IDG Contributor Network: NCAA coaches have a lot in common with data center managers

As April brings the best college basketball teams together for the final leg of March Madness, college basketball is in full swing. With all this attention on the top teams and programs in country, there is more than one parallel between data center managers and NCAA basketball coaches.Their management techniques and job descriptions often align: optimizing lineups to ensure they have the best team on the floor in the final seconds of a big game, or stressing teamwork and cooperation during tight deadlines, outages or other time-sensitive situations. Coaches and data center managers play a similar role to ensure their team (or infrastructure) is ready to perform when it matters most.To read this article in full or to leave a comment, please click here

IDG Contributor Network: NCAA coaches have a lot in common with data center managers

As April brings the best college basketball teams together for the final leg of March Madness, college basketball is in full swing. With all this attention on the top teams and programs in country, there is more than one parallel between data center managers and NCAA basketball coaches.Their management techniques and job descriptions often align: optimizing lineups to ensure they have the best team on the floor in the final seconds of a big game, or stressing teamwork and cooperation during tight deadlines, outages or other time-sensitive situations. Coaches and data center managers play a similar role to ensure their team (or infrastructure) is ready to perform when it matters most.To read this article in full or to leave a comment, please click here

FIRST LOOK: The Samsung Galaxy S8 smartphone

Halt and (don’t) catch fireImage by SamsungThis April 21, you can lay your hands – safely this time – on Samsung’s latest flagship smartphones, the Galaxy S8 and S8 Plus. They’re both unsurprisingly impressive devices, and Samsung’s going to be hoping that they can restore the company’s fortunes in the wake of the Note 7 debacle and legal troubles at home, and in advance of Apple’s anticipated iPhone 8 or iPhone X release later this year. Check it out.To read this article in full or to leave a comment, please click here

Trojan source code leak poised to spur new online banking attacks

The source code for a new Trojan program that targets banking services has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users.The Trojan is called Nuclear Bot and first appeared for sale on underground cybercrime forums in early December for $2,500. It can steal and inject information from and into websites opened in Mozilla Firefox, Internet Explorer and Google Chrome and can also open a local proxy or hidden remote desktop service.These are all features commonly seen in banking Trojans, as they're used by attackers to bypass the security checks of online bank websites to perform fraud. For example, the proxy and remote desktop functionality allows hackers to initiate rogue transactions through the victims' browsers after they have been tricked into providing the second authentication factor.To read this article in full or to leave a comment, please click here

Trojan source code leak poised to spur new online banking attacks

The source code for a new Trojan program that targets banking services has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users.The Trojan is called Nuclear Bot and first appeared for sale on underground cybercrime forums in early December for $2,500. It can steal and inject information from and into websites opened in Mozilla Firefox, Internet Explorer and Google Chrome and can also open a local proxy or hidden remote desktop service.These are all features commonly seen in banking Trojans, as they're used by attackers to bypass the security checks of online bank websites to perform fraud. For example, the proxy and remote desktop functionality allows hackers to initiate rogue transactions through the victims' browsers after they have been tricked into providing the second authentication factor.To read this article in full or to leave a comment, please click here

Kubernetes networking 101 – Pods

Some time ago I wrote a post entitled ‘Kubernetes networking 101‘.  Looking at the published date I see that I wrote that more than 2 years ago!  That being said – I think it deserves a refresher.  The time around, Im going to split the topic into smaller posts in the hopes that I can more easily maintain them as things change.  In today’s post we’re going to cover how networking works for Kubernetes pods.  So let’s dive right in!

In my last post – I described a means in which you can quickly deploy a small Kubernetes cluster using Ansible.  I’ll be using that environment for all of the examples shown in these posts.  To refresh our memory – let’s take another quick look at the topology…

The lab consists of 5 hosts with ubuntu-1 acting as the Kubernetes master and the remaining nodes acting as Kubernetes minions (often called nodes now but I cant break the habit).  At the end of our last post we had what looked like a working Kubernetes cluster and had deployed our first service and pods to it.  Prior to deploying to the cluster we had to add some routing in the form Continue reading

Microsoft’s Surface Book and Surface Studio will ship in more markets

Microsoft has been cautious about making its Surface product line available worldwide. It tests devices in specific markets, sees how they do, and if the response is good, ships them to those areas.The company appears to have have received a strong response, in particular, to its Surface Studio, Surface Book devices and Surface Dial, which will soon be available in many Asian and European countries.The expanded availability of these devices was announced on the same day Microsoft said it would release Windows 10 Creators Update on April 11.The Surface Book with Performance Base, one of the devices that will be more broadly available, is a high-performance laptop that can also be a tablet. The screen pops out from the keyboard base to be a tablet. In a review, PC World concluded the device was powerful and easy to use, but had some design issues and was heavy.To read this article in full or to leave a comment, please click here

What it takes to become an information assurance analyst

After spending 13 years working in systems administration and network and desktop support, Simeon Holloway had reached a crossroads in his career.“I had capped out on the knowledge” required for the positions, Holloway says. “Salary-wise, I was capping out, too. I wanted to move in a different direction — something challenging and that was in high demand.” Cybersecurity was at the top of his list. In 2014, he set out on a self-guided journey toward a new career. Today, Holloway is an information assurance analyst for the Georgia Lottery in Atlanta. download What it takes to become an information assurance analyst CSO Online Getting serious about security While still a senior systems administrator for the Centers for Disease Control, Holloway kicked into overdrive, spending his evenings and weekends researching cybersecurity online. “I watched YouTube videos, joined webinars, things like that,” Holloway says. He spent four months studying for and earning his CompTIA Security+ certification, and attended a five-day Certified Ethical Hacker Bootcamp course that helped him get his CEH certification six months later. “I also built my own virtual lab — taking some of the free cyber tools available online, like BackTrack and Kali Linux, and practiced pen testing,” Continue reading

IDG Contributor Network: How to test SD-WANs

Whenever I speak with companies starting to research SD-WANs, the question about testing invariably comes up. Like probably any enterprise device, SD-WANs are filled with features. And as with any major WAN acquisition, testing those features prior to purchase is incredibly important. SD-WAN vendors have their own nuances and strengths. You need to be sure those strengths align with your environment.RELATED: SD-WAN: What it is and why you will use it one day As an edge device, there’s very little in terms of packet processing that needs to be tested in an SD-WAN node. But that doesn’t mean SD-WAN node testing isn’t important. Here are some tips for what you can look for when running your proof of concept (POC) from my buddy DC Palter, CEO at network testing simulator company Apposite Technologies, and our experiences here at SD-WAN Experts.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to test SD-WANs

Whenever I speak with companies starting to research SD-WANs, the question about testing invariably comes up. Like probably any enterprise device, SD-WANs are filled with features. And as with any major WAN acquisition, testing those features prior to purchase is incredibly important. SD-WAN vendors have their own nuances and strengths. You need to be sure those strengths align with your environment.RELATED: SD-WAN: What it is and why you will use it one day As an edge device, there’s very little in terms of packet processing that needs to be tested in an SD-WAN node. But that doesn’t mean SD-WAN node testing isn’t important. Here are some tips for what you can look for when running your proof of concept (POC) from my buddy DC Palter, CEO at network testing simulator company Apposite Technologies, and our experiences here at SD-WAN Experts.To read this article in full or to leave a comment, please click here

How to speed up your MySQL with replication to in-memory database

Original article available at https://habrahabr.ru/company/mailru/blog/323870/

I’d like to share with you an article based on my talk at Tarantool Meetup(the video is in Russian, though). It’s a short story of why Mamba, one of the biggest dating websites in the world and the largest one in Russia, started using Tarantool. Why did we decide to busy ourselves with MySQL-to-Tarantool replication?

First, we had to migrate to MySQL 5.7 at some point, but this version didn’t have HandlerSocket that was being actively used on our MySQL 5.6 servers. We even contacted the Percona team — and they confirmed MySQL 5.6 is the last version to have HandlerSocket.

Second, we gave Tarantool a try and were pleased with its performance. We compared it against Memcached as a key-value store and saw the speed double from 0.6 ms to 0.3 ms on the same hardware. In relative terms, Tarantool’s twice as fast as Memcached. In absolute terms, it’s not that cool, but still impressive.

Third, we wanted to keep the whole existing architecture. There’s a MySQL master server and its slaves — we didn’t want to change anything in this structure. Can MySQL 5.6 slaves with HandlerSocket be replaced Continue reading

Sponsored Post: ButterCMS, Aerospike, Loupe, Clubhouse, Stream, Scalyr, VividCortex, MemSQL, InMemory.Net, Zohocorp

Who's Hiring? 

  • Advertise your job here! 

Fun and Informative Events

  • Analyst Webinar: Forrester Study on Hybrid Memory NoSQL Architecture for Mission-Critical, Real-Time Systems of Engagement. Thursday, March 30, 2017 | 11 AM PT / 2 PM ET. In today’s digital economy, enterprises struggle to cost-effectively deploy customer-facing, edge-based applications with predictable performance, high uptime and reliability. A new, hybrid memory architecture (HMA) has emerged to address this challenge, providing real-time transactional analytics for applications that require speed, scale and a low total cost of ownership (TCO). Forrester recently surveyed IT decision makers to learn about the challenges they face in managing Systems of Engagement (SoE) with traditional database architectures and their adoption of an HMA. Join us as our guest speaker, Forrester Principal Analyst Noel Yuhanna, and Aerospike’s VP Marketing, Cuneyt Buyukbezci, discuss the survey results and implications for your business. Learn and register

  • Advertise your event here!

Cool Products and Services

  • InMemory.Net provides a Dot Net native in memory database for analysing large amounts of data. It runs natively on .Net, and provides a native .Net, COM & ODBC apis for integration. It also has an easy to use language for importing data, and supports Continue reading

Intel Vigorously Defends Chip Innovation Progress

With absolute dominance in datacenter and desktop compute, considerable sway in datacenter storage, a growing presence in networking, and profit margins that are the envy of the manufacturing and tech sectors alike, it is not a surprise that companies are gunning for Intel. They all talk about how Moore’s Law is dead and how that removes a significant advantage for the world’s largest – and most profitable – chip maker.

After years of this, the top brass in Intel’s Technology and Manufacturing Group as well as its former chief financial officer, who is now in charge of its manufacturing, operations,

Intel Vigorously Defends Chip Innovation Progress was written by Timothy Prickett Morgan at The Next Platform.

IBM on the state of network security: Abysmal

The state of online security is darn dreadful. At least if you look at the results from the IBM Security’s 2017 IBM X-Force Threat Intelligence Index released today which contains myriad depressing nuggets such as: The number of records compromised grew a historic 566% in 2016 from 600 million to more than 4 billion -- more than the combined total from the two previous years. In one case, a single source leaked more than 1.5 billion records [see Yahoo breach]. In the first three months of 2016, the FBI estimated cybercriminals were paid a reported $209 million via ransomware. This would put criminals on pace to make nearly $1 billion from their use of the malware just last year. In 2016, many significant breaches related to unstructured data such as email archives, business documents, intellectual property and source code were also compromised. The most popular types of malcode we observed in 2016 were Android malware, banking Trojans, ransomware offerings and DDoS-as-a-service vendors. Since DDoS tools are mostly sold as a service and not as malware per se, we will focus here on banking Trojans, Android malware and ransomware. In December 2016, a malware developer with an ongoing banking Trojan Continue reading

IBM on the state of network security: Abysmal

The state of online security is darn dreadful. At least if you look at the results from the IBM Security’s 2017 IBM X-Force Threat Intelligence Index released today which contains myriad depressing nuggets such as: The number of records compromised grew a historic 566% in 2016 from 600 million to more than 4 billion -- more than the combined total from the two previous years. In one case, a single source leaked more than 1.5 billion records [see Yahoo breach]. In the first three months of 2016, the FBI estimated cybercriminals were paid a reported $209 million via ransomware. This would put criminals on pace to make nearly $1 billion from their use of the malware just last year. In 2016, many significant breaches related to unstructured data such as email archives, business documents, intellectual property and source code were also compromised. The most popular types of malcode we observed in 2016 were Android malware, banking Trojans, ransomware offerings and DDoS-as-a-service vendors. Since DDoS tools are mostly sold as a service and not as malware per se, we will focus here on banking Trojans, Android malware and ransomware. In December 2016, a malware developer with an ongoing banking Trojan Continue reading

25% off HotLogic Mini Personal Portable Oven – Deal Alert

Hot Logic Mini averages 4.8 out of 5 stars on Amazon from over 1,800 people (87% rate a full 5 stars: read recent reviews).  A cross between a lunch bag and an oven, this personal, portable cooker is great for the office, job site, the campsite, the car, or anywhere you have an outlet. The Hot Logic Mini will prepare fresh-cooked hot meals, reheated meals or perfectly cooked prepackaged meals without overcooked edges or frozen centers. Whether you're cooking uncooked, frozen chicken breasts with fresh beans on top or reheating last night's pizza, HotLogic will cook it and hold its temperature until you're ready to eat. Its typical list price of $39.95 has been reduced, for now, to $29.95. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Amazon’s successful drone delivery test doesn’t really prove anything

Last week, Amazon Prime Air released dramatic video of a drone delivering bottles of sunscreen in a test at Amazon's MARS conference in a controlled environment at Palm Springs International Airport in California.Pretty cool stuff, even if the company has already demonstrated the ability to complete actual commercial drone deliveries in the United Kingdom. But my longstanding skepticism for the practicality of drone deliveries hasn’t diminished. More than two years ago, for example, I listed 10 reasons Amazon's drone delivery plan still won't fly.To read this article in full or to leave a comment, please click here