"cloud" entries

How ZeroVM changes analytics in the cloud

What's so interesting about another open source virtualization platform?

ZeroVMZeroVM was the piece of technology that caught my attention during the recent Bay Area Apache Drill Meetup. What’s so interesting about another open source virtualization platform? To find out I did more reading and spoke with LiteStack founder, Camuel Gilyadov.

ZeroVM has its roots in the OpenDremel project. Camuel and his team needed a lightweight virtualization framework but couldn’t find one that suited their requirements for OpenDremel. They created ZeroVM and along the way addressed issues relevant to cloud applications, including security, multi-tenancy, and instant1 elasticity. I’m not claiming ZeroVM is mature technology, but there are two potential applications that data scientists will like: Read more…

Four short links: 20 July 2012

Four short links: 20 July 2012

Turning Drones, Censoring Cloud, Trolling for America, and Thinging the Internets

  1. Intercepted DronesThe demonstration of the near-disaster, led by Professor Todd Humphreys and his team at the UTA’s Radionavigation Laboratory, points to a “gaping hole” in the US’s plan to open US airspace to thousands of drones, Fox noted: namely, drones can be turned into weapons, given the right equipment. Drones are AI for the physical world: disconnected agents, unsettling because they live in this uncanny valley of almost-independence. Military drones are doubly disconcerting. If von Clauswitz were around today, he’d say drones are the computation of politics by other means.
  2. Microsoft Censors Its Cloud Storage Service — upload porn, get your accounts (all your Microsoft accounts) frozen.
  3. Uncle Sam Wants You … to Troll (Wired) — Amanullah has a different view. You don’t necessarily need to deface the forums if you can troll them to the point where their most malign influences are neutralized.
  4. Wroblewski’s Theorem“Anything that can be connected to the Internet, will be.”
Four short links: 6 July 2012

Four short links: 6 July 2012

UK Copyright Modernisation, Lessons from Cisco's Evil, Automation, and Kinect Tool

  1. HM Government Consultation on Modernising Copyright (PDF) — from all appearances, the UK Govt is prepared to be progressive and tech-savvy in considering updates to copyright law. Proof of the pudding is in the eating (i.e., wait and see whether the process is coopted by maximalists) but an optimistic start.
  2. Cisco Provides a Lesson (Eric Raymond) — This is why anyone who makes excuses for closed source in network-facing software is not just a fool deluded by shiny marketing but a malignant idiot whose complicity with what those vendors do will injure his neighbors as well as himself. […] If you don’t own it, it will surely own you.
  3. Automate or Perish (Technology Review) — As the MIT economist David Autor has argued, the job market is being “hollowed out.” […] Any work that is repetitive or fairly well structured is open to full or partial automation. Being human confers less and less of an advantage these days.
  4. Kinectable Pipe (Github) — command-line tool that writes skeleton data (as reported by Kinect) to stdout as text. Because Kinect programming is a pain in the neck, and by trivializing the device’s output into a simple text format, it becomes infinitely easier to digest in the scripting language of your choice.

Jesse Robbins on the state of infrastructure automation

Shifts for sysadmins and a surprising use for Chef.

OpsCode chief community officer Jesse Robbins discusses cloud infrastructure automation and the most surprising use of Chef he's seen so far.

Complexity fails: A lesson from storage simplification

Storage architectures show simplicity's power and how to build clouds at scale.

Simple systems scale effectively, while complex systems struggle to overcome the multiplicative effect of potential failure points. This shows us why the most reliable and scalable clouds are those made up of fewer, simpler parts.

Parts of healthcare are moving to the cloud

Cloud-based electronic health record services are gaining traction.

Brian Ahier looks at offerings from CareCloud and athenahealth that combine cloud-based access with electronic health records.

Four short links: 24 February 2012

Four short links: 24 February 2012

Analytics in Excel, HTTP Debugger, Analytics for Personalized Healthcare, and EFF To The Rescue

  1. Excel Cloud Data Analytics (Microsoft Research) — clever–a cloud analytics backend with Excel as the frontend. Almost every business and finance person I’ve known has been way more comfortable with Excel than any other tool. (via Dr Data)
  2. HTTP Client — Mac OS X app for inspecting and automating a lot of HTTP. cf the lovely Charles proxy for debugging. (via Nelson Minar)
  3. The Creative Destruction of Medicine — using big data, gadgets, and sweet tech in general to personalize and improve healthcare. (via New York Times)
  4. EFF Wins Protection of Time Zone Database (EFF) — I posted about the silliness before (maintainers of the only comprehensive database of time zones was being threatened by astrologers). The EFF stepped in, beat back the buffoons, and now we’re back to being responsible when we screw up timezones for phone calls.

Business-government ties complicate cyber security

"Inside Cyber Warfare" author Jeffrey Carr discusses current security trends.

Is an attack on a U.S. business' network an attack on the U.S. itself? "Inside Cyber Warfare" author Jeffrey Carr discusses the intermingling of corporate and government interests in this interview.

Strata Week: Genome research kicks up a lot of data

Where to store all that genome data? Also, clarifying the work of digital humanities scholars.

We take a look at the big data obstacles and opportunities for genomics, digital humanities scholars respond to Stanley Fish's mischaracterization of what they do with data, and Hadoop World and the Strata Conference merge.

Medical imaging in the cloud: a conversation about eMix

It's a situation crying out for networked transfer, but HIPAA requires careful attention to security and privacy.