NSA collected 1 trillion metadata records, harvested 1 billion mobile calls daily
The SSO document claimed that it allows “75% of the traffic to pass through the filter” before adding, “After the EvilOlive deployment, traffic has literally doubled.” Then on the last day of 2012, an SSO official boasted about yet another secret NSA program, codenamed ShellTrumpet having “just processed its One Trillionth metadata record.” …
Couchbase Takes On Oracle, MongoDB And Cassandra
"If you were developing an application from around 1995 to 2002, you had no choice but to develop it with Oracle, DB2 or Microsoft SQL Server," Wiederhold told InformationWeek. "Now they're having a difficult time scaling and they're not getting the performance they need with relational databases. They want a horizontally scalable application tier and a horizontally scalable database tier because their mobile and Web applications are very data-centric, and they're connected to the Internet and potentially billions of users."
Clayton Christensen: Still disruptive
The SSO document claimed that it allows “75% of the traffic to pass through the filter” before adding, “After the EvilOlive deployment, traffic has literally doubled.” Then on the last day of 2012, an SSO official boasted about yet another secret NSA program, codenamed ShellTrumpet having “just processed its One Trillionth metadata record.” …
Couchbase Takes On Oracle, MongoDB And Cassandra
"If you were developing an application from around 1995 to 2002, you had no choice but to develop it with Oracle, DB2 or Microsoft SQL Server," Wiederhold told InformationWeek. "Now they're having a difficult time scaling and they're not getting the performance they need with relational databases. They want a horizontally scalable application tier and a horizontally scalable database tier because their mobile and Web applications are very data-centric, and they're connected to the Internet and potentially billions of users."
Clayton Christensen: Still disruptive
Firstly, the technology per se is not disruptive or sustaining. Rather it is the way it is deployed in the market. So if all that Harvard did was provide MOOCs to everyone so they could employ the technology in existing business models, it wouldn’t change much. But where it would make huge difference is on the delivery of education amongst a population that can't come to Harvard Business School.
CIO concerns over IT complexity are smothering the cloud, claims NTT
“Each business has its own complexities but their CIOs need clouds which can take that complexity and hide it behind the dashboard. CIOs expect transparency in their systems and for the control to be taken by the provider. For their part, cloud providers need to demonstrate they can virtualise and industrialise a huge variety of IT platforms and services, and deliver them all with total security.”
Developers Are Lifting The Cloud, Not The Other Way Around
So all the machines and the pipes are getting abstracted and the developer, arguably, is driving that change. The smartphone is a server. As again illustrated by Joyent with Project Manta, the big storage and network machines are now becoming part of the operating system. Compute and storage are coming together and in-memory databases make for split-second analytics.
Cassandra Mythology
Like the prophetess of Troy it was named for, Apache Cassandra has seen some myths accrue around it. Like most myths, these were once at least partly true, but have become outdated as Cassandra evolved and improved. In this article, I'll discuss five common areas of concern and clarify the confusion.
What’s in a ‘G’? Why terms like 5G and LTE-Advanced are important
Anyone who claims to have a 5G network, device or technology is quite simply full of crap. There have only been a few offenders on this front so far — mainly Broadcom and Samsung appropriating the term for marketing purposes — but that hasn’t stopped 5G from eking out into news stories from reputable media organizations. What starts out as a trickle could easily become a downpour.
Singapore creates operations hub to beef up cyberdefense
"We are beefing up our cyberdefence because that's the next leap forward that we see," Ng said. He added the issue of cyberattacks was a major point made at the Shangri-La security dialogue in Singapore by the U.S. Defense Secretary last month. The Singapore Armed Force's back-end functions such as logistics and engineering, and its front-end capabilities in sensing and responding to threats all depend on computer networks, Ng pointed out.
Big data confusion leads corporate IT to put the brakes on BI spending
Most large organisations have BI platforms in place, he said: “They might feel the need to upgrade, but ‘big data confusion’ reigns. Users do not know what it means for them.” That might change when more concrete use cases for big data analytics emerge, he said, but for now, “people are sitting on their wallets” with respect to BI software. BI spending is also continuing to move outside IT, he confirmed.
Save network bandwidth by using Out-of-Band Initial Replication method in Hyper-V Replica
Hyper-V Replica supports an option where you can transport the initial copy of your VM to the Replica site using an external storage medium - like a USB drive. This method of seeding the Replica site is known is Out-of-Band Initial Replication (OOB IR) and is the focus of this blog post. OOB IR is especially helpful if you have a large amounts of data to be replicated and the datacenters are not connected using a very high speed network.
Quote for the day:
"The journey of a thousand miles must begin with a single step." -- Lao Tzu
CIO concerns over IT complexity are smothering the cloud, claims NTT
“Each business has its own complexities but their CIOs need clouds which can take that complexity and hide it behind the dashboard. CIOs expect transparency in their systems and for the control to be taken by the provider. For their part, cloud providers need to demonstrate they can virtualise and industrialise a huge variety of IT platforms and services, and deliver them all with total security.”
Developers Are Lifting The Cloud, Not The Other Way Around
So all the machines and the pipes are getting abstracted and the developer, arguably, is driving that change. The smartphone is a server. As again illustrated by Joyent with Project Manta, the big storage and network machines are now becoming part of the operating system. Compute and storage are coming together and in-memory databases make for split-second analytics.
Cassandra Mythology
Like the prophetess of Troy it was named for, Apache Cassandra has seen some myths accrue around it. Like most myths, these were once at least partly true, but have become outdated as Cassandra evolved and improved. In this article, I'll discuss five common areas of concern and clarify the confusion.
What’s in a ‘G’? Why terms like 5G and LTE-Advanced are important
Anyone who claims to have a 5G network, device or technology is quite simply full of crap. There have only been a few offenders on this front so far — mainly Broadcom and Samsung appropriating the term for marketing purposes — but that hasn’t stopped 5G from eking out into news stories from reputable media organizations. What starts out as a trickle could easily become a downpour.
Singapore creates operations hub to beef up cyberdefense
"We are beefing up our cyberdefence because that's the next leap forward that we see," Ng said. He added the issue of cyberattacks was a major point made at the Shangri-La security dialogue in Singapore by the U.S. Defense Secretary last month. The Singapore Armed Force's back-end functions such as logistics and engineering, and its front-end capabilities in sensing and responding to threats all depend on computer networks, Ng pointed out.
Big data confusion leads corporate IT to put the brakes on BI spending
Most large organisations have BI platforms in place, he said: “They might feel the need to upgrade, but ‘big data confusion’ reigns. Users do not know what it means for them.” That might change when more concrete use cases for big data analytics emerge, he said, but for now, “people are sitting on their wallets” with respect to BI software. BI spending is also continuing to move outside IT, he confirmed.
Save network bandwidth by using Out-of-Band Initial Replication method in Hyper-V Replica
Hyper-V Replica supports an option where you can transport the initial copy of your VM to the Replica site using an external storage medium - like a USB drive. This method of seeding the Replica site is known is Out-of-Band Initial Replication (OOB IR) and is the focus of this blog post. OOB IR is especially helpful if you have a large amounts of data to be replicated and the datacenters are not connected using a very high speed network.
Quote for the day:
"The journey of a thousand miles must begin with a single step." -- Lao Tzu
No comments:
Post a Comment