Articles

If you have had a chance to play around with some of the new Arduino-enabled hardware platforms such as the ESP8266 Wi-Fi SoC, you may already have used an online IoT service for your project. In this article, we will show you how to setup your own online service by setting up a Virtual Private Server (VPS) and server software for your Arduino IoT project.

In addition to setting up your own VPS, we will show you how to install a simple example that lets you control LEDs, lights, etc., by using a browser. The following figure shows how any number of devices can be controlled in real time by navigating to your own VPS using a browser. The online VPS functions as a proxy and makes it possible for any number of users to control the devices via the online server.

Source de l’article sur DZONE

In part one of this series on Best Practices for Building and Designing Containers for Kubernetes, we looked at how to separate config from code in Kubernetes and why you need to do that. Specifically, we examined how config maps and environment variables are defined and configured. In this post, we continue that important discussion with a look at secrets management, what secrets are, and how you manage them.

Managing Public Configuration Information in Kubernetes

Not all configuration information is safe to keep out in the “public” and many, if not most, Kubernetes-hosted workloads need usernames/passwords, tokens, keys or other private information to securely connect to other services. There are a variety of options worth exploring here, each with its own set of positives and negatives.

Source de l’article sur DZONE

Keycloak is an open source software which provides single sign-on with Identity Management and access management. Keycoak uses different types of pings to discover other members of cluster. We are going to use kube_ping as discovery (JGROUPS_DISCOVERY_PROTOCOL).

How kube_ping Works

Let’s assume we launch a cluster of 3 pods in Kubernetes in the default Namespace. When discovery starts, kube_ping asks for a list of the IP addresses of all pods from Kubernetes.

Source de l’article sur DZONE

This time, we will use the package Spring Cloud Config to have remote configurations for our applications.

The idea is that our program or programs can move your settings to an external place so that our application is easily configurable and can even change their settings.

Source de l’article sur DZONE

Most companies only use 5 to 10 percent of the data they collect. So estimates Beatriz Sanz Sai, a 20-year veteran in advanced analytics and the head of Ernst and Young’s global data and analytics practice. While it’s impossible to validate such a claim, the fact is many organizations are gathering lots of data but analyzing little of it.

Legacy database management systems shoulder much of the blame for this. They hog time and resources for the sake of storing, managing, and preparing data and thus impede analytics.

Source de l’article sur DZONE

Amazon Simple Storage Service, better known as AWS S3, is one of the oldest and most widely-used solutions from Amazon Web Services. S3 is designed to store terabytes of customer data with high availability and scale. Prior to AWS S3 Intelligent Tiering, Amazon Cloud users had access to four storage class options:

  1. Standard – Designed for frequently accessed data.
  2. Standard-IA – Designed for long-lived, infrequently accessed data.
  3. One Zone-IA – Designed for long-lived, infrequently accessed, non-critical data.
  4. Glacier – Designed for long-lived, infrequent accessed, archived critical data.

The issue here is that access patterns can be different for the different objects. Though customers could build lifecycle policies to move the objects across storage classes, it was challenging to predefine the most appropriate storage class(s) because of the unpredictable nature of application adoption and usage. Even in scenarios where access frequency is known, customers may forget to make the proper class adjustments to optimize their budget.

Source de l’article sur DZONE

Kyvos Version 5 was released with new enhancements to scale growing workloads.

The update, which was designed specifically for the cloud, allows businesses to scale growing workloads and draw intelligence, which in turn enables businesses to run real-time queries on data before it enters the cube. 

Source de l’article sur DZONE

In 2015, Statista published a report which predicted that by 2018, companies that have "fully invested in all types of personalization" will outsell companies that have not by 20 percent. Gartner’s thesis has already come to reality. We can’t deny how companies are dramatically increasing their revenues and the way they are doing business. 

Companies like Amazon and Netflix have set a benchmark for offering a personalized experience to their user base. This technology has also gained traction in the B2B industry along with account-based marketing.

Source de l’article sur DZONE

The practice of creating a threat model can help teams proactively understand and develop a strategy for managing the possible vulnerabilities their organization faces, instead of waiting until after an incident occurs. OWASP defines threat modeling as “a procedure for optimizing security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system.”

SecOps teams can benefit from creating a threat model for cloud infrastructure and defining an approach to operationalizing, hardening, and automating security throughout the software development lifecycle. While it’s best to build security into the design of your systems at the outset, remember the motto:

Source de l’article sur DZONE

Managed service providers are becoming a growing influence in the business world. With high-speed internet widely available, and the proliferation of cloud services in general, attitudes towards the remote management of services have changed considerably in a relatively short space of time. Businesses across the spectrum are increasingly turning to managed service providers to take care of some, or all, of their IT needs.

Software developers are just one of the many business individuals that can benefit from managed service providers. Many IT teams are leveraging external expertise to expand and improve their own development processes. An outside perspective can add much-needed input for organizations who are keen to streamline and make continuous improvements to their technology value stream. So, while many businesses can be adequately catered to with non-specific IT service management, others, such as those in software development, require a custom solution and specialized approach.

Source de l’article sur DZONE