Spark for Data Padawans Episode 3: Spark vs MapReduce After learning about Hadoop and distributed data storage, and what exactly Spark is in the previous episodes, it's time to dig a little deaper to understand why even if Spark is great, it isn't necessarily a miracle solution to all your data processing issues. It's time for Spark for super beginners episode 3! As always, I try to keep these articles as easy to understand as possible, but if you really are a super data padawan you probably need to have a quick look at episode 1 and episode 2 to understand what I'm talking about. You can always go back to a previous episode later:
Routers and Wireless The Dude The Dude network monitor is an application by MikroTik which can dramatically improve the way you manage your network environment. It will automatically scan all devices within specified subnets, draw and layout a map of your networks, monitor services of your devices and alert you in case some service has problems. OUI Lookup Tool Riverbed is Wireshark's primary sponsor and provides our funding. They also make great products. I have a lot of traffic... Cubism.js - A D3 Plugin for Visualizing Time Series Cubism.js is a D3 plugin for visualizing time series. Use Cubism to construct better realtime dashboards, pulling data from Graphite, Cube and other sources. Cubism fetches time series data incrementally: after the initial display, Cubism reduces server load by polling only the most recent values. Cubism renders incrementally, too, using Canvas to shift charts one pixel to the left. This approach lets Cubism scale easily to hundreds of metrics updating every ten seconds!
Data lake A data lake is a large storage repository and processing engine, they provide "massive storage for any kind of data, enormous processing power and the ability to handle virtually limitless concurrent tasks or jobs". The term was coined by James Dixon, Pentaho chief technology officer. Dixon used the term initially to contrast with "data mart", which is a smaller repository of interesting attributes extracted from the raw data. He wrote: "If you think of a datamart as a store of bottled water – cleansed and packaged and structured for easy consumption – the data lake is a large body of water in a more natural state. The contents of the data lake stream in from a source to fill the lake, and various users of the lake can come to examine, dive in, or take samples."  Dixon argued that data marts have several inherent problems, and that data lakes are the optimal solution. Examples of data lakes
namebench - Open-source DNS Benchmark Utility Final list of nameservers considered: ------------------------------------------------------------------------------ 188.8.131.52 UMBC 5 US 56 ms | 184.108.40.206 OpenDNS-3 56 ms | www.google.com is hijacked: google.navigation.opendns.com 220.127.116.11 Level3-R2 62 ms | 18.104.22.168 DynGuide 63 ms | NXDOMAIN Hijacking 22.214.171.124 BroadAspect US 63 ms | 126.96.36.199 Google Public DNS- 64 ms | Replica of Google Public DNS [188.8.131.52] 184.108.40.206 OpenDNS 65 ms | www.google.com is hijacked: google.navigation.opendns.com 220.127.116.11 UltraDNS 67 ms | NXDOMAIN Hijacking 127.0.0.1 Localhost IPv4 68 ms | NXDOMAIN Hijacking (www) 18.104.22.168 RoadRunner NC US 68 ms | Replica of RoadRunner NC-2 US [22.214.171.124], NXDOMAIN Hijacking (www) 126.96.36.199 Comodo Secure DNS- 80 ms | NXDOMAIN Hijacking 188.8.131.52 RoadRunner NC-2 US 104 ms | (excluded: Slower replica of RoadRunner NC US [184.108.40.206]) - Sending 250 queries to 11 servers...
6 free network vulnerability scanners Though you may know and follow basic security measures on your own when installing and managing your network and websites, you'll never be able to keep up with and catch all the vulnerabilities by yourself. Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritized list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process.