news

IBM Reveals 8-Bit Analog Chip With Phase-Change Memory

Today at the IEEE International Electron Devices Meeting in San Francisco, IBM reported a new 8-bit analog chip. But the true development was less about analog chips catching up to their digital peers and more a radical rethink of chip architecture. This chip is the first to perform 8-bit calculations right where information is stored. IBM’s new analog chip is based on phase-change memory. The key ingredient is a material that can undergo phase changes in response to electrical current.
Read more

Manage NTP with Chrony

Computers worldwide use the Network Time Protocol (NTP) to synchronize their times with internet standard reference clocks via a hierarchy of NTP servers. The primary servers are at stratum 1, and they are connected directly to various national time services at stratum 0 via satellite, radio, or even modems over phone lines. The time service at stratum 0 may be an atomic clock, a radio receiver tuned to the signals broadcast by an atomic clock, or a GPS receiver using the highly accurate clock signals broadcast by GPS satellites.
Read more

Using Terraform for container security as code with Sysdig Secure

In the following tutorial you can learn how to implement container security as code. You probably have a CI/CD pipeline to automatically rebuild your container images. What if you could define your container security as code, push it into a Git repository to version control changes and then enforce your policy in your container orchestration tool like Docker or Kubernetes using Sysdig Secure? Terraform is an awesome tool to deploy and update your infrastructure using code.
Read more

Kubernetes 1.13: Simplified Cluster Management with Kubeadm, Container Storage Interface (CSI), and CoreDNS as Default DNS are Now Generally Available

We’re pleased to announce the delivery of Kubernetes 1.13, our fourth and final release of 2018! Kubernetes 1.13 has been one of the shortest releases to date at 10 weeks. This release continues to focus on stability and extensibility of Kubernetes with three major features graduating to general availability this cycle in the areas of Storage and Cluster Lifecycle. Notable features graduating in this release include: simplified cluster management with kubeadm, Container Storage Interface (CSI), and CoreDNS as the default DNS.
Read more

90 days of AWS EKS in Production

I’ve been using EKS in production for a small number of months now and so far, so good. Really impressed by the simplicity of getting a cluster up and running and ready for workloads. AWS provide a greatGetting Started Guideon their website, which is super duper for getting your head around the components and glue required for getting EKS stood up. EKS is a very vanilla service, giving users a cluster that conforms to CNCF standards,which Kubernetes purists will be very happy with, however, don’t think that because AWS provides Kubernetes as a service, you no longer have to worry about getting your nodes optimised and ready for your heavy workloads.
Read more

Drone CI/CD Goes Kubernetes-Native

Today we’re announcing official support for Kubernetes. While many organizations have already been combining Drone and Kubernetes for their deployments, today we’re delivering a native integration for a better user experience. Now your CI/CD Pipelines are translated into native Pods, Secrets, and Services. We’ve been at the forefront of the containerization movement; we started support for Linux containers, and when Docker came around we fully embraced their container runtime. Since then we’ve seen the hyper growth of Kubernetes platforms and users like eBay, Reddit and The New York Times adopting Drone and Kubernetes together.
Read more

Kubernetes’ first major security hole discovered

Kubernetes has become the most popular cloud container orchestration system by far, so it was only a matter of time until its first major security hole was discovered. And the bug, CVE-2018-1002105, aka the Kubernetes privilege escalation flaw, is a doozy. It’s a CVSS 9.8 critical security hole. CVSS 9.8 critical security hole. With a specially crafted network request, any user can establish a connection through the Kubernetes application programming interface (API) server to a backend server.
Read more

5 Initiatives to Modernize Jenkins and Kill the Jenkinsteins

Kohsuke Kawaguchi, creator of Jenkins and CTO at CloudBees, spoke last month at Jenkins World in Nice about five on-going initiatives to modernize the popular CI/CD tool. The initiatives revolve around Jenkins Evergreen, Jenkins Pipeline (Blue Ocean), Jenkins Configuration-as-Code, Jenkins X, and Cloud-Native Jenkins. While open source development is not going to disappear, the future of commercial open source is not very promising. Cloud providers are adopting open source software without necessarily adding value, or supporting future development.
Read more

Using AI and satellite imagery for disaster insights

A framework for using convolutional neural networks (CNNs) on satellite imagery to identify the areas most severely affected by a disaster. This new method has the potential to produce more accurate information in far less time than current manual methods. Ultimately, the goal of this research is to allow rescue workers to quickly identify where aid is needed most, without relying on manually annotated, disaster-specific data sets. Researchers train models on CNNs to detect human-made features, such as roads.
Read more

NGINX Conf 2018: Migrating Load-Balanced Services from F5 to NGINX Plus at AppNexus

In his session at NGINX Conf 2018, ErnestoChaves, a Senior Network Engineer at AppNexus, describes how and why the company replaced all of the F5Networks BIG‑IP hardware load balancers in its global data centers with NGINXPlus. He details the motivations, pitfalls, and successes of the transition from proof of concept through to implementation. In this blog we highlight some key takeaways. You can watch the complete video here: Solutions that were the best choice at the time don’t always stay that way.
Read more