Skip to content

Feed aggregator

LG jumps ahead of the trade show pack, announces new tablet

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 19:35
In an attempt to grab attention ahead of next month's IFA trade show, LG teases its new G Pad II 10.1 tablet.

Categories: Blogs

PlayStation Plus free games of September 2015 for PS4, PS3, and Vita

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 19:14
Six new games come to Plus, including four for PS4.

Categories: Blogs

Look who's Tarkin: 'Star Wars' prequel 'Rogue One' could re-create Peter Cushing in CGI

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 18:45
Cushing, who played villainous military officer Grand Moff Tarkin in the first "Star Wars" movie, died in 1994. Is this a fitting tribute to a beloved actor, or special effects gone mad?

Categories: Blogs

Han Solo in carbonite backpack will make Jabba jealous

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 17:43
Stuff all your gear inside a "Star Wars" backpack with Han Solo's frozen face sticking out, waiting to be rescued.

Categories: Blogs

Intel's Edison joins the quest to save the bees

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 17:32
Tiny radio-frequency identification chips attached to bees will be paired with Intel Edison boards to monitor the bees' activities and help the fight against colony collapse disorder.

Categories: Blogs

Skateboarder collects coins, outruns turtle shells in Mario Kart spoof

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 17:22
Watch this skater dressed as Luigi do an impressive run during which he outpaces turtle shells, collects coins and uses turbo boots to try to beat Mario's record.

Categories: Blogs

Happy 20th birthday, Microsoft Windows 95

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 16:14
Twenty years before it launched Windows 10 -- in a very different time and place -- Microsoft launched Windows 95.

Categories: Blogs

Microsoft's Hello facial detection system tells twins apart

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 15:19
The new log-in system for Windows 10 recognizes your face -- and reportedly can distinguish you from your identical twin.

Categories: Blogs

Managing a Jenkins Docker Infrastructure: Docker Garbage Collector

CloudBees' Blog - Mon, 08/24/2015 - 15:18
Using Docker for Continuous Delivery is great. It brings development teams an impressive flexibility, as they can manage environments and test resources by themselves, and, at same time, enforce clean isolation with other teams sharing the same host resources.

But a side effect on enabling Docker on build infrastructure is disk usage, as pulling various Docker images consumes hundreds megabytes. The layered architecture of Docker images ensures that you'll share the lower level layers as much as possible. However, as those layers get updated with various fixes and upgrades, the previous ones remain on disk, and can result, after few months, in huge disk usage within /var/lib/docker.

Jenkins monitors can alert on disk consumption on build executors. However, a more proactive solution should be implemented versus simply making the node offline until administrator handle the issue "ssh-ing" to the server.
Docker does not offer a standard way to address image garbage collection, so most production teams have created their own tool, including folks at Spotify who open-sourced docker-gc script.

On a Jenkins infrastructure, a scheduled task can be created to run this maintenance script on all nodes. I did it for my own usage (after I had to handle filesystem full error). To run the script on all docker enabled nodes, I'm using a workflow job. Workflow make it pretty trivial to setup such a GC .

The script I'm using relies on a "docker" label to be used on all nodes with docker support. Jenkins.instance.getLabel("docker").nodes returns all the build nodes with this label, so I can iterate on them and run a workflow node() block to execute the docker-gc script within a sh shell script command:

def nodes = Jenkins.instance.getLabel("docker").nodes
for (n in nodes) {
node (n.nodeName) {
sh 'wget -q -O - | bash'


docker-gc script do check images not used by a container. When an image existed last run of the script, but is not used by a container,

I hope that the Docker project will soon release an official docker-gc command. This will benefit to infrastructure teams, eliminating the need to re-invent custom solutions to the same common issue.
Categories: Companies

Awesome nebula cradles a runaway star

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 14:27
The Hubble Space Telescope has captured a glorious picture of a brightly burning, quickly moving star and the wind-blasted nebula around it.

Categories: Blogs

Tintri to Showcase New All-Flash Array, Real Time Analytics and Converged Solutions at VMworld San Francisco 2015

Tintri blog - Mon, 08/24/2015 - 14:00

MOUNTAIN VIEW, Calif. – August 24, 2015 – Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, today announced it will kick off VMworld week with its annual user conference, Tintricity, in San Francisco on August 30. The conference will be immediately followed by Tintri’s extensive activities as a Platinum Sponsor at VMworld 2015.

Language English
Categories: Companies

Mother Nature's fury as seen from space (pictures)

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 04:18
Normally we see the devastation natural disasters visit on neighborhoods and cities, but our outposts in orbit show the full scope of their destructive power.

Categories: Blogs

Rapper Wiz Khalifa arrested for allegedly refusing to dismount hoverboard

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 03:00
Technically Incorrect: Claiming it was "all because I didn't want to ditch the technology everyone will be using in the next 6 months," Khalifa undergoes some physical restraint at the hands of the LAPD.

Categories: Blogs

The future of the tablet is the PC

The Wisdom of Clouds - James Urquhart - Mon, 08/24/2015 - 02:38
As the tablet market slows, mobile computing is gravitating toward devices that can convert from a tablet to a laptop and back again.

Categories: Blogs

ESPN freezes top writer's iPhone and laptop after accidentally firing him

The Wisdom of Clouds - James Urquhart - Sun, 08/23/2015 - 23:41
Technically Incorrect: A technical error leads to Adam Shefter suddenly discovering he is technologically bereft.

Categories: Blogs

Bill Maher on Airbnb: Who actually wants strangers in their house?

The Wisdom of Clouds - James Urquhart - Sun, 08/23/2015 - 23:00
Technically Incorrect: The comedian takes to his HBO show to excoriate the sharing economy as nothing more than the desperate economy, where Americans are merely trying to adapt to increasing inequality.

Categories: Blogs

Need to take down a drone? A munitions company offers firepower

The Wisdom of Clouds - James Urquhart - Sun, 08/23/2015 - 18:31
Technically Incorrect: An Idaho company says its products protect against drone-based privacy concerns and terror.

Categories: Blogs

Some iPhone 6 Plus devices have faulty cameras, says Apple, as it offers free repair

The Wisdom of Clouds - James Urquhart - Sun, 08/23/2015 - 16:35
"A small percentage" of the phones sold between September and January have iSight cameras that take blurry shots. But if you got stuck, you can get a fix at no charge.

Categories: Blogs

3D printing: Where Chattanooga's past meets its future

The Wisdom of Clouds - James Urquhart - Sun, 08/23/2015 - 04:43
As part of Road Trip 2015, CNET digs into the 3D printing startup culture in Chattanooga, Tennessee.

Categories: Blogs

The Cybersecurity Sprint: Are we safe yet?

Cloud Musings by Kevin L. Jackson - Sun, 08/23/2015 - 01:57

UPDATE: NBC News reports U.S. officials have disclosed a hack of the Pentagon’s Joint Staff unclassified email system, which took place on July 25.

Recent unauthorized access to a U.S. government database led to thecompromise of information on at least 21.5 million individuals. This massive background investigation data breach also compromised usernames, passwords, mental health records and financial information. Although a security update applied by the Office of Management and Budget (OPM) and the Homeland Security Department (DHS) in January ended the bulk of the data extraction, the U.S. government-wide remediation efforts were extended by launching a 30-day Cybersecurity Sprint.

This action was done to assess and improve the health of all federal assets and networks. Agencies were instructed to immediately patch critical vulnerabilities, review and tightly limit the number of privileged users with access to authorized systems and dramatically accelerate the use of strong authentication, especially for privileged users.

Last month, federal CIO Tony Scott reported significant progress with the sprint citing significant progress that included:

  • A Federal Civilian agency increase in the use of strong authentication for privileged and unprivileged users from 42 percent to 72 percent
  • An increase in the use of strong authentication for privileged users from 33 percent to nearly 75 percent
  • The implementation of strong authentication across 95 percent of privileged users working in thirteen agencies, or more than half of the largest agencies – including the Departments of Transportation, Veterans Affairs, and the Interior Department

Although I applaud these recent efforts the Federal government has a very long way to go before anything like “Mission Accomplished” can be claimed.

One major and costly challenge will be in the area of software development. A recent analysis, State of Software Security by Veracode, that rated application security by using compliance with Open Web Application Security Project (OWASP) top 10 vulnerabilities recommendations as a yardstick found a “low pass rate” in government applications. This dismal finding was theorized as being the result of a:

  • Higher use of scripting languages
  • More prevalent use of older languages which are known to produce more vulnerabilities
  • Low rate of software remediation (e.g. fixing flaws)
The four most important vulnerability categories listed by the study are SQL injection, cross-site scripting (XSS), cryptography issues and command injection. This is due to the pervasiveness and severity of these vulnerabilities, specifically:

  • SQL injection was the application vulnerability most often exploited in web application attacks in a recent 2015 data breach Incident
  • Cross-site scripting is overall far more prevalent than any other category
  • OS command injection played a role in 2014’s Shellshock vulnerability, in which a commonly used open source component was exploited in a way that allowed taking over a server to run arbitrary code
Government developed software has performed poorly by having the highest prevalence of both SQL injection and cross-site scripting when compared to other industry rates.

To improve on the current sad state of government cybersecurity, the Federal Information Security Management Reform Act (FISMA Reform), has been proposed as a new bill. This legislations offers five major initiatives designed to improve the overall security posture of federal networks:

  • Grant DHS authority to operate intrusion detection and prevention software across the .gov domain
  • Authorize DHS to conduct regular risk assessments on federal networks
  • Require DHS to enact defensive countermeasures in the event an intrusion is detected
  • Strengthen and streamline authority Congress gave to DHS last year to issue binding operational directives to federal agencies, especially to respond to substantial cybersecurity threats in emergency situations
  • Mandate annual OMB reports on enforcement of government wide cybersecurity standards
As citizens we all place a significant amount of trust in our government’s ability to defend and protect society and our way of life. In the modern world this trust extends into our cyber life as well. Although individuals still need to take more responsibility for how they manage and protect their own information, our government needs to look at how they are managing our data and protecting information. National security needs to be a priority to all. 

FY 2015 Q2 (4/15) vs. Cybersecurity Sprint Results (7/29)(
This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. For more on these topics, visit Dell's thought leadership site Power MoreDell sponsored this article, but the opinions are my own and don't necessarily represent Dell's positions or strategies.)

Cloud Musings↑ Grab this Headline Animator( Thank you. If you enjoyed this article, get free updates by email or RSS - © Copyright Kevin L. Jackson 2015) var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-5213477-1']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://' : 'http://') + ''; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })(); (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//','ga'); ga('create', 'UA-5213477-1', 'auto'); ga('send', 'pageview');

Follow me at
Categories: Blogs