Network Performance Monitoring is dead

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Step back and imagine the world of technology 10 years ago. YouTube was in its infancy, the iPhone was more than a year away from release, Blackberry was the smartest phone on the market and Twitter was barely making a peep.While the masses are now glued to their iPhones watching cat videos and pontificating 140 characters at a time, the backend infrastructure that supports all of that watching and tweeting—not to mention electronic health records, industrial sensors, e-commerce, and a myriad of other serious activities—has also undergone a massive evolution. Unfortunately, the tools tasked with monitoring and managing the performance, availability, and security of those infrastructures have not kept up with the scale of data or with the speed at which insight is required today.To read this article in full or to leave a comment, please click here

How to deal with a manager who hates you

Last week I discussed 15 ways to not get fired from your dream job and I actually got a decent amount of thank you email. One email, however, got me thinking. It was from a guy who was not getting along with his manager -- and man I’ve been there. I had this one manager who was a nightmare and I kind of went a little off the rails myself. Now when I spoke to others who had worked for him, something I should have done before I took the job, I found that not only wasn’t he a good manager, he was harsh to employees who aggressively wanted to advance, particularly if they were women.To read this article in full or to leave a comment, please click here

FCC wireless auction hits spectrum target, paving way for fast, reliable 5G

Television stations have volunteered to sell off 126MHz of "beach front" wireless spectrum to mobile carriers in an ongoing U.S. Federal Communications Commission auction, potentially bringing higher speeds and more reliable networks to customers.The 126MHz of spectrum was the highest amount anticipated by the FCC in the so-called incentive auction, agency officials said Friday. In most areas of the country, the agency will be able to auction 10 blocks of 10MHz to mobile carriers and other interested bidders.This low-band spectrum, in the 600MHz band, is highly coveted by mobile carriers because it can cover long distances and penetrate walls and other obstacles. Mobile carriers have pushed for more spectrum as their customers' network use keeps growing, and the low-band spectrum will help carriers roll out faster 5G service, supporters say.To read this article in full or to leave a comment, please click here

FCC wireless auction hits spectrum target, paving way for fast, reliable 5G

Television stations have volunteered to sell off 126MHz of "beach front" wireless spectrum to mobile carriers in an ongoing U.S. Federal Communications Commission auction, potentially bringing higher speeds and more reliable networks to customers.The 126MHz of spectrum was the highest amount anticipated by the FCC in the so-called incentive auction, agency officials said Friday. In most areas of the country, the agency will be able to auction 10 blocks of 10MHz to mobile carriers and other interested bidders.This low-band spectrum, in the 600MHz band, is highly coveted by mobile carriers because it can cover long distances and penetrate walls and other obstacles. Mobile carriers have pushed for more spectrum as their customers' network use keeps growing, and the low-band spectrum will help carriers roll out faster 5G service, supporters say.To read this article in full or to leave a comment, please click here

FBI: Ransomware threat at all-time high; how to protect company jewels

The scourge of ransomware hit new highs in 2015 and 2016 is turning out to be no bargain – particularly attacks against businesses as the payoffs are higher, the FBI said this week. Ransomware attacks are not only proliferating, they’re becoming more sophisticated, the FBI stated. +More on Network World: FBI warning puts car hacking on bigger radar screen+ “Several years ago, ransomware was normally delivered through spam e-mails, but because e-mail systems got better at filtering out spam, cyber criminals turned to spear phishing e-mails targeting specific individuals,” the FBI stated. And in newly identified instances of ransomware, some cyber criminals aren’t using e-mails at all. “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers,” said FBI Cyber Division Assistant Director James Trainor in a statement.To read this article in full or to leave a comment, please click here

FBI: Ransomware threat at all-time high; how to protect company jewels

The scourge of ransomware hit new highs in 2015 and 2016 is turning out to be no bargain – particularly attacks against businesses as the payoffs are higher, the FBI said this week.Ransomware attacks are not only proliferating, they’re becoming more sophisticated, the FBI stated.+More on Network World: FBI warning puts car hacking on bigger radar screen+“Several years ago, ransomware was normally delivered through spam e-mails, but because e-mail systems got better at filtering out spam, cyber criminals turned to spear phishing e-mails targeting specific individuals,” the FBI stated. And in newly identified instances of ransomware, some cyber criminals aren’t using e-mails at all. “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers,” said FBI Cyber Division Assistant Director James Trainor in a statement.To read this article in full or to leave a comment, please click here

5 (more) reasons to be a data scientist

"Data scientist" has already been declared this year's hottest job, and now a new report offers several more reasons to consider it as a career.For the past three years executive recruiter Burtch Works has been surveying data-science professionals about salaries and other related topics. Burtch Works defines data scientists as professionals who can work with enormous sets of unstructured data and use analytics to get meaning out of them. Published on Thursday, this year's report is based on interviews with 374 working data scientists, and it paints a pretty compelling picture. Here are five particularly attractive highlights.To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For April 29th, 2016

Hey, it's HighScalability time:


The Universe in one image (Pablo Budassi). Imagine an ancient being leaning over, desperately scrying to figure out what they have wrought.

 

If you like this sort of Stuff then please consider offering your support on Patreon.
  • 50 minutes: Facebook daily average use; 1.65 billion: Facebook Monthly active users; 25PB: size of Internet archive; 7 years: speedup of encryption adoption from the Snowden revelations; 10 million: strands of DNA Microsoft is buying to store data; 300TB: open data from CERN; 2PB: data from PanSTARRS' imaging survey; 100 billion: words translated by Google per day; 204 million: Weather Channel views in March on Facebook; 

  • Quotable Quotes:
    • @antevens: -> Describe your perfect date. ......<- YYYY-MM-DD HH:MM:SS.XXXXXX
    • @ValaAfshar: 1995: top 15 Internet companies worth $17 billion. 2015: top 15 Internet companies worth $2.4 trillion.
    • @BenedictEvans: The move to mobile took away Facebook's monopoly of social, but gave it much greater scale, engagement & revenue potential.
    • Sundar Pichai: We will move from mobile first to an AI first world.
    • Chris Sacca~ We [Google] literally could feel a scale that had never been felt before on Continue reading

Facebook’s killer quarter reinforces mobile’s dominance

If you paid attention to Apple’s quarterly report earlier this week, you could be forgiven for thinking that the mobile revolution was beginning to stall.Slipping mobile hardware sales For the first time ever, iPhone shipments slipped year over year, and the growth of global smartphone sales is slipping to about 7 percent this year, per Gartner. That’s the first time it’s dipped below double digits. Ever.Similarly, iPad sales have been going nowhere for a while now. In fact, the IDC Worldwide Quarterly Tablet Tracker recently noted a 14.7 percent decline in worldwide tablet shipments in the first quarter of 2016, noting “an overall disinterested customer base.”To read this article in full or to leave a comment, please click here

LinuxFest Northwest 2016: Enterprises and hobbyists have a picnic

Last weekend—April 23 and 24—was LinuxFest Northwest (LFNW) in Bellingham, Washington. And it was a truly excellent event.The amazing thing about LFNW is how very community-centric it is—yet still manages to draw in 2,000 attendees over the course of the two-day event.And, when I say “community-centric,” I really mean it. The exhibit hall, which is often one of the largest areas of many conferences, is small. Really small. Two short rows of booths with a scattering of booths around the edge of the room.To read this article in full or to leave a comment, please click here

IBM offers advice on how to secure blockchain in the cloud

Cloud providers hosting blockchain secure transactions technology should take additional steps to protect the records, IBM says.IBM's new framework for securely operating blockchain networks, released Friday, recommends that network operators make it easy to audit their operating environments and use optimized accelerators for hashing -- the generation of numbers from strings of text -- and the creation of digital signatures to pump up CPU performance. Along with the security guidelines, IBM announced new cloud-based blockchain services designed to meet existing regulatory and security requirements. The company has worked with security experts to create cloud services for "tamper-resistant" blockchain networks, it said.To read this article in full or to leave a comment, please click here

IBM offers advice on how to secure blockchain in the cloud

Cloud providers hosting blockchain secure transactions technology should take additional steps to protect the records, IBM says.IBM's new framework for securely operating blockchain networks, released Friday, recommends that network operators make it easy to audit their operating environments and use optimized accelerators for hashing -- the generation of numbers from strings of text -- and the creation of digital signatures to pump up CPU performance. Along with the security guidelines, IBM announced new cloud-based blockchain services designed to meet existing regulatory and security requirements. The company has worked with security experts to create cloud services for "tamper-resistant" blockchain networks, it said.To read this article in full or to leave a comment, please click here

Toy maker Maisto’s website pushed growing CryptXXX ransomware threat

Attackers are aggressively pushing a new file-encrypting ransomware program called CryptXXX by compromising websites, the latest victim being U.S. toy maker Maisto. Fortunately, there's a tool that can help users decrypt CryptXXX affected files for free.Security researchers from Malwarebytes reported Thursday that maisto.com was infected with malicious JavaScript that loaded the Angler exploit kit. This is a Web-based attack tool that installs malware on users' computers by exploiting vulnerabilities in their browser plug-ins.To read this article in full or to leave a comment, please click here

Toy maker Maisto’s website pushed growing CryptXXX ransomware threat

Attackers are aggressively pushing a new file-encrypting ransomware program called CryptXXX by compromising websites, the latest victim being U.S. toy maker Maisto. Fortunately, there's a tool that can help users decrypt CryptXXX affected files for free.Security researchers from Malwarebytes reported Thursday that maisto.com was infected with malicious JavaScript that loaded the Angler exploit kit. This is a Web-based attack tool that installs malware on users' computers by exploiting vulnerabilities in their browser plug-ins.To read this article in full or to leave a comment, please click here