HPE looks to move data between computers at the speed of light

Hewlett Packard Enterprise is turning to lights and lasers in thin fiber optics as a way to move data at blazing speeds between computers, replacing thicker and slower copper wires.A motherboard with an optical module, shown by HPE at its recent Discover show, could transfer data at a staggering 1.2 terabits per second. That's enough for the transfer of a full day's worth of HD video in one second.The data transfer speed is much quicker than any existing networking and connector technology based on copper wires today. It could replace copper Ethernet cables that are widely used in data centers.To read this article in full or to leave a comment, please click here

HPE looks to move data between computers at the speed of light

Hewlett Packard Enterprise is turning to lights and lasers in thin fiber optics as a way to move data at blazing speeds between computers, replacing thicker and slower copper wires.A motherboard with an optical module, shown by HPE at its recent Discover show, could transfer data at a staggering 1.2 terabits per second. That's enough for the transfer of a full day's worth of HD video in one second.The data transfer speed is much quicker than any existing networking and connector technology based on copper wires today. It could replace copper Ethernet cables that are widely used in data centers.To read this article in full or to leave a comment, please click here

Join Us And Paul Vixie On Tuesday To Discuss BIND, Root Servers, And DNS Security

CloudFlare and Gandi have been hosting a speaker series on DNS, previously bringing in the founder of DNS Paul Mockapetris and Dan Kaminsky, who uncovered one of the most critical vulnerabilities in DNS.

Our third and final talk is coming up on June 21st at 6PM PST at the Gandi office in San Francisco (live stream link will be posted on the Meetup page) and you won’t want to miss it, because our speaker is none other than Paul Vixie.

Paul wrote most of BIND Version 8 and hired the team who wrote BIND Version 9, the most widely used DNS software on the Internet. He founded ISC, home of BIND and F-root and later operated C-root.

We'll talk about alternative DNS root servers, email security and spam (Paul founded the first ever anti-spam company), and what needs to be done about DNS and security (Paul added most of BIND’s current security systems).

So come grab a beer and let's geek out about DNS one more time.

RSVP here.

Stuff The Internet Says On Scalability For June 17th, 2016

Hey, it's HighScalability time:


You've seen the Netflix Death Star microservices map. Here's a map of microbes conversing on your skin.

 

If you like this sort of Stuff then please support me on Patreon.
  • 4281: # of unread articles in my HackerNews feed; 23%: of all corporate cash is held by Microsoft, Apple, Google; 400 million: number of new servers needed by 2020; ~25,740TB: storage Backblaze adds per month; 3 bits: IBM stores per memory cell; 488 million: faked comments by China per year; 90%: revenue Spotify makes fron 30% of users; 780 million: miles of Tesla driving data; 4 days: median time to binge watch a season on Netlix; $33: cost of Nike Air Max; $50 billion: amount Apple has paid out to app developers; $270 million: amount Line makes from selling stickers; 4,600: # of trees Apple will plant aorund the Spaceship; 200 million: Google photos users; $1.8 billion: Series F round for Snapchat; 3x: capacity of the roadway with driverless cars; 138%: growth in Alibaba's cloud; 

  • Quotable Quotes:

Cavium Buys Access To Enterprise With QLogic Deal

Might doesn’t make right, but it sure does help. One of the recurring bothers about any technology upstart is that they are smaller Davids usually up against vastly larger Goliaths, usually with a broader and deeper set of technologies covering multiple markets. The best way to get traction in one market, then, seems to be to have significant footing in several markets.

This is the strategy that ARM server chip and switch ASIC maker Cavium is taking as it shells out approximately $1.36 billion to acquire network and storage switch chip maker QLogic. The combination of the two companies will

Cavium Buys Access To Enterprise With QLogic Deal was written by Timothy Prickett Morgan at The Next Platform.

Announcing Our Next Docker Hackathon!

In just a couple of days, over four thousand people will be joining us in Seattle for DockerCon 2016 to learn from top practitioners, take part in hands-on labs, engage with Docker ecosystem innovators and meet others in the Docker Community.

We realize that attendees were bummed when we didn’t announce an in-person hackathon but we have been working hard to remedy this by organizing an online hackathon for participants to hack on the newest features and products coming out of DockerCon!

Continue reading

VeloCloud’s SD-WAN solution facilitates quick expansion for The Bay Club Company

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  The Bay Club Company is an operator of private clubs that blend fitness, swimming and tennis. Today the company has 24 clubs across California, but it's growth path could potentially double that by the end of 2017. The Bay Club's expansion strategy includes acquiring smaller clubs and bringing them into the portfolio.IT director Mark Street is charged with bringing the acquired clubs into the Bay Club network as quickly as possible. That connection is essential in order for the club, from a technology point of view, to begin operating and feeling like a Bay Club. Street says it would take 60 to 90 days to bring a new club onto the traditional corporate backbone, but his goal is to be able to fully integrate a new club within a week to help The Bay Club and its members benefit from the new acquisition faster.To read this article in full or to leave a comment, please click here

VeloCloud’s SD-WAN solution facilitates quick expansion for The Bay Club Company

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  The Bay Club Company is an operator of private clubs that blend fitness, swimming and tennis. Today the company has 24 clubs across California, but it's growth path could potentially double that by the end of 2017. The Bay Club's expansion strategy includes acquiring smaller clubs and bringing them into the portfolio.IT director Mark Street is charged with bringing the acquired clubs into the Bay Club network as quickly as possible. That connection is essential in order for the club, from a technology point of view, to begin operating and feeling like a Bay Club. Street says it would take 60 to 90 days to bring a new club onto the traditional corporate backbone, but his goal is to be able to fully integrate a new club within a week to help The Bay Club and its members benefit from the new acquisition faster.To read this article in full or to leave a comment, please click here

Belgian hospitals turn to robots to receive patients

Robots have already invaded the operating room in some hospitals, but in Belgium they will soon be taking on the potentially more difficult task -- for robots, at least -- of greeting patients and giving them directions.The Citadelle regional hospital in Liège and the Damiaan general hospital in Ostend will be working with Zora Robotics to test patients' reactions to robot receptionists in the coming months.Zora already has experience programming the diminutive humanoid robot Nao to act as a chatty companion for the elderly, offering it as a form of therapy for those with dementia.Now the Belgian company is working with Nao's newer, bigger sibling, Pepper. Both were developed by French robotics company Aldebaran, now owned by Japanese Internet conglomerate SoftBank.To read this article in full or to leave a comment, please click here

Monitoring VMware NSX SpoofGuard with REST API and Perl

In some prior blogs, we demonstrated leveraging NSX REST API with Python. See prior blogs, Automating Security Group and Policy Creation with NSX REST API and Automating VMware NSX Security Rules Creation using Splunk and Some Code. In this blog, we demonstrate how NSX REST API can be used with the popular Perl programming language.

One of Perl’s key strengths is the vast amount of Perl modules/libraries available via the Comprehensive Perl Archive Network (CPAN). There is also a CPAN module included with Perl which is used to automatically download and install additional Perl modules from the CPAN repository. The example Perl code in this post demonstrates a simple program that uses a Perl REST client module/library with NSX REST API to retrieve NSX SpoofGuard information.  Continue reading

Microsoft buys Wand to improve chat capabilities

Satya Nadella wasn't kidding when he said earlier this year that he believed in using chat as a platform for computing. Microsoft just bought Wand, a chat app for iOS, to further that vision. The Wand team will be joining Bing's engineering and platform group, Corporate Vice President David Ku wrote in a post announcing the deal Thursday. The company's team members will be working primarily on Microsoft's push to enable the creation of intelligent chatbots and virtual assistants. To read this article in full or to leave a comment, please click here

China claims exascale by 2020, three years before U.S.

China has set 2020 as the date for delivering an exascale system, the next major milestone in supercomputing performance. This is three years ahead of the U.S. roadmap.This claim is from China's National University of Defense Technology, as reported Thursday by China's official news agency, Xinhua.This system will be called Tianhe-3, following a naming convention that began in 2010 when China announced its first petaflop-scale system, Tianhe-1. The first petascale system was developed in the U.S. in 2008.To read this article in full or to leave a comment, please click here

China claims exascale by 2020, three years before U.S.

China has set 2020 as the date for delivering an exascale system, the next major milestone in supercomputing performance. This is three years ahead of the U.S. roadmap.This claim is from China's National University of Defense Technology, as reported Thursday by China's official news agency, Xinhua.This system will be called Tianhe-3, following a naming convention that began in 2010 when China announced its first petaflop-scale system, Tianhe-1. The first petascale system was developed in the U.S. in 2008.To read this article in full or to leave a comment, please click here

10 major headaches Apple fixed

Improving every Apple platformImage by AppleIt was a jam-packed WWDC, and thankfully Apple gave us much-needed fixes to some of the most frustrating problems in all its major platforms.What were some of your personal headaches that Apple cured with the annnouncement of iOS 10, macOS, watchOS 3, and tvOS?To read this article in full or to leave a comment, please click here

IDG Contributor Network: How behavior online will identify you

Just half an hour of web browsing is enough time for machine learning mechanisms to uncover a person’s personality and produce identifying digital signatures, researchers say.Those traits can include conscientiousness and neuroticism, among other characteristics, the scientists from Universiti Teknologi Malaysia say in their media release published by AAAS, the science society.And it might identify the individual, too."Our research suggests a person's personality traits can be deduced by their general internet usage,” says Dr. Ikusan R. Adeyemi, a research scholar at the university.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How behavior online will identify you

Just half an hour of web browsing is enough time for machine learning mechanisms to uncover a person’s personality and produce identifying digital signatures, researchers say.Those traits can include conscientiousness and neuroticism, among other characteristics, the scientists from Universiti Teknologi Malaysia say in their media release published by AAAS, the science society.And it might identify the individual, too."Our research suggests a person's personality traits can be deduced by their general internet usage,” says Dr. Ikusan R. Adeyemi, a research scholar at the university.To read this article in full or to leave a comment, please click here