RIP: The BlackBerry Classic (and its iconic keyboard) is dead

BlackBerry isn’t giving up on phones with physical keyboards, but the company does appear to be backing off the concept. The company recently announced that it will no longer make the BlackBerry Classic. The handset was first launched in late 2014 as a replacement for the BlackBerry Bold. This may be the end of the Classic handset but it isn't the end of physical keyboards for BlackBerry. The company still produces the Passport, which features a smaller physical keyboard to create more space for the phone’s touchscreen. There's also the Android-based BlackBerry Priv, which has a slide-out keyboard.To read this article in full or to leave a comment, please click here

Study: More than 50% of SMBs were breached in the past year

A new study conducted by the Ponemon Institute and sponsored by password management provider Keeper Security analyzed the state of cybersecurity in small and medium-sized businesses (SMBs) and found that confidence in SMB security is shockingly low (just 14% of the companies surveyed rated their ability to mitigate cyber attacks as highly effective).To read this article in full or to leave a comment, please click here(Insider Story)

Study: More than 50% of SMBs were breached in the past year

A new study conducted by the Ponemon Institute and sponsored by password management provider Keeper Security analyzed the state of cybersecurity in small and medium-sized businesses (SMBs) and found that confidence in SMB security is shockingly low (just 14% of the companies surveyed rated their ability to mitigate cyber attacks as highly effective)."We've conducted many surveys on enterprise cybersecurity in the past but this unique report on SMBs sheds light on the specific challenges this group faces," said Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute. "Considering the size of the SMB market in the United States alone, this information can be useful to diminish the risk of breach to millions of businesses."To read this article in full or to leave a comment, please click here(Insider Story)

Microsoft could overtake Amazon in the cloud, Morgan Stanley survey finds

In what could be foreshadowing a momentous shift in the IaaS public cloud computing market, investment bank Morgan Stanley’s survey of CIOs found they’re more likely to use Microsoft Azure compared to Amazon Web Services in the coming years.The results of the survey are noteworthy because since the dawn of the IaaS cloud computing market Amazon Web Services has been seen as the top vendor. Morgan Stanley’s 2016 State of the CIO report shows that could be changing though. Morgan Stanley More CIOs are using Amazon Web Services over Microsoft for IaaS cloud now, but in three years more expect to use Azure over AWS. To read this article in full or to leave a comment, please click here

Intel scales back Android development

Android was once a big part of Intel's plans in mobile devices, but the company is now paying much less attention to the OS.Intel is moving away from developing Android for x86 processors used in smartphones, since it is exiting the handset market. The company's commitment to Android development for tablets, however, is also under question.The company still has a strong partnership with Google, with an Intel spokeswoman saying in email, "We continue to work with Google on supporting their OS for different product lines including Chromebooks, tablets and IOT products."To read this article in full or to leave a comment, please click here

In Situ Analysis to Push Supercomputing Efficiency

As supercomputers expand in terms of processing, storage, and network capabilities, the size and scope of simulations is also expanding outward. While this is great news for scientific progress, this naturally creates some new bottlenecks, particularly on the analysis and visualization fronts.

Historically, most large-scale simulations would dump time step and other data at defined intervals onto disk for post-processing and visualization, but as the petabyte scale of that process adds more weight, that is becoming less practical. Further, for those who know what they want to find in that data, using an in situ approach to finding the answer

In Situ Analysis to Push Supercomputing Efficiency was written by Nicole Hemsoth at The Next Platform.

CFAA anti-hacking law applies to using shared password, appeals court said

Millions of Americans willingly share passwords with family or friends to access devices or accounts, but the Ninth Circuit Court of Appeals said using a willingly shared password is covered under the anti-hacking Computer Fraud and Abuse Act (CFAA).After previously being found guilty of violating the CFAA, David Nosal appealed because he doesn't believe he actually hacked his former employer, Korn/Ferry. Instead, he gained access through passwords that other employees voluntarily shared with him after he left the company and his credentials were revoked.But in a 2-1 decision, the federal appeals court may have set a dangerous precedent that could ultimately affect millions of Americans who use a willingly shared password. Password sharing was not allowed by Korn/Ferry, so Circuit Judge Margaret McKeowin wrote (pdf) that Nosal had acted “without authorization” and, therefore, falls under the CFAA.To read this article in full or to leave a comment, please click here

CFAA anti-hacking law applies to using shared password, appeals court said

Millions of Americans willingly share passwords with family or friends to access devices or accounts, but the Ninth Circuit Court of Appeals considered using a willingly shared password to be covered under the anti-hacking Computer Fraud and Abuse Act (CFAA) law.After previously being found guilty, David Nosal appealed since he believed he should not have been found guilty of CFAA as he didn’t actually hack his former employer, Korn/Ferry. Instead, he gained access through passwords that had been voluntarily shared with him by other employees after he left the company and his credentials were revoked.But in a 2-1 decision, the federal appeals court may have set a dangerous precedent which could ultimately affect millions of Americans who use a willingly shared password. Password-sharing was not allowed by Korn/Ferry, so Circuit Judge Margaret McKeowin wrote (pdf) that Nosal had acted “without authorization” and therefore falls under the CFAA.To read this article in full or to leave a comment, please click here

DockerCon 2016 Videos: Docker, Docker, Docker track

We are excited to share the videos and slides from the Docker, Docker, Docker track at DockerCon 2016!

Note that the following sessions videos from the Docker, Docker, Docker track have already been published in previous blog post:

Check out the videos (and slides) from the remaining sessions below!

Continue reading

Machine Learning Driven Programming: A New Programming for a New World

 

If Google were created from scratch today, much of it would be learned, not coded. Around 10% of Google's 25,000 developers are proficient in ML; it should be 100% -- Jeff Dean

Like the weather, everybody complains about programming, but nobody does anything about it. That’s changing and like an unexpected storm the change comes from an unexpected direction: Machine Learning / Deep Learning.

I know, you are tired of hearing about Deep Learning. Who isn’t by now? But programming has been stuck in a rut for a very long time and it's time we do something about it.

Lots of silly little programming wars continue to be fought that decide nothing. Functions vs objects; this language vs that language; this public cloud vs that public cloud vs this private cloud vs that ‘fill in the blank’; REST vs unrest; this byte level encoding vs some different one; this framework vs that framework; this methodology vs that methodology; bare metal vs containers vs VMs vs unikernels; monoliths vs microservices vs nanoservices; eventually consistent vs transactional; mutable vs immutable; DevOps vs NoOps vs SysOps; scale-up vs scale-out; centralized vs decentralized; single threaded vs massively parallel; sync vs async. And so Continue reading

9 best technology jobs in the U.S.

The best tech jobs in 2016Image by ThinkstockComputers, smartphones, tablets, e-readers -- technology touches every aspect of our daily lives. It facilitates business, communication, travel, entertainment and healthcare, just to name a few, and the industry boasts high salaries and low unemployment rates. The U.S. Bureau of Labor Statistics predicts that technology jobs will grow at a rate of 12 percent this decade, almost twice the growth rate of jobs growth overall. Here, based on the number of projected jobs from 2014 to 2024, the median salary and the unemployment rate are the nine best technology jobs as ranked by US News & World Report. 1. Computer systems analystImage by ThinkstockTo read this article in full or to leave a comment, please click here

Finding, retaining IT talent still a struggle

What's the biggest threat to IT organizations today? According to global human resources and staffing solutions firm Randstad Technologies' 2016 Workplace Trends Report, it's the scarcity of skilled talent and an increasingly competitive landscape in which to attract and hire that talent.Of the 2,004 hiring managers and hiring decision makers surveyed between November and December 2015, 55 percent say finding the skilled talent they need is the biggest threat to meeting their revenue or business performance targets in 2016."These results validated for us what we already suspected -- there's absolutely a skills shortage, the war for talent is real, and it's having a corresponding effect on ROI and productivity and on companies' bottom line," says Bob Dickey, group president, technology and engineering, Randstad U.S.To read this article in full or to leave a comment, please click here

Spending on public cloud IT infrastructure to hit $23.3 billion

The first quarter of 2016 may have shown some softness in hyperscale cloud service provider (CSP) demand for IT infrastructure products for deployment in cloud environments — server, enterprise storage and Ethernet switches — but it's coming back with a vengeance in the second half, according to the latest forecast from IDC).The IDC Worldwide Quarterly Cloud IT Infrastructure Tracker, released yesterday, forecasts that total spending on IT infrastructure products for deployment in cloud environments will hit $37.1 billion in 2016, an increase of 15.5 percent. IDC forecasts that spending on public cloud IT infrastructure, in particular, will increase by 18.8 percent in 2016 to $23.3 billion.To read this article in full or to leave a comment, please click here

Amazon’s amazingly wasteful packaging

“Why did they come in such a big box,” asks my 14-year-old daughter, Emma, who is hopeful she won’t need them – special dental flossers for kids who wear braces – beyond summer’s end. But she needs them now and none were available at my local grocery or two pharmacies, so, I had resorted to Amazon. Two days later, a box big enough to hold a DVD player lands on our doorstep carrying two tiny packages of 24 flossers, the pair wrapped tightly together in more Amazon plastic. The box measures 15.5 by 13 by 3.5 inches.To read this article in full or to leave a comment, please click here

Network, host, and application monitoring for Amazon EC2

Microservices describes how visibility into network traffic is the key to monitoring, managing and securing applications that are composed of large numbers of communicating services running in virtual machines or containers.

Amazon Virtual Private Cloud (VPC) Flow Logs can be used to monitor network traffic:
However, there are limitations on the types of traffic that are logged, a 10-15 minute delay in accessing flow records, and costs associated with using VPC and storing the logs in CloudWatch (currently $0.50 per GB ingested, $0.03 per GB archived per month, and possible addition Data Transfer OUT charges).

In addition, collecting basic host metrics at 1 minute granularity using CloudWatch is an additional $3.50 per instance per month.

The open source Host sFlow agent offers an alternative:
  1. Lightweight, requiring minimal CPU and memory on EC2 instances.
  2. Real-time, up to the second network visibility
  3. Efficient, export of extensive set of host metrics every 10-60 seconds (configurable).
This article will demonstrate how to install Host sFlow on an Amazon Linux instance:
$ cat /etc/issue
Amazon Linux AMI release 2016.03
The following commands build the latest Continue reading

Tetris comes to Megaprocessor

The game Tetris has gone through many configurations over its 30-plus years in existence (including on an MIT building in in a pumpkin), but perhaps none is more impressive than a Cambridge, England man's version running on a giant homemade computer.The BBC reports on James Newman, who has been building his 33-foot wide, 6-foot high Megaprocessor since 2012, and has shared a series of Youtube videos about the project, including a demo of the behemoth running Tetris.To read this article in full or to leave a comment, please click here

21% off SentrySafe Fire-Safe Waterproof File Storage Box – Deal Alert

Where do you store your most important CD's, DVD's, USB drives and documents? Are they protected from fire and water damage, if that "worst-case scenario" actually happens? SentrySafe's HD4100CG storage box is UL classified with 1/2-hour fire protection and ETL verified 1/2 hour fire protection for CD's, DVD's, USB drivers and memory sticks up to 1550F. It’s also ETL verified waterproof. It measures roughly 11x8 with a 9-inch depth. It currently averages 4.5 out of 5 stars on Amazon from over 300 customers (read reviews) and its list price of $85 has been reduced by 21% to $68. See the discounted SentrySafe HD4100CG Fire-Safe Waterproof File now on Amazon.To read this article in full or to leave a comment, please click here

21% off SentrySafe Fire-Safe Waterproof File Storage Box – Deal Alert

Where do you store your most important CD's, DVD's, USB drives and documents? Are they protected from fire and water damage, if that "worst-case scenerio" actually happens? SentrySafe's HD4100CG storage box is UL classified with 1/2-hour fire protection and ETL verified 1/2 hour fire protection for CD's, DVD's, USB drivers and memory sticks up to 1550F. It’s also ETL verified waterproof. It measures roughly 11x8 with a 9-inch depth. It currently averages 4.5 out of 5 stars on Amazon from over 300 customers (read reviews) and its list price of $85 has been reduced by 21% to $68. See the discounted SentrySafe HD4100CG Fire-Safe Waterproof File now on Amazon.To read this article in full or to leave a comment, please click here