Zinc launches new tools for putting workers on blast

Zinc, a messaging platform for businesses, announced Friday that it is launching a set of new features aimed at helping desk-less workers get the most out of enterprise instant messaging. First off, the company is launching Broadcasts, a way for businesses to send employees rich notifications that block out all of the other messages and force users to close then before they can resume messaging. Administrators will be able to see which employees have seen and dismissed the notification. In addition, the company rolled out support for Organizations, which let administrators subdivide all of the Zinc users in their company into a set of smaller groups.To read this article in full or to leave a comment, please click here

Businesses eye cloud for big data deployments

As 2016 draws to a close, a new study suggests big data is growing in maturity and surging in the cloud.AtScale, which specializes in BI on Hadoop using OLAP-like cubes, recently conducted a survey of more than 2,550 big data professionals at 1,400 companies across 77 countries. The survey was conducted in conjunction with Cloudera, Hortonworks, MapR, Cognizant, Trifacta and Tableau.[ Analytics 50 winners for 2016 ] AtScale's 2016 Big Data Maturity Survey found that nearly 70 percent of respondents have been using big data for more than a year (compared with 59 percent last year). Seventy-six percent of respondents are using Hadoop today, and 73 percent say they are now using Hadoop in production (compared with 65 percent last year). Additionally, 74 percent have more than 10 Hadoop nodes and 20 percent 20 percent have more than 100 nodes.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT-based precision agriculture reduces the guesswork in farming

“Whoever makes two ears of corn, or two blades of grass to grow where only one grew before, deserves better of mankind, and does more essential service to his country than the whole race of politicians put together”.Steven Valenscin, the founder of Growers exemplifies this 400-year-old quote by Jonathan Swift.Steven grew up working on his family farm in Washington State. After serving in the US Navy, He started North Carolina’s first private soil testing laboratory and then combined his passion for soil fertility and farming to found Growers. Steven aims to simplify the complex world of agronomy into precise farm management decisions.To read this article in full or to leave a comment, please click here

New research reveals cybersecurity skills shortage impact

When it comes to the cybersecurity skills shortage, I am somewhat of a “Chicken Little,” as I’ve been screaming about this issue for the last five years or so. As an example, ESG research conducted in early 2016 indicated that 46% of organizations indicate that they have a problematic shortage of cybersecurity skills today (note: I am an ESG employee). So, ESG and other researchers have indicated that there aren’t enough infosec bodies to go around but what about those that have jobs? How is the cybersecurity skills shortage affecting them and the organizations they work for? Earlier this week, ESG and the Information Systems Security Association (ISSA) published the second report in a two-part research report series investigating these issues. This new report, titled "Through the Eyes of Cyber Security Professionals," uncovers a lot more about just how deep the cybersecurity skills shortage cuts. For example:To read this article in full or to leave a comment, please click here

New Research Reveals Cybersecurity Skills Shortage Impact

When it comes to the cybersecurity skills shortage, I am somewhat of a “Chicken Little” as I’ve been screaming about this issue for the last 5 years or so.  As an example, ESG research conducted in early 2016 indicated that 46% of organizations indicate that they have a problematic shortage of cybersecurity skills today (note: I am an ESG employee).So, ESG and other researchers have indicated that there aren’t enough infosec bodies to go around but what about those that have jobs?  How is the cybersecurity skills shortage affecting them and the organizations they work for?Earlier this week, ESG and the Information Systems Security Association (ISSA) published the second report in a two-part research report series investigating these issues.  This new report titled, Through the Eyes of Cyber Security Professionals, uncovers a lot more about just how deep the cybersecurity skills shortage cuts.  For example:To read this article in full or to leave a comment, please click here

New Research Reveals Cybersecurity Skills Shortage Impact

When it comes to the cybersecurity skills shortage, I am somewhat of a “Chicken Little” as I’ve been screaming about this issue for the last 5 years or so.  As an example, ESG research conducted in early 2016 indicated that 46% of organizations indicate that they have a problematic shortage of cybersecurity skills today (note: I am an ESG employee).So, ESG and other researchers have indicated that there aren’t enough infosec bodies to go around but what about those that have jobs?  How is the cybersecurity skills shortage affecting them and the organizations they work for?Earlier this week, ESG and the Information Systems Security Association (ISSA) published the second report in a two-part research report series investigating these issues.  This new report titled, Through the Eyes of Cyber Security Professionals, uncovers a lot more about just how deep the cybersecurity skills shortage cuts.  For example:To read this article in full or to leave a comment, please click here

Corero says its always-on DDoS defense system automatically safeguards service providers  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   The massive DDoS attack that was aimed in stages at DNS provider Dyn in October 2016 did more than grab headlines. It also served as a wake-up call to companies that provide the global Internet infrastructure, as well as downstream operators and service providers. Many experts fear this attack could prove to be a tipping point in the battle to maintain stability and availability across the Internet. Research shows the attack originated from an Internet of Things (IoT) botnet that involved an estimated 100,000 devices. Dyn experienced packet flow bursts 40 to 50 times higher than normal, and unverified reports put the magnitude of the attack in the 1.2Tbps range. The attack used multiple vectors and required a variety of techniques to fight off.To read this article in full or to leave a comment, please click here

Corero says its always-on DDoS defense system automatically safeguards service providers  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   The massive DDoS attack that was aimed in stages at DNS provider Dyn in October 2016 did more than grab headlines. It also served as a wake-up call to companies that provide the global Internet infrastructure, as well as downstream operators and service providers. Many experts fear this attack could prove to be a tipping point in the battle to maintain stability and availability across the Internet. Research shows the attack originated from an Internet of Things (IoT) botnet that involved an estimated 100,000 devices. Dyn experienced packet flow bursts 40 to 50 times higher than normal, and unverified reports put the magnitude of the attack in the 1.2Tbps range. The attack used multiple vectors and required a variety of techniques to fight off.To read this article in full or to leave a comment, please click here

Worm on the sensor: What happens when IoT data is bad?

Enterprises trying to use the internet of things already face a deluge of data and a dizzying array of ways to analyze it. But what happens if the information is wrong?Bad data is common in IoT, and though it’s hard to get an estimate of how much information streaming in from connected devices can’t be used, a lot of people are thinking about the problem.About 40 percent of all data from the edges of IoT networks is “spurious,” says Harel Kodesh, vice president of GE’s Predix software business and CTO of GE Digital. Much of that data isn’t wrong, just useless: duplicate information that employees accidently uploaded twice, or repetitive messages that idle machines send automatically. To read this article in full or to leave a comment, please click here

Worm on the sensor: What happens when IoT data is bad?

Enterprises trying to use the internet of things already face a deluge of data and a dizzying array of ways to analyze it. But what happens if the information is wrong?Bad data is common in IoT, and though it’s hard to get an estimate of how much information streaming in from connected devices can’t be used, a lot of people are thinking about the problem.About 40 percent of all data from the edges of IoT networks is “spurious,” says Harel Kodesh, vice president of GE’s Predix software business and CTO of GE Digital. Much of that data isn’t wrong, just useless: duplicate information that employees accidently uploaded twice, or repetitive messages that idle machines send automatically. To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For December 16th, 2016

Hey, it's HighScalability time:

 

This is the entire internet. In 1973! David Newbury found the map going through his dad's old papers.

If you like this sort of Stuff then please support me on Patreon.

  • 2.5 billion+: smartphones on earth; $36,000: loss making a VR game; $1 million: spent playing Game of War; 2000 terabytes: saved downloading Font Awesome's fonts per day; 14TB: new hard drives; 19: Systems We Love talks; 4,600Mbps: new 802.11ad Wi-Fi standard; 

  • Quotable Quotes:
    • Thomas Friedman: [John] Doerr immediately volunteered to start a fund that would support creation of applications for this device by third-party developers, but Jobs wasn’t interested at the time. He didn’t want outsiders messing with his elegant phone.
    • Fastly: For every problem in computer networking there is a closed-box solution that offers the correct abstraction at the wrong cost. 
    • ben stopford: The Data Dichotomy. Data systems are about exposing data. Services are about hiding it.
    • Ernie: just as Amazon invaded the CDN ecosystem with CloudFront and S3, CDNs are going to invade the cloud compute space of AWS.
    • The Attention Merchants: When not chronicling death in its many forms, Continue reading

Using Ganglia to monitor Linux services

The screen capture from the Ganglia monitoring tool shows metrics for services running on a Linux host. Monitoring Linux services describes how the open source Host sFlow agent has been extended to export standard Virtual Node metrics from services running under systemd. Ganglia already supports these standard metrics and the article Using Ganglia to monitor virtual machine pools describes the configuration steps needed to enable this feature.