“Toon” into these InterConnect highlights

I recently asked IBM employees for some of their questions about InterConnect, which kicks off next Monday. We had so much fun inside IBM preparing the answers, we thought we’d share it with the world.
Check out this brief video to learn the top 5 things I think you should check out InterConnect this year. And just for a little fun, I reveal my dream InterConnect keynote and entertainer picks.

I can’t wait for the energy and inspiration that InterConnect delivers. If you’re still working on your schedule, let IBM Watson help you find the perfect sessions, education opportunities and more. I hope to see you in Vegas.
The post “Toon” into these InterConnect highlights appeared first on news.
Quelle: Thoughts on Cloud

Gain confidence with Cloud Technical Engagement

Adopting and thriving on cloud will make or break many industries.
Using cloud to transform business is this generation’s professional challenge, but digital transformation doesn’t have to be confusing or daunting. Whether you are just learning about the business value of cloud, or you’re in the middle of your own transformation, there’s room to learn and gain confidence in the next step.
There are plenty of opportunities to learn more about cloud at InterConnect 2017, and Cloud Technical Engagement offers proven, technical expertise for turning cloud strategies into reality.
Planning the path ahead and getting cloud architectures and workloads right can be challenging. A common question is, “How can I achieve my business goals and leapfrog my competition while meeting security, networking and other requirements?”
My team and I hear these concerns in the hallways of the companies we work with, from cloud-native startups to Fortune 100 companies. The Cloud Technical Engagement team at IBM Cloud turns challenges into opportunities, ensuring that the companies and teams with whom we collaborate leave each engagement knowledgeable and confident in their next steps.
This year, the Cloud Technical Engagement team is bringing lessons learned from countless engagements and successes to InterConnect. With a 4,000 square-foot Cloud Confidence Center, more than 100 breakout sessions (with a third of them featuring a specific client success story), more than 100 technical hands-on labs, a full slate of cloud certification exams and a staff of 300-plus experts, my team is ready to help attendees adopt cloud and achieve its maximum value quickly.
See for yourself
The Cloud Confidence Center, at booth , is one of the largest areas in the entire concourse. It’s where attendees can come to ask questions and discuss plans about cloud and get answers from experts. From understanding to adopting, all the way getting support, the team has a solution. Start a conversation with cloud adoption leaders, technical experts tasked with spearheading complex cloud adoption scenarios, who will come to understand your individual challenges and provide personalized recommendations based on your cloud journey.
Tell us your cloud story, we’ll help you gain confidence in your next step and begin implementing a winning cloud strategy.
Attendees can also talk with technical leaders from the IBM Bluemix Garage and Cloud Professional Services, who can describe how to quickly transform like a startup or craft and implement winning strategies on cloud. Discuss the latest technologies and trends in cloud or see tried and proven implementation patterns in action with the solution architecture team. Learn how support programs are ready to help you succeed with cloud every step of the way.
Breakout sessions, labs, certifications, and more
If speaking with experts on the concourse floor is not for you, drop by one of the breakout sessions or labs. Nearly all our experts attending InterConnect will be presenting in a session, leading a boot camp, facilitating a hands-on lab or proctoring certification exams. You are bound to come across one of our experts, whether you know it or not.
Breakout sessions
From cloud adoption leaders

Innovation at speed as mainstream across an enterprise, with Bendigo and Adelaide Bank
IBM Bluemix Private Cloud for cloud service providers: Materna&;s experiences and technical insight

From the Bluemix Garage

Pixxy&8217;s startup journey: From great idea to validating an app in eight weeks
Experience IBM Design Thinking from the IBM Bluemix Garage

From Cloud Professional Services

Maximizing service management efficiency with an advanced correlation framework at Ford
How many rules? How do we estimate and plan that?: Planning for large-scale rules projects

From Solution Architecture

Top 10 performance best practices for designing and deploying enterprise applications on IBM Bluemix
IBM Cloud Architecture Center: Developed by our clients for our clients

Bootcamps and hands-on labs

Monitoring and diagnosing the performance problems of enterprise applications on IBM Bluemix
Creating open toolchains for IBM Bluemix
The practices of the Bluemix Garage developer: Extreme programming (for non-programmers)
Hands-on lab for IBM UrbanCode Deploy and IBM API Connect

Certifications

IBM Cloud Platform Solution Architect v2
IBM Cloud Platform Application Development v2
IBM Cloud Platform Advanced Application Development V1
Foundations of IBM DevOps V1
IBM API Connect v. 5.0.5 Solution Implementation
IBM WebSphere Application Server Network Deployment V9.0 Core Administration

Come talk with us
Meet the Cloud Technical Engagement team at IBM InterConnect to learn how to achieve value with cloud and get the confidence you need to transform. We look forward to seeing you, so don’t forget to register for InterConnect.
The post Gain confidence with Cloud Technical Engagement appeared first on news.
Quelle: Thoughts on Cloud

Cloud KMS GA, new partners expand encryption options

By Maya Kaczorowski, Product Manager

As you heard at Google Cloud Next ‘17, our Cloud Key Management Service (KMS) is now generally available. Cloud KMS makes it even easier for you to encrypt data at scale, manage secrets and protect your data the way you want — both in the cloud and on-premise. Today, we’re also announcing a number of partner options for using Customer-Supplied Encryption Keys.

Cloud KMS is now generally available.

With Cloud KMS, you can manage symmetric encryption keys in a cloud-hosted solution, whether they’re used to protect data stored in Google Cloud Platform (GCP) or another environment. You can create, use, rotate and destroy keys via our Cloud KMS API, including as part of a secret management or envelope encryption solution. Further, Cloud KMS is directly integrated with Cloud Identity Access Management and Cloud Audit Logging for greater control over your keys.

As we move out of beta, we’re introducing an availability SLA, so you can count on Cloud KMS for your production workloads. We’ve load tested Cloud KMS extensively, and reduced latency so that Cloud KMS can sit in the serving path of your requests.

Ravelin, a fraud detection provider, has continued their use of Cloud KMS to encrypt secrets stored locally, including configurations and authentication credentials, used for both customer transactions and internal systems and processes. Using Cloud KMS allows Ravelin to easily encrypt these secrets for storage.

“Encryption is absolutely critical to any company managing their own systems, transmitting data over a network or storing sensitive data, including sensitive system configurations. Cloud KMS makes it easy to implement best practices for secret management, and its low latency allows us to use it for protecting frequently retrieved secrets. Cloud KMS gives us the cryptographic tools necessary to protect our secrets, and the features to keep encryption practical.” — Leonard Austin, CTO at Ravelin. 

Managing your secrets in Google Cloud

We’ve published recommendations on how to manage your secrets in Google Cloud. Most development teams have secrets that they need to manage at build or run time, such as API keys. Instead of storing those secrets in source code, or in metadata, for many cases we suggest you store secrets encrypted at rest in a Google Cloud Storage bucket, and use Cloud KMS to encrypt those secrets at rest.

Customer-Supplied Encryption Key partners

You now have several partner options for using Customer-Supplied Encryption Keys. Customer-Supplied Encryption Keys (or CSEK, available for Google Cloud Storage and Compute Engine) allow you to provide a 256-bit string, such as an AES encryption key, to protect your data at rest. Typically, customers use CSEK when they have stricter regulatory needs, or need to provide their own key material.

To simplify the use of this unique functionality, our partners Gemalto, Ionic, KeyNexus, Thales and Virtru, can generate CSEK keys in the appropriate format. These partners make it easier to generate an encryption key for use with CSEK, and to associate that key to an object in Cloud Storage or a persistent disk, image or instance in Compute Engine. Each partner brings differentiated features and value to the table, which they describe in their own words below.

Gemalto

“Gemalto is dedicated to multi-cloud enterprise key management by ensuring customers have the best choices to maintain high assurance key ownership and control as they migrate operations, workloads and data to the cloud. Gemalto KeySecure has supported Client-Side Encryption with Google Cloud Storage for years, and is now extending support for Customer Supplied Encryption Keys (CSEK).” — Todd Moore SVP of Encryption Products at Gemalto

Ionic

“We are excited to announce the first of many powerful capabilities leveraging Google’s Customer Supplied Encryption Keys (CSEK). Our new Ionic Protect for Cloud Storage solution enables developers to simply and seamlessly use their own encryption keys with the full capabilities of the Ionic platform while natively leveraging Google Cloud Storage.” — Adam Ghetti, Founder and CEO of Ionic

KeyNexus

“KeyNexus helps customers supply their own keys to encrypt their most sensitive data across Google Cloud Platform as well as hundreds of other bring-your-own-key (BYOK) use cases spanning SaaS, IaaS, mobile and on-premise, via secure REST APIs. Customers choose KeyNexus as a centralized, platform-agnostic, key management solution which they can deploy in numerous highly available, scalable and low latency cloud or on-premise configurations. Using KeyNexus, customers are able to supply keys to encrypt data server-side using Customer-Supplied Encryption Keys (CSEKs) in Google Cloud Storage and Google Compute Engine” — Jeff MacMillan, CEO of KeyNexus

Thales

“Protected by FIPS 140-2 Level 3 certified hardware, the Thales nShield HSM uses strong methods to generate encryption keys based on its high-entropy random number generator. Following generation, nShield exports customer keys into the cloud for one-time use via Google’s Customer-Supplied Encryption Key functionality. Customers using Thales nShield HSMs and leveraging Google Cloud Platform can manage their encryption keys from their own environments for use in the cloud, giving them greater control over key material” — Sol Cates, Vice President Technical Strategy at Thales e-Security

Virtru

“Virtru offers business privacy, encryption and data protection for Google Cloud. Virtru lets you choose where your keys are hosted and how your content is encrypted. Whether for Google Cloud Storage, Compute Engine or G Suite, you can upload Virtru-generated keys to Google’s CSEK or use Virtru’s client-side encryption to protect content before upload. Keys may be stored on premise or in any public or private cloud.” — John Ackerly, Founder and CEO of Virtru

Encryption by default, and more key management options

Recall that by default, GCP encrypts customer content stored at rest, without any action required from the customer, using one or more encryption mechanisms using keys managed server-side.

Google Cloud provides you with options to choose the approach that best suits your needs. If you prefer to manage your cloud-based keys yourself, select Cloud KMS; and if you’d like to manage keys with a partner or on-premise, select Customer-Supplied Encryption Keys.

Safe computing!
Quelle: Google Cloud Platform

Docker to donate containerd to the Cloud Native Computing Foundation

Today, Docker announced its intention to donate the project to the Cloud Native Computing Foundation (CNCF). Back in December 2016, Docker spun out its core container runtime functionality into a standalone component, incorporating it into a separate project called containerd, and announced we would be donating it to a neutral foundation early this year. Today we took a major step forward towards delivering on our commitment to the community by following the Cloud Native Computing Foundation process and presenting a proposal to the CNCF Technical Oversight Committee (TOC) for containerd to become a CNCF project: [overview][link], [proposal][link]. Given the consensus we have been building with the community, we are hopeful to get a positive affirmation from the TOC before CloudNativeCon/KubeCon later this month.  
Over the past 4 years, the adoption of containers with Docker has triggered an unprecedented wave of innovation in our industry: we believe that donating containerd to the CNCF will unlock a whole new phase of innovation and growth across the entire container ecosystem. containerd is designed as an independent component that can be embedded in a higher level system, to provide core container capabilities. Since our December announcement, we have focused efforts on identifying the right home for containerd, and making progress in implementing it and building consensus in the community.

Why is the CNCF the right place for containerd?

Given that containerd has been the heart of the Docker platform since April 2016 when it was included in Docker 1.11, it is already deployed on millions of machines; we wanted it to continue its development under the governance of an organization where a focus on containerization is  front and center.
Docker with containerd is already a key foundation for Kubernetes, which was the original project donated to the CNCF; Kubernetes 1.5 runs with Docker 1.10.3 to 1.12.3. Moving forward, we and key stakeholders from the Kubernetes project believe that containerd 1.0 can be a great core container runtime for Kubernetes.
Strong alignment with other CNCF projects (in addition to Kubernetes): containerd exposes an API using gRPC and exposes metrics in the Prometheus format. Both projects are part of CNCF already.

Technical progress and building consensus
In the past few months, the containerd team has been active implementing Phase 1 and Phase 2 of the containerd roadmap. You can find details about progress in containerd weekly development reports posted in the Github project.
At the end of February, Docker hosted the containerd summit with more than 50 members of the community from companies including Alibaba, AWS, Google, IBM, Microsoft, Rancher, Red Hat and VMware. The group gathered to learn more about containerd, get more information on containerd’s progress and discuss its design. You can watch some of the presentations in the containerd summit recap blog post: Deep Dive Into Containerd By Michael Crosby, Stephen Day, Derek McGowan And Mickael Laventure (Docker), Driving Containerd Operations With GRPC By Phil Estes (IBM) and Containerd And CRI By Tim Hockin (Google).
Tim Hockin from Google gave the best summary of the containerd summit.

containerd @thockin containerd is all we wanted from @docker in @kubernetesio and none of what we didn&;t need: kudos to the team! pic.twitter.com/t26kRo2etJ
— chanezon (@chanezon) February 23, 2017

There is still a lot of work to finish implementing the containerd 1.0 roadmap, our target being June 2017. If you want to contribute to containerd, or embed it in your container system, you can find the project on GitHub. If you want to learn more about containerd progress, or discuss its design, join us in Berlin in March at CloudNativeCon/KubeCon 2017 (more details to follow) or Austin for DockerCon Day 4 Thursday April 20th, the Docker Internals Summit morning session will be the next containerd summit.
The Summit is a small collaborative event for container runtime and system experts who are actively maintaining, contributing or generally involved in the design and development of containerd and/or related projects. Simply submit a PR to add discussion topics to the agenda. If you have not signed up to attend the summit you can do so in this form.
Today we followed the CNCF process and presented a proposal to the CNCF Technical Oversight Committee (TOC) for containerd to become a CNCF project: [overview][link], [proposal][link]. If the CNCF TOC votes to accept our donation, we are excited for containerd to become part of the CNCF community!

@Docker to donate containerd to the @CloudNativeFdnClick To Tweet

Learn More about containerd:

Watch the containerd GitHub Repository
Follow @containerd on twitter
Sign up for the containerd summit on 4/21

The post Docker to donate containerd to the Cloud Native Computing Foundation appeared first on Docker Blog.
Quelle: https://blog.docker.com/feed/