Use Apache Spark? This tool can help you tap machine learning

Finding insight in oceans of data is one of enterprises' most pressing challenges, and increasingly AI is being brought in to help. Now, a new tool for Apache Spark aims to put machine learning within closer reach.Announced on Friday, Sparkling Water 2.0 is a major new update from H2O.ai that's designed to make it easier for companies using Spark to bring machine-learning algorithms into their analyses. It's essentially an API (application programming interface) that lets Spark users tap H2O's open-source artificial-intelligence platform instead of -- or alongside -- the algorithms included in Spark's own MLlib machine-learning library.To read this article in full or to leave a comment, please click here

Cato Networks offers a new model for network security as a service  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   The advent of worker mobility and cloud computing have played havoc with the traditional network perimeter. At one time the perimeter was a well-established concept. All of our users, locations, data centers and applications were inside this zone protected by strong network security. That notion seems almost quaint today. With mobile users and data and applications in the cloud, the old perimeter has basically dissolved, leading to the development of entirely new security tools—secure web gateways, cloud access security brokers, enterprise mobility management, and so on. These new products and services augment the traditional network security stack of firewalls, anti-virus, email and web filtering, etc.To read this article in full or to leave a comment, please click here

Cato Networks offers a new model for network security as a service  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.   The advent of worker mobility and cloud computing have played havoc with the traditional network perimeter. At one time the perimeter was a well-established concept. All of our users, locations, data centers and applications were inside this zone protected by strong network security. That notion seems almost quaint today. With mobile users and data and applications in the cloud, the old perimeter has basically dissolved, leading to the development of entirely new security tools—secure web gateways, cloud access security brokers, enterprise mobility management, and so on. These new products and services augment the traditional network security stack of firewalls, anti-virus, email and web filtering, etc.To read this article in full or to leave a comment, please click here

DARPA unified space-sensor networks help keep orbiting junk from slamming into something important

DARPA recently said that it had finished integrating seven space-watching networks that will feed tons of new Earth-orbiting junk data into what the agency calls “the largest and most diverse network of space situational awareness networks ever assembled.”+More on Network World: NASA’s hot Juno Jupiter mission+DARPA’s OrbitOutlook (O2) program brings seven previously separate new space sensor networks together that could ultimately feed into the United States Space Surveillance Network (SSN), a worldwide network of 29 military radar and optical telescopes operated by the Air Force as well as NASA, the FAA and other entities that could use the information.To read this article in full or to leave a comment, please click here

DARPA unified space-sensor networks help keep orbiting junk from slamming into something important

DARPA recently said that it had finished integrating seven space-watching networks that will feed tons of new Earth-orbiting junk data into what the agency calls “the largest and most diverse network of space situational awareness networks ever assembled.”+More on Network World: NASA’s hot Juno Jupiter mission+DARPA’s OrbitOutlook (O2) program brings seven previously separate new space sensor networks together that could ultimately feed into the United States Space Surveillance Network (SSN), a worldwide network of 29 military radar and optical telescopes operated by the Air Force as well as NASA, the FAA and other entities that could use the information.To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For July 1st, 2016

Hey, it's HighScalability time:


If you can't explain it with Legos then you don't really understand it.

 

If you like this sort of Stuff then please support me on Patreon.

  • 700 trillion: more pixels in Google's Satellite Map; 9,000km: length of new undersea internet cable from Oregon to Japan; 60 terabits per second: that undersea internet cable again; 12%: global average connection speed increase; 76%: WeChat users who spend more than 100RMB ($15) per month; 5 liters: per day pay in beer for Pyramid workers;  680: number of rubber bands it takes to explode a watermelon; 1,000: new Amazon services this year; $15 billion: amount Uber has raised; 7 million: # of feather on on each bird in Piper; 5.8 million: square-feet in Tesla Gigafactory; 2x: full-duplex chip could double phone-network data capacity; 

  • Quotable Quotes:
    • @hyc_symas: A shame everyone is implementing on top of HTTP today. Contemporary "protocol design" is a sick joke.
    • @f3ew: Wehkamp lost dev and accept environments 5 days before launch. Shit happens.  48 hours to recovery. #devopsdays
    • Greg Linden: Ultimately, [serverless computing] this is a good thing, making compute more efficient by allowing more overlapping workloads Continue reading

Scrutiny of Google’s tax liabilities intensifies with Spanish raid

Spain has joined the scrum of tax authorities examining Google's accounts to see if the company has paid all that it should.A team of 35 inspectors from Agencia Tributaria, the Spanish tax authority, raided Google offices on two sites in Madrid on Thursday, according to Spanish newspaper El País. The authority requested court approval for the raid on Tuesday, the report said.They were investigating the tax liabilities of Google's subsidiaries in Spain and Ireland, through which the company channels much of its European revenue.+ ALSO  ON NETWORK WORLD Is Google pushing the cloud envelope too far? +To read this article in full or to leave a comment, please click here

Hillary Clinton’s tech agenda draws cheers from IT industry

Leading tech groups hailed the release of Hillary Clinton's agenda for promoting technology and innovation, praising the presumptive Democratic presidential nominee's focus on issues like cybersecurity and her acknowledgement that the industry is vital to the nation's economic prosperity.[ Related: Obama, Zuckerberg push better broadband, innovative startups ]Clinton's "initiative on technology and innovation" comes as the most detailed elucidation of a technology platform from a major presidential candidate this election season, a multi-pronged plan that touches on issues like promoting science and technical education, building out broadband infrastructure and defending net neutrality.To read this article in full or to leave a comment, please click here

Study reveals security gap in big data projects

Ideally, the ultimate output of big-data analysis can provide a company with a valuable competitive advantage. But those results aren’t getting much additional security, according to an IDG Enterprise study of big-data initiatives.To read this article in full or to leave a comment, please click here(Insider Story)

Big Brother is listening as well as watching

In a world of ubiquitous security cameras, most people know by now that some form of Big Brother – government or private – is watching them. But they are less likely to know that in some areas, he is also listening.While it is not yet widespread, audio surveillance is increasingly being used on parts of urban mass transit systems.That is the bad news, in the view of privacy advocates. But the good news is that public awareness can, at least in some cases, curtail it.This past week, following revelations that New Jersey Transit didn’t have policies governing storage and who had access to data from audio surveillance on some of its light-rail trains, the agency ended the program.To read this article in full or to leave a comment, please click here

Zenly + Docker 1.12 + 1M teenagers

Zenly is a mobile app that helps you locate your friends in real time. Recently the Zenly app reached the million registered users mark — and half of them signed up in the last three months.

In the words of Steeve Morin, VP Engineering of Zenly, “Behold, the power of teenagers.”

zenlyThe rapid growth in users, traffic and data points generated posed new challenges for the Zenly team.

As one of the early users of Docker 1.12, the Zenly team shared their experience during the keynote presentation at DockerCon US 2016 in Seattle.

Here is the story as told by Steeve, JB Daildo and Corentin Kerisit:


 

The sudden growth of traffic has been both amazing and a real challenge to scale, not on our production stack, but our analytics pipeline as our app started to generate half a billion events a day and counting. Our analytics stack was starting to experience failures due to scaling issues, the costs were rising with how we were running the cluster in the cloud and our 6 person team was challenged in supporting it while also building, scaling and supporting the Zenly app.

What we wanted was to Continue reading

Real-time BGP route analytics

The diagram shows how sFlow-RT real-time analytics software can combine BGP route information and sFlow telemetry to generate route analytics. Merging sFlow traffic with BGP route data significantly enhances both data streams:
  1. sFlow real-time traffic data identifies active BGP routes
  2. BGP path attributes are available in flow definitions
The following example demonstrates how to configure sFlow / BGP route analytics. In this example, the switch IP address is 10.0.0.253, the router IP address is 10.0.0.254, and the sFlow-RT address is 10.0.0.162.

Setup

First download sFlow-RT. Next create a configuration file, bgp.js, in the sFlow-RT home directory with the following contents:
var reflectorIP  = '10.0.0.254';
var myAS = '65162';
var myID = '10.0.0.162';
var sFlowAgentIP = '10.0.0.253';

// allow BGP connection from reflectorIP
bgpAddNeighbor(reflectorIP,myAS,myID);

// direct sFlow from sFlowAgentIP to reflectorIP routing table
// calculate a 60 second moving average byte rate for each route
bgpAddSource(sFlowAgentIP,reflectorIP,60,'bytes');
The following sFlow-RT System Properties load the configuration file and enable BGP:
  • script.file=bgp.js
  • bgp.start=yes
Start sFlow-RT and the following log lines will confirm that BGP has been enabled and configured:
 Continue reading

Brown University offers Ivy League CISO creds

Freshly minted CISOs as well as other mid-career professionals with a need for a broad grounding in cybersecurity can get an advanced degree in the topic through a new program at Brown University. The Executive Master in Cybersecurity set to launch in October is a 16-month program to instruct students in technology, law and policy, human behavior, and leadership-skills development. “What the industry is crying out for is interdisciplinary training,” says Alan Usas, the program director. The idea is to prepare cybersecurity leaders who not only understand the technical needs of protecting data and privacy but who can also talk effectively to the boards of directors about these issues in a way that nets results for security and for business goals, he says.To read this article in full or to leave a comment, please click here

Brown University offers Ivy League CISO creds

Freshly minted CISOs as well as other mid-career professionals with a need for a broad grounding in cybersecurity can get an advanced degree in the topic through a new program at Brown University.The Executive Master in Cybersecurity set to launch in October is a 16-month program to instruct students in technology, law and policy, human behavior, and leadership-skills development. “What the industry is crying out for is interdisciplinary training,” says Alan Usas, the program director.The idea is to prepare cybersecurity leaders who not only understand the technical needs of protecting data and privacy but who can also talk effectively to the boards of directors about these issues in a way that nets results for security and for business goals, he says.To read this article in full or to leave a comment, please click here

Hackers are coming for your healthcare records — here’s why

Data stolen from a bank quickly becomes useless once the breach is discovered and passcodes are changed. But data from the healthcare industry, which includes both personal identities and medical histories, can live a lifetime.Cyberattacks will cost hospitals more than $305 billion over the next five years and one in 13 patients will have their data compromised by a hack, according to industry consultancy Accenture. Accenture And a study by the Brookings Institution predicts that one in four data breaches this year will hit the healthcare industry.To read this article in full or to leave a comment, please click here

Hackers are coming for your healthcare records — here’s why

Data stolen from a bank quickly becomes useless once the breach is discovered and passcodes are changed. But data from the healthcare industry, which includes both personal identities and medical histories, can live a lifetime.Cyberattacks will cost hospitals more than $305 billion over the next five years and one in 13 patients will have their data compromised by a hack, according to industry consultancy Accenture. Accenture And a study by the Brookings Institution predicts that one in four data breaches this year will hit the healthcare industry.To read this article in full or to leave a comment, please click here