Singularity is the Hinge To Swing HPC Cloud Adoption

For almost a decade now, the cloud has been pitched as a cost-effective way to bring supercomputing out of the queue and into public IaaS or HPC on-demand environments. While there are certainly many use cases to prove that tightly-coupled problems can still work in the cloud despite latency hits (among other issues), application portability is one sticking point.

For instance, let’s say you have developed a financial modeling application on an HPC on demand service to prove that the model works so you can make the case for purchasing a large cluster to run it at scale on-prem. This

Singularity is the Hinge To Swing HPC Cloud Adoption was written by Nicole Hemsoth at The Next Platform.

How to maintain data oversight to avoid ‘shadow data’

Data at riskImage by George HodanBefore his retirement, an employee of the Office of the Comptroller of the Currency (OCC) uploaded more than 10,000 OCC records onto two removable thumb drives. He retired in November 2015; the agency didn’t discover the breach until the following September. That left almost a year between breach and detection. The OCC was not able to recover the thumb drives.To read this article in full or to leave a comment, please click here

How to maintain data oversight to avoid ‘shadow data’

Data at riskImage by George HodanBefore his retirement, an employee of the Office of the Comptroller of the Currency (OCC) uploaded more than 10,000 OCC records onto two removable thumb drives. He retired in November 2015; the agency didn’t discover the breach until the following September. That left almost a year between breach and detection. The OCC was not able to recover the thumb drives.To read this article in full or to leave a comment, please click here

Yes, you still need endpoint malware protection

There has been a steady stream of reports and claims lately that many of us no longer need endpoint security, that antivirus (AV) programs on our PCs are worthless.Gizmodo flat out said that you really don't need an antivirus app anymore, arguing that Windows 10 and the browsers have tightened up security to the point that they adequately protect end users. Windows Central asked the same question, but determined that more protection is better than less.To read this article in full or to leave a comment, please click here

Yes, you still need endpoint malware protection

There has been a steady stream of reports and claims lately that many of us no longer need endpoint security, that antivirus (AV) programs on our PCs are worthless.Gizmodo flat out said that you really don't need an antivirus app anymore, arguing that Windows 10 and the browsers have tightened up security to the point that they adequately protect end users. Windows Central asked the same question, but determined that more protection is better than less.To read this article in full or to leave a comment, please click here

PQ Show 116: Practical YANG For Network Automation

Todays Priority Queue explores network modeling and programmability. Our guest Michael Kashin has been working with YANG models, python, and a variety of supporting tools. We discuss how to work with network models and how they tie to the future of network configuration. The post PQ Show 116: Practical YANG For Network Automation appeared first on Packet Pushers.

Developing a Spring Boot app on Docker: The AtSea Demo App

This is the first of a series of blog posts that demonstrates using Docker to develop a typical web application and deploying it in production. For DockerCon 2017, we wanted to build a new demo application that would demonstrate the flexibility of using Docker in development as well as showcase the features of Docker in a production environment. The result was the AtSea Shop, a storefront application that can be deployed on different operating systems and can be customized to both your enterprise development and operational environment.

A Hybrid Architecture

The team decided on a few ground rules. First, we wanted to use modern components commonly used in enterprise applications. We decided to build a Java application using the Spring Boot framework. The web client is a javascript application written using React as a framework.  Second, the application should be able to use any relational database and that it could be deployed on a Linux or Windows environment or cluster. Finally, the team wanted to show the process from development to deployment including building the application, implementing security, and deploying the application.

Docker Demo App

The application combines a typical Java n-tier architecture that uses Spring Boot’s web MVC framework for the REST API Continue reading

How the Internet changed the Nyirarukobwa Primary School

Sarah is 11 years old and goes to school in the Nyirarukobwa Primary School, together with about 1400 other kids.

She tells me that she joined this school this year because it has a very high success rate for the National Exam. Sarah said to me: 'I want to go to boarding School', which is what will happen when she passes the exam and go to Secondary school. 

She is one of the 700 plus children who joined the Nyirarukobwa School over the last 3 years (yes the number of kids just doubled!!) because of its high exam success rate. 
Ms. Joyce Dogniez

Google’s AI shifts from the next platform to its next products

Last October, when Google Home was announced, Google CEO Sundar Pichai christened AI as the next platform. Yesterday, AI became a Google product that could become as transformative and as large and potentially pervasive as Google Search.Google’s grand bargain with its users will not change: indispensable free apps in return for users’ data. Easier to use conversational interfaces such as Google Home and Google Assistant built with AI could be the next free indispensable Google app purchased with the users’ information as the currency. It is a virtuous cycle. User interaction with indispensable apps like Google Search, Translate and Assistant that use AI, creates more data to create new indispensable AI systems. Pichai confirmed this during the Google I/O keynote when he said:To read this article in full or to leave a comment, please click here

55% off Panda Security Ransomware and Virus Protection Products for Home Users – Deal Alert

Panda security solutions will fully protect you against the newly released malware and ransomware attacks, and Panda is offering 55% off all security products for home users using the coupon code ANTIRANSOMWARE at checkout. See Panda's Internet Security product here, or their Antivirus Pro product here, and enter the code at checkout to activate the 55% savings. This code will work for all Panda Security products for home users.  To read this article in full or to leave a comment, please click here

55% off Panda Security Ransomware and Virus Protection Products for Home Users – Deal Alert

Panda security solutions will fully protect you against the newly released malware and ransomware attacks, and Panda is offering 55% off all security products for home users using the coupon code ANTIRANSOMWARE at checkout. See Panda's Internet Security product here, or their Antivirus Pro product here, and enter the code at checkout to activate the 55% savings. This code will work for all Panda Security products for home users.  To read this article in full or to leave a comment, please click here

Save 20% on Amazon’s New Generation of Fire Tablets – Deal Alert

The all-new Fire 7 and Fire HD 8 feature longer battery life, a thinner and lighter body, better Wi-Fi connectivity, and Alexa. It features a beautiful 7" IPS display with higher contrast and sharper text, a 1.3 GHz quad-core processor, and up to 8 hours of battery life. 8 or 16 GB of internal storage and a microSD slot for up to 256 GB of expandable storage. Amazon has also introduced two new Fire Kids Edition (Fire 7 and Fire HD 8 Kids Editions). To go along with the launch, customers who purchase any 3 new generation Fire Tablets save 20% by using the code FIRE3PACK at checkout. See the full lineup here.To read this article in full or to leave a comment, please click here

Introducing Argo — A faster, more reliable, more secure Internet for everyone

Introducing Argo — A faster, more reliable, more secure Internet for everyone

The Internet is inherently unreliable, a collection of networks connected to each other with fiber optics, copper, microwaves and trust. It’s a magical thing, but things on the Internet break all the time; cables get cut, bogus routes get advertised, routers crash. Most of the time, these failures are noticed but inexplicable to the average user — ”The Internet is slow today!” — frustrating user experiences as people go about their lives on the Internet.

Introducing Argo — A faster, more reliable, more secure Internet for everyone

Today, to fix all of this, Cloudflare is launching Argo, a “virtual backbone” for the modern Internet. Argo analyzes and optimizes routing decisions across the global Internet in real-time. Think Waze, the automobile route optimization app, but for Internet traffic.

Just as Waze can tell you which route to take when driving by monitoring which roads are congested or blocked, Argo can route connections across the Internet efficiently by avoiding packet loss, congestion, and outages.

Cloudflare’s Argo is able to deliver content across our network with dramatically reduced latency, increased reliability, heightened encryption, and reduced cost vs. an equivalent path across the open Internet. The results are impressive: an average 35% decrease in latency, a 27% decrease in connection errors, and a 60% Continue reading

Why you need an enterprise architect

As more enterprises tackle digital transformation and recognize the value of aligning their IT strategy, technology and processes with broader business goals, there's a growing need for talented pros who can reduce complexity, establish solid technology processes and ensure tech's used consistently across business units and functional areas.Increasingly that role is filled by an enterprise architect: someone who can translate a company's business strategy into concrete solutions, design and execute an IT systems architecture blueprint to support that strategy, says Rich Pearson, senior vice president of marketing and categories at technology skills marketplace Upwork.To read this article in full or to leave a comment, please click here

Higher performance for oVirt Python SDK

Python SDK version 4.1.4 introduced support for sending asynchronous requests and HTTP pipelining.

This blog post explains those terms and will show you an example how to use the Python SDK in an asynchronous manner.

Asynchronous Requests

When using asynchronous requests, the client sends the request and defines a method (usually called callback), which should be called after the response is received but the client is not waiting for the response. In order for SDK to work in an asynchronous fashion, we introduced two new features to our SDK: multiple connections and HTTP pipelining.

These features provide significant value when the user wishes to fetch the inventory of the oVirt system. The time to fetch the inventory may be significantly decreased, too. A comparison of the synchronous and asynchronous requests folows.

Multiple Connections

Previously the SDK used only a single open connection that sequentially sent the requests according to user program and always waited for the server response for corresponding request.

In the new version of the SDK, the user can specify the number of connections the SDK should create to the server, and the specific requests created by user program uses those connections in parallel.

HTTP Continue reading