Big Data: 5 Top Companies and Their Plans for 2015
Expect new product and service announcements from the established big names, as well as a flood of innovative start-ups hitting the headlines over the next 12 months. This is the first part of my run-through of big data companies I expect to hear great things in 2015. I’ve started with the “big data giants” – established names which have made data the foundation of their business model. In another post I will focus on the newcomers and start-ups snapping at their heels.
Cloud ERP: 9 Emerging Options
The good news for CIOs and their teams considering moving some or all ERP functions online: Vendors have been prepping for this shift, and there's already plenty of choice. The conventional ERP heavyweights -- Microsoft, Oracle, and SAP -- are also in on the trend. You may have noticed how much all three, each in their own way, talked up cloud across the board in 2014. Oracle in particular spent a good bit of time discussing -- at the highest executive levels -- its cloud endeavors and future plans, sure signs that the entrenched on-premises approaches to ERP are getting a cloud makeover, even if such shifts will take much more time than, say, getting off that old Exchange server for email.
World's Largest DDoS Attack Reached 400Gbps, says Arbor Networks
Increasingly, the culprit is Network Time Protocol (NTP), an important but otherwise totally ignored way for the Internet to keep its routers and server infrastructure synchronised with UTC. Not long after an infamous attack on Spamhaus in early 2013, which used something called DNS amplification to summon up potentially vast amounts of traffic, someone worked out that other protocols were open to the same trick. NTP turned out to be a good candidate for the same spoofing/amplification treatment, notably during the almost-as-infamous attack on CloudFlare a year ago, the one Arbor mentions as hitting 325Gbps.
Samsung's $100 million Internet of Things Bet
Samsung has thrown its weight behind an effort called Thread, which also has the backing of Nest, processor designer ARM, and a few other industry players. As Parks Associates analyst Tom Kerber explains, Thread works by assigning every device its own IP address, and brings numerous benefits including end-to-end encryption and low power consumption. "If you think about longer-term, it's very likely that a lot of the intelligence is going to be in the end devices rather than in a central controller, so these end devices need to be addressable, and IP is kind of predominant," Kerber says.
7 Corporate blogging blunders to avoid
Yes, blogging has some huge advantages. And yes, I believe that many companies would greatly benefit from an ongoing blogging initiative. But that means taking the time to do it right.
Blogging requires a strong strategy, good optimization and fantastic content. Without those three elements, your blog will fizzle out before it starts to sizzle. It won’t help you boost search positions. It won’t engage your readers. And it won’t help your company make money. That’s never good. Want to keep your blog on the straight and narrow?
Microsoft unveils a great distraction
Can we all please calm down and look at this product glimpse rationally? Sure, HoloLens will find a home in some markets. I can certainly see design verticals such as CAD and CAM embracing the technology. And I’m sure that gamers will love it. Halo in 3D? I’m there! But outside of those niche markets, does this new headlining feature really offer anything to the ordinary home or corporate user? I don’t think so. My word processor and spreadsheet won’t work any better for being in 3D. As a writer, I want people to become immersed in my prose, but I don’t want to rely on a 3D trick to accomplish that.
Crooks Start Encrypting Websites And Demanding Thousands Of Dollars From Businesses
“The next step might well be the modern equivalent of protection rackets – threatening companies with being either taken offline or having their databases frozen unless they pay a regular fee.” Brian Honan, security consultant, said the modus operandi of the RansomWeb hackers was similar to ransomware attacks against a number of SMBs he had worked with, whereby the criminals broke into the server of the victim, overwrote backups with either the encrypted data or blank data, and at a later date returned to encrypt the server. “At this stage the backups are no longer useful as they contain no workable data to restore the systems, thus leaving the victim companies with the choice of either losing all their data and rebuilding it from scratch, or paying the ransom.”
Data scientists: How to hire and how to get the best from them
Hand says the rise of the data scientist is unsurprising, especially as it has been long predicted that the industry would see a massive shortage of people with a high level of analytical skills. He says any individual with data science in their LinkedIn profile can expect to be bombarded with emails from recruiters - yet, Hand says smart organisations also focus on two other sources of data scientists. "The first is to develop a close working relationship with a university, and not just the computer science school as many of the most successful analysts are coming from other schools of science," he says. "The second is to look inside the organisation for core analytical skills and to be prepared to retrain those people in advanced data analytics."
Building Massively-Scalable Distributed Systems using Go and Mesos
Apache Mesos uses an idiom known as a framework to delegate task scheduling to client code running on the cluster. Spark, for example, was originally a Mesos framework written to the Mesos API using the Scala language bindings. The original version of Mesos was built in 2009, before Go was popular. Today, Go is one of the most popular languages and many of the key components that integrate with Mesos are written in Go. For example, Kubernetes-Mesos, the Mesos framework for running Kubernetes workloads on Mesos is written in Go. Also, Go is popular with the many infrastructure tools including and surrounding the Docker container format which is natively supported by Mesos.
eBook: How to Adopt Microservices
Microservices architecture is emerging as the new standard for building applications. This approach to software design breaks complex applications into small, nimble, independent components to speed up time to market, simplify maintenance, and enable continuous integration.Learn in this new ebook how to adopt this new approach and optimize your applications and development processes.
Quote for the day:
"Leadership is the art of getting someone else to do something you want done because he wants to do it." -- Dwight D. Eisenhower
Expect new product and service announcements from the established big names, as well as a flood of innovative start-ups hitting the headlines over the next 12 months. This is the first part of my run-through of big data companies I expect to hear great things in 2015. I’ve started with the “big data giants” – established names which have made data the foundation of their business model. In another post I will focus on the newcomers and start-ups snapping at their heels.
Cloud ERP: 9 Emerging Options
The good news for CIOs and their teams considering moving some or all ERP functions online: Vendors have been prepping for this shift, and there's already plenty of choice. The conventional ERP heavyweights -- Microsoft, Oracle, and SAP -- are also in on the trend. You may have noticed how much all three, each in their own way, talked up cloud across the board in 2014. Oracle in particular spent a good bit of time discussing -- at the highest executive levels -- its cloud endeavors and future plans, sure signs that the entrenched on-premises approaches to ERP are getting a cloud makeover, even if such shifts will take much more time than, say, getting off that old Exchange server for email.
World's Largest DDoS Attack Reached 400Gbps, says Arbor Networks
Increasingly, the culprit is Network Time Protocol (NTP), an important but otherwise totally ignored way for the Internet to keep its routers and server infrastructure synchronised with UTC. Not long after an infamous attack on Spamhaus in early 2013, which used something called DNS amplification to summon up potentially vast amounts of traffic, someone worked out that other protocols were open to the same trick. NTP turned out to be a good candidate for the same spoofing/amplification treatment, notably during the almost-as-infamous attack on CloudFlare a year ago, the one Arbor mentions as hitting 325Gbps.
Samsung's $100 million Internet of Things Bet
Samsung has thrown its weight behind an effort called Thread, which also has the backing of Nest, processor designer ARM, and a few other industry players. As Parks Associates analyst Tom Kerber explains, Thread works by assigning every device its own IP address, and brings numerous benefits including end-to-end encryption and low power consumption. "If you think about longer-term, it's very likely that a lot of the intelligence is going to be in the end devices rather than in a central controller, so these end devices need to be addressable, and IP is kind of predominant," Kerber says.
7 Corporate blogging blunders to avoid
Yes, blogging has some huge advantages. And yes, I believe that many companies would greatly benefit from an ongoing blogging initiative. But that means taking the time to do it right.
Blogging requires a strong strategy, good optimization and fantastic content. Without those three elements, your blog will fizzle out before it starts to sizzle. It won’t help you boost search positions. It won’t engage your readers. And it won’t help your company make money. That’s never good. Want to keep your blog on the straight and narrow?
Microsoft unveils a great distraction
Can we all please calm down and look at this product glimpse rationally? Sure, HoloLens will find a home in some markets. I can certainly see design verticals such as CAD and CAM embracing the technology. And I’m sure that gamers will love it. Halo in 3D? I’m there! But outside of those niche markets, does this new headlining feature really offer anything to the ordinary home or corporate user? I don’t think so. My word processor and spreadsheet won’t work any better for being in 3D. As a writer, I want people to become immersed in my prose, but I don’t want to rely on a 3D trick to accomplish that.
Crooks Start Encrypting Websites And Demanding Thousands Of Dollars From Businesses
“The next step might well be the modern equivalent of protection rackets – threatening companies with being either taken offline or having their databases frozen unless they pay a regular fee.” Brian Honan, security consultant, said the modus operandi of the RansomWeb hackers was similar to ransomware attacks against a number of SMBs he had worked with, whereby the criminals broke into the server of the victim, overwrote backups with either the encrypted data or blank data, and at a later date returned to encrypt the server. “At this stage the backups are no longer useful as they contain no workable data to restore the systems, thus leaving the victim companies with the choice of either losing all their data and rebuilding it from scratch, or paying the ransom.”
Data scientists: How to hire and how to get the best from them
Hand says the rise of the data scientist is unsurprising, especially as it has been long predicted that the industry would see a massive shortage of people with a high level of analytical skills. He says any individual with data science in their LinkedIn profile can expect to be bombarded with emails from recruiters - yet, Hand says smart organisations also focus on two other sources of data scientists. "The first is to develop a close working relationship with a university, and not just the computer science school as many of the most successful analysts are coming from other schools of science," he says. "The second is to look inside the organisation for core analytical skills and to be prepared to retrain those people in advanced data analytics."
Building Massively-Scalable Distributed Systems using Go and Mesos
Apache Mesos uses an idiom known as a framework to delegate task scheduling to client code running on the cluster. Spark, for example, was originally a Mesos framework written to the Mesos API using the Scala language bindings. The original version of Mesos was built in 2009, before Go was popular. Today, Go is one of the most popular languages and many of the key components that integrate with Mesos are written in Go. For example, Kubernetes-Mesos, the Mesos framework for running Kubernetes workloads on Mesos is written in Go. Also, Go is popular with the many infrastructure tools including and surrounding the Docker container format which is natively supported by Mesos.
eBook: How to Adopt Microservices
Microservices architecture is emerging as the new standard for building applications. This approach to software design breaks complex applications into small, nimble, independent components to speed up time to market, simplify maintenance, and enable continuous integration.Learn in this new ebook how to adopt this new approach and optimize your applications and development processes.
Quote for the day:
"Leadership is the art of getting someone else to do something you want done because he wants to do it." -- Dwight D. Eisenhower
No comments:
Post a Comment