Wednesday, February 14, 2024

A Few Words About Nothing

 

If I told you that only 26% of the population can demonstrate a basic understanding of calculus, and 63% of those are women, you might be surprised.  It would appear that calculus must be a niche specialty where women are well ahead of men.  You could not help but wonder how men have dominated the STEM fields for so long, given this apparently superior mathematical aptitude that women have. 

 

The truth is, both men and women are equally capable of advanced mathematical reasoning, and the above statistics are fictitious.  It is a proven fact that we find statements accompanied by precise numbers far more compelling than vague assertions.  We trust statistics, with little regard for how they were obtained.  A cautionary view is often attributed to Mark Twain (who himself credited British Prime Minister Benjamin Disraeli) – “There are three kinds of lies; Lies, Damned Lies, and Statistics.”  Statisticians have a language all their own, which only makes things worse.

 

A statistician approaching the aforementioned question of mathematical acuity would begin with a test of some sort and form a hypothesis – something like “There is no difference in standardized mathematical test scores based on gender.”  In stat-speak, this is the “null hypothesis.”  If the data showed no difference in test scores based on gender, you might say men and women are equally proficient at math.  A statistician, with an apparent aversion to commitment, would only say their study “failed to reject the null hypothesis.”  If nothing else, reading this paragraph should convince you that Mark Twain was on to something.  

 

“Null” is a nothing word, something with no value.    It comes from the Latin “nullus”, meaning “not any.”  It has also come to mean “invalid” or “powerless.” In our math-gender example, it says, “Move along now – there’s nothing here.”  Although software developers may use nulls for padding or as delimiters, they otherwise have little value.  Nothing is nothing, after all.

 

It would be easy to conclude that this is much ado about nothing, but there is more to nothing than first appears.  If you’ve ever typed an address into Google Maps (e.g. 1600 Pennsylvania Avenue, Washington, DC), you would see a map with a pin at that location.  How does it know?  Thanks to geocoding, the physical addresses with which we are familiar have been converted into coordinates that the map understands – in this case 38°53'52.2"N 77°02'11.7"W.  This is a hidden marvel of modern technology, except when it’s not.

 

Geocoders are not perfect, nor are the humans who use them.  Mis-spelled street names, non-existent address numbers or just plain typos can confound the system and cause it to default to “0,0”.  This poses a bit of a problem in that 0,0 is an actual location on Earth, south of Ghana in the Gulf of Guinea.  It is a running joke among GIS professionals that all those mistakes are sent off to “Null Island.”  Ironically, Null Island is one of the most visited places on Earth, though it doesn’t actually exist.  (NOTE:  There is, however, a NOAA weather observation buoy, known as Station 13010, located at 0,0). 

 

Like many big cities, Los Angeles has some rough areas that tourists should avoid.  The section surrounding LA City Hall directly across the street from the Los Angeles Police Department would seem safe but in one 4-month period, it showed on the map as the location for 1,380 crimes. There is a hand-written entry for every reported crime in the city, and if the computer can’t decipher it, it defaults to the front of LAPD Headquarters.  Once this was discovered, the fix was clear – deport all those criminals to Null Island.

 

Typos and criminals aren’t the only things banished to Null Island.  A popular outdoor fitness tracking app called Strava, used by athletes to share their training feats on social media, incorporates GPS based location tracking to broadcast from where and for how far they ran, cycled, or swam.  When Strava published a "Global Heatmap" to hype the widespread usage of their product, some folks noticed a concentration of activity in a few unlikely areas.  When it was revealed that some of these were heretofore undisclosed military bases, privacy concerns arose, and people started entering “0,0” as their starting location.  Soon Null Island became a global destination for fitness training.

 

An outbreak of COVID19 cases, a scourge of cyberattacks, some crazy gender theories - all have helped Null Island maintain notoriety through the years as a busy yet non-existent place.  It will long endure as a gathering spot for a vast assortment of items with one thing in common – nothing.


 

 Author Profile - Paul W. Smith - leader, educator, technologist, writer - has a lifelong interest in the countless ways that technology changes the course of our journey through life.  In addition to being a regular contributor to NetworkDataPedia, he maintains the website Technology for the Journey and occasionally writes for Blogcritics.  Paul has over 40 years of experience in research and advanced development for companies ranging from small startups to industry leaders.  His other passion is teaching - he is a former Adjunct Professor of Mechanical Engineering at the Colorado School of Mines. Paul holds a doctorate in Applied Mechanics from the California Institute of Technology, as well as Bachelor’s and Master’s Degrees in Mechanical Engineering from the University of California, Santa Barbara.

 

Monday, February 12, 2024

AWS EFS: Tips and Best Practices for Cloud-Based File Systems

 


What Is AWS EFS?

Amazon Web Services (AWS) Elastic File System (EFS) is a cloud-based file storage service that offers scalable, elastic, and secure file storage for use with AWS Cloud services and on-premises resources. It is designed to provide a simple, scalable, fully managed elastic NFS file system for use with AWS cloud services and on-premises resources. AWS EFS is built to be highly available and durable, automatically replicating your data within a region to protect against data loss.

EFS is particularly beneficial for applications and workloads that require a file system interface and file system semantics. It allows multiple EC2 instances to access a common file system concurrently, providing a high level of throughput and I/O performance. This shared access across multiple instances makes it ideal for applications that require a centralized file repository, such as content repositories, development environments, and home directories. AWS EFS also complies with various industry standards, including PCI-DSS, ISO, and HIPAA, ensuring secure and reliable storage for sensitive data.

Use Cases for AWS EFS

Shared File Storage for Cloud Applications

AWS EFS is an excellent solution for cloud applications that require shared access to file data. It provides a common data source for applications to read and write, making it an ideal choice for applications requiring high availability and durability. For instance, content management systems, development environments, web server farms, home directories, and many more applications can benefit from the shared file storage capability of AWS EFS.

AWS EFS file systems can be accessed by multiple EC2 instances from different Availability Zones, so multiple applications can share common datasets, providing the ability to scale and perform better. AWS EFS also supports file locking and consistency, which is crucial for applications that require simultaneous read and write operations.

Data Analytics and Big Data Processing

AWS EFS can be used for big data and analytics applications that require high-speed access to large datasets. Because AWS EFS scales automatically to petabytes of storage, it can handle the large data sets typically used in big data analytics. AWS EFS provides the high throughput and low latency needed for fast, parallel data processing.

AWS EFS is also Hadoop compatible, meaning you can use it with your existing Hadoop applications. It can handle the high concurrency, high throughput, and low latency requirements of big data workloads, making it an excellent choice for data lake architectures.

Content Management and Web Serving

Content management systems (CMS) and web servers often require a shared, scalable, and reliable file storage system. AWS EFS provides these capabilities, making it a great choice for these use cases. With AWS EFS, you can easily manage, store, and serve web content and media files.

AWS EFS also integrates well with other AWS services such as Amazon EC2 for computing resources and Amazon S3 for object storage. This makes it easy to build a highly scalable and reliable web serving and CMS solution on AWS.

Backup and Disaster Recovery Solutions

AWS EFS can be used as a target for backup and disaster recovery solutions. It provides a durable and reliable storage solution for backing up critical data. With its support for file system snapshots, you can easily create point-in-time copies of your file systems. These snapshots can be used for backup or for disaster recovery purposes.

AWS EFS also integrates with AWS Backup, a fully managed backup service that makes it easy to centralize and automate the backup of data across AWS services. With AWS Backup, you can configure backup policies, monitor backup activity, and recover backups when needed.

Tips and Best Practices for Using AWS EFS

Choosing the Right Performance Mode

AWS EFS offers two performance modes: general purpose and max I/O. General purpose mode is suitable for most workloads, offering lower latency for file operations. Max I/O mode scales to higher levels of aggregate throughput and operations per second, but with slightly higher latencies. It is best for highly parallelized and big data workloads. Choose the performance mode that best fits your workload requirements.

Enabling Encryption at Rest and in Transit

Security is a crucial aspect of any cloud service. AWS EFS offers built-in support for encryption at rest and in transit. Encryption at rest automatically encrypts your data before it is written to the file system, and decrypts it when read. Encryption in transit uses the industry-standard Transport Layer Security (TLS) 1.2 protocol to protect your data as it travels between your file system and your EC2 instances.

Using EFS Lifecycle Management for Cost Efficiency

AWS EFS offers a feature called EFS Lifecycle Management that can help you reduce storage costs. This feature automatically moves files that are not accessed for a certain period of time from the performance storage class to the infrequent access storage class, which costs less. You can choose the age threshold for moving files, giving you control over your storage costs.

Leveraging Automatic Scaling Features

One of the key benefits of AWS EFS is its automatic scaling capability. The file system grows and shrinks as you add and remove files, eliminating the need for capacity planning. To make the most of this feature, monitor your file system's metrics using Amazon CloudWatch to understand your usage patterns and adjust your workloads as necessary.

Multi-AZ Deployment for Redundancy and Failover

AWS EFS supports deploying your file system across multiple Availability Zones (AZs). This provides high availability and redundancy for your data. If an issue occurs in one AZ, your file system remains accessible in the other AZs. Multi-AZ deployment also enables you to balance your workload and traffic across several AZs, improving the performance and reliability of your applications.

Implementing Backup Strategies with AWS Backup

As mentioned earlier, AWS EFS integrates with AWS Backup, making it easy to back up your file systems. AWS Backup provides centralized backup across AWS services, and enables you to automate backup scheduling, set retention policies, and monitor recent backups. It's a best practice to regularly back up your AWS EFS file systems to safeguard your data against accidental deletion or system failures.

In conclusion, AWS EFS provides a highly scalable, reliable, and secure file storage solution for a wide range of use cases. By understanding its features and best practices, you can leverage AWS EFS to meet your application's file storage needs effectively.


ree

Author Bio: Gilad David Maayan

Gilad David Maayan is a technology writer who has worked with over 150 technology companies including SAP, Imperva, Samsung NEXT, NetApp and Check Point, producing technical and thought leadership content that elucidates technical solutions for developers and IT leadership. Today he heads Agile SEO, the leading marketing agency in the technology industry.

 

Saturday, February 10, 2024

Weekend Flashback: Seiko

 

I guess Seiko was way ahead of their time.


I vaguely remember this but wonder who bought one?


Friday, February 9, 2024

Internetworks: What is cisco port security? How to secure switches ports? | What are the violations of port security? | How to configure?

 

As we already know switches are very important network devices and with the help of switches we connect and maintain communication channels between various devices. we also know ethernet ports are present on our switches and with these ports, we connect our devices like routers computers, and other devices. switches identify the devices by their MAC addresses and provide the services. the important thing is we need to secure these ethernet ports so that authorized users can connect network securely.

Popular post