Google’s DeepMind AI gets a few new tricks to learn faster

The content below is taken from the original (Google’s DeepMind AI gets a few new tricks to learn faster), to continue reading please visit the site. Remember to respect the Author & Copyright.

When it comes to machine learning, every performance gain is worth a bit of celebration. That’s particularly true for Google’s DeepMind division, which has already proven itself by beating a Go world champion, mimicking human speech and cutting down their server power bills. Now, the team has unveiled new "reinforcement learning" methods to speed up how the AI platform trains itself without being directly taught.

First off, DeepMind’s learning agent has a better grasp of controlling pixels on the screen. Google notes it’s "similar to how a baby might learn to control their hands by moving them and observing the movements." By doing this, it can figure out the best way to get high scores and play games more efficiently. Additionally, the agent can now figure out rewards from a game based on past performance. "By learning on rewarding histories much more frequently, the agent can discover visual features predictive of reward much faster," Google says. The company laid out the entire concept for the abilities in a paper, "Reinforcement Learning with Unsupervised Auxiliary Tasks."

These skills, along with DeepMind’s previous Deep Reinforcement Learning methods, make up the group’s new UNREAL (UNsupervised REinforcement and Auxiliary Learning) agent. That’s a mouthful, but the big takeaway is that DeepMind is beginning to teach itself much like humans. The group describes the methods as being similar to the way animals dream about positive and negative events (though I wouldn’t really say DeepMind has learned how to "dream").

In a 3D maze environment called Labryinth, Google says the UNREAL agent was able to learn stages around ten times faster. It has managed to achieve 87 percent of "expert human performance" in that game, and around nine times typical human performance in a bevy of Atari titles.

On the face of it, UNREAL should help DeepMind’s agents significantly. But we’ll have to wait and see if those performance gains can actually be used in scenarios beyond games.

Source: DeepMind

Embedded PC roll-out spans Apollo Lake and Bay Trail

The content below is taken from the original (Embedded PC roll-out spans Apollo Lake and Bay Trail), to continue reading please visit the site. Remember to respect the Author & Copyright.

Advantech unveiled two rugged embedded computers built on Intel’s Apollo Lake SoCs, as well as an embedded PC with a Bay Trail Atom E3845. We recently covered the five SBCs and three COMs in Advantech’s announcement of products built around Intel’s 14nm Apollo Lake family of Atom E3900, Celeron, and Pentium SoCs. Here now are […]

Android OS Now Available as an AMI (AWS EC2 instances)

The content below is taken from the original (Android OS Now Available as an AMI (AWS EC2 instances)), to continue reading please visit the site. Remember to respect the Author & Copyright.

http://bit.ly/2gmpvfy

How to transfer ownership of files and folders in Google Drive

The content below is taken from the original (How to transfer ownership of files and folders in Google Drive), to continue reading please visit the site. Remember to respect the Author & Copyright.

When you create any files in Google Docs, Sheets, and Slides, or upload into Google Drive, Google makes you the owner, by default. That said, you can invariably transfer ownership of your Google Drive files (Docs, Sheets, and Slides) and folders to anyone you like, as long as that person has an email address. This way you can change ownership of a large number of files and folders in Google Drive.

Let’s get to know the method of transferring ownership of files and folders in Google Drive.

Transfer ownership of files & folders in Google Drive

Open Google App Launcher and go to Google Drive web application.

Once there, log in with your Google credentials (email and password).

Next search for the file/folder whose ownership you want to be transferred. Then, find and click on Share visible in the upper region of the screen. If the file is shared by someone already, you can skip this step.

Transfer ownership of files & folders in Google Drive

Now, in the sharing screen that opens, enter the Email address of the person to whom you would want to transfer the ownership of the file/folder.

google-drive-share-option-name

Once shared, hit the Send button to send the person, a mail with a link attached alongside it.

This readily gives the person, access to the shared file or folder.

Once the file or folder is shared, click on the Share icon once again

In the ‘Share with others’ screen that opens, click on the ‘Advanced’ link.

google-drive-share-advanced

Thereafter, under the ‘Sharing Settings’ screen, find the person to whom you want to transfer the ownership of the file.

Try finding him under ‘Who has access’ option by clicking on the drop down menu associated with the Edit icon.

When found, choose Is owner from the list of options and hit the Save Changes button.

If prompted to confirm the action, agree and proceed to the next step. The new person who has access to your file/folder now also becomes its owner. The person can remove your access to the file/folder.

google-drive-share-ownership

Please note that you can’t make a person outside your domain, the owner of your Google Doc. Only Google Apps customers can transfer ownership of a synced or uploaded file (like a PDF or image file).

In my next post, we will see how to set an Auto-Expiration Date for your Google Drive files & folders.



Munich city planning to move back to Windows and Office from open-source software

The content below is taken from the original (Munich city planning to move back to Windows and Office from open-source software), to continue reading please visit the site. Remember to respect the Author & Copyright.

http://bit.ly/2fVRUES

Azure Security Center now available in UK

The content below is taken from the original (Azure Security Center now available in UK), to continue reading please visit the site. Remember to respect the Author & Copyright.

Azure Security CenterWe’re pleased to announce Azure Security Center is now available in the UK. Azure Security Center helps protect your Azure resources by providing visibility into security across all your subscriptions, helping you find and fix vulnerabilities, and alerting you if threats are detected.

Learn more about Azure Security Center and our approach to data security, or review the quick start.

Announcing integration of Azure Backup into VM management blade

The content below is taken from the original (Announcing integration of Azure Backup into VM management blade), to continue reading please visit the site. Remember to respect the Author & Copyright.

Today, we are excited to announce the ability to seamlessly backup virtual machines in Azure from the VM management blade using Azure Backup. Azure Backup already supports backup of classic and Resource Manager VMs (Windows or Linux) using Recovery Services vault, running on standard storage or on Premium Storage. We also announced backup of VMs encrypted using ADE (Azure Disk Encryption), a couple of weeks back. With this announcement, we are brining the backup experience closer to VM management experience, giving ability to backup VMs directly from VM management blade. This announcement makes Azure the public cloud providing a backup experience natively integrated into VM management.

Azure Virtual Machines provide a great value proposition for different kind of workloads that want to harness the power of cloud. It provides a range of VMs offering basic capabilities to running powerful GPUs to meet customer demands. Backing VMs against accidental deletions and corruptions resulting from human errors is a critical capability for enterprise customers as well as small and medium scale customers who are deploying their production workloads in the cloud. This integration makes meeting that requirement seamless with a simple two-step backup configuration.

Value proposition

Azure Backup’s cloud-first approach to backup puts following cloud promises into action:

  • Freedom from infrastructure: No need to deploy any infrastructure to backup VMs
  • Cloud Economics: Customers can leverage highly available, scalable and resilient backup service at a cost-effective price
  • Infinite scale: Customers can protect multiple VMs in one go or one at a time using a Recovery Services vault
  • Pay as you go: Simple Backup pricing makes it easy to protect VMs and pay for what you use

Features

With the integration of Azure Backup into VM management blade, customers will be able to perform following operations directly from VM management blade:

  • Configure Backup using simple two-step configuration.
  • Trigger an on-demand backup for backup configured VMs
  • Restore a complete VM, all disks or a file-folders inside the VM( In preview for Windows VMs) from backup data
  • View recovery points corresponding to configured backup schedule

Get started

To get started,select a virtual machine from the Virtual machines list view. Select Backup in the Settings menu.

  • Create or select a Recovery Services vault: A recovery Services vault stores backups separate from customer storage account to guard from accidental deletions.
  • Create or Select a Backup Policy: A backup policy specifies the schedule at which backups will be running and how long to store backup data.

By default a vault and a policy is selected to make this experience even smoother. Customers have the flexibility to customize this as per needs.

Backup directly from VM blade

Related links and additional content

Cycle Computing Teams with Dell EMC on Cloud Software and Services for HPC

The content below is taken from the original (Cycle Computing Teams with Dell EMC on Cloud Software and Services for HPC), to continue reading please visit the site. Remember to respect the Author & Copyright.

Cycle Computing , the leader in cloud computing orchestration software for Big Compute and Big Data, today announced that Dell EMC will offer its… Read more at VMblog.com.

Google’s PhotoScan Simplifies Scanning Physical Pictures

The content below is taken from the original (Google’s PhotoScan Simplifies Scanning Physical Pictures), to continue reading please visit the site. Remember to respect the Author & Copyright.

Android/iPhone: Google’s introduced PhotoScan, a new app that makes scanning and uploading old photos a heck of a lot easier.

PhotoScan is not just a photo of a photo. You’ll snap several shots on a picture, then PhotoScan automatically detects and removes the edges, straightens the image, and removes any glare before turning it into a high resolution file. If you’re using Google Photos, your scans are automatically uploaded to Google Photos.

Speaking of Google Photos, updates to the mobile apps are rolling out there as well. This includes advanced editing tools, like the ability to adjust exposure, contrast, and more. You’ll also get a suite of new filters for one-tap editing. You can snag PhotoScan in your app store of choice right now, and the Google Photos updates are rolling out now as well.

Now your photos look better than ever – even those dusty old prints | Google

YANG: coming soon to a router near you

The content below is taken from the original (YANG: coming soon to a router near you), to continue reading please visit the site. Remember to respect the Author & Copyright.

It’s about time the world had one: a proposal to pull the world of router configuration into the warm embrace of the popular YANG protocol.

Reading the RFCs so you don’t have to, this one caught the Vulture South eye, because given the scale of networks some sysadmins have to work with, it’s the start of something big.

Since its emergence in 2010, YANG (Yet Another Next Generation) has become a must-have in software-defined networking (SDN), a popular tool for automating configuration tasks.

The standards-track RFC8022 only defines three modules for YANG-controlled routing, but the authors note that they expect many more modules to follow from other groups.

Its baby steps into programming core ‘net infrastructure with YANG are:

  • Generic components of the routing model, in “ietf-routing” – this includes the destination prefix, route preference, and next hop specification; and
  • Modules adding unicast models for IPv4 and IPv6 environments.

“While these three modules can be directly used for simple IP devices with static routing … their main purpose is to provide essential building blocks”, the document states.

The vision splendid is that YANG routing config will expand to cover systems using multiple control plane protocols, other address families (MPLS comes to mind, for example, or flow-based control), route filtering, and policy routing.

A simple rollout such as static routing, the authors say, should be YANG-configurable without any other modules. For more complex environments (such as are present in any large enterprise or service provider network), the RFC defines how to use different Routing Information Bases (RIBs – route tables in the vernacular) and distribute route information.

The other key requirement the RFC includes is the ability to map the generic models onto vendors’ proprietary environments. ®

Sponsored:
10 Reasons LinuxONE is the best choice for Linux workloads

Oxford University will offer free online courses in 2017

The content below is taken from the original (Oxford University will offer free online courses in 2017), to continue reading please visit the site. Remember to respect the Author & Copyright.

The highest ranked university in the world will soon join prestigious institutions like Berkeley, Harvard and MIT in offering free massive open online courses (MOOCs). Starting in February 2017, Oxford University will partner with nonprofit online learning platform edX to teach a freely available economics class titled, "From Poverty to Prosperity: Understanding Economic Development."

While the idea of free online learning has started to catch on in the United States — the New York Times declared 2012 "the year of the MOOC" — Oxford has held out on such programs until now. Appropriately enough, this particular course is a perfect fit for promoting accessibility in places of higher education: it will be taught by Oxford Economics and Public Policy professor Sir Paul Collier, and will "examine the vital role that governments play in boosting economic development," according to a statement from the university.

"The School’s mission is to improve government around the world through research and education, and this requires better educated public officials, teachers, entrepreneurs, journalists and citizens," Professor Ngaire Woods, the Dean of Oxford’s Blavatnik School of Government said. "We see this first massive open online course as an effective way to expand access to knowledge beyond the classrooms of Oxford, and to help people understand how their community and country can flourish wherever they are in the world."

Enrollment is open now through edX’s platform and students can expect to spend about two to three hours per week on the six-week course. The materials will also be available to view after the course closes.

Via: BBC

Source: Oxford University

Happy 20th birthday, ICQ!

The content below is taken from the original (Happy 20th birthday, ICQ!), to continue reading please visit the site. Remember to respect the Author & Copyright.

Uh-oh! It’s 20 years to the day since the introduction of one of the internet’s most well-remembered chat apps: ICQ.

It was pretty barebones in its first form, released by its Israeli student creators in November 1996, but over the next year had versions available for Windows 95, 3.1 (not everyone wanted to upgrade), and Macs (presumably System 7).

Remember this noise?

The online chat world was a simpler one at the time, at least in terms of the market and technology used. ICQ was simple and unencrypted, and every user was assigned a number — six digits at first, more later — for ease of operation.

whatis_liteYou could message anyone whose number you had, and you could gather them by fair means or foul, on IRC, BBS, or AOL — or at school, of course, the way you’d exchange phone numbers. At first, contact lists and other info were even kept client-side, making it an early success of peer-to-peer as well as messaging. And a relatively open architecture meant it could be cloned and forked.

Who can forget the little status icons, the sense of discovery and independence, the possibilities of a platform like this? It was popular among nerds of the day (source: was one), but this type of chat app quickly outgrew its humble beginnings.

AOL Instant Messenger got its standalone in mid-1997, building on the concept and making it an easy transition from millions of AOL subscribers. Along with MSN Messenger, that pretty much blew the lid off the chat market, and prefigured today’s fractured ecosystem. (Disclosure: Aol owns TechCrunch — it was rather a different company back then, though.)

Mirabilis, the company formed around ICQ and its technologies, was bought shortly thereafter by AOL for $287 million — an eye-popping number at the time, though we’ve gotten used to such things in the two decades since. In 2001, it had over 100 million users.

I’m the wrong person to go into all the changes since then — the many forward-thinking features added, the sale in 2008 to what would later become the Mail.ru group, its enduring popularity in Russia, and so on. You’d be better off reading this Medium post.

It’s still available, and although it’s hard to say why you should choose it over the many other offerings today, it’s sort of comforting to think that the brand and basic function of something like ICQ can endure for so long in so chaotic an environment.

Happy 20th, ICQ! Many happy returns.

The 10 fastest supercomputers in the world

The content below is taken from the original (The 10 fastest supercomputers in the world), to continue reading please visit the site. Remember to respect the Author & Copyright.

Fast and powerful
supercomputer 2016 1

The twice-annual Top500 list of the most powerful supercomputers in the world (adjudged by their performance on the Linpack benchmark) is out this morning, and there are a pair of newcomers on the list. Check it out.

Trinity
supercomputer 2016 2

Image by Los Alamos National Laboratory

To read this article in full or to leave a comment, please click here

96Boards-like SBC offers wireless and Ethernet

The content below is taken from the original (96Boards-like SBC offers wireless and Ethernet), to continue reading please visit the site. Remember to respect the Author & Copyright.

Geniatech’s “Development Board IV” is a 96Boards-like SBC that runs Android or Debian on a Snapdragon 410, and features 40- and 60-pin expansion connectors. Linaro’s 96Boards spec has taken off to the point that we’re beginning to see clones and near-clones that are not yet sanctioned by 96Boards.org with an official mark of compliance, as […]

Amazon’s cloudy ‘WorkSpace’ desktops-as-a-service gain a GPU

The content below is taken from the original (Amazon’s cloudy ‘WorkSpace’ desktops-as-a-service gain a GPU), to continue reading please visit the site. Remember to respect the Author & Copyright.

Amazon Web Services’ (AWS’) desktop-as-a-service “WorkSpaces” just grew up. And got all muscly, too: the cloud colossus has announced a new option to add 1,536 CUDA GPU cores with 4GB of graphics memory.

The new “Graphics bundle” also offers eight virtual CPUs and 15GB of RAM, plus a 100GB virtual disk for users on top of the 100GB system disk.

You can’t buy the new instances for a flat monthly fee. Instead you’ll need to pay US$22 in each month you fire up the desktop, plus $1.75 for each hour of usage.

Pay attention to that monthly fee, because the introductory post by AWS’ Jeff Barr warns that “Due to the way that the underlying hardware operates, WorkSpaces that run this bundle do not save the local state (running applications and open documents) when used in conjunction with the AutoStop running mode.”

That’s important because that AutoStop feature sees WorkSpaces shut down gracefully when idle, in order to avoid paying for another hour of usage fees. Barr therefore recommends “saving open documents and closing applications before disconnecting from your WorkSpace or stepping away from it for an extended period of time.”

Might there be two things to learn here, namely that AWS is willing to throw specialised hardware at some applications and is not completely confident about the reliability of WorkSpaces?

AWS is going after workstations with this new release. It’s far from alone in doing so, as both Citrix and VMware, with NVIDIA in tow, have increased the graphics-crunching power of their virtual desktops, while Microsoft has revealed an NC-class Azure instance for GPU-hungry users.

AWS’ attack on the workstation market also looks to have data movement costs in mind, as it points out that these new instances “are located just light-feet away” from its other services and can therefore do both heavy lifting and visualisation work in one place.

Perhaps that combination might change our opinion, formed during a second review of WorkSpaces, that they remain intriguing rather than compelling. ®

Sponsored:
The state of mobile security maturity

Packet.net strong-ARMs cloud for $0.005 per core per hour

The content below is taken from the original (Packet.net strong-ARMs cloud for $0.005 per core per hour), to continue reading please visit the site. Remember to respect the Author & Copyright.

Packet.net, a bare-metal cloud aimed at developers, has flicked the switch on cloud-running servers powered by a pair of Cavium’s 48-core ARMv8-A ThunderX processors.

CEO Zachary Smith told The Register that the company’s cooked up the cloud for a few reasons. Price is one: Packet will offer ARM cores at a tenth of the price it charges for Intel cores, at US$0.50 per hour per server, or $0.005 per core per hour. Smith thinks that will be a head-turner by itself.

He also thinks developers will appreciate the chance to try native Docker on many-cored machines and appreciate the opportunity an ARM-powered cloud represents as they pursue 100 per cent portable software. He believes open source folk will see the arrival of an ARM-powered cloud as incentive to accelerate cross-platform versions of their pet projects.

Even ARM will benefit, he says, because having a working cloud on the market will give both it and licensees more reason to innovate for the data centre.

ARM’s recent purchaser, SoftBank, recently tipped some money into Packet.net, but Smith swears he’s had a long-term ambition to offer an ARM-powered cloud, if only because he enjoys having multiple ARM server CPU vendors willing to do deals. That kind of competition is not currently possible in the x86 world, at least until AMD returns to servers in 2017.

Smith also feels that ARM clouds are inevitable, probably thanks to telcos looking to offer cores to rent at the edge of their networks. The CEO feels that telcos will build edge clouds because they’re sick of over-the-top players having all the fun and profits: this time telcos want to build a revenue-generating platform beyond mere carriage.

For now, Packet’s ARM cloud offers 64-bit Ubuntu 16.04, but promises that CoreOS, FreeBSD and CentOS are in the pipeline. Four different ARM server configurations are also in the works.

The cloud will have an API, a portal, and will also be accessible from DevOps favourites likes Terraform and Ansible. Four of the company’s bit barns – in Parsippany New Jersey, Sunnyvale California, Amsterdam and Tokyo – will offer the service as of Tuesday.

“We want to offer a super-cheap, ‘you would be stupid not to try it’ offering,” Smith told The Register. “If we can get the open source ecosystem rebooted, I think Intel’s grip on the data centre will be shattered.” ®

Sponsored:
The state of mobile security maturity

Office 365 Identity Management with DirSync without Exchange Server On-Premises

The content below is taken from the original (Office 365 Identity Management with DirSync without Exchange Server On-Premises), to continue reading please visit the site. Remember to respect the Author & Copyright.

This post describes how users, groups and contact are provisioned in Office 365 from the on-premises Active Directory. By using DirSync, these objects are created in and synchronized to Office 365. Without an Exchange Server and Exchange Management tools in place, it is not always obvious how these objects should be created.

The following sections describe the procedures you can follow without Exchange or the Exchange management tools in place.

IMPORTANT NOTE
The sections below only specify the basic actions you need to perform in Active Directory to have the object appear in the right place in Office 365 (user, security group, mailbox, distribution group, contact). Note that almost all properties of these objects need to be set in Active Directory. If you want to hide a distribution group from the address book or you want to configure moderation for a distribution group, you have to know the property in Active Directory that’s responsible for the setting, set the value and perform directory synchronization. You will also need to upgrade the Active Directory schema with Exchange Server 2010 schema updates. You cannot use the Exchange Server 2010 System Manager without having at least one Exchange Server 2010 role installed on-premises.

Create a user account

Create a regular user account in Active Directory. This user account will be replicated by DirSync and it will appear in the Users list in the portal (http://bit.ly/2fwE0tK).

Important: set the user logon name to a value with a suffix that matches the suffix used for logging on to Office 365. For instance, if you logon with [email protected] in Office 365, set the UPN to that value:
clip_image002

User accounts without a mailbox (or any other license) can be used in Office 365 to grant permissions such as Billing Administrator or Global Administrator. A user account like this is typically used to create a DirSync service account.

Create a user account for a user that needs a mailbox

Create a user account as above. Set the user’s primary e-mail address in the email attribute or you will get an onmicrosoft.com address only:

clip_image004

When this user is synchronized and an Exchange Online license is added in the portal, a mailbox will be created that has the E-mail address in the E-mail field as primary SMTP address. Automatically, a secondary SMTP address is created with prefix@tenantid.onmicrosoft.com:

clip_image006

What if the user needs extra SMTP addresses?

  • You cannot set extra SMTP addresses in Exchange Control Panel (or Remote PowerShell) because the object is synchronized with DirSync.
  • In the on-premises Active Directory you need to populate the proxyAddresses attribute of the user object. You can set the values in this field with ADSIEdit or Active Directory Users and Computers (Windows Server 2008 ADUC and higher with Advanced Features turned on)
  • In the proxyAddresses field, make sure that you also list the primary SMTP address with SMTP: (in uppercase) in front of the address. Secondary addresses need smtp: (in lowercase) in front of the address.
    clip_image008

Note: instead of editing the proxyAddresses field directly, you can use a free (but at this point in time beta) product: http://bit.ly/2fPkqf6. The tool adds the following tabs to Active Directory Users and Computers:

  • O365 Exchange General: set display name, Email address, additional Email addresses and even a Target Email Address (for mail redirection)
  • O365 Custom Attributes: set custom attributes in AD for replication to Office 365
  • O365 Delivery Restrictions: accept messages from, reject messages from
  • O365 Photo: this photo will appear on the user’s profile and will be used by Lync Online as well
  • O365 Delegates: to set the publicDelegates property

When a user is created in AD, you can use the additional tabs this tool provides to set all needed properties at once.

To summarize the actions for a mailbox:

  • Create a user in ADUC with the user logon name (UPN) and e-mail address to the primary e-mail address of the user (UPN and e-mail address do not have to match but it’s the most common case)
  • Make sure the user has a display name (done automatically for users if you specify first, last and full name in the AD wizard)
  • Set proxyAddresses manually or with the MessageOps add-in to specify additional e-mail addresses (with smtp: in the front) and make sure you also specify the primary e-mail address with SMTP: in the front.
  • Let DirSync create and sync the user to Office 365
  • Assign an Exchange Online license to the user. A mailbox will be created with the correct e-mail addresses.

Create a security group

Create a security group in Active Directory. The group will be synchronized by DirSync and appear in the Security Groups in the portal. The group will not appear in the Distribution Groups in Exchange Online (obviously).

Create a distribution group

Create a distribution group in Active Directory. In the properties of the group set the primary e-mail address in the E-mail address field:

clip_image010

In addition to the e-mail address, the group object also needs a display name (displayname attribute). If the distribution group in AD has an e-mail address and a display name, the group will appear in the Distribution Groups list in Exchange Online after synchronization.

Note that specifying members and alternate e-mail addresses has to be done in the local Active Directory as well. If you have installed the MessageOps add-in, you can set easily set those properties.

Create a mail-enabled distribution group

You can add a display name and e-mail address to a standard security group to mail-enable the group. After stamping those two properties, the group will appear in the list of Distribution Groups in Exchange Online. When you list groups with the Get-Group cmdlet, you will see the following:

clip_image012

You can stamp the properties manually or use the MessageOps add-in to set these properties easily.

Create a contact

Create a contact object in Active Directory. In the properties of the created object, fill in the E-mail field in the General tab.

Conclusion

Although DirSync makes it easy to create directory objects in Office 365, without an Exchange Server and the Exchange management tools it is not always obvious how to set the needed properties in order to correctly synch these objects. If you find it too much of a hassle to set the required properties on your local Active Directory objects, there are basically two things you can do:

  • Turn off Directory Synchronization and start mastering directory objects in the cloud
  • Install at least one Exchange Server 2010 SP1 so that you can use the Exchange management tools

An Introduction to the VirtualBox CLI

The content below is taken from the original (An Introduction to the VirtualBox CLI), to continue reading please visit the site. Remember to respect the Author & Copyright.

This post provides a basic introduction to the VirtualBox CLI (command-line interface) tool, vboxmanage. This post does not attempt to replace the comprehensive documentation; rather, its purpose is to help users who are new to vboxmanage (such as myself, having recently adopted VirtualBox for my Vagrant environments) get somewhat up to speed as quickly and as painlessly as possible.

Basic Commands

Let’s start with some basic operations. Here are a few to get you started:

  • To list all the registered VMs, simply run vboxmanage list vms. Note that if you are using Vagrant with VirtualBox, this command will also show VirtualBox VMs that have been instantiated by Vagrant. Similarly, if you are using Docker Machine with VirtualBox, this command will show you VMs created by Docker Machine.

  • To list all the running VMs, use vboxmanage list runningvms.

  • To start a VM, run vboxmanage startvm <name or UUID>. You can optionally specify a --type parameter to control how the VM is started. Using --type gui will show it via the host GUI; using --type headless means you’ll need to interact over the network (typically via SSH). To emulate Vagrant/Docker Machine-like behavior, you’d use --type headless.

  • Once a VM is running, you’ll switch to vboxmanage controlvm <subcommand> for most other operations. Valid <subcommands> related to VM state operations include pause, resume, reset, poweroff, and savestate. (There’s a whole ton of additional subcommands, a few of which I’ll discuss later in this post.)

  • To unregister (remove) a stopped VM, the command vboxmanage unregister <name or UUID> will do it for you. Keep in mind this does not delete the VM’s files. To delete the files, add the --delete flag to the command.

Viewing and Modifying the Configuration of a Stopped VM

To view the information about a VM, run vboxmanage showvminfo <name or UUID>. Because this command is “read only” (it doesn’t attempt to modify the configuration of the VM in any way), you can use this on running, paused, or stopped VMs.

To change the configuration of a stopped VM, you’ll use the modifyvm keyword to vboxmanage. Here are some quick examples of modifying the configuration of a stopped VM:

  • To change the name of a VM, use vboxmanage modifyvm <name or UUID> --name <new name>. Note that you wouldn’t want to do this for Vagrant- or Docker Machine-managed VirtualBox VMs, as you would likely break the relationship between the VM and Vagrant/Docker Machine.

  • To change a VM’s description, you’d use vboxmanage modifyvm <name or UUID> --description <new description>.

  • To change the amount of RAM assigned to a VM, use vboxmanage modifyvm <name or UUID> --memory <RAM in MB>.

  • To change the number of virtual CPUs assigned to a VM, use vboxmanage modifyvm <name or UUID> --cpus <number>.

  • To put a VM’s NIC into promiscuous mode (typically necessary if you are running a software switch in the VM), use vboxmanage modifyvm <name or UUID> --nicpromisc<num> allow-all, where <num> is the number of the NIC from VirtualBox’s perspective (“nicpromisc1” would target the equivalent of “eth0”, “nicpromisc2” would target the equivalent of “eth1”, and so forth).

Note that these commands won’t work on a paused VM; the VM must actually be shutdown/stopped. If the VM isn’t stopped, then you’ll need to switch from the modifyvm command to the controlvm command, as described in the next section.

Modifying the Configuration of a Running VM

Not all configuration options can be modified for a running VM, but for those that can you can use the controlvm subcommand. I’ve already discussed the controlvm subcommands that affect VM state (pause, resume, reset, poweroff, and savestate); here are a few more that you might find useful:

  • To simulate a “disconnected” eth0 link in the VM, use vboxmanage controlvm <name or UUID> setlinkstate1 off. (As with the “nicpromis” command, the number on the end of “setlinkstate” refers to the number of the NIC you’d like to affect). Run vboxmanage controlvm <name or UUID> setlinkstate1 on to restore the connection. (This is more handy than it may seem at first glance.)

  • You can change a NIC’s promiscuous mode setting on the fly while the VM is running; just use vboxmanage controlvm <name or UUID> nicpromisc<num> allow-all. To make “eth1” in the VM named “vm-name” promiscuous, for example, you’d run vboxmanage controlvm vm-name nicpromisc2 allow-all. Change “allow-all” to “deny” to reverse the effect.

  • To change the configuration of a NIC—meaning, to change the VirtualBox network to which it connects—use vboxmanage controlvm nic<num> <network type>. For example, to connect “eth1” to a hostonly network, you’d use vboxmanage controlvm <name or UUID> nic2 hostonly.

Obviously, this is only a subset of what you can do with vboxmanage; use vboxmanage <command> help to get more information on the options available for each command. What I’ve included here will help you at least get started. Have fun!

Release: Windows Server 2016 with support for Window Server & Hyper-V containers

The content below is taken from the original (Release: Windows Server 2016 with support for Window Server & Hyper-V containers), to continue reading please visit the site. Remember to respect the Author & Copyright.

Yesterday Microsoft announced the general availability of Windows Server 2016 which the company defines as a cloud-ready OS.

Beside fancy definitions, one of the most relevant perks of this release is that enables windows users to consume container virtualization technologies through two different technologies: Windows Server Containers & Hyper-V Containers.

The first allowed Docker Engine to be ported on windows, where has been in technical preview for over a year.
As a consequence Docker and Microsoft announced a commercial partnership during the Ignite, but, despite this relationship, Docker Engine is not an integral part of Windows Server setup, nor Windows Update. Though a PowerShell script is at your disposal to make the magic happen.

Hyper-V Containers comes from Microsoft’s strategy to support containers within its pre-existing hypervisor ecosystem, a similar (but not identical from a technology standpoint) approach to VMware’s vSphere Integrated Containers. Using Microsoft’s own definition:

multiple container instances can run concurrently on a host; however, each container runs inside of a special virtual machine. This provides kernel level isolation between each Hyper-V container and the container host

You can give a peek downloading Windows Server 2016 Evaluation from this link.

Labels: Container Virtualization, Microsoft, Windows Server 2016

Three New AWS Certifications announced. Advanced Networking, Big Data & Security. Exams currently in Beta.

The content below is taken from the original (Three New AWS Certifications announced. Advanced Networking, Big Data & Security. Exams currently in Beta.), to continue reading please visit the site. Remember to respect the Author & Copyright.

http://amzn.to/2eTXCtv

Three New AWS Certifications announced. Advanced Networking, Big Data & Security. Exams currently in Beta.

The content below is taken from the original (Three New AWS Certifications announced. Advanced Networking, Big Data & Security. Exams currently in Beta.), to continue reading please visit the site. Remember to respect the Author & Copyright.

http://amzn.to/2eTXCtv

Getting Started with Azure Active Directory Domain Services

The content below is taken from the original (Getting Started with Azure Active Directory Domain Services), to continue reading please visit the site. Remember to respect the Author & Copyright.

cloud-computing-hands-hero

cloud-computing-hands-hero

In today’s Ask the Admin, I’ll show you how to configure Azure Active Directory (AAD) Domain Services and connect it to your AAD tenant.

AAD Domain Services allows organizations to “lift-and-shift” apps that use on-premises AD for authentication to the cloud, extending the capabilities of AAD to provide many of the features of an on-premises AD deployments, but without the effort of installing domain controllers (DCs) in the cloud, setting up ExpressRoute, or a VPN to connect on-premises DCs to Azure. AAD Domain Services supports Kerberos, Windows Integrated Authentication, and NTLM, plus Group Policy and Lightweight Directory Access Protocol (LDAP).

 

 

In this article, I’ll show you how to enable AAD Domain Services to work with an existing AAD tenant. For more information about setting up AAD, see What is Azure Active Directory? on the Petri IT Knowledgebase.

There are four steps required to set up AAD Domain Services:

  1. Create an administrative group called AAD DC Administrators. Users of this group can manage Azure Active Directory Domain Services and perform tasks, such as adding VMs to the domain.
  2. Set up a virtual network and subnet. AAD Domain Services must be associated with and enabled in a subnet in a virtual network.
  3. Update DNS settings for the virtual network to point to the IP address(es) assigned to AAD Domain Services.
  4. Users wanting to use AAD Domain Services must change their passwords to generate the credential hashes that are required by AAD Domain Services.

Create an Administrative Group in AAD

The first task is to create an administrative group in AAD. This special administrative group is called AAD DC Administrators, and members are granted administrative privileges on domain-joined devices. It’s worth noting that configuration of Azure AD Domain Services is currently supported in only the classic portal.

Add the AAD DC Administrators to AAD (Image Credit: Russell Smith)

Add the AAD DC Administrators to AAD (Image Credit: Russell Smith)

  • Log in to the Azure classic portal here: http://bit.ly/2d5noZX.
  • Click Active Directory in the left panel and select your directory.
  • Click the Groups tab and then Add a Group.
  • Name the group AAD DC Administrators and set GROUP TYPE to Security. Note that you must use as the name for this group.
  • Click AAD DC Administrators in the list of the groups, and then Add members at the bottom of the screen.
  • In the Add members dialog box, select one or more existing users to add to the group.
Add the AAD DC Administrators to AAD (Image Credit: Russell Smith)

Add the AAD DC Administrators to AAD (Image Credit: Russell Smith)

Enable Azure AD Domain Services in a Virtual Network

AAD Domain Services only supports virtual networks created in the classic portal, so you won’t be able to add Domain Services support for networks created using Azure Resource Manager (ARM). For more information about creating virtual networks in the classic portal, see Set Up a Virtual Network in Windows Azure on Petri IT Knowledgebase.

Sponsored

To complete the steps below, you’ll need a virtual network and subnet created in the classic portal. Not all Azure regions support AD Domain Services, so check that virtual network is in a supported region on the Azure services by region page. Microsoft also recommends using a dedicated subnet for AAD Domain Services.

Enable Domain Services for the directory (Image Credit: Russell Smith)

Enable Domain Services for the directory (Image Credit: Russell Smith)

  • Click Active Directory in the left panel of the portal and select your directory.
  • Switch to the CONFIGURE tab.
  • Scroll down to domain services and set ENABLE DOMAIN SERVICES FOR THIS DIRECTORY to YES.
  • In the DNS DOMAIN NAME OF DOMAIN SERVICES drop-down menu, select the domain name you’d like to use for the AD domain. Alternatively, type a domain name into the drop-down menu box.

The domain prefix should be no longer than 15 characters and the domain name shouldn’t already be in use in the virtual network.

  • In the CONNECT DOMAIN SERVICES TO THIS VIRTUAL NETWORK drop-down menu, select the virtual network subnet for which you’d like to enable AAD domain services.
  • Click SAVE at the bottom of the portal window, and you’ll notice that the configuration status changes to pending. This process can take up to 30 minutes.

Configure DNS

Once the operation is complete, you’ll see an IP address appear under domain services — or two if high availability is enabled for your AAD. Make a note of these IP addresses.

  • Click NETWORKS in the left pane, and select the virtual network where Azure AD Domain Services is enabled.
  • Switch to the CONFIGURE tab.
  • Under dns servers, add the IP addresses that appeared under domain services from the previous steps. The names of the servers can be anything you choose.
  • Click SAVE at the bottom of the screen.
Configure DNS settings for the virtual network (Image Credit: Russell Smith)

Configure DNS settings for the virtual network (Image Credit: Russell Smith)

Generate Credential Hashes

The instructions that follow are for cloud-only AAD tenants. If you have set up AAD to synchronize with on-premises AD, you’ll need to enable synchronization of NTLM and Kerberos credential hashes to AAD.

Sponsored

Each user that wants to access AAD Domain Services will need to follow these steps, and password management must be enabled for the Azure AD tenant.

  • Go to the Azure AD Access Panel page at http://bit.ly/2fI3JzA.
  • Switch to the profile tab.
  • Click the Change password tile.
  • Follow the instructions to change the password.

Once the user’s password has been changed, they should wait at least twenty minutes before attempting to log in to computers joined to the managed domain.

The post Getting Started with Azure Active Directory Domain Services appeared first on Petri.

ArduWorm: A Malware for Your Arduino Yun

The content below is taken from the original (ArduWorm: A Malware for Your Arduino Yun), to continue reading please visit the site. Remember to respect the Author & Copyright.

We’ve been waiting for this one. A worm was written for the Internet-connected Arduino Yun that gets in through a memory corruption exploit in the ATmega32u4 that’s used as the serial bridge. The paper (as PDF) is a bit technical, but if you’re interested, it’s a great read. (Edit: The link went dead. Here is our local copy.)

The crux of the hack is getting the AVR to run out of RAM, which more than a few of us have done accidentally from time to time. Here, the hackers write more and more data into memory until they end up writing into the heap, where data that’s used to control the program lives. Writing a worm for the AVR isn’t as easy as it was in the 1990’s on PCs, because a lot of the code that you’d like to run is in flash, and thus immutable. However, if you know where enough functions are located in flash, you can just use what’s there. These kind of return-oriented programming (ROP) tricks were enough for the researchers to write a worm.

In the end, the worm is persistent, can spread from Yun to Yun, and can do most everything that you’d love/hate a worm to do. In security, we all know that a chain is only as strong as its weakest link, and here the attack isn’t against the OpenWRT Linux system running on the big chip, but rather against the small AVR chip playing a support role. Because the AVR is completely trusted by the Linux system, once you’ve got that, you’ve won.

Will this amount to anything in practice? Probably not. There are tons of systems out there with much more easily accessed vulnerabilities: hard-coded passwords and poor encryption protocols. Attacking all the Yuns in the world wouldn’t be worth one’s time. It’s a very cool proof of concept, and in our opinion, that’s even better.

Thanks [Dave] for the great tip!

Filed under: Arduino Hacks, security hacks, slider

A minute to remember!

Time passes but memories never fade… A minute to remember!

You could become a pilot in the Drone Racing League if you’re good at this racing simulator

The content below is taken from the original (You could become a pilot in the Drone Racing League if you’re good at this racing simulator), to continue reading please visit the site. Remember to respect the Author & Copyright.


Today the Drone Racing League, a league that has a deal with ESPN to broadcast races this season, launched a drone racing simulator game.

And perhaps even more interesting, the league will be teaming up with Bud Light to host Drone Racing League tryouts on the simulator, with the winner receiving a $75,000 contract to compete in the 2017 season.

The simulator itself is pretty basic – it’s available for PC and Mac, and can gives you a first person view of a racing drone flying on different courses. You can control the drone with the arrow keys (not recommended), a bluetooth controller or Xbox controller, or specialized drone controller that can be connected to your computer.

The game itself offers a tutorial (which teaches you how to fly as well as the rules of drone racing), free flight mode, campaign and even a live multiplayer mode. You can also see the time trial rankings for the official tryouts from both within the game and online.



I first tried the simulator (which is a downloadable game) on my MacBook with no controller, and while the slender laptop was able to power up the game it ran at a really low frame rate, it was basically unplayable. I then switched over to the gaming PC I use to power my Oculus Rift setup, where it ran flawlessly.

Once running on a powerful PC with a connected Xbox controller I actually had a lot of fun playing. The graphics were great (comparable to a high-quality PC game) and it’s probably a game I’d actually pay money for.

That being said, actually flying a drone and racing without crashing in the game was insanely hard, even with controller. But to be honest it actually mimicked my experience flying real FPV racing drones, which are also insanely hard to fly. A tip if you decide to try playing yourself: be extremely gentle with the joysticks!

In terms of the tryout component, DRL says that the top 24 participants (who complete the simulation course in the shortest amount of time) will be invited to compete in a live finals simulation tournament in January, with the winner of that getting the $75,000 racing contract.

While this is definitely at least partially a marketing gimmick, it’s actually smart to use a simulator as a way to scout out future pilots from around the world. The barrier to entry for real drone racing is extremely high (you need a lot of money and a lot of open space), so there are definitely people missing out who could actually be really good pilots.

You can download the simulator here if you want to try it out.

The league also launched its first commercial tonight, which aired during a race tonight on ESPN.