Stuff The Internet Says On Scalability For March 18th, 2016


We come in peace. 5,000 years of battles mapped from Wikipedia. Maybe not.

 

If you like this sort of Stuff then please consider offering your support on Patreon.

 

  • 500 petabytes: data stored in Dropbox; 8.5 kB: amount of drum memory in an IBM 650; JavaScript: most popular programming language in the world (OMG); $20+ billion: Twitch in 2020; Two years: time it took to fill the Mediterranean; 

  • Quotable Quotes:
    • Dark Territory: The other bit of luck was that the Serbs had recently given their phone system a software upgrade. The Swiss company that sold them the software gave U.S. intelligence the security codes.
    • Alec Ross~ The principle political binary of the 20th century is left versus right. In the 21st century the principle political binary is open versus closed. The real tension both inside and outside countries are those that embrace more open economic, political and cultural systems versus those that are more closed. Looking forward to the next 20 years the states and societies that are more open are those that will compete and succeed more effectively in tomorrows industry.
    • @chrismaddern"Population size: 1. Facebook 2. China ?? 3. Continue reading

Cybersecurity Skills Shortage Impact on Cloud Computing

Look at any industry data and you’ll see a consistent trend – the march toward cloud computing continues to gain momentum.  According to ESG research, 75% of organizations are currently using public cloud services (note: I am an ESG employee).  This is dominated by the use of SaaS today but ESG research reveals that 38% of organizations use IaaS while 33% use PaaS.  The research also indicates that these numbers will continue to increase in the future.Now before you short HP and double-down on AWS, there is also a potential fly in the ointment – the global cybersecurity skills shortage.  ESG research indicates that 46% of organizations say that they have a “problematic shortage” of cybersecurity skills in 2016, up from 28% last year.  ESG also asked survey respondents to identify the area where they have the biggest cybersecurity skills shortage.  Not surprisingly, 33% say that their biggest deficiency was cloud security specialists, followed by 28% who pointed to a deficiency with network security specialists, and 27% who have a shortage of security analysts – pretty scary stuff when you think about cloud security defense along with incident detection and response for cloud-based cyber-threats. Continue reading

Deutsche Telekom to boost security offering for European enterprises

"Bring your own device" can easily turn into bring your own disaster for corporate networks, if attackers use a compromised device as a bridgehead into a secure environment.That's one of the reasons Deutsche Telekom is partnering with two security companies to offer services to smaller companies that don't have the resources to install and operate their own MDM (mobile device management) or endpoint security systems.Internet Protect Pro and Mobile Protect Pro are rebranded versions of services from Zscaler and Zimperium, respectively. The CEOs of the two companies joined Deutsche Telekom executives on stage at the Cebit tradeshow in Hanover, Germany, on Thursday to announce the deals.To read this article in full or to leave a comment, please click here

The 10 Windows group policy settings you need to get right

One of the most common methods to configure an office full of Microsoft Windows computers is with group policy. For the most part, group policies are settings pushed into a computer's registry to configure security settings and other operational behaviors. Group policies can be pushed down from Active Directory (actually, pulled down by the client) or configured locally.I've been doing Windows computer security since 1990, so I've seen a lot of group policies. In my work with customers, I scrutinize each group policy setting within each group policy object. With Windows 8.1 and Windows Server 2012 R2, for example, there are more than 3,700 settings for the operating system alone.To read this article in full or to leave a comment, please click here(Insider Story)

x86-Based Switching at Ludicrous Speed on Software Gone Wild

Imagine you want to have an IPv6-only access network and transport residual IPv4 traffic tunneled across it. Sounds great, but you need to terminate those tunnels and encapsulate/decapsulate IPv4 traffic at multi-gigabit rate.

There are plenty of reassuringly-expensive hardware solutions that can do that, or you could work with really smart people and get software-based solution that can do 20 Gbps per CPU core.

Read more ...

Vehicles ‘increasingly vulnerable’ to hacking, FBI warns

The FBI and the National Highway Traffic Safety Administration warned on Thursday that the rising use of computers in vehicles poses increasing risks of cyberattacks. The warning comes eight months after a high-profile demonstration published by Wired showed how a Jeep Cherokee could be remotely controlled over the Internet. Fiat Chrysler later recalled 1.4 million vulnerable vehicles. Manufacturers see great promise in designing vehicles with advanced networking capabilities for everything from entertainment to fleet management. But computer security experts have criticized the industry for not taking stronger steps to prevent software vulnerabilities that could have lethal consequences.To read this article in full or to leave a comment, please click here

New Stagefright exploit puts millions of Android devices at risk

Millions of Android devices are at risk yet again after researchers found a new way to exploit an older vulnerability that was previously patched by Google. NorthBit, based in Herzliya, Israel, published a paper outlining Metaphor, a nickname for a new weakness they found in Stagefright, Android's mediaserver and multimedia library.  The attack is effective against devices running Android versions 2.2 through 4.0 and 5.0 and 5.1, NorthBit said. The company said its attack works best on Google's Nexus 5 with stock ROM, and with some modifications for HTC's One, LG's G3 and Samsung's S5. The attack is an extension of other ones developed for CVE-2015-3864, a remote code execution vulnerability which has been patched twice by Google.To read this article in full or to leave a comment, please click here

Can’t have SDDC without SD-WAN: Nuage

SANTA CLARA -- SDN can’t be done on an island, according to Nuage Networks.If an enterprise is doing a software-defined datacenter, it must also do a software-defined WAN to ensure consistent policy across the IT infrastructure, said Sunil Khandekar, Nuage CEO and co-founder.“You can’t view SDDC and SD WAN as two separate puzzles,” Khandehar said during a presentation at the Open Networking Summit here. “If you do you’ve created islands of automation.”To read this article in full or to leave a comment, please click here

Can’t have SDDC without SD-WAN: Nuage

SANTA CLARA -- SDN can’t be done on an island, according to Nuage Networks.If an enterprise is doing a software-defined datacenter, it must also do a software-defined WAN to ensure consistent policy across the IT infrastructure, said Sunil Khandekar, Nuage CEO and co-founder.“You can’t view SDDC and SD WAN as two separate puzzles,” Khandehar said during a presentation at the Open Networking Summit here. “If you do you’ve created islands of automation.”To read this article in full or to leave a comment, please click here

Technology Short Take #63

Welcome to Technology Short Take #63. I’ve managed to (mostly) get back to my Friday publishing schedule, though I’m running much later in the day this time around than usual. I’ll try to correct that for the next one. In any case, here’s another collection of links and articles from around the Net on the major data center technology areas. Have fun reading!

Networking

  • At DevOps Networking Forum 2016, I had the opportunity to share a presentation on some Linux networking options. If you’d like to see the presentation, it’s available on Slideshare and Speakerdeck. If you’d like to re-create the demo environment, check out the presentation’s GitHub repository. I’m also thinking of creating a video version of the presentation with some expanded content; I’d love to hear from readers if they would find that useful.
  • Here’s another topic that came up at the recent DevOps Networking Forum: Spotify’s SDN Internet Router (SIR). Here’s a two-part series (Part 1 and Part 2) that discusses the SIR, the motivations for building it, the challenges they faced in building SIR, and the solutions to those challenges. It’s a pretty interesting read, in my opinion.
  • I recently came across a couple Continue reading

FTC warns app developers against using audio monitoring software

 The U.S. Federal Trade Commission has sent warning letters to 12 smartphone app developers for allegedly compromising users' privacy by packaging audio monitoring software into their products.The software, from an Indian company called SilverPush, allows apps to use the smartphone's microphone to listen to nearby television audio in an effort to deliver more targeted advertisements. SilverPush allows the apps to surreptitiously monitor the television viewing habits of people who downloaded apps with the software included, the FTC said Thursday."This functionality is designed to run silently in the background, even while the user is not actively using the application," the agency said in its letter to the app developers. "Using this technology, SilverPush could generate a detailed log of the television content viewed while a user’s mobile phone was turned on."To read this article in full or to leave a comment, please click here