How an online real estate company optimized its Hadoop clusters

San Francisco-based online residential real estate company Trulia lives and dies by data. To compete successfully in today's housing market, tt must deliver the most up-to-date real estate information available to its customers. But until recently, doing so was a daily struggle.Acquired by online real estate database company Zillow in 2014 for $3.5 billion, Trulia is one of the largest online residential real estate marketplaces around, with more than 55 million unique site visitors each month.Hadoop at heart With so much data to store and process, the company adopted Hadoop in 2008 and it has since become the heart of Trulia's data infrastructure. The company has expanded usage of Hadoop to an entire data engineering department consisting of several teams using multiple clusters. This allows Trulia to deliver personalized recommendations to customers based on sophisticated data science models that analyze more than a terabyte of data daily. That data is drawn from new listings, public records and user behavior, all of which is then cross-referenced with search criteria to alert customers quickly when new properties become available.To read this article in full or to leave a comment, please click here

Apple to pay $24.9 million to settle Siri patent lawsuit

Apple has agreed to pay US$24.9 million to a patent holding company to resolve a 5-year-old lawsuit accusing Siri of infringing one of its patents.Apple will pay the money to Marathon Patent Group, the parent company of Texas firm Dynamic Advances, which held an exclusive license to a 2007 patent covering natural language user interfaces for enterprise databases. Marathon reported the settlement in a filing with the U.S. Securities and Exchange Commission Tuesday.To read this article in full or to leave a comment, please click here

Using the IoT for good: Beacon of Hope project to help fight human trafficking

With their Beacon of Hope IoT app, twin sisters and social entrepreneurs America and Penelope Lopez, are taking up the fight against one of the most revolting crimes on the planet—human trafficking. In 2013, the United Nations reported that 20.9 million people have been pushed into forced labor and sex trades around the world. Ranked in the top three of fastest-growing crime categories, the same study reported modern slavery has become a booming $32 billion illicit trade. Recognizing the importance of the issue, the Lopez sisters created the Beacon of Hope project. It is the latest in their string of hackathon successes that includes an anti-bullying app and a police bodycam with facial recognition. This project began at the ground zero of hackathons, the AT&T hackathon at the Consumer Electronics Show in Las Vegas, which draws hackers like the Kentucky Derby draws gamblers.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fonteva to enable Salesforce app development. Doesn’t Salesforce already do that?

Salesforce is a juggernaut.In the 10 or so years since it was founded, the company has pretty much single-handedly changed the face of the software industry. Concepts such as SaaS, the cloud and enterprise application marketplaces were, if not invented, at least popularized by Salesforce.In the past decade, Salesforce has gone from being a very interesting and agile CRM vendor to being a provider of pretty much an entire enterprise software stack—from applications at the top end through to development platforms for the creation of applications. Indeed, the fact that health IT vendor Veeva was able to undertake an IPO based on a product built entirely on Salesforce's platform is testimony to what Salesforce has achieved.To read this article in full or to leave a comment, please click here

New point-of-sale malware Multigrain steals card data over DNS

Security researchers have found a new memory-scraping malware program that steals payment card data from point-of-sale (PoS) terminals and sends it back to attackers using the Domain Name System (DNS).Dubbed Multigrain, the threat is part of a family of malware programs known as NewPosThings, with which it shares some code. However, this variant was designed to target specific environments.That's because unlike other PoS malware programs that look for card data in the memory of many processes, Multigrain targets a single process called multi.exe that's associated with a popular back-end card authorization and PoS server. If this process is not running on the compromised machine, the infection routine exists and the malware deletes itself.To read this article in full or to leave a comment, please click here

New point-of-sale malware Multigrain steals card data over DNS

Security researchers have found a new memory-scraping malware program that steals payment card data from point-of-sale (PoS) terminals and sends it back to attackers using the Domain Name System (DNS).Dubbed Multigrain, the threat is part of a family of malware programs known as NewPosThings, with which it shares some code. However, this variant was designed to target specific environments.That's because unlike other PoS malware programs that look for card data in the memory of many processes, Multigrain targets a single process called multi.exe that's associated with a popular back-end card authorization and PoS server. If this process is not running on the compromised machine, the infection routine exists and the malware deletes itself.To read this article in full or to leave a comment, please click here

How Twitter Handles 3,000 Images Per Second

Today Twitter is creating and persisting 3,000 (200 GB) images per second. Even better, in 2015 Twitter was able to save $6 million due to improved media storage policies.

It was not always so. Twitter in 2012 was primarily text based. A Hogwarts without all the cool moving pictures hanging on the wall. It’s now 2016 and Twitter has moved into to a media rich future. Twitter has made the transition through the development of a new Media Platform capable of supporting photos with previews, multi-photos, gifs, vines, and inline video.

Henna Kermani, a Software Development Engineer at Twitter, tells the story of the Media Platform in an interesting talk she gave at Mobile @Scale London: 3,000 images per second. The talk focuses primarily on the image pipeline, but she says most of the details also apply to the other forms of media as well.

Some of the most interesting lessons from the talk:

  • Doing the simplest thing that can possibly work can really screw you. The simple method of uploading a tweet with an image as an all or nothing operation was a form of lock-in. It didn’t scale well, especially on poor networks, which made it Continue reading

Illumio’s cyber assessment program helps find new attack surfaces ASAP

Earlier this week, I wrote a post discussing how visibility can be used to reverse the security asymmetry challenge. On Tuesday, hot security startup Illumio proved my point by announcing a cyber assessment program that uses granular visibility to identify new attack surfaces.Illumio’s Attack Surface Assessment Program (ASAP) was led by Nathaniel Gleicher, former Director of Cybersecurity Policy for the National Security Council at the White House and now the Head of Cybersecurity Strategy for Illumio. The White House obviously has the strictest of security policies, giving Gleicher the necessary level of paranoia to put together a program like this. Now, any company can benefit from his experience.To read this article in full or to leave a comment, please click here

Illumio’s cyber assessment program helps find new attack surfaces ASAP

Earlier this week, I wrote a post discussing how visibility can be used to reverse the security asymmetry challenge. On Tuesday, hot security startup Illumio proved my point by announcing a cyber assessment program that uses granular visibility to identify new attack surfaces.Illumio’s Attack Surface Assessment Program (ASAP) was led by Nathaniel Gleicher, former Director of Cybersecurity Policy for the National Security Council at the White House and now the Head of Cybersecurity Strategy for Illumio. The White House obviously has the strictest of security policies, giving Gleicher the necessary level of paranoia to put together a program like this. Now, any company can benefit from his experience.To read this article in full or to leave a comment, please click here

Illumio’s cyber assessment program helps find new attack surfaces ASAP

Earlier this week, I wrote a post discussing how visibility can be used to reverse the security asymmetry challenge. On Tuesday, hot security startup Illumio proved my point by announcing a cyber assessment program that uses granular visibility to identify new attack surfaces.Illumio’s Attack Surface Assessment Program (ASAP) was led by Nathaniel Gleicher, former Director of Cybersecurity Policy for the National Security Council at the White House and now the Head of Cybersecurity Strategy for Illumio. The White House obviously has the strictest of security policies, giving Gleicher the necessary level of paranoia to put together a program like this. Now, any company can benefit from his experience.To read this article in full or to leave a comment, please click here

Difference between in-store, online prices probably not what you think

Sure, online shopping is generally more convenient than going to the store for your purchases, but prices are pretty much the same three quarters of the time, according to a new MIT study.MIT Sloan Professor Alberto Cavallo cleverly went the crowdsourcing route to gather some of his data by having 370 recruits use a scanning app to check barcodes for prices on a random set of 10 to 50 products in physical stores in 10 countries. That information, along with online price data at multi-channel retailers (so no Amazon or eBay), was fed into the MIT Billion Prices Project database for analysis. To read this article in full or to leave a comment, please click here

Automating Change With Help From Fibonacci

FibonacciShell

A few recent conversations that I’ve seen and had with professionals about automation have been very enlightening. It all started with a post on StackExchange about an unsuspecting user that tried to automate a cleanup process with Ansible and accidentally erased the entire server farm at a service provider. The post was later determined to be a viral marketing hoax but was quite believable to the community because of the power of automation to make bad ideas spread very quickly.

Better The Devil You Know

Everyone in networking has been in a place where they’ve typed in something they shouldn’t have. Whether you removed the management network you were using to access the switch or created an access list that denied packets that locked you out of something. Or perhaps you typed an errant debug command that forced you to drive an hour to reboot a switch that was no longer responding. All of these things seem to happen to people as part of the learning process.

But how many times have we typed something in to create a change and found that it broke more than we expected? Like changing a native VLAN on a trunk and bringing down Continue reading

A Baker’s Dozen, 2015 Regional View

Our Baker’s Dozen blog focuses on the top global Internet providers as measured by quantity of transited IP space.  If your market is not truly global, it pays to consider your provider options by region, country or even city.  Our Internet Intelligence product suite is designed around helping our customers understand the structure, performance and reliability of the Internet regardless of their geographic scope or potential providers.  In other words, there is a lot more to consider than just a top global list by a single metric.  To explore this topic further, we’ll look one geographic level deeper into the Internet Intelligence – Transit rankings for the top-5 providers by continent.  As we’ll see below, these can vary considerably from our top global list and even include other players with a more regional focus.  Let’s take a quick look.

 


AF-f

At the end of 2015, Cogent (AS174) was ranked  as the #4 global provider by our metric, but it closed the year as #1 in Africa, opening up a wide margin over Level 3 (AS3356), its nearest competitor on the continent.  Cogent started transiting a sizeable number of new prefixes from South Africa’s Continue reading

First Guest Speaker in Building Next-Generation Data Center Course

When I started thinking about my first online course, I decided to create something special – it should be way more than me talking about cool new technologies and designs – and the guest speakers are a crucial part of that experience.

The first guest speaker is one of the gurus of network design and complexity, wrote numerous books on the topic, and recently worked on a hardware-independent network operating system.

Read more ...