Take a look at Boston’s runaway train barreling through two stops without a driver

The Massachusetts Bay Transportation Authority (MBTA) has released surveillance camera video of an unintentionally driverless Red Line train zipping through two commuter stops in December, a potential catastrophe triggered by the operator’s decision to wrap a rubber cord around the vehicle’s accelerator before stepping out to address a signal problem. The train left without him and travelled through a total of four stations before stopping after power was cut to the third rail.While the episode itself was dramatic, to say to the least, the video – even this edited version from WCVB Channel 5 TV -- is underwhelming. Even the people on the platforms didn’t seem to realize anything was wrong.To read this article in full or to leave a comment, please click here

How Microsoft keeps the bad guys out of Azure

Microsoft has published its latest Security Intelligence Report (SIR), which it does twice a year, covering security issues for the prior six months. This latest edition covers the second half of 2015, analyzing the threat landscape of exploits, vulnerabilities and malware using data from Internet services and over 600 million computers worldwide.It is a massive effort, with dozens of Microsoft staff from different groups contributing. For the first time, they looked at not only PC malware but threats to its Azure cloud service as well, which the company says "reveals how we are leveraging an intelligent security graph to inform how we protect endpoints, better detect attacks and accelerate our response, to help protect our customers."To read this article in full or to leave a comment, please click here

How Microsoft keeps the bad guys out of Azure

Microsoft has published its latest Security Intelligence Report (SIR), which it does twice a year, covering security issues for the prior six months. This latest edition covers the second half of 2015, analyzing the threat landscape of exploits, vulnerabilities and malware using data from Internet services and over 600 million computers worldwide.It is a massive effort, with dozens of Microsoft staff from different groups contributing. For the first time, they looked at not only PC malware but threats to its Azure cloud service as well, which the company says "reveals how we are leveraging an intelligent security graph to inform how we protect endpoints, better detect attacks and accelerate our response, to help protect our customers."To read this article in full or to leave a comment, please click here

That massive reported ‘data breach’ was just hype, Mail.ru says

Hold Security made quite a splash in the security world on Wednesday when it claimed to have recovered 272 million stolen email credentials from a much larger trove, but on Friday the email provider most strongly affected called the report an effort to create media hype.Hold suggested that nearly 57 million of the stolen email accounts uncovered were from the popular Russian service Mail.ru. But more than 99.9 percent of the Mail.ru account credentials in a sample examined by the provider are invalid, the Russian company said.To read this article in full or to leave a comment, please click here

That massive reported ‘data breach’ was just hype, Mail.ru says

Hold Security made quite a splash in the security world on Wednesday when it claimed to have recovered 272 million stolen email credentials from a much larger trove, but on Friday the email provider most strongly affected called the report an effort to create media hype.Hold suggested that nearly 57 million of the stolen email accounts uncovered were from the popular Russian service Mail.ru. But more than 99.9 percent of the Mail.ru account credentials in a sample examined by the provider are invalid, the Russian company said.To read this article in full or to leave a comment, please click here

EMC Shoots For Explosive Performance With Isilon Nitro

Storage giant EMC, soon to be part of the Dell Technologies conglomerate, declared that this would be the year of all flash for the company when it launched its DSSD D5 arrays back in February. It was not kidding, and as a surprise at this weeks EMC World 2016 conference, the company gave a sneak peek at a future all-flash version of its Isilon storage arrays, which are also aimed at high performance jobs but which are designed to scale capacity well beyond that of the DSSD.

The DSSD D5 is an impressive beast, packing 100 TB of usable

EMC Shoots For Explosive Performance With Isilon Nitro was written by Timothy Prickett Morgan at The Next Platform.

What does the future of the Apache Software Foundation hold?

The Apache Software Foundation (ASF) will hold its second annual Apache: Big Data North America conference in Vancouver, BC, starting Monday next week. Alongside keynotes from companies like Netflix and IBM, and panels on a huge range of topics — from security and storage to managing distributed systems and machine learning — the foundation will also host a forum that looks to cut to the heart of its community model and how private companies should be involved in its work. On Wednesday afternoon, Jim Jagielski, senior director in the Tech Fellows program at Capital One and one of the developers and founders of the Apache Software Foundation (ASF),  and John Mertic director of Program Management for ODPi and Open Mainframe Project at The Linux Foundation, will host a panel dubbed ODPi and ASF Collaboration: Ask Us Anything!.To read this article in full or to leave a comment, please click here

The Oracle-Google trial over Android starts Monday. Here’s what you need to know

Oracle’s legal fight with Google over its use of Java in Android goes to a jury trial for the second time next week, and the stakes are even higher than when the two sides met in court four years ago.Oracle wants a whopping $8.8 billion in damages from Google, much more than the first time around, making it one of the biggest copyright cases ever, and it's anyone’s guess which way the jury will go.MORE: 10 mobile startups to watch The timing is awkward for Google – its I/O conference comes smack in the middle of the trial -- and developers at that event should pay attention to the outcome. If Oracle wins, Google could be forced to make changes to the way people build apps for Android, or else swallow a royalty fee for continued use of Oracle's technology.To read this article in full or to leave a comment, please click here

Lenovo patches serious flaw in pre-installed support tool

Lenovo has fixed a vulnerability in its Lenovo Solution Center support tool that could allow attackers to execute code with system privileges and take over computers.The Lenovo Solution Center (LSC) is an application that comes pre-installed on many Lenovo laptops and desktops. It allows users to check their system’s virus and firewall status, update their software, perform backups, check battery health, get registration and warranty information and run hardware tests.The tool has two components: a graphical user interface and a service called LSCTaskService that runs in the background at all times even if the user interface is not started.To read this article in full or to leave a comment, please click here

Lenovo patches serious flaw in pre-installed support tool

Lenovo has fixed a vulnerability in its Lenovo Solution Center support tool that could allow attackers to execute code with system privileges and take over computers.The Lenovo Solution Center (LSC) is an application that comes pre-installed on many Lenovo laptops and desktops. It allows users to check their system’s virus and firewall status, update their software, perform backups, check battery health, get registration and warranty information and run hardware tests.The tool has two components: a graphical user interface and a service called LSCTaskService that runs in the background at all times even if the user interface is not started.To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For May 6th, 2016

Hey, it's HighScalability time:


Who wants in on the over? We are not alone if the probability a habitable zone planet develops a technological species is larger than 10-24.

 

If you like this sort of Stuff then please support me on Patreon.
  • 100,000+: bare metal servers run by Twitter; 10 billion: Snapchat videos delivered daily; $2.57 billion: AWS fourth quarter revenues; 40 light years: potentially habitable planets; 1700: seed banks around the world; 560x: throughput after SSD optimization; 12: data science algorithms; $2.8 billion: new value of Pivotal’s Cloud Foundry;  

  • Quotable Quotes:
    • @skap5: Pied Piper's product is its stock and anything that makes its price go up! #SiliconValley
    • Seth Godin: It pays to have big dreams but low overhead. 
    • Craig Venter~ Our knowledge of the genome hasn't changed a lot since 2003, but it's about to start changing rapidly. One of the key things for understanding the genome is to get very large numbers of genomes so we can understand out of the 6.2 billion or so letters of genetic code the less than 3% that we have different amongst the entire human population. We Continue reading

IDG Contributor Network: Protecting the rainforests with IoT and recycled phones

“Timber!” That’s what you hear from a lumberjack in movies before a tree comes crashing down.But that’s not what you’ll hear in rainforests while one tree after another is cut down. Why? The logging is often illegal, and the last thing the culprits want is to attract attention.Rainforests once covered 14 percent of the earth's land surface. Now they cover just 6 percent, and experts estimate that the last remaining rainforests could be consumed in less than 40 years. (The Amazon rainforest itself produces 20 percent of the world’s oxygen.)Worst still, wildlife and local cultures that depend on the rainforest ecosystem are being wiped as well. Local authorities and indigenous tribes are fighting back against the illegally clearing of the rainforest for commercial farming. This tussle between poor villagers and well-funded commercial logging interests is pretty one-sided, but IoT is helping to level the playing field a little.To read this article in full or to leave a comment, please click here

Virtual environments make it easy to deploy deception technology

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Cyber attackers use deception to try to get inside your network by doing everything from spoofing email addresses in spear phishing attacks to hiding malware on legitimate websites.  So, if deception is standard operating procedure for the bad guys, perhaps it's time to fight back with some deception of your own.  In fact, Gartner says it's a good complement to your existing security infrastructure.Deception technology designed to lure and trap malicious actors has been around since at least 1999 when Lance Spitzner, founder of the Honeynet Project, published a paper on how to build a honeypot. Early honeynets were pretty resource intensive and they had to be maintained to ensure the honeynet wasn't turned against the host organization. Since then, the advent of virtual machines has helped ease the deployment and use of deception technology.To read this article in full or to leave a comment, please click here

Virtual environments make it easy to deploy deception technology

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  Cyber attackers use deception to try to get inside your network by doing everything from spoofing email addresses in spear phishing attacks to hiding malware on legitimate websites.  So, if deception is standard operating procedure for the bad guys, perhaps it's time to fight back with some deception of your own.  In fact, Gartner says it's a good complement to your existing security infrastructure.Deception technology designed to lure and trap malicious actors has been around since at least 1999 when Lance Spitzner, founder of the Honeynet Project, published a paper on how to build a honeypot. Early honeynets were pretty resource intensive and they had to be maintained to ensure the honeynet wasn't turned against the host organization. Since then, the advent of virtual machines has helped ease the deployment and use of deception technology.To read this article in full or to leave a comment, please click here