What is IoT?

The Internet of Things, at its simplest level, is smart devices - from refrigerators that warn you when you’re out of milk to industrial sensors – that are connected to the Internet so they can share data, but IoT is far from a simple challenge for IT departments.For many companies, it represents a vast influx of new devices, many of which are difficult to secure and manage. It’s comparable to the advent of BYOD, except the new gizmos are potentially more difficult to secure, aren’t all running one of three or four basic operating systems, and there are already more of them.A lot more, in fact – IDC research says that there are around 13 billion connected devices in use worldwide already, and that that number could expand to 30 billion within the next three years. (There were less than 4 billion smartphone subscriptions active around the world in Ericsson’s most recent Mobility Report.) To read this article in full or to leave a comment, please click here

What is IoT?

The Internet of Things, at its simplest level, is smart devices - from refrigerators that warn you when you’re out of milk to industrial sensors – that are connected to the Internet so they can share data, but IoT is far from a simple challenge for IT departments.For many companies, it represents a vast influx of new devices, many of which are difficult to secure and manage. It’s comparable to the advent of BYOD, except the new gizmos are potentially more difficult to secure, aren’t all running one of three or four basic operating systems, and there are already more of them.A lot more, in fact – IDC research says that there are around 13 billion connected devices in use worldwide already, and that that number could expand to 30 billion within the next three years. (There were less than 4 billion smartphone subscriptions active around the world in Ericsson’s most recent Mobility Report.) To read this article in full or to leave a comment, please click here

The System Bottleneck Shifts To PCI-Express

No matter what, system architects are always going to have to contend with one – and possibly more – bottlenecks when they design the machines that store and crunch the data that makes the world go around. These days, there is plenty of compute at their disposal, a reasonable amount of main memory to hang off of it, and both Ethernet and InfiniBand are on the cusp of 200 Gb/sec of performance and not too far away from 400 Gb/sec and even higher bandwidths.

Now, it looks like the peripheral bus based on the PCI-Express protocol is becoming the bottleneck,

The System Bottleneck Shifts To PCI-Express was written by Timothy Prickett Morgan at The Next Platform.

IDG Contributor Network: How to plan your successful cloud migration

Recent Accenture Strategy research found that four out of five companies run up to half of their business functions in the cloud. Moreover, that figure is likely to increase significantly over the next few years. The research reveals that a clear majority of business leaders see the cloud platform as a critical enabler of greater innovation and competitive edge.Yet, companies still struggle when it comes to structuring the cloud transformation, beginning with the fundamental first step — planning a successful migration. What’s lacking is a solid comprehension of what value the cloud brings, its potential and its elasticity.To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For July 14th, 2017

Hey, it's HighScalability time:

 

 

We've seen algorithms expressed in seeds. Here's an algorithm for taking birth control pills expressed as packaging. Awesome history on 99% Invisible.

If you like this sort of Stuff then please support me on Patreon.

 

  • 2 trillion: web requests served daily by Akamai; 9 billion: farthest star ever seen in light-years; 10^31: bacteriophages on earth; 7: peers needed to repair ransomware damage; $30,000: threshold of when to leave AWS; $300K-$400K: beginning cost of running Azure Stack on HPE ProLiant; 3.5M: files in the Microsoft's git repository; 300M: Google's internal image data training set size; 7.2 Mbps: global average connection speed; 85 million: Amazon Prime members; 35%: Germany generated its electricity from renewables;

  • Quotable Quotes:
    • Jessica Flack: I believe that science sits at the intersection of these three things — the data, the discussions and the math. It is that triangulation — that’s what science is. And true understanding, if there is such a thing, comes only when we can do the translation between these three ways of representing the world.
    • gonchs: “If your whole business relies on us [Medium], you might Continue reading

Technology Requirements for Deep and Machine Learning

Having been at the forefront of machine learning since the 1980s when I was a staff scientist in the Theoretical Division at Los Alamos performing basic research on machine learning (and later applying it in many areas including co-founding a machine-learning  based drug discovery company), I was lucky enough to participate in the creation and subsequently to observe first-hand the process by which the field of machine-learning grew to become a ‘bandwagon’ that eventually imploded due to misconceptions about the technology and what it could accomplish.

Fueled by across-the-board technology advances including algorithmic developments, machine learning has again become a

Technology Requirements for Deep and Machine Learning was written by Nicole Hemsoth at The Next Platform.

37% off Fitfort 4K WiFi Ultra HD Waterproof Sport Camera – Deal Alert

This sport camera is a budget-friendly alternative to GoPro. It averages 4.5 out of 5 stars from over 230 reviewers on Amazon, where Its list price of $100 is currently discounted 37% to just $64. Designed to be used for biking, hiking, diving, swimming, surfing, or anywhere else you could use a rugged, waterproof camera. The camera provides 4K/25FPS, 2.7K/30FPS, 1080P/60FPS, 1080P/30FPS and 720P/120FPS video resolution. Comes with a wireless remote, and 2 rechargeable batteries that provide up to 90 minutes of continuous filming each. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Mythbusting the CCIE Continuing Education Program

It’s been about a month since the CCIE Continuing Education program was announced ahead of Cisco Live. There was a fair amount of discussion about it both on this blog as well as other places, like Jeff Fry’s post. Overall, the response has been positive. However, there are a few questions and ideas about the program that are simply not true. And no, this is not The Death Of The CCIE Program (just Google it). So, let’s take a look at this edition of Mythbusters for the CCIE CE program.

Myth #1: The CE Program Is Just A Way For Cisco To Sell More Training

This was a good one. The list of CE classes that was release at the beginning of the program included Cisco Live classes as well as Cisco Authorized training classes. Those were the only thing on the list as of right now. When some people saw the list, they jumped to the conclusion that the reason why the CE program exists is because Cisco wants to push their training courses. Let’s look at that.

Let’s say you want to start a global program that requires people to keep track of their training credits to turn Continue reading

Azure Stack: Microsoft’s private-cloud platform and what IT pros need to know about it

Microsoft’s release of Azure Stack, an on-premises version of its public cloud, could be important for networking and data center pros for one simple reason: It gives customers a way to use a popular and familiar cloud platform without shipping their sensitive data into a multi-tenant environment.Azure Stack is software from Microsoft that’s been certified to run on a select group of partners’ hardware and is intended to look and feel just like the Azure public cloud. In addition to providing a common management platform between the public and private cloud, Azure Stack is important for another reason too: none of Microsoft’s biggest public cloud competitors have anything like it.To read this article in full or to leave a comment, please click here

Checkpoint Gateway and Mangers

Checkpoint Firewalls are not zone based Firewalls so have a different type of policy compared to ASA and Juniper. A typical build consist of a Security Gateways managed by a centralised Management Server using the Checkpoint Smart Dashboard software. Firewall policies are created and managed on the management server and pushed to the security gateway.