Stuff The Internet Says On Scalability For April 8th, 2016

Hey, it's HighScalability time:


Time for a little drone envy. Sea Hunter, 132 foot autonomous surface vessel.

 

If you like this sort of Stuff then please consider offering your support on Patreon.
  • 12,000: base pairs in the largest biological circuit ever built; 3x: places GitHub data is now stored; 3.5x: Slacks daily user growth this year; 56 million: events/sec processed through BigTable; 100 Billion: requests per day served by Google App Engine

  • Quotable Quotes:
    • Horst724: #PanamaPapers is the biggest secret data leak in history. It involves 2,6 TB of data, a total of 11.5 million documents that have been leaked by an anonymous insider.
    • Amazon cloud has 1 million users and is near $10 billion in annual sales: Today, AWS offers more than 70 services for compute, storage, databases, analytics, mobile, Internet of Things, and enterprise applications. We also offer 33 Availability Zones across 12 geographic regions worldwide, with another five regions and 11 Availability Zones.
    • @CodeWisdom: "Give someone a program, you frustrate them for a day; teach them how to program, you frustrate them for a lifetime." - David Leinweber
    • @peterseibel: OH: it is Continue reading

Karamba brings cybersecurity to the automotive market for connected cars  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  If you happen to be driving around California roads this summer, don't be surprised if a car with no driver pulls up next to you at an intersection. Google expects to be road-testing its prototype of a driverless car soon. If all goes well with this and other tests, BI Intelligence believes there could be 10 million cars with self-driving features on our roads by 2020.Fully autonomous cars – those that don't need any interaction at all from a driver, like Google's – still seem futuristic to most of us, but there are plenty of semi-autonomous cars sharing our roads today. This latter category includes all sorts of features to increase safety and convenience, everything from lane-keeping assist systems designed to keep a car in an open lane, to adaptive cruise control that matches the car's speed to that of the vehicle ahead,To read this article in full or to leave a comment, please click here

Karamba brings cybersecurity to the automotive market for connected cars  

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  If you happen to be driving around California roads this summer, don't be surprised if a car with no driver pulls up next to you at an intersection. Google expects to be road-testing its prototype of a driverless car soon. If all goes well with this and other tests, BI Intelligence believes there could be 10 million cars with self-driving features on our roads by 2020.Fully autonomous cars – those that don't need any interaction at all from a driver, like Google's – still seem futuristic to most of us, but there are plenty of semi-autonomous cars sharing our roads today. This latter category includes all sorts of features to increase safety and convenience, everything from lane-keeping assist systems designed to keep a car in an open lane, to adaptive cruise control that matches the car's speed to that of the vehicle ahead,To read this article in full or to leave a comment, please click here

10 best cloud SLA practices

Getting and enforcing a service level agreement is paramount when employing cloud services – that was the chief conclusion reached in a report out this week by the federal watchdogs at the Government Accountability Office.“Purchasing IT services through a provider enables agencies to avoid paying for all the assets such as hardware, software and networks that would typically be needed to provide such services.+More on Network World: What network technology is going to shake up your WAN?+This approach offers federal agencies a means to buy the services faster and possibly cheaper than through the traditional methods they have used. To take advantage of these potential benefits, agencies have reported that they plan to spend more than $2 billion on cloud computing services in fiscal year 2016,” the GAO stated.To read this article in full or to leave a comment, please click here

10 best cloud SLA practices

Getting and enforcing a service level agreement is paramount when employing cloud services – that was the chief conclusion reached in a report out this week by the federal watchdogs at the Government Accountability Office.“Purchasing IT services through a provider enables agencies to avoid paying for all the assets such as hardware, software and networks that would typically be needed to provide such services.+More on Network World: What network technology is going to shake up your WAN?+This approach offers federal agencies a means to buy the services faster and possibly cheaper than through the traditional methods they have used. To take advantage of these potential benefits, agencies have reported that they plan to spend more than $2 billion on cloud computing services in fiscal year 2016,” the GAO stated.To read this article in full or to leave a comment, please click here

10 best cloud SLA practices

Getting and enforcing a service level agreement is paramount when employing cloud services – that was the chief conclusion reached in a report out this week by the federal watchdogs at the Government Accountability Office.“Purchasing IT services through a provider enables agencies to avoid paying for all the assets such as hardware, software and networks that would typically be needed to provide such services.+More on Network World: What network technology is going to shake up your WAN?+This approach offers federal agencies a means to buy the services faster and possibly cheaper than through the traditional methods they have used. To take advantage of these potential benefits, agencies have reported that they plan to spend more than $2 billion on cloud computing services in fiscal year 2016,” the GAO stated.To read this article in full or to leave a comment, please click here

Containers and VMs Together

A couple weeks back I talked about how Docker containers were not virtual machines (VMs). I received a lot of positive feedback on the article (thanks!), but I also heard a common question: Can VMs and Docker containers coexist? The … Continued

New Windows 10 build loaded with changes

Microsoft promised a lot of nifty new features for Windows 10 at the Build conference, and one week later it has delivered a new build—number 14316—to the Fast Ring of its Windows Insiders who get the first crack at new builds for testing.At the Build show, Microsoft announced an “Anniversary update” slated for June, which was when a big update codenamed Redstone was thought to arrive. It now looks like the two are one in the same.To read this article in full or to leave a comment, please click here

Business email scams have led to $2.3 billion losses via rogue wire transfers

Over the past two and a half years, cybercriminals have managed to steal over $2.3 billion from thousands of companies worldwide by using little more than carefully crafted scam emails.Known as business email compromise (BEC), CEO fraud or whaling, this type of attack involves criminals impersonating an organization's chief executive officer, or some other high-ranking manager, and instructing employees via email to initiate rogue wire transfers.According to an alert issued earlier this week by the FBI, between October 2013 and February 2016, 17,642 organizations from the U.S. and 79 other countries have fallen victim to BEC attacks. The combined losses amount to over $2.3 billion, the agency said.To read this article in full or to leave a comment, please click here

Business email scams have led to $2.3 billion losses via rogue wire transfers

Over the past two and a half years, cybercriminals have managed to steal over $2.3 billion from thousands of companies worldwide by using little more than carefully crafted scam emails.Known as business email compromise (BEC), CEO fraud or whaling, this type of attack involves criminals impersonating an organization's chief executive officer, or some other high-ranking manager, and instructing employees via email to initiate rogue wire transfers.According to an alert issued earlier this week by the FBI, between October 2013 and February 2016, 17,642 organizations from the U.S. and 79 other countries have fallen victim to BEC attacks. The combined losses amount to over $2.3 billion, the agency said.To read this article in full or to leave a comment, please click here

47% off TomTom VIA 1505M 5-Inch Portable GPS – Deal Alert

The TomTom VIA 1505M 5-Inch Portable GPS Navigator receives an average of 4 out of 5 stars on Amazon (read reviews). With a list price of $169.95, this substantial 47% discount knocks the price down to just $89.99.Clean, clear and intuitive maps are displayed on the VIA's bright 5" inch touchscreen. Pre-installed points of interest and Advanced Lane Guidance help you find what you need quickly, and guide you there without confusion. This device comes with free map upgrades for the life of the unit, so you stay up to date with the inevitable changes. An integrated mount attaches to your windshield or dashboard and quickly folds away for increased portability.To read this article in full or to leave a comment, please click here

CloudFlare Crypto Meetup: April 21, 2016

CloudFlare Crypto Meetup Teaser.

Now back in HD: the CloudFlare Cryptography Meetup series. A while back, CloudFlare hosted a pair of Meetups focused on encryption and cryptographic technology. Now that CloudFlare HQ has moved into our beautiful new home at 101 Townsend in San Francisco, we’ve decided to bring the crypto back.

In this series, we’ve invited experts from academia and industry to talk about the cryptographic protocols they are working on and to share experiences around deploying cryptographic applications in the real world. This is the place to geek out on crypto!

These talks are intended to explore interesting new crypto topics in an accessible way. It aims to be informative and thought provoking, and practical examples are encouraged.

We’ll start the evening at 6:00p.m. with time for networking, followed up with short talks by leading experts. Pizza and beer are provided!

Whether you're a cryptography hobbyist, an industry expert or just interested in the subject, come visit CloudFlare’s world headquarters at 6:00pm on April 21st.

RSVP here on Meetup.com.

Speakers

The confirmed speakers for April 21st are Brian Warner, Zakir Durumeric and Amine Kamel.

Brian Warner

magic-wormhole

"magic-wormhole" is a simple tool to move files from Continue reading

That moment when you realize you’re exchanging emails with a robot

Next time you schedule a meeting and an assistant named Amy or Andrew Ingram sets up the logistics, here's a pro tip: You may be chatting with a robot. And if it's one of x.ai's bots, you might never know the difference. That was my experience when I exchanged emails with "Andrew" to set up an interview with x.ai's CEO. After I emailed x.ai's press contact, she referred me to Andrew to hammer out the details. Andrew proposed a time, thanked me when I accepted and sent out a calendar invitation. Had I not been clued in ahead of time, I never would have realized Andrew wasn't human. Therein lies x.ai's value proposition.To read this article in full or to leave a comment, please click here

Millions of child support records stolen, D.C. officials want answers

In early February, a thief broke into several offices in Olympia, Washington to steal anything he could grab that was worth selling. In one locked drawer, the thief found a couple of external hard drives that he added to his haul of cash, cameras, electronics and laptops.The hard drives belonged to the local office of the Administration for Children and Families, part of the Department of Health and Human Services, and contained between two and five million records related to child-support audits.As of Thursday morning, the City of Olympia police department did not know what happened to the drives, even though two people have been arrested in connection with the theft.To read this article in full or to leave a comment, please click here

Millions of child support records stolen, D.C. officials want answers

In early February, a thief broke into several offices in Olympia, Washington to steal anything he could grab that was worth selling. In one locked drawer, the thief found a couple of external hard drives that he added to his haul of cash, cameras, electronics and laptops.The hard drives belonged to the local office of the Administration for Children and Families, part of the Department of Health and Human Services, and contained between two and five million records related to child-support audits.As of Thursday morning, the City of Olympia police department did not know what happened to the drives, even though two people have been arrested in connection with the theft.To read this article in full or to leave a comment, please click here