October 6, 2016 brianradio2016

For an increasing number of applications, tracking location is essential. A social application might connect users based on location. A hospitality or travel application might use the user’s location to point out interesting sights or provide custom itineraries. A sensor application might store and analyze data that is both geospatial and time series, to trigger an action like detecting patterns, outliers, and anomalies.

Further, as geospatial technology matures, location-based applications are evolving from mainly mapping applications into sophisticated, cutting-edge programs that process and analyze millions of data points from mobile users, sensor networks, IoT devices, and other sources. The world is in constant motion, and our apps are beginning to catch on.

Location data presents an interesting challenge for the developer because querying it or performing calculations of position and distance have to consider longitude (x), latitude (y), and sometimes even elevation (z). The multidimensional nature of location data requires optimized mechanisms to process it — treating it as merely integers is highly inefficient. If the database, whether an RDBMS or a NoSQL store, lacks the capabilities for handling geospatial data, application programmers have to do the extra work of preprocessing the data, or they have to build in logic that treats the data as geospatial.

Processing geospatial data is also a real-time, big data challenge. Applications that use and manage geospatial data must serve, at minimal latency, a high number of requests for location (“Where are you?”), updates to location (“I am here”), and searches for data by location (“Who or what is nearby?”).

October 4, 2016 brianradio2016

Millennials hate email, and they will finally kill this business scourge — or so you would think from popular discussions on the topic. But do a little research, and you discover that millennials not only don’t hate email, they use it more than any other age group.

Yes, the text-obsessed and social-media-loving millennials are addicted to email, a recent survey of 1,004 mobile-using American office workers by Adobe Systems has found. Millennials (born between 1981 and 2001) check their email more often than any other group — even more than Gen X (born between 1961 and 1981) and baby boomers (born between 1947 and 1961) for whom email is the mainstay business communication method.

Well, the Adobe survey doesn’t use the typical age range for millennials; instead it looks at ages 25 through 34, what demographers call the early millennials. Still, it’s an interesting result. (Adobe made that split that because younger millennials are so new in the workplace that they’re unlikely to have fully formed their work behaviors.)

The reason of course is obvious: Email is how business gets done and documented in white-collar office jobs, and early millennials work in that world. Of course they use email. 

September 29, 2016 brianradio2016

Among the key findings of an April 2016 survey by the OpenStack Foundation was the strong interest among OpenStack users in software-based networking on servers, or server-based networking. The factors driving this interest include SDN/NFV (mentioned by 52 percent of respondents), containers (mentioned by 70 percent), and bare-metal deployments (mentioned by 50 percent). This level of interest is reflected in practices of the largest datacenters in the world (for example, Google Cloud, Amazon Web Services, and Microsoft Azure), which use server-based networking for the networking flexibility and scalability it provides.

Enterprises are increasingly interested in how server-based networking can best be deployed. With growing bandwidth requirements and the adoption of 10GbE and higher-speed technologies across industries, it has become widely acknowledged that using general-purpose CPUs for server-based networking tasks is highly inefficient. Microsoft, for one, has expressed interest in using software-programmable network interface cards, aka SmartNICs, to scale its server-based networking infrastructure more efficiently. Netronome and Ericsson have demonstrated that SmartNICs can be used to offload and accelerate the server-based networking data path, demonstrating up to a sixfold improvement in TCO for some use cases.

OpenStack networking today

Two specific uses cases have led to improvements in OpenStack networking performance, but with compromises: single-root IO virtualization (SR-IOV) and Data Plane Development Kit (DPDK).

SR-IOV. One way to improve OpenStack network throughput is to use SR-IOV plugins with SR-IOV-capable server NICs. When this is implemented in OpenStack Neutron using traditional NICs, bandwidth delivered to virtual machines is improved significantly and latency for VM-to-VM traffic is reduced, as is the need to use CPUs for networking tasks. However, with such increased performance, the number of server-based networking features is severely limited, as shown in Figure 1a and 1b.

September 26, 2016 brianradio2016

As we’ve come to expect from new versions of Windows Server, Windows Server 2016 arrives packed with a huge array of new features. Many of the new capabilities, such as containers and Nano Server, stem from Microsoft’s focus on the cloud. Others, such as Shielded VMs, illustrate a strong emphasis on security. Still others, like the many added networking and storage capabilities, continue an emphasis on software-defined infrastructure begun in Windows Server 2012.

The GA release of Windows Server 2016 rolls up all of the features introduced in the five Technical Previews we’ve seen along the way, plus a few surprises. Now that Windows Server 2016 is fully baked, we’ll treat you to the new features we like the most.

September 22, 2016 brianradio2016

Don’t be intimidated by webhooks. They are essentially the equivalent of “don’t call us, we’ll call you,” for the automated web. In the old days, if you wanted to act on changes to databases, websites, APIs, or online accounts, you would need to write a polling routine. Now, developers have a smarter option.

Why use webhooks versus polling? Polling involves writing an algorithm that checks the status of an endpoint for changes. Polling used to be the primary method for change notification at higher levels, but it’s not very efficient. Still, for low-level devices like printers, polling is your only option.

A study by Zapier found that 98.5 percent of polls were wasted because they nearly always brought back empty event data or polling messages. Meanwhile they soaked up system resources and had a tendency to swamp the I/O of the endpoint when polling intervals were set too close together.

Webhooks were introduced nearly a decade ago as a way to free up those resources. Webhooks send back notifications only when there are changes at the endpoint. Around 80 percent of developers surveyed preferred using webhooks over polling, but websites or APIs don’t support webhooks automatically.

September 21, 2016 brianradio2016

Does anyone even try to sell closed-source software anymore? It must be hard, when so many of the tools used to power the world’s largest datacenters and build the likes of Google, Facebook, and LinkedIn have been planted on GitHub for everyone to use. Even Google’s magic sauce, the software that knows what you will read or buy before you read or buy it, is now freely available to any ambitious developer with dreams of a smarter application.

Google didn’t used to share its source code with the rest of us. It used to share research papers, then leave it to others to come up with the code. Perhaps Google regrets letting Yahoo steal its thunder with Hadoop. Whatever the reason, Google is clearly in the thick of open source now, having launched its own projects — TensorFlow and Kubernetes — that are taking the world by storm.

Of course, TensorFlow is the machine learning magic sauce noted above, and Kubernetes the orchestration tool that is fast becoming the leading choice for managing containerized applications. You can read all about TensorFlow and Kubernetes, along with dozens of other excellent open source projects, in this year’s Best of Open Source Awards, aka the Bossies. In all, our 2016 Bossies cover 72 winners in five categories:

The software tumbling out of Google and other cloudy skies marks a huge shift in the open source landscape and an even bigger shift in the nature of the tools that businesses use to build and run their applications. Just as Hadoop reinvented data analytics by distributing the work across a cluster of machines, projects such as Docker and Kubernetes (and Mesos and Consul and Habitat and CoreOS) are reinventing the application “stack” and bringing the power and efficiencies of distributed computing to the rest of the datacenter.

September 21, 2016 brianradio2016

The Sleuth Kit (TSK) is a fairly comprehensive collection of tools for analyzing and recovering files from disk images, useful for postmortem computer forensics in a corporate investigation of unauthorized use, an issue of workplace harassment, or a criminal investigation by law enforcement. TSK is the tool to use to dig deep into the disk.

When it comes to forensics at the file system level, TSK combines a number of command-line utilities (including fls to display file names within a file system, fsstat to show file system statistical data, and ils to list metadata entries, among others) with support for common file systems (including NTFS, FAT, ExFAT, UFS, EXT, and HFS), allowing you to examine Windows, many Linux, and most Mac OS X systems. Need to go deeper? TSK also allows you to drill down to the bits of a hard disk image to see what may be hidden within.

Working hand in glove with TSK is Autopsy, a GUI-based tool for searching disk images. Autopsy, by default, will search for recent user activity, email, pictures, IP addresses, phone numbers, URLs, and other interesting file types and tidbits. You can have Autopsy search for specific keywords and regex strings, or use it to dredge up files that contain audio or video, a plethora of document types, or any number of executable file types.

Between TSK and Autopsy, you can be sure that any disk you examine will reveal its secrets.

— Victor R. Garza

September 20, 2016 brianradio2016

Microsoft has given up on the PC; mobile devices have won the war after not even a decade.

OK, that’s a bit extreme. But the PC is becoming simply another device, reinvented to work like a smartphone or tablet when it comes to application development, application distribution, device management, and security.

The two major examples of this shift to what’s called an omnidevice strategy are Microsoft’s Surface Pro tablet and the adoption of mobile management and security standards in Windows 10.

Is a Surface Pro a laptop or a tablet? Yes. That’s the point: The difference is situational, as the device can be used in either mode, yet it is the same “tabtop” device. Likewise, Apple’s iPad Pro and Google’s Pixel-C tablets, which no Microsoft IT shop would ever have considered to be laptops, can be used as laptops — but they don’t run Windows.

September 15, 2016 brianradio2016

Every company wants to guarantee uptime and positive experiences for its customers. Behind the scenes, in increasingly complex IT environments, this means giving operations teams greater visibility into their systems — stretching the window of insight from hours or days to months and even multiple years. After all, how can IT leaders drive effective operations today if they don’t have the full-scale visibility needed to align IT metrics with business results?

Expanding the window of visibility has clear benefits in terms of identifying emerging problems anywhere in the environment, minimizing security risks, and surfacing opportunities for innovation. Yet it also has costs. From an IT operations standpoint, time is data: The further you want to see, the more data you have to collect and analyze. It is an enormous challenge to build a system that can ingest many terabytes of event data per day while maintaining years of data, all indexed and ready for search and analysis.

These extreme scale requirements, combined with the time-oriented nature of event data, led us at Rocana to build an indexing and search system that supports ever-growing mountains of operations data — for which general-purpose search engines are ill-suited. As a result, Rocana Search has proven to significantly outperform solutions such as Apache Solr in data ingestion. We achieved this without restricting the volume of online and searchable data, with a solution that balances responsively and scales horizontally via dynamic partitioning.

The need for a new approach

When your mission is to enable petabyte-level visibility across years of operational data, you face three primary scalability challenges:

September 14, 2016 brianradio2016

Microsoft Edge has bookmarks, of course, but they’re called Favorites. I’ll show you how they work and how to move over your bookmarks from another browser.

[The rest]
You get to your Favorites in Edge by clicking the Hub icon, which looks like three horizontal lines of different lengths. This menu slides out from the side, and you hit the star icon to get to your Favorites list.

You’ll probably want to turn on the Favorites bar, too. In the Favorites menu, hit the Settings link on the right. There you’ll see an option for “Show the favorites bar,” which, as you can see, is Off by default. Just slide it to On, and you’ll see the bar appear in the browser window.

You can build Favorites from scratch by going to any URL and hitting the star icon in the address bar. You can edit the name and also choose whether it’ll show up in the Favorites bar or in a Favorites folder. I’ll put this one on the bar so you can see what that looks like.

To import bookmarks from another browser, click this button in the Favorites settings that says “Import your favorites.” This works for Explorer, Chrome, and Firefox, and it just drops those bookmarks into a folder in your Favorites list.

One of those folders will be called “Bookmarks bar.” That’s where all the websites you saved in your old browser’s bookmarks bar will be. To put them onto Edge’s Favorite’s bar, click and drag them to Edge’s “Favorites Bar” folder at the top of this window. You’ll also see them show up automatically in the Favorites bar.

Now that your Favorites are set up, you can learn more about Edge from our videos and articles at pcworld.com, or write to us at answer@pcworld.com.