Stuff The Internet Says On Scalability For November 11th, 2016

Hey, it's HighScalability time:

 

Hacking recognition systems with fashion.

 

If you like this sort of Stuff then please support me on Patreon.

  • 9 teraflops: PC GPU performance for VR rendering; 1.75 million requests per second: DDoS attack from cameras; 5GB/mo: average data consumption in the US; ~59.2GB: size of Wikipedia corpus; 50%: slower LTE within the last year; 5.4 million: entries in Microsoft Concept Graph; 20 microseconds: average round-trip latencies between 250,000 machines using direct FPGA-to-FPGA messages (Microsoft); 1.09 billion: Facebook daily active mobile users; 300 minutes: soaring time for an AI controlled glider; 82ms: latency streaming game play on Azure; 

  • Quotable Quotes:
    • AORTA: Apple’s service revenue is now consistently greater than iPad and Mac revenue streams making it the number two revenue stream behind the gargantuan iPhone bucket.
    • @GeertHub: Apple R&D budget: $10 billion NASA science budget: $5 billion One explored Pluto, the other made a new keyboard.
    • Steve Jobs: tie all of our products together, so we further lock customers into our ecosystem
    • @moxie: I think these types of posts are also the inevitable result of people overestimating our organizational capacity based Continue reading

What Sort of Burst Buffer Are You?

Burst buffer technology is closely associated with HPC applications and supercomputer sites as a means of ensuring that persistent storage, typically a parallel file system, does not become a bottleneck to overall performance, specifically where checkpoints and restarts are concerned. But attention is now turning to how burst buffers might find broader use cases beyond this niche, and how they could be used for accelerating performance in other areas where the ability to handle a substantial volume of data with high speed and low latency is key.

The term burst buffer is applied to this storage technology simply because this

What Sort of Burst Buffer Are You? was written by Nicole Hemsoth at The Next Platform.

Election data models provide a lesson for cybersecurity

If you are like me, you were pretty convinced that Secretary Clinton was poised to be the President elect. Confidence in this opinion was based on reviewing numerous big data analytics models from the fivethirtyeight.com, The New York Times, Princeton, etc. The lowest percentage gave Mrs. Clinton roughly a 65 percent chance of winning on November 8. So, what happened? Every database jockey recognizes the old maxim of garbage in/garbage out. In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data. Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas. The result? A stunning election result and lots of eggs on Ivy League elitist faces.To read this article in full or to leave a comment, please click here

Election Data Models Lesson for Cybersecurity

If you are like me, you were pretty convinced that Secretary Clinton was poised to be the President elect.  Confidence in this opinion was based on reviewing numerous big data analytics models from the fivethirtyeight.com, the New York Times, Princeton, etc.  The lowest percentage gave Mrs. Clinton roughly a 65% chance of winning on November 8. So, what happened?  Every database jockey recognizes the old maxim of garbage in/garbage out.  In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data.  Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas.  The result?  A stunning election result and lots of eggs on ivy league elitist faces.To read this article in full or to leave a comment, please click here

Election Data Models Lesson for Cybersecurity

If you are like me, you were pretty convinced that Secretary Clinton was poised to be the President elect.  Confidence in this opinion was based on reviewing numerous big data analytics models from the fivethirtyeight.com, the New York Times, Princeton, etc.  The lowest percentage gave Mrs. Clinton roughly a 65% chance of winning on November 8. So, what happened?  Every database jockey recognizes the old maxim of garbage in/garbage out.  In other words, killer algorithms and all the processing power in the world are rather useless if your model is built on the back of crappy data.  Obviously, all the brainiacs building these models made a critical mistake in not gathering data from disenfranchised white voters in rural areas.  The result?  A stunning election result and lots of eggs on ivy league elitist faces.To read this article in full or to leave a comment, please click here

Docker at Tech Field Day 12

Docker will be presenting at Tech Field Day 12, and you can sit in on the sessions – at least virtually.

Tech Field Day is an opportunity for IT practitioners to hear from some of the leading technology companies, and Docker is excited to be participating again. Many thanks to Stephen Foskett and Tom Hollingsworth for cultivating a vibrant community of technical leaders and evangelists and inviting us to participate. Looking forward to meeting more of the delegates.

Our session will be Wednesday, November 16th, from 4:30 to 6:30pm Pacific. We have a full slate of topics including:

  • Docker Datacenter: What is Docker Datacenter and how can it help organizations implement their own Container as a Service platform.
  • Docker for Windows Server: An overview of the integration of Docker containers and Windows Server 2016.
  • Docker for AWS and Docker for Azure: Learn about the easiest way to deploy and manage clusters of Docker hosts on both Azure and AWS.
  • Docker Security: We’ll discuss how to implement a secure software supply chain with Docker.
  • Docker Networking: A conversation on how Docker allows developers to define container centric networks that run on top of your existing infrastructure.

Continue reading

75% off Phaiser BHS-730 Bluetooth Sweatproof Sport Earbuds, Magnetic – Deal Alert

Phaiser's BHS-730 Bluetooth Sport earbuds are both highly rated and dramatically discounted on Amazon. Averaging 4.5 out of 5 stars on Amazon from over 4,600 people (read reviews), the list price of $160 has been reduced a significant 75% to just $39.99.  The BHS-730 uses the highest quality hardware, as well as Bluetooth 4.1 and A2DP stereo transfer protocols to produce bigger bass, lighter-than-air treble, and perfect phone call clarity every time. Bullet-shaped Comply T-400 M memory foam tips provide total isolation from external noise. It's designed to withstand the toughest environments, and the earbuds are made from Aviation Grade Aluminum-Magnesium-Alloy which doesn't add weight. And a LiquipelTM Nano-Coating means it can be dropped into water and will live to see another day. The BHS-730's are magnetized, so they stick to each other and stay securely around your neck when you need to take them out of your ears. Along with the earbuds you get a generous 7 sets of ear tips, a 60-day "no questions asked" return policy, and a lifetime sweatproof warranty as well. See the discounted Phaiser BHS-730 now on Amazon. To read this article in full or to leave a comment, please click here

Surface Book i7 review: Still unique and still blazing fast

It’s always been difficult trying to find the right category for Microsoft’s hybrid tablet/laptop Surface Book. And now with the new Surface Book i7 in hand, it’s even harder to figure out just what square hole to put this round peg into.Before we get too far into the review, let me say that the Surface Book i7 is incredibly fast for a laptop in its class, offering no less than twice the performance of the original Surface Book, which itself outstripped all others in its day. Even better, it has stupidly long battery life that bests all the laptops we’ve tested.Done. Fini. Move along, right? Well, not quite. The world isn’t the same as it was a year ago and the Surface Book i7’s competitors have been hard at work too, and there are aspects of Microsoft’s hybrid device that aren’t perfect.To read this article in full or to leave a comment, please click here

Introduction to Quantum Cryptography

How Does Internet Work - We know what is networking

Quantum cryptography is a new technique of securing computer network communication channel. Existing standard crypto systems are using advanced algorithms to create key pairs which are extremely hard to inverse engineer. Quantum cryptography avoids any mathematical algorithm and uses principles of quantum physics. Quantum crypto implements a new technique of generating and exchanging crypto keys which makes it impossible for third party entities to get those keys by snooping or to create man in the middle by snooping and sending copies of original key. Keys generated in this way will automatically destroy themselves if read by third-party interferer. When generated between two sides, using quantum key distribution, secret keys will

Introduction to Quantum Cryptography

That private network on the Wi-Fi band? Won’t happen

Satellite service provider Globalstar has dropped its controversial plan to launch a wireless network in the U.S. in part of an unlicensed band that Wi-Fi and Bluetooth use.The plan had alarmed supporters of those technologies who feared the network would interfere with them and effectively privatize unlicensed spectrum. Globalstar’s TLPS (Terrestrial Low-Power Service) proposal was one of several ideas introduced in recent years to mix licensed and unlicensed uses of spectrum. While some have been ruled out, others, such as LTE-Unlicensed, are moving forward.To read this article in full or to leave a comment, please click here