Warning on our increasingly connected world

There is a lack of understanding by many non-technical people on how the technology their lives revolve around works. This is the intention of technology – shield complexities of how things work from people and make hard things easy. However, it also has a potential dark side that can create a blind spot in people’s personal security.

Let’s take a simple example – any of the many voice response tools out there, from speakers to TV remotes to refrigerators to phone. Many people are unaware that to process speak most of these devices sends recordings / streams of people speaking to the company’s servers for processing (the chipset in most devices isn’t powerful enough to process things like freeform speech efficiently). The device opens a connection to the servers, sends information, then waits for a response telling it how to behave.

This means that all of your recordings, and anything you or others said in them, are now stored on a server and you no longer own them. Most of these devices claim that they sleep until their activation word is spoken, meaning that the only recordings are the ones that follow you explicitly initiating dialog.

 

It would be quite easy to couple the data in these recordings with your profile account information and other openly searchable data points (Facebook, LinkedIn, etc.) to put a pretty robust picture of you together. This could be used for anything from targeted marketing to targeted scams, if the data fell into the wrong hands.

This is just one of many examples of how our increasingly interconnected world opens avenues many people don’t realize exist. These technologies are not bad things. You should just make sure you understand what you are getting into and how you will use it before you go all in on the latest and greatest IOT device.

Mr. T Challenge!

So my team has a tough goal. They named themselves “The A Team” with A standing for “Agile Coaching”. Given their name I told them that if they could hit a set of tough goals that I’d shave my head like Mr. T. They said it needed to be purple too. They hit their goal so I held up my end of the bargain.

Wearing it like this for a full week. Go team!

Kubernetes – exposing port outside cluster

So there is a ton of documentation out there on Kubernetes and how to expose ports outside the cluster. Perhaps I was having an issues interpreting the docs but I struggled for a long time with this. No matter what I did I found that I could get to the pod as long as I was inside the cluster (vagrant ssh minion-1) but could not get it from my browser.

After a lot of spinning I finally got this figured out and figured I’d post it in case it helps anyone else. The key was using nodePort value in the configuration, along with the node IP address, to reach into the pod from outside the cluster. This means setting ‘type: NodePort’ in your configuration then using the nodePort assigned with the IP address of the node to access: ‘http://10.245.1.3:30892/’.

Image to help clarify:

 

Screen Shot 2015-08-27 at 7.53.44 PM kube-nodeport