Trusted Connectivity Alliance Publishes Recommendations to Enhance Subscriber Privacy in 5G – IoT For All

White paper calls for mobile network operators (MNOs) to ensure consistent global protection of subscriber privacy using the 5G SIM

Trusted Connectivity Alliance (TCA),formerly SIMalliance, has published awhite paperoutlining the clear benefits of 5G SIM capabilities to protect the most prominent personal data involved in mobile communications the International Mobile Subscriber Identity (IMSI). The paper has already been welcomed byEurosmart, and the digital security organisation has expressed its full support for Trusted Connectivity Alliances recommendations.

The IMSI, known as a Subscription Permanent Identifier (SUPI) in 5G, is the unique identifier allocated to an individual SIM by an MNO. Despite representing highly personal information, the IMSI is exposed to significant security vulnerabilities as it is sent unencrypted over-the-air in 2G, 3G and 4G technologies. Most notably, IMSI catchers are readily and inexpensively available and can be used to illegally monitor a subscribers location, calls and messages.

To address the significant privacy risks posed by IMSI catchers, the 5G standards introduced the possibility for MNOs to encrypt the IMSI before it is sent over-the-air, comments Claus Dietze, Chair of Trusted Connectivity Alliance. But as the standards state that encryption can be performed either by the SIM or by the device, and even be deactivated, there is potential for significant variability in terms of implementation. This creates scenarios where the IMSI is not sufficiently protected and the subscribers personal data is potentially exposed.

Given these scenarios, the white paper recommends that MNOs consider limiting the available implementation options to rely on proven, certified solutions. Of the available options, executing IMSI encryption within the 5G SIM, which refers to both the SIM or eSIM as defined by Trusted Connectivity Alliance as theRecommended 5G SIM, emerges as a comprehensive solution when examined against a range of key criteria. This includes ownership and control, the security of the SIM and its production process, and certification and interoperability.

Eurosmart fully supports the Trusted Connectivity Alliance position on subscriber privacy encryption, and agrees it should be managed within the 5G SIM. If we consider the direct impact on the security and resilience of critical infrastructures and essential services, and the requirements of the NIS directives, it is also apparent that a robust regulatory response is warranted to support these recommendations, adds Philippe Proust, President of Eurosmart. We therefore contend that regulatory measures should be implemented to define an ad hoc security certification scheme addressing IMSI encryption within the 5G SIM under the EU Cybersecurity Act. In addition, it should be a requirement for the IMSI to be encrypted within the 5G SIM, and for the 5G SIM to be mandatorily security certified to demonstrate its capabilities.

Claus concludes: Managing IMSI encryption within the 5G SIM delivers control, best-in-class security and interoperability to prevent malicious and unlawful interception. And with 5G creating a vast array of new use-cases, SIM-based encryption is the only viable way to establish interoperability across emerging consumer and industrial IoT use-cases and, ultimately, enable a secure connected future.

Protecting Subscriber Privacy in 5Gis available for free download from the Trusted Connectivity Alliance website. Asummary documentand presentation are alsoavailable. The TCA is also hosting a free-to-attend webinar to further explore the topics covered in the white paper. The webinar will take place on Thursday 17 September at 10:00 CET and 17:00 CET. To register, clickhere.

Link:
Trusted Connectivity Alliance Publishes Recommendations to Enhance Subscriber Privacy in 5G - IoT For All

Cloud storages you need to know – The Star, Kenya

Since we handle so much data on our devices, there has been a need for storage for the data.

This is what led to the development of cloud storage and file syncing applications.

With these applications, you can share a 20 GB folder of photos and videos with colleagues around the world.

Cloud storage is the virtual hard drive on the internet that ensures the latest version of your files are at the ready on all your devices.

Google Drive is one of the cloud storage and file syncing applications that is best known for unlimited storage of videos, photos and Google docs, sheets and slides.

It offers you the most amount of free storage space of 15GB that is shared with your Gmail and Google Photos.

Besides the generous amount of storage, it has the fastest syncing speed from the desktop to the web.

When in the web app, you can work with your files and folders as much like you can with your laptop.

Editing files with this app is better when you are working primarily online.

As you are editing a document on Google Docs or replying to emails in Gmail, you can get files from your Google Drive Storage and use them directly without the need of downloading anything.

Sync is another app that is best for advanced security features and unlimited file sizes.

It offers end-to-end encryption, which means that all your data, is encrypted at all times whether it is on your computer, while in transit and on sync servers.

This apps zero knowledge privacy means that your password is never stored by the company and they cannot access your encryption keys.

It will give you a 5GB storage for free plus the ability to gain more space through referrals.

One Drive is also a cloud storage and syncing application that is best for Microsoft Office and Windows users.

For the free Cloud storage, this app is still a good option. You will get to have 5GB of free storage space to start and up to 10GB additional space for referring others to it.

Dropbox another cloud storage app is best for fast syncing over your local network.

It offers you free storage space of 2GB but you can earn up to 16GB on the free account by referring new members and completing their task.

File sharing with this app is easy since it has been around for a long time with some people already familiar with it.

One of the advantages it has is that it saves on the time of syncing over your local network.

Having these applications for storage helps, you be able to access your information, send and receive files from wherever you are in the world.

Continued here:
Cloud storages you need to know - The Star, Kenya

Activate these 4 WhatsApp settings NOW to stop snoopers including face-lock and encryption – The Sun

AS messaging apps go, WhatsApp is a pretty safe way to talk to your friends online.

However, there are lots of little ways you can protect yourself further from WhatsApp snoopers and we've rounded up a few below.

2

Two-factor authentication is very useful to have setup on any device that contains personal data like photos and messages.

It just means adding an extra security step before you can access an app or device.

Open WhatsApp, go to Settings, then click "Two-Step Verification".

The click "Enable" and enter a PIN of your choose.

2

WhatsApp will occasionally ask for this PIN when you use the app to double check it is you.

This is useful if your phone is hacked or if someone knows the password to your handset but not your WhatsApp PIN.

Then PIN will also be required to add contacts.

This step is useful if you don't want people to know you've read their message.

It just means if you do open a message, the person who sent it won't see two blue ticks to indicate you've seen it.

Go to Settings, click "Privacy" and then turn the "Read Receipts" toggle off.

This means you won't be able to see if other people have read your messages.

Bear in mind that read receipts are always visible on group chats.

WhatsApp has a Face ID feature that means you can only unlock the app with your own face.

To turn it on, go to Settings, click "Privacy and then "Screen Lock".

You'll see a "Require Face ID" toggle that you can turn on and off.

There's also a message that explains: "When enabled, you'll need to use Face ID to unlock WhatsApp.

"You can still reply to messages from notifications and answer calls if WhatsApp is locked."

WhatsApp is already encrypted so your messages are already pretty safe.

This means only you and the chat you're sending messages to can see the conversation unless they happen to be 'screenshotting'.

However, if you back up your chats to the cloud then they aren't protected in the same way.

Law enforcement could ask Google or Applefor access to your backed up chats and there's a chance they could be handed over.

Alternatively, a hacker could enter your cloud backup.

To turn off cloud backup go to Settings, then click "Chats", "Chat Backup", "Auto Backup" and then turn the toggle off.

WhatsApp a quick history

Here's what you need to know...

OPSY DAISYFootage of new Call of Duty game leaks online months ahead of release

SEX GAMESMan suing Twitch for 'showing so many scantily-clad gamers he injured his penis'

Hot Deals

echo echoYou can get an Echo speaker for 99p when you sign up to a month of Amazon music

CRACKING THE CODEHow to use secret Netflix codes to unlock hidden TV shows and movies

OUT OF JUICEDelete THESE 22 dodgy apps to save your phone's battery life

EMAIL-INHotmail login: How to sign into your Outlook account and change your password?

In other news, Facebook has sparked widespread fury over a threat to ban news stories in Australia.

Rumours suggest the iPhone XR, iPhone 11 Pro and iPhone 11 Pro Max could be decommissioned when the iPhone 12 arrives.

And, Facebook messenger has started to merge with Instagram chat.

What's your favourite app to message on? Let us know in the comments...

We pay for your stories! Do you have a story for The Sun Online Tech & Science team? Email us at tech@the-sun.co.uk

Go here to read the rest:
Activate these 4 WhatsApp settings NOW to stop snoopers including face-lock and encryption - The Sun

Simple Ways of Protecting Your Website from Data Breaches – TechGeek

The internet is home to unthinkable quantities of information, much of which is best kept private, so it follows that business owners spend a great deal of time and energy on fending off hackers and potential data breaches. It doesnt take having your business security compromised to understand the importance of data protection, and yet so many businesses fall victim to data breaches every year.

Whether youre working with internal information or providing a service to your customers, securing your website could not be more important, particularly as hackers and malicious online systems become more advanced. Ultimately, failing to enhance and update your security measures means risking consumer trust and opening yourself up to the avalanche of negative PR that comes with data leakage.

With that in mind, here are a few ways you can prevent your business from joining those ranks.

It might seem a little obvious, but the humble password is a critical tool in the war against data breaches, but only when implemented effectively. Essentially, if youre in the habit of using the same password for everything or opting for simple, hackable options like 1234 or password, youre creating an easy, hacker-sized entrance to the most valuable information in your business. Before you do anything else like investing in expensive data security programs invest some time in creating more secure passwords. Theres no need to worry about forgetting your new passwords, either, now that handy password-storage applications are free and available on most devices.

Unless youre a web developer, you may not know a whole lot about the first few letters of your website URL, but you should. A URL beginning with HTTPS as opposed to HTTP is a signal that the webpage in question has been encrypted, meaning intruders are unable to hack into vital communications between your website and its visitors. Without this added layer of security, users are vulnerable to hackers who plan to collect sensitive information on their identities and online activities.

If those words sound like another language to you, then youre not alone but this is no longer the domain of tech geeks alone. In fact, enough tools have been created for this very job that its difficult to justify an anti-encryption position. Full-disk encryption is the most secure option for protecting the data on your devices, but you can also encrypt the data on memory cards, in the cloud, and even on the internet with a virtual private network (VPN). Before you know it, youll be protected on every possible platform!

When youre using an old device, you have to lower your expectations for functionality, and the same is true for your data security software. Investing in the most recent, reputable software on the market is ideal, and depending on your operating system, you can often get software updates for no extra cost. Even basic malware bugs cause big problems, which makes quality anti-malware software an essential investment. The best part about these software programs is that they can usually be set to update automatically, leaving you with one less thing to think about.

You dont need to be a tech expert to understand the value of effective data management, or to get the right protective systems in place, but you do need a plan of action. In case your business hasnt yet developed a plan of action for dealing with potential data breaches, now is the time to do it. Putting a data breach response plan in place is a critical step towards minimising the consequences of any future breaches, and it will go a long way towards earning consumers trust.

As computers become more and more integral to the functions of everyday life, so do the basic methods of data protection, and this one is about as basic as they come. The problem is that effective data protection practices are a habit (just like pressing CTRL + S to save), and one which many people are yet to develop. Remember that old saying, Prevention is better than the cure.? Think of data backups as a simple way of preventing a total disaster, even if youre unfortunate enough to encounter a hacker. Saving everything on the cloud is a great start, and there are also a growing number of specialised backup services for developers.

We all know that downtime is essential for physical and mental wellbeing, but what you may not know is that your computer needs its shut-eye too. Switching off completely at the end of the day is a foolproof way to minimise scammers access to your device and your network plus, it gives your computers operating system a chance to install any new software updates which have become available. Whats not to love?

Keeping your website and business safe from the ever-growing threat of hackers, malware, and all the other dark forces of the internet is a big job, but its also critical to your success in the online world. Even if it seems daunting right now, creating a simple yet effective plan for your online security will make all the difference going forward.

See original here:
Simple Ways of Protecting Your Website from Data Breaches - TechGeek

Top 10 Programming Languages That Pay Handsome Salaries in 2020 – Analytics Insight

Pursuing in programming languages has become one of the most career choices among tech professionals. Today, the demand and use of programming languages is showing a quite upward trend, making it a possible career option. To get started in this evolving field, choosing the right programming language will give aspirants an edge over others. They must try to learn the languages that are hot and popular in the market and make themselves more pertinent to potential employers. Undoubtedly, programmers and developers in the world are among the highly-paid tech professionals, making the field more competitive.

While it is worth choosing a career as a programmer, here are the top 10 programming languages that pay the highest salaries in 2020.

Global Medium Salary: US$76,000

Scala, a general-purpose, high-level, multi-paradigm programming language, combines the flexibility of Java-type interfaces with the power of classes. It can alter to bytecodes and run on the Java Virtual Machine (JVM). There is no concept of primitive data as everything is an object in Scala. It is aimed at expressing the general programming patterns in a refined, succinct, and type-safe way. Scala has many reasons for being popular among programmers, including easy to start, comprehensive features, close integration with Java, and others.

Global Medium Salary: US$72,691

Go, also referred to as Golang, is an open-source programming language developed by Google to make it easy to build simple, reliable, and efficient software. This programming language can be used in application development, web development, and in operations and infrastructure teams, and much more. It is the language of Cloud Native infrastructure and software development. When it comes to its drawbacks, Go does not encompass a library for GUIs, which are the most common ways that end-users interact with any device that has a screen.

Global Medium Salary: US$66,697

Objective-C is a superset of the C programming language and provides object-oriented capabilities and a dynamic runtime. It inherits the syntax, primitive types, and flow control statements of C and adds syntax for defining classes and methods. As it is based upon the C language, Objective-C can combine blocks of C code as well as C++, making it very versatile for application development. It is based upon the concept of code representing real-life objects.

Global Medium Salary: US$65,171

Swift language is the result of the latest research on programming languages and is developed using a modern approach to safety, software design patterns by Apple. Introduced at Apples 2014 WWDC with version Swift 1.0, Swift was developed by Chris Lattner with the purpose to resolve difficulties existed in Objective C. Swift language does not compromise either on performance or development speed, while it itself is optimized for development at a lightning-fast speed.

Global Medium Salary: US$62,773

As a computer programming language, Pascal was developed for teaching programming as a systematic discipline and to develop reliable and efficient programs. It is an Algol-based language and encompasses several constructs of Algol. Pascal offers numerous data types and programming structures, which makes it easy to understand and maintain Pascal programs.

Global Medium Salary: US$61,629

R language is typically used by statisticians, data analysts, researchers and marketers to recuperate, clean, assess, visualize and present data. It is an open-source and free programming language created by the University of Aucklands statistician Ross Ihaka and Robert Gentleman. Based on their names of the first character, R is freely available under the GNU General Public License, and pre-compiled binary versions are provided for various operating systems like Linux, Windows and Mac.

Global Medium Salary: US$56,670

Python is one of the most popular programming languages in the world. As an interpreted, interactive and object-oriented scripting language, Python uses English keywords repeatedly as opposed to other languages that use punctuation, making it highly readable. It provides a better structure and support for large programs than shell scripting as well as supports GUI applications that can be created and ported to many system calls, libraries and windows systems.

Global Medium Salary: US$55,690

JavaScript is a must-have programming language for students and working professionals to become a promising Software Engineer especially when they are working in the Web Development domain. When fused with Node.js, programmers can use JavaScript to generate web content on the server before a page is sent to the browser, which can be used to develop games and communication applications that run directly in the browser. Its applications, such as client-side validation, manipulating HTML page, dynamic pop-ups, back-end data loading and presentations, make Javascript one of the most widely used programming languages.

Global Medium Salary: US$55,363

As a multi-paradigm language, C++ supports at least seven different styles of programming. It was developed as an enhancement of the C language to include object-oriented paradigm and can be used to develop games, desktop apps, operating systems, and so on. C++ allows programmers and developers to divide complex problems into smaller pieces by using objects. C++ has its own rich library support as well as 3rd party libraries, e.g. Boost libraries, for fast and rapid development.

Global Medium Salary: US$54,000

Kotlin, a statically typed, general-purpose programming language, is an object-oriented language, and fully interoperable with Java code as it runs on JVM. Its data classes feature lead to auto-generation of boilerplate like equals, hashCode, toString, getters/setters and much more. In 2017, Google announced Kotlin as an official language for android development.

Read this article:
Top 10 Programming Languages That Pay Handsome Salaries in 2020 - Analytics Insight

Fairwinds Adds Open Source Interface for Kubernetes Backup and Recovery – Container Journal

Fairwinds, a provider of managed IT services, has launched an open source project that layers a user interface on top of the VolumeSnapshot application programming interface (API) that is available in beta on the latest release of Kubernetes.

Robert Brennan, director for open source at Fairwinds, says Fairwinds Gemini will make it easier for IT administrators to automate backups on a customizable, fine-grained schedule as well as making it easier to restore specific backups and delete stale backups. As the number of snapshots an organization creates increases, its relatively simple for those snapshots to pile up over time, he notes.

Given the ephemeral nature of containers, theres a desire to run snapshots more frequently to capture the application environment at a specific time. However, the cost of those snapshots can add up in cloud computing environments, he says.

The VolumeSnapshot API is an extension of the Container Storage Interface (CSI) through which IT teams attach external storage systems to Kubernetes clusters. As databases are deployed more frequently on Kubernetes clusters, it becomes more important to automate the backup and recovery of that data in the event a Kubernetes cluster suddenly becomes unavailable.

IT teams should also remember to test their ability to recover backups because there are any number of reasons why a backup file may become corrupted, including the injection of malware that encrypts the data organizations are expecting to be pristine to recover from a ransomware attack.

Interest in deploying stateful applications on Kubernetes clusters is rising because IT teams are looking to streamline the management of stateless and stateful applications on the same platform versus relying on legacy external storage systems to capture the state of an application that may be running stateless on a Kubernetes cluster.

Fairwinds Gemini is the fifth open source project launched by Fairwinds pertaining to Kubernetes. The other four are Nova, a tool for monitoring Helm charts; Astro, a tool for managing instances of Datadog monitoring tools for Kubernetes clusters; Pluto, a tool for discovering deprecated Kubernetes APIs; and Polaris, a tool that evaluates Kubernetes configurations based on best DevOps practices.

Despite the downturn in the economy brought on by the COVID-19 pandemic, interest in deploying cloud-native applications on Kubernetes clusters is on the rise. Organizations want to build and deploy applications today that will stand the test of time rather than continuing to build monolithic applications that eventually would have to be modernized anyway. The issue many organizations have today is they lack the internal expertise required to build and deploy those cloud-native applications, notes Brennan.

During an economic downturn, the adoption of open source technology rises. IT organizations would rather reduce commercial license fees than cut IT headcount. The challenge they all face now is managing the rate of open source innovation, which is now occurring faster than many of them can absorb on their own.

Related

Read more here:
Fairwinds Adds Open Source Interface for Kubernetes Backup and Recovery - Container Journal

Bill Gates says Tesla Semi and electric airplanes will probably never work, and he is wrong – Electrek.co

Bill Gates has thrown some cold water on the Tesla Semi project and recent comments from Elon Musk about the possibility of commercial electric airplanes.

Is he right?

In recent years, Gates has focused on using his fortune to try and fix major problems in the world.

He is getting more attention lately due to his early warnings of the world not being ready for a pandemic prior to the COVID-19 crisis.

Now, he is using his platform to issue a similar warning about climate change:

Earlier this month, I wrote about howCOVID-19 is a cautionary tale for climate change. Theres no doubt that we have experienced terrible suffering and economic hardship over the last several months. But as hard as it is to imagine right now when were still in the middle of the pandemic, climate change has the potential to be even more devastating.

In a new blog post, he emphasizes the need to electrify transport in order to address climate change.

However, he made some controversial comments about the segments going electric.

Gates does believe that passenger vehicles are going to be electrified, and they already are to a degree:

Plus, increased competition in the market means there are more choices available to customers than ever before, from compact sedans to sleek sports cars. Youll even be able to buy an all-electric pick-up truck soon thanks to legacy companies like GM and Ford and new carmakers like Rivian and Bollinger.

The Microsoft founder, who used to drive a Model X, snubbed Tesla and its Cybertruck in mentioning electric pickup trucks.

No big deal, but where Gates comments get more controversial is that he claims that electric semi-trucks, like Tesla Semi, and electric jets, will probably never happen:

The problem is that batteries are big and heavy. The more weight youre trying to move, the more batteries you need to power the vehicle. But the more batteries you use, the more weight you addand the more power you need. Even with big breakthroughs in battery technology, electric vehicles will probably never be a practical solution for things like 18-wheelers, cargo ships, and passenger jets. Electricity works when you need to cover short distances, but we need a different solution for heavy, long-haul vehicles.

Thats despite several electric semi-truck programs, like Tesla Semi and the Freightliner eCascadia, being quite far along.

As for electric airplanes, Tesla CEO Elon Musk has been predicting that they would become viable once batteries reach an energy density of 400 Wh/kg, which many battery manufacturers are currently working on.

Instead, Gates suggest biofuels as potential alternative to batteries for those segments of transportation.

I wont pretend to be smarter than Bill Gates, but Id like for him to revisit these comments because I think he is not looking at it the right way.

First of all, its not all about batteries being big and heavy.

If you look at the problem through that lens, you assume that we have reached the efficiency limit for all those types of vehicles (trucks, cargo ships, and planes).

I dont think thats true.

With the electrification of passenger cars, manufacturers have doubled down on their efforts to improve efficiency in order to use fewer batteries in their vehicles and they have found plenty of room for improvements.

As we start to electrify trucks and planes, we will likely find new efficiency improvements because necessity is the mother of invention.

We just didnt have that need until now.

But if you want to focus on the batteries, I find it kind of crazy that he doesnt believe they will improve enough to enable electric trucks and planes.

Especially when you consider that he is a major investor in Quantumscape, which claims that its technology is going to enable 500 Wh/kg batteries:

That would be more than enough to enable long-range electric 18-wheelers and even commercial jet planes.

What I am missing? Let me know what you think in the comment section below.

FTC: We use income earning auto affiliate links. More.

Subscribe to Electrek on YouTube for exclusive videos and subscribe to the podcast.

Visit link:
Bill Gates says Tesla Semi and electric airplanes will probably never work, and he is wrong - Electrek.co

The programming language that does not stop growing and that you may be interested in learning – Checkersaga

Tiobes August index throws a curious surprise and its the exponential increase in the use of the R programming language, driven by the desperate search for a vaccine for COVID-19.

There are many programming languages on the market, and it is essential to have some type of index that encompasses popularity and use so that a professional or a student in the programming niche can be guided more wisely, and the Tiobe index has a lot to say about it.

Tiobe is one of the most popular indexes in the programming market, and is based on measuring the popularity of all these languages through their searches in the main internet search engines, on the availability of jobs and the number of engineers and programmers qualified who are using it.

Well, R may not sound like much to you, but it is the protagonist of the last index of Tiobe that collects the most popular programming languages of August 2020. R has just climbed to eighth position, a considerable fact considering that it was only a year it was in the twentieth position among the most used programming languages.

The R programming language is free and open source, focused more on the subject of statistical computing and graphics, and from Tiobe they affirm that this exponential growth in the last 12 months It is because universities and research institutes have moved away from other commercial and classical statistical languages like SAS and Stata to embrace R and other open source languages like Python. Likewise, many engineers and researchers are using this programming language within data science to find a vaccine for COVID-19.

Learn a programming language It is not easy at all and it requires many years of our life, and therefore knowing how to specialize in the right one and that at the same time we like it, can assure us a job.

This means that the R programming language could end up becoming the 2020 Tiobe programming language, which is awarded to the language that achieves the highest grade increase over the course of 12 months.

The rest of the positions in the index have hardly changed, dominating the C programming language, followed by Java and Python, while other languages such as Go, Swift and SQL are fighting to enter the Top 10.

These types of indexes are essential for a programmer to specialize in those with the greatest demand for employment.

[Va:techrepublic]

Continued here:
The programming language that does not stop growing and that you may be interested in learning - Checkersaga

Build and Deploy .Net Core WebAPI Container to Amazon EKS using CDK & cdk8s – idk.dev

In this blog, we will leverage the development capabilities of theCDK for Kubernetesframework also known as cdk8s along with theAWS Cloud Development Kit (AWS CDK)framework to provision infrastructure through AWS CloudFormation.

cdk8s allows us to define Kubernetes apps and components using familiar languages. cdk8s is an open-source software development framework for defining Kubernetes applications and reusable abstractions using familiar programming languages and rich object-oriented APIs. cdk8s apps synthesize into standard Kubernetes manifests which can be applied to any Kubernetes cluster. cdk8s lets you define applications using Typescript, JavaScript, and Python. In this blog we will use Python.

The AWS CDK is an open source software development framework to model and provision your cloud application resources using familiar programming languages, including TypeScript, JavaScript, Python, C# and Java.

For the solution in this blog, we will use C# for the infrastructure code. Completing this walkthrough successfully would take you about couple hours (including installing pre-requisites etc.), so plan accordingly.

Lets get started!

At a high-level, we will:

Creating the infrastructure described above will result in charges beyond free tier. So, review the pricing section below for service-specific details and make sure to clean up the built infrastructure to avoid any recurring cost.

The Github source code includes a cdk8s folder where the .NET application (docker container WebAPI in ECR) will be deployed and run in the Kubernetes cluster. cdk folder contains the AWS Cloud Development Kit (CDK) solution (C# .Net Core) to build the infrastructure. This solution constructs the AWS infrastructure where the webapi (.NET Core Web api) is packaged, built as an artifact and pushed to AWS ECR. The .NET project sample uses AWS SDK, Mysql data packages to connect to MySQL and interact with Amazon Aurora database. The exposed Web API endpoint makes HTTP calls (GET & POST) to add/retrieve TODOs. The end user can use any http get/put tool like curl or UI tools like Google Chrome ARC Rest Client or POSTMAN to validate the changes.

We will use Docker Containers to deploy the Microsoft .NET Web API. The following are required to setup your development environment:

To provision the infrastructure (and services) and deploy the application, we will start by cloning the sample code from the aws-samples repo on GitHub, run installation scripts (includedin the sample code) to setup the infrastructure and deploy the webapi to your AWS Account. We will review and test the application, and finally cleanup the resources (basically teardown what you provisioned).

$ git clone https://github.com/aws-samples/aws-cdk-k8s-dotnet-todo

The git source provided above has a cdk, webapi and a cdk8s folder. webapi has the necessary .NET Web API solution. We will use the AWS CDK commands to build the infrastructure and deploy the webapi into EKS. cdk8s code provided (using Python language) defines our Kubernetes chart which creates a webservice (k8s Service and Deployment).

Once the code is downloaded, please take a moment to see how CDK provides a simpler implementation for spinning up an infrastructure using C# code. You may use Visual Studio Code or your favorite choice of IDE to open the folder aws-cdk-k8s-dotnet-todo).Open the file /aws-cdk-k8s-dotnet-todo/cdk/src/EksCdk/EksCdkStack.cs. Code below (provided a snippet from the github solution) spins up a VPC for the required Cidr and number of availability zones.Similarly Open the file /aws-cdk-k8s-dotnet-todo/cdk8/main.py. Below snippet creates a Kubernetes chart and creates a webservice.

NOTE: Make sure to replace with your AWS account number (where you are trying to deploy/run this application).

main.py is called by cdk8s.yaml when cdk8s synth is invoked (by run_cdk8s.sh). Windows users may have to change the name to main.py instead of .main.py in the cdk8s.yaml

Open the file /aws-cdk-k8s-dotnet-todo/cdk/src/EksCdk/EksCdkStack.cs. Below snippet creates a Kubernetes chart and creates a webservice.

Scripts provided

Provided run_infra.sh script/bash file as part of the code base folder, Make sure to replace with your AWS account number (where you are trying to deploy/run this application). This will create the CDK infrastructure and pushes the WebAPI into the ECR. Additionally the script registers the kube update config for the newly created cluster.

If you would like to perform these steps you can do these manual steps as below

Step 1: Steps to build CDK

The above CLI will produce output similar to below. Copy and execute this in the command line. This will update your kube config to connect to the EKS control plane.

Below provided below is a sample only:

EksCdkStack.cdkeksConfigCommand415D5239 = aws eks update-kubeconfig name cdkeksDB67CD5C-34ca1ef8aef7463c80c3517cc12737da region $REGION role-arn arn:aws:iam::$ACCOUNT_NUMBER:role/EksCdkStack-AdminRole38563C57-57FLB39DWVJR

Step 2: Steps to Build and push WebAPI into ECR (todo-app ECR repository created as part of above CDK infrastructure)

Make sure to update your region and account number above

Step 3: Steps to create Kubernetes service and pods using cdk8s

After this is run, review the list/cdk8s.k8s.yaml. cdk8s created k8s yaml that is needed for deploying, loading the image from the ECR. A sample is provided below.

In this case, the generated yaml has a Kubernetes service & a deployment.

Once the Kubernetes objects are created, you can see the created pods and services like below. NOTE This could take sometime to start the ELB cluster with the deployment

The .NET code provided(cdk/src/EksCdk/Program.cs) creates the EksCdkStack as coded. Based on the name provided, a CloudFormation stack is built. You will be able to see this new stack in AWS Console > CloudFormation.

Stack creation creates close to 44 resources within a new VPC. Some of them are provided here below for your reference.

At the end of this step, you will create the Amazon Aurora DB table and the EKS Cluster exposed with a Classic LoadBalancer where the .NET Core Web API is deployed & exposed to the outside world. The output of the stack returns the following:

Once the above CloudFormation stack is created successfully, take a moment to identify the major components. Here is the infrastructure youd have created

Using CDK constructs, we have built the above infrastructure and integrated the solution with a Public Load Balancer. The output of this stack will give the API URLs for health check and API validation. As you notice by defining the solution using CDK, you were able to:

Using cdk8s chart, were able to generate the needed Kubernetes deployment and service yaml. The generated yaml is applied to the EKS Cluster and exposed using the classic load balancer.

Lets test the TODO API using any REST API tools, like Postman, Chrome extension ARC or RestMan.

Set Headers as Content-type & application/jsonSample request:{"Task": "Deploying WebAPI in K8s","Status": "WIP"}

Run the cleanup.sh to delete the created infrastructure

If you would like to do this manually, make sure the following resources are deleted before performing the delete/destroy:

cleanup can be done using the below CLI commands as well:

As you can see, we were able to deploy an ASP.NET Core Web API application that uses various AWS Services. In this post we went through the steps and approach for deploying Microsoft .NET Core application code as containers with infrastructure as code using CDK and deploy the Kubernetes services, pods using cdk8s. cdk8s+ is a library built on top of cdk8s. It is a rich, intent-based class library for using the core Kubernetes API. It includes hand crafted constructs that map to native Kubernetes objects, and expose a richer API with reduced complexity. You can check out more cdk8s examples, patterns, AWS EKS Architecture, and intent-driven APIs using cdk8s+ for Kubernetes objects.

We encourage you to try this example and see for yourself how this overall application design works within AWS. Then, it will just be a matter of replacing your current applications (Web API, MVC, or other Microsoft .NET core application), package them as Docker containers and let the Amazon EKS manage the application efficiently.

If you have any questions/feedback about this blog please provide your comments below!

About the Authors

More here:
Build and Deploy .Net Core WebAPI Container to Amazon EKS using CDK & cdk8s - idk.dev

The future of school may be outdoors, even after the pandemic – CBC.ca

It's a five-minute walk from the nearest road to the wooden sign that announces the site of the Guelph Outdoor School. There, in a clearing in the woods, is a registration table the only visible infrastructure.

On a sunny August weekday inGuelph, Ont., dozens of kids find their way down the path, equipped with hats and bug spray everything they'll need for a full day outdoors. Cohorted into groups of 10, they play games, trek along a series of well-worn paths, study found bird bones, and learn things like how to tell which plant is Queen Anne's lace and which is poisonous water hemlock.

This is summer camp, but the Guelph Outdoor School runs similar programs year-round. In the past the full-day fall and winter programs have been more of a niche attraction, for students aged four to 14 with enough stamina to brave the wilderness in January. Many were homeschooled or had a special arrangement with their regular school to attend once or twice a week.

In 2020, though, with fresh air seen as a way to lower the risk of COVID-19 transmission, more parents are seeing the value in moving their kids outside through programming like this.

"The phone is [ringing] off the hook and I can't even keep track," said Chris Green, a former classroom teacher who started the outdoor school eight years ago.

He and his team have added seven new programs this year, all of which have been filling up. They've also partnered with a local Montessori school to offer a full-time option, where around 30 kids, split into two groups, will spend half the day in a classroom and the other half outdoors.

"For me, it's always made sense to have kids outside," Green said. "And now it makes double the sense, because it has now shifted from an educational and developmental initiative, to a kind of preventative public health initiative."

Even those who were already converts to the school's philosophy are thinking differently about its value.

Cheryl Cadogan's 13-year-old son, David, normally attends programming there one day a week during the school year. But this year, Cadogan said, their family has been on heightened alert since her partner is immunocompromised.

"It's not safe for us as a family to have him go back to school," she said.

David will instead take his Grade 8classes online, while also spending a few days a week at the outdoor school.

Cadogan said she knows there's still a risk, but she is heeding the words of Dr. Anthony Fauci, head of the U.S. National Institute of Allergy and Infectious Diseases, who has said that outdoors is better than indoors.

Indeed, the appeal of open-air activities during the COVID-19 pandemic is rooted in science. Dr. Linsey Marr of Virginia Tech studies how viruses spread through the air. She said COVID-19 transmission by air is happening "there's really no question anymore."

When asked why there's a lower risk of transmission outside, she recommended picturing a smoker. Outside, she said, the exhaled smoke "rapidly disperses throughout the atmosphere and becomes very dilute." Indoors, on the other hand, it gets "trapped."

While masks, physical distancing and proper ventilation can go a long way to help curb the spread of the virus in schools, Dr. Marr said she would seize upon "any opportunity that there is to move an activity outdoors."

The Toronto District School Board (TDSB) is trying to increase those opportunities for its students, encouraging teachers to take classes outside whenever possible this year. But schools that don't have a forest on their property will need to think differently about using the space beyond their doors.

David Hawker-Budlovsky is the Central Coordinating Principal for outdoor education at the TDSB. While it won't be possible for many large downtown schools to have full-day outdoor programming, he said teachers will be able to schedule time in the yard, while staggering entries and exits to maintain physical distance.

Teachers and students will have to get used to "traveling around and using the community as classroom as well," he said. Ideas range from reading aloud to a class in the yard, to teaching about climate change in a nearby ravine, or learning about local history while walking around the neighbourhood.

Hawker-Budlovsky said there will be challenges, and admitted the plan has skeptics. But he's excited about the idea of getting kids outside more often.

"I think what's really important is to be able to look at this [with] an open mind, be creative and be as flexible as possible," he said.

Open-mindedness will certainly be a valuable trait for those holding open-air classes in the Canadian winter. But according to Pamela Gibson, a former teacher who now consults on sustainability and outdoor education with Learning for a Sustainable Future (LSF), students and teachers can get past it.

"There is no bad weather," she said. "There are just bad clothes." Over time, she said, people can learn how to prepare themselves for those less-than-perfect forecasts.

In the early 2000s, as a teacher at Belfountain Public School in Caledon, Ont., Gibson began experimenting with open-air class time. The idea was initially spurred by a group of parents looking for ways for their kids to spend more time outside on the 10-acre property surrounding the school.

At first, she said, "we had the usual kids that hung around the doors and really felt uncomfortable. But as time went on, we [didn't] have those door hangers anymore."

Outdoor learning has become so ingrained there, she said students will sometimes spend two-thirds of their days in the yard or out in the community, working on class projects.

Teachers looking to adopt similar programs elsewhere, she said, will have to be creative. But from the Belfountain experience, even a tree can be looked to as a "possible source of curriculum."

Gibson suggested educators ask themselves, "What's the math in that tree? What's the science in that tree? Where are the arts in that tree?" She believes it's all there.

Holding classes outside in the community is not only possible, Gibson said, but is "crucial," even beyond the pandemic. Curriculum, she said, is "supposed to be what children need to function in the world, not just inside the building [and] not just inside their homes."

With the spectre of COVID-19 pushing educators to look differently at their classrooms, Gibson said, there's "an opportunity for great change," and perhaps even a chance to improve the system for the future.

See more here:
The future of school may be outdoors, even after the pandemic - CBC.ca