads then you are at risk and need to act: 

Read through your bushfire survival plan. If you do not have one decide what you will do if a fire starts. 

If you are not prepared to the highest level, leaving bushfire risk areas early in the day is your safest option. 

Homes that are prepared to the highest level, have been constructed to bushfire protection levels and are actively defended may provide safety. 

You must be physically and mentally prepared to defend in these conditions. 


To find out what the Fire Danger Rating means to you visit www.dfes.wa.gov.au or call 9395 9300 during normal office hours.

Check the Fire Danger Rating for your area by visiting www.bom.gov.au or call 1300 659 213 (call charges apply).

Publication Time: 12/02/2016 4:35 PM
Expiration Time: 14/02/2016 12:00 AM

SC Magazine: AWS debuts new Sydney availability zone

(posted on Friday February 12, 2016 at 14:00 AWST)

Could new data centres be live?

SC Magazine: Optus net profits up despite mobile subscriber fall

(posted on Friday February 12, 2016 at 09:33 AWST)

Increase in mobile ARPU, NBN subscriber numbers.

SC Magazine: UK parliamentary committee criticises encryption backdoor bill

(posted on Friday February 12, 2016 at 09:08 AWST)

'Snoopers' charter' faces resistance.

SC Magazine: Herron Todd White's bet on building from scratch

(posted on Friday February 12, 2016 at 09:00 AWST)

Going outside the box.

SC Magazine: Toshiba issues big recall for laptop batteries over fire fears

(posted on Friday February 12, 2016 at 07:35 AWST)

54 models affected.

SC Magazine: Cisco firewalls vulnerable to remote takeover

(posted on Friday February 12, 2016 at 07:31 AWST)

Critical vulnerability patched.

SC Magazine: Queensland Urban Utilities transforms data into ops gains

(posted on Friday February 12, 2016 at 04:49 AWST)

Q-Ops brings big rewards.

SC Magazine: Toll dumps Google overhaul, reviewing SAP rollout

(posted on Friday February 12, 2016 at 04:24 AWST)

Exclusive: Business benefits not demonstrated.

Ubuntu Security Notices: The Model of a Good Time: Juju Charmer Summit 2.0 @ cfgmgmntcamp

(posted on Friday February 12, 2016 at 02:43 AWST)

Over 100 Juju enthusiasts gathered this week for our second Juju Charmer Summit in beautiful Gent, Belgium as part of the Config Management Camp. This was our first time officially participating and helping to sponsor the event, and we are proud to join the existing Ansible, Chef, CFEngine/Rudder, Foreman, Puppet, and Salt tracks. Over 700 people attended the event, with our own room being visited by over 100 participants from 44 organizations.

Group Photo

We started off with a keynote by Mark Shuttleworth titled “The Magic of Application Monitoring”, and then we had three full days of sessions and workshops:

We’ll publish the videos with slides on the Juju YouTube channel when editing is complete. Many thanks to Bart Smith for providing in-audience videos of select talks.

We will certainly be returning to cfgmgmntcamp next year, and we look forward to continue to participate with our peers to help drive operations at scale!

We’d like to thank the following organizations and projects for participating in our track: Redis Labs, University of Ghent, AGFA, SIDIU, AT Computing, Chorally, Warpnet, Phoops, Dark Horse Comics, University College Gent, Meteorite.bi, Apache Zeppelin, Madtech, Engineering SRA, Neo Technology, Skymind, Spotify, Analytical Labs, Zentyal, Frogtek, Biodec, Capensis, PCCW Global, Cloudar, Freesolutions, Positive Internet Co, NFLabs, CoScale, Cloudbase Solutions, Johnson and Johnson, Red Hat, IBM, Ghent University, Nulogy, Zero Turnaround, Plista GmbH, Sysart, DHC, Fairbanks, FiSolutions, Puppet Labs, Canonical, Travix, and Sunningdale.

Comments

Thursday February 11, 2016

Ubuntu Security Notices: Juju GUI 2.0 Release Introduction

(posted on Thursday February 11, 2016 at 23:41 AWST)

Jeff Pihach gives a run through of the new design of the latest release of the Juju GUI.

We are always interested to hear what you think about the GUI and for input on what features you want to see next.

We can be found on IRC on freenode.net in #juju and #juju-gui, on the Juju mailing list

Or you can find the GUI repository on github.

Comments

SC Magazine: Panasonic recalls Toughbook batteries over fire hazard

(posted on Thursday February 11, 2016 at 13:35 AWST)

Offering free replacements.

SC Magazine: Fifield urged to extend mobile blackspots program

(posted on Thursday February 11, 2016 at 13:00 AWST)

Farmer's death might have been avoided.

SC Magazine: ATO soothes accountants over major IT changes

(posted on Thursday February 11, 2016 at 10:12 AWST)

A lack of consultation hurt ‘digital by default’ drive.

SC Magazine: US says Google computers qualify as drivers

(posted on Thursday February 11, 2016 at 09:31 AWST)

Boost to self-driving cars.

SC Magazine: Apple in ACCC's sights over bricked iPhones

(posted on Thursday February 11, 2016 at 08:29 AWST)

Smartphones unusable after third-party repairs.

SC Magazine: Inside BloodNet: Australia's real-time blood database

(posted on Thursday February 11, 2016 at 08:07 AWST)

One national system tracks the country's critical blood stores.

SC Magazine: Telstra users locked out of US hosting servers

(posted on Thursday February 11, 2016 at 06:59 AWST)

Upstream provider issue blamed for service disruption.

Drupal Contrib Security: CAS - Moderately Critical - Information Disclosure - DRUPAL-SA-CONTRIB-2016-005

(posted on Thursday February 11, 2016 at 05:16 AWST)

Description

This module enables you to use your Drupal site as a client or server for the single sign on protocol CAS. This vulnerability only affects sites that use the "CAS Server" sub module.

The module doesn't allow an administrator to restrict which CAS clients are allowed authenticate with the Drupal CAS server. A malicious CAS client can trick your users into exposing information about themselves, including: username, uid, email, account created date, account language, and roles.

This vulnerability is mitigated by the fact that a user must click a specially formed link from the malicious site and log into your Drupal CAS server with their credentials. If the user already has an active session with your Drupal CAS server, then that step is skipped.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.

Versions affected

  • CAS 7.x-1.x versions prior to 7.x-1.5.

Drupal core is not affected. If you do not use the contributed CAS module, there is nothing you need to do.

Solution

Install the latest version:

  • If you are using the CAS Server sub-module, upgrade to CAS 7.x-1.5 and configure the "white list" of accepted CAS clients that are allowed to authenticate with your CAS server.
  • If you use the CAS module but NOT the server sub-module, then do nothing.

Also see the CAS project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

Drupal Contrib Security: Embedded Media Field - Moderately Critical - Access Bypass - DRUPAL-SA-CONTRIB-2016-004

(posted on Thursday February 11, 2016 at 05:14 AWST)

Description

This module enables you to to display video, image, and audio files from various third party providers

The module doesn't sufficiently sanitize path arguments under certain scenarios.

This vulnerability is mitigated by the fact that an attacker must be able to trick an administrator into visiting a carefully crafted URL.

CVE identifier(s) issued

  • A CVE identifier will be requested, and added upon issuance, in accordance with Drupal Security Team processes.

Versions affected

  • Embedded Media Field 6.x-1.x all versions.
  • Embedded Media Field 6.x-2.x versions prior to 6.x-2.7.

Versions of Embedded Media Field for Drupal 7 are not affected.

Drupal core is not affected. If you do not use the contributed Embedded Media Field module, there is nothing you need to do.

Solution

Install the latest version:

Also see the Embedded Media Field project page.

Reported by

Fixed by

Coordinated by

Contact and More Information

The Drupal security team can be reached at security at drupal.org or via the contact form at https://www.drupal.org/contact.

Learn more about the Drupal Security team and their policies, writing secure code for Drupal, and securing your site.

Follow the Drupal Security Team on Twitter at https://twitter.com/drupalsecurity

SC Magazine: US lawmakers to ban states from mandating encryption backdoors

(posted on Thursday February 11, 2016 at 04:59 AWST)

Call state-based laws 'unworkable'.

SC Magazine: Google kills Flash for ads

(posted on Thursday February 11, 2016 at 03:27 AWST)

Will switch to HTML 5 this year.

Ubuntu Security Notices: Docker, Alpine, Ubuntu, and You

(posted on Thursday February 11, 2016 at 01:09 AWST)

There’s no shortage of excitement, controversy, and readership, any time you can work “Docker” into a headline these days. Perhaps a bit like “Donald Trump”, but for CIO tech blogs and IT news — a real hot button. Hey, look, I even did it myself in the title of this post!

Ubuntu, Docker and Alpine

There’s no shortage of excitement, controversy, and readership, any time you can work “Docker” into a headline these days. Perhaps a bit like “Donald Trump”, but for CIO tech blogs and IT news — a real hot button. Hey, look, I even did it myself in the title of this post!

Sometimes an article even starts out about CoreOS, but gets diverted into a discussion about Docker, like this one, where shykes (Docker’s founder and CTO) announced that Docker’s default image would be moving away from Ubuntu to Alpine Linux.

article screenshot

I have personally been Canonical’s business and technical point of contact with Docker Inc, since September of 2013, when I co-presented at an OpenStack Meetup in Austin, Texas, with Ben Golub and Nick Stinemates of Docker. I can tell you that, along with most of the rest of the Docker community, this casual declaration in an unrelated Hacker News thread, came as a surprise to nearly all of us!

Docker’s default container image is certainly Docker’s decision to make. But it would be prudent to examine at a few facts:

(1) Check DockerHub and you may notice that while Busybox (Alpine Linux) has surpassed Ubuntu in the number downloads (66M to 40M), Ubuntu is still by far the most “popular” by number of “stars” — likes, favorites, +1’s, whatever, (3.2K to 499).

(2) Ubuntu’s compressed, minimal root tarball is 59 MB, which is what is downloaded over the Internet. That’s different from the 188 MB uncompressed root filesystem, which has been quoted a number of times in the press.

(3) The real magic of Docker is such that you only ever download that base image, one time! And you only store one copy of the uncompressed root filesystem on your disk! Just once, sudo docker pull ubuntu, on your laptop at home or work, and then launch thousands of images at a coffee shop or airport lounge with its spotty wifi. Build derivative images, FROM ubuntu, etc. and you only ever store the incremental differences.

Actually, I encourage you to test that out yourself… I just launched a t2.micro — Amazon’s cheapest instance type with the lowest networking bandwidth. It took 15.938s to sudo apt install docker.io. And it took 9.230s to sudo docker pull ubuntu. It takes less time to download Ubuntu than to install Docker!

ubuntu@ip-172-30-0-129:~⟫ time sudo apt install docker.io -y
...
real    0m15.938s
user    0m2.146s
sys     0m0.913s

As compared to…

ubuntu@ip-172-30-0-129:~⟫ time sudo docker pull ubuntu
latest: Pulling from ubuntu
f15ce52fc004: Pull complete 
c4fae638e7ce: Pull complete 
a4c5be5b6e59: Pull complete 
8693db7e8a00: Pull complete 
ubuntu:latest: The image you are pulling has been verified. Important: image verification is a tech preview feature and should not be relied on to provide security.
Digest: sha256:457b05828bdb5dcc044d93d042863fba3f2158ae249a6db5ae3934307c757c54
Status: Downloaded newer image for ubuntu:latest
real    0m9.230s
user    0m0.021s
sys     0m0.016s

Now, sure, it takes even less than that to download Alpine Linux (0.747s by my test), but again you only ever do that once! After you have your initial image, launching Docker containers take the exact same amount of time (0.233s) and identical storage differences. See:

ubuntu@ip-172-30-0-129:/tmp/docker⟫ time sudo docker run alpine /bin/true
real    0m0.233s
user    0m0.014s
sys     0m0.001s
ubuntu@ip-172-30-0-129:/tmp/docker⟫ time sudo docker run ubuntu /bin/true
real    0m0.234s
user    0m0.012s
sys     0m0.002s

(4) I regularly communicate sincere, warm congratulations to our friends at Docker Inc, on its continued growth. shykes publicly mentioned the hiring of the maintainer of Alpine Linux in that Hacker News post. As a long time Linux distro developer myself, I have tons of respect for everyone involved in building a high quality Linux distribution. In fact, Canonical employs over 700 people, in 44 countries, working around the clock, all calendar year, to make Ubuntu the world’s most popular Linux OS. Importantly, that includes a dedicated security team that has an outstanding track record over the last 12 years, keeping Ubuntu servers, clouds, desktops, laptops, tablets, and phones up-to-date and protected against the latest security vulnerabilities. I don’t know personally Natanael, but I’m intimately aware of what a spectacular amount of work it is to maintain and secure an OS distribution, as it makes its way into enterprise and production deployments. Good luck!

(5) There are currently 5,854 packages available via apk in Alpine Linux (sudo docker run alpine apk search -v). There are 8,862 packages in Ubuntu Main (officially supported by Canonical), and 53,150 binary packages across all of Ubuntu Main, Universe, Restricted, and Multiverse, supported by the greater Ubuntu community. Nearly all 50,000+ packages are updated every 6 months, on time, every time, and we release an LTS version of Ubuntu and the best of open source software in the world every 2 years. Like clockwork. Choice. Velocity. Stability. That’s what Ubuntu brings.

Docker holds a special place in the Ubuntu ecosystem, and Ubuntu has been instrumental in Docker’s growth over the last 3 years. Where we go from here, is largely up to the cross-section of our two vibrant communities.

And so I ask you honestly…what do you want to see? How would you like to see Docker and Ubuntu operate together?

Original article

Ubuntu Security Notices: Federal Government experts Awnix join Canonical’s Partner Programme

(posted on Thursday February 11, 2016 at 01:03 AWST)

Canonical is excited to welcome OpenStack solution provider Awnix to its Reseller Programme.  Awnix provides OpenStack solutions tailored to the US federal government.  Awnix is led by a team of technology experts with decades of experience serving the government and corporate markets. Awnix’s founders are former Federal data center architects with a combined 25 years of experience designing systems and solutions for enterprise data center environments.

OpenStack is at the foundation of Awnix’s industry-leading Engineered Systems, which are designed to help government and enterprise IT professionals more easily meet their security, reliability, compliance, and cost-efficiency goals. With over 61% of large scale OpenStack deployments running on Ubuntu, collaboration between Awnix and Canonical is an obvious choice.

“Ubuntu is a worldwide leader in Linux and OpenStack development, innovation and flexibility, so collaborating with Canonical better enables us to easily and rapidly develop platforms and solutions that are highly scalable, robust, and secure,” said Rick Kundiger, CEO of Awnix. “Those are the qualities our  customers in both the public and private sectors are looking for in a cloud solution – scale, resiliency, flexibility, and security that meet the requisite certification and compliance regulations – so that they can develop and deploy sophisticated applications quickly and easily.”

“The combination of Canonical’s expertise and leadership in OpenStack together with Awnix’s extensive experience in the Federal Government is another step we take to bring cloud solutions to the US Public Sector in order to improve civic services. Awnix is the right partner with the needed knowledge and delivery capabilities to help us expand even more, create the potential for even greater quality as well as functionality, economy and flexibility for customers choosing to deploy OpenStack based cloud platforms and solutions,” said Marcin Kierdelewicz, Director of Channel Business Development, from Canonical.

Canonical and Awnix will be showcasing their joint solution, based on Ubuntu Cloud Technologies including OpenStack, MAAS and Juju, along with PLUMgrid SDN at the WEST conference in San Diego next week.  Come and visit us in Booth 1549.

For more information about Awnix and their products and services please visit http://www.awnix.com.

For more information on Canonical’s cloud partner programmes, please visit http://partners.ubuntu.com/.  

Comments

Wednesday February 10, 2016

Netcraft: AlphaBay darknet phishing attack impersonates .onion domain

(posted on Wednesday February 10, 2016 at 21:58 AWST)

Fraudsters operating on the AlphaBay darknet market are using phishing attacks to steal login credentials from other criminals. In this particular attack, the phishing site mimics the address of one of AlphaBay's Tor hidden services.

Dark Wars: A phishing site impersonating the AlphaBay Market

Dark Wars: A phishing site impersonating the AlphaBay Market

AlphaBay describes itself as a darknet market that specialises in all kinds of illegal goods, and so its users are reminded to access the site directly through the Tor anonymity network, rather than via a WWW to .onion gateway. However, this is not the only thing that users need to worry about: some of the criminals on AlphaBay also try to steal other users' credentials by sending messages to trick them into visiting phishing sites.

AlphaBay was originally founded by members of Russian carding forums, but the range of illegal goods being sold on the anonymous marketplace now includes drugs and weapons as well as credit card details. AlphaBay uses a .onion address which allows the website to run as a hidden service on the Tor network – this means that the physical location of the website remains anonymous, as well as the locations of Tor users who access it.

The genuine AlphaBay hidden service uses the address pwoah7foa6au2pul.onion. A hidden service's address is derived from the public key used to authenticate the connection, so it is difficult to convincingly impersonate the site without having access to the owner's key pair. However, the fraudster could easily have computed a partial match using tools such as scallion; for example, Netcraft generated the lookalike address pwoah7f5ivq74fmp.onion within minutes.

However, in the case of this phishing attack, the fraudster has simply created a lookalike domain on the public internet, using the address pwoah7foa6au2pul.me.pn.

The genuine AlphaBay Market login form, accessed via its .onion address on a Tor-enabled browser.

The genuine AlphaBay Market login form, accessed via its .onion address using the Tor Browser Bundle.

The address used by the phishing site will look familiar to regular users of the AlphaBay darknet market, but rather than pointing to an anonymous hidden service, it points to a phishing site hosted by AttractSoft GmbH in Germany.

The phishing site used in this attack was discovered on Thursday and is still operating at the time of writing. It mimics the genuine AlphaBay Market login page, and prompts the victim to enter his username and password. A client-side check forces the victim to also complete the security code CAPTCHA field, although the phishing site does not care whether the correct value was entered.

The stolen credentials are then submitted to a PHP script, which immediately redirects the victim to the genuine AlphaBay hidden service.

This phishing attack makes use of a me.pn domain, which was likely chosen because addresses under this domain can be registered for free, and the ".me.pn" string bears a (somewhat tenuous) similarity to the .onion TLD, at least in terms of its length.

Ironically, some of the services that can be bought and sold on the AlphaBay Market include spam sending services, "bank drops" (for receiving fraudulent bank transfers), account details, and other services useful to fraudsters engaged in phishing. This attack could therefore be viewed as yet another example of fraudsters defrauding fraudsters.

In a further show of there being no honour amongst thieves, the HTML source of the phishing site appears to have been copied from a previous lookalike site using the onion-market.co domain name. This domain name has since been repossessed by its registrar, GoDaddy, which is typical of domains that have been paid for with fraudulent funds or subjected to chargebacks.

The content of the phishing site was mirrored from another site that has since been suspended.

The content of the phishing site was mirrored from another site that has since been suspended.

AlphaBay has been operating since the end of 2014, when it helped fill the void left after the demise of Silk Road and Silk Road 2.0. It has since become one of the largest darknet markets, gaining wide publicity after it was used to sell compromised Uber accounts and data stolen from the TalkTalk breach in 2015.

Ubuntu Security Notices: Ubuntu Core is available for the Intel® NUC

(posted on Wednesday February 10, 2016 at 17:36 AWST)

Thin Canyon_NUC_Front Angle_Board

Over the last few months Canonical and Intel have been working together to create a standard platform for developers to test and create x86-based IOT solutions using snappy Ubuntu Core. The results are here today and we’re pleased to announce the availability of the Ubuntu Core images for the Intel® NUC DE3815TY on our developer site.

We focused on the Intel® NUC for its relatively low cost point for a starter platform (around $150) and broad availability (you can even find them on Amazon!). This affordable device running Ubuntu Core offers a simple developer experience, making embedded development accessible to all with a deployment ready edge computing option for IOT.

We have just published the 15.04 snappy image and will also publish a 16.04 LTS version for this device when it is released in the next few months. As the device is on a three year guarantee lifecycle, having the long term support release will make it a trusted development platform for years to come.

A background on the Intel® NUC; they are mini PCs built with small packaging (190mm or 115mm * 116mm * 40mm) particularly suited for embedded use cases. Their small size, low consumption, fanless operations and low cost make them particularly strong candidates for digital display or retail kiosks. Combined with Ubuntu Core this creates opportunities across digital display and retail kiosks in particular. For example your preferred shop’s till could also double up as a bluetooth beacon, an advertising screen, a people counting device, just by installing a few apps on it.

The Intel® NUC DE3815TY is an ideal IOT development platform! It’s got enough computing power to prototype for all embedded use cases with an Intel® Atom Processor. It also offers a lot of IOs and configuration options: USB ports, I2C ports, 4Gb eMMC and the possibility to add a wireless card, up to 8G of RAM and a 2.5 inch HDD or SSD. Now, with the availability of snappy Ubuntu Core, developers have the possibility to simply bring the rich ecosystem of Ubuntu apps onto the Intel® NUC and into the embedded space. Don’t like embedded because cross-compilation is a bit painful? Development for the Intel® NUC requires none of that, what will run on the developer’s machine will run on the embedded device. With the addition of snapcraft, the tool used by Ubuntu Core to package apps, embedded development is now as simple as it can get.

But the Intel® NUC could also ramp up for production environments. With the option for VGA screens or HDMI it can cover both new build or legacy deployments. It also has plenty of spare CPU makes it a future proof choice and with a 3 years guarantee lifecycle it’s definitely built to cover all your future computing needs. This is exactly where snappy Ubuntu Core becomes powerful, combining the upgrade capabilities of Ubuntu Core and the app architecture – you can guarantee that your Intel® NUC will satisfy today’s use case as well as tomorrow’s.

Comments

SC Magazine: DBC gives up on iiNet piracy case

(posted on Wednesday February 10, 2016 at 15:02 AWST)

End of the line for rights holder.

SC Magazine: 'Netflix tax' bill hits parliament

(posted on Wednesday February 10, 2016 at 12:11 AWST)

Digital goods bought from overseas to get GST.