Stuff The Internet Says On Scalability For April 15th, 2016

Hey, it's HighScalability time:


What happens when Beyoncé meets eCommerce? Ring the alarm.

 

If you like this sort of Stuff then please consider offering your support on Patreon.
  • $14 billion: one day of purchases on Alibaba; 47 megawatts: Microsoft's new data center space for its MegaCloud; 50%: do not speak English on Facebook; 70-80%: of all Intel servers shipped will be deployed in large scale datacenters by 2025; 1024 TB: of storage for 3D imagery currently in Google Earth; $7: WeChat average revenue per user; 1 trillion: new trees; 

  • Quotable Quotes:
    • @PicardTips: Picard management tip: Know your audience. Display strength to Klingons, logic to Vulcans, and opportunity to Ferengi.
    • Mark Burgess: Microservices cannot be a panacea. What we see clearly from cities is that they can be semantically valuable, but they can be economically expensive, scaling with superlinear cost. 
    • ethanpil: I'm crying. Remember when messaging was built on open platforms and standards like XMPP and IRC? The golden year(s?) when Google Talk worked with AIM and anyone could choose whatever client they preferred?
    • @acmurthy: @raghurwi from @Microsoft talking about scaling Hadoop YARN to 100K+ clusters. Yes, 100,000 
    • @ryanbigg: Took Continue reading

IDG Contributor Network: Almost all of IT budgets will soon be dedicated to cloud, Intel study finds

The cloud is exploding globally, with most of IT spending soon to be allocated to cloud, according to a new Intel report.The technology company predicts that virtually all IT spending (80 percent) will be on cloud in the next 16 months. One reason is that ever-increasing digital activities “are leveraging cloud computing in some way,” the company said in its press release.And it’s happening quickly, according to the survey of 1,200 IT executives in eight countries, which was conducted by market research provider Vanson Bourne on behalf of Intel.To read this article in full or to leave a comment, please click here

AMC drops ‘texting friendly’ theaters idea faster than a box-office flop

That didn’t take long.In an interview published only two days ago by Variety, the head of AMC Entertainment, Adam Aron, suggested that making his company’s theaters more “texting friendly” would be just the ticket to attract more moviegoers, particularly younger ones.As anyone other than Aron should have expected, reaction to the idea was almost universally negative.And so this morning, while many media outlets were just getting around to reporting on Aron’s texting trial balloon, AMC stuck a pin in it via Twitter: “NO TEXTING AT AMC. Won't happen. You spoke. We listened. Quickly, that idea has been sent to the cutting room floor.”To read this article in full or to leave a comment, please click here

Mark Shuttleworth: ‘Ubuntu keeps GNU/Linux relevant’

In my ongoing quest to interview the leadership of every Linux distribution on the planet (see my interviews with the heads of elementary, Fedora and openSUSE) I reached out to the top dog in the Ubuntu world: Mark Shuttleworth.This is not a hard-hitting, no-holds-barred sort of interview. It’s just a casual chat to hear about Ubuntu from the guy that started it and hopefully, in the process, get to know him a little better.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Mainframes: A technological best bet

I’ve seen a number of great technologies come and go. Some are fun for a while, as they are the first to market, such as game systems, entertainment devices and lifestyle products. But without staying ahead of the competition, they soon become irrelevant. Others simply don’t solve a big enough problem to warrant spending money to become an early adopter, such as Google Glass, Amazon’s Fire mobile phone or HD DVD. How do you know when the time is right to invest in new technology? For personal technology, if you’re like me, you’ll forever be an early adopter and likely always be first in line for the next iPhone or Android device—even if the existing one works perfectly fine. But if you’re committing thousands and thousands of dollars of your company’s limited IT resources, how do you know what you’re buying today will be still be the best technology five years from now—or even next year?To read this article in full or to leave a comment, please click here

IDG Contributor Network: Mainframes: A technological best bet

I’ve seen a number of great technologies come and go. Some are fun for a while, as they are the first to market, such as game systems, entertainment devices and lifestyle products. But without staying ahead of the competition, they soon become irrelevant. Others simply don’t solve a big enough problem to warrant spending money to become an early adopter, such as Google Glass, Amazon’s Fire mobile phone or HD DVD. How do you know when the time is right to invest in new technology? For personal technology, if you’re like me, you’ll forever be an early adopter and likely always be first in line for the next iPhone or Android device—even if the existing one works perfectly fine. But if you’re committing thousands and thousands of dollars of your company’s limited IT resources, how do you know what you’re buying today will be still be the best technology five years from now—or even next year?To read this article in full or to leave a comment, please click here

Hybrid GozNym malware targets customers of 24 financial institutions

A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen millions of dollars from customers of 24 U.S. and Canadian banks.The new threat has been dubbed GozNym by researchers from IBM X-Force because it combines the stealthy Nymaim malware and the Gozi banking Trojan.The new computer Trojan targets 22 websites that belong to banks, credit unions and e-commerce platforms based in the U.S., and two that belong to financial institutions from Canada. Business banking services appear to be a top target for GozNym's creators, according to the IBM researchers.Nymaim is what researchers call a dropper. Its purpose is to download and run other malware programs on infected computers. It is usually distributed through Web-based exploits launched from compromised websites.To read this article in full or to leave a comment, please click here

Hybrid GozNym malware targets customers of 24 financial institutions

A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen millions of dollars from customers of 24 U.S. and Canadian banks.The new threat has been dubbed GozNym by researchers from IBM X-Force because it combines the stealthy Nymaim malware and the Gozi banking Trojan.The new computer Trojan targets 22 websites that belong to banks, credit unions and e-commerce platforms based in the U.S., and two that belong to financial institutions from Canada. Business banking services appear to be a top target for GozNym's creators, according to the IBM researchers.Nymaim is what researchers call a dropper. Its purpose is to download and run other malware programs on infected computers. It is usually distributed through Web-based exploits launched from compromised websites.To read this article in full or to leave a comment, please click here

8 cyber security technologies DHS is trying to commercialize

The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products.In its fourth “Cyber Security Division Transition to Practice Technology Guide”, DHS outlines the eight technologies that range from malware analysis tools to behavior analysis platforms to randomization software that protects Windows applications.+More on Network World: IRS: Tax deadline looms, scammers get more frantic+To read this article in full or to leave a comment, please click here

8 cyber security technologies DHS is trying to commercialize

The Department of Homeland Security is publicizing eight new cyber security technologies developed under federal grants that are looking for private businesses to turn them into commercial products.In its fourth “Cyber Security Division Transition to Practice Technology Guide”, DHS outlines the eight technologies that range from malware analysis tools to behavior analysis platforms to randomization software that protects Windows applications.+More on Network World: IRS: Tax deadline looms, scammers get more frantic+To read this article in full or to leave a comment, please click here

IDG Contributor Network: 22 new concerns added to Docker security benchmark

Security has, and continues to be, an impediment to container adoption. Whether containers are less or more secure than their virtual machine counterparts is a topic of continued debate.Like any debate, there are merits to arguments on both sides with a bit of FUD interlaced. Many efforts have been undertaken within the container ecosystem to educate adopters and improve their comprehension of available tooling and security postures within platforms and offerings—be that in the form of static analysis (image scanning), runtime vulnerability detection, provenance (image signing), fine-grained authorization, cryptographic verification, etc.The breadth of need for improved security capabilities has provided an opportunity for emerging start-ups to focus specifically on the container security space and others to dedicate their company's mission to securing the Internet. Having spent time with most of the vendors in this space, I'll say that as you might expect, it's a quickly changing landscape. One thing is evident: open source communities and vendors at every layer—from hardware through operating system, container runtime, container image, host-to-cluster orchestrator, PaaS to CaaS—have significantly marshalled forward security-centered improvements in the past year.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 22 new concerns added to Docker security benchmark

Security has, and continues to be, an impediment to container adoption. Whether containers are less or more secure than their virtual machine counterparts is a topic of continued debate.Like any debate, there are merits to arguments on both sides with a bit of FUD interlaced. Many efforts have been undertaken within the container ecosystem to educate adopters and improve their comprehension of available tooling and security postures within platforms and offerings—be that in the form of static analysis (image scanning), runtime vulnerability detection, provenance (image signing), fine-grained authorization, cryptographic verification, etc.The breadth of need for improved security capabilities has provided an opportunity for emerging start-ups to focus specifically on the container security space and others to dedicate their company's mission to securing the Internet. Having spent time with most of the vendors in this space, I'll say that as you might expect, it's a quickly changing landscape. One thing is evident: open source communities and vendors at every layer—from hardware through operating system, container runtime, container image, host-to-cluster orchestrator, PaaS to CaaS—have significantly marshalled forward security-centered improvements in the past year.To read this article in full or to leave a comment, please click here