Tag Archive for GOOG

Who Rules the Internet?

Who Rules the Internet?

Singapore-based ISP Vodien published an infographic that lists the 100 highest-ranking websites in the U.S. by traffic, according to website analytics company Alexa. There are over 1.1 billion websites on the Internet, but the majority of all traffic actually goes to a very small number of firms. Seven companies control 30% of the top 100 websites and the related web traffic.

InternetNot surprisingly Alphabet controls the most popular sites on the web, Google and YouTube. Surprisingly, Microsoft controls the most sites in the top 100. Redmond controls seven of the top web properties including recently purchased LinkedIn, Bing, and Microsoft.com. For a long time, MSFT’s online efforts were a disaster. That seems to have changed with Azure, but I still hate Bing. According to the Vodien infographic Alphabet controls four of the most popular sites.

The Visual Capitalist points out that Google.com gets an astounding 28 billion visits per month. The next closest is also a Google-owned property, YouTube, which brings in 20.5 billion visits.

Facebook (FB) controls two of the most popular websites; Facebook (#3) and Instagram (#13).

Jeff Bezo’s firm Amazon (AMZN) directs four popular websites;

The infographic says Verizon (VZ) now controls the Huffington Post (#49) and AOL (#59) and will control Yahoo (#5) and Tumlr (#12) if the deal closes in 2017 Q2.

Reddit.com comes in at #7 and Reddituploads.com is #61.

Online retailer eBay comes in as the #8 website.

POTUS favorite Twitter (TWTR) is the 9th ranked website and t.co is #25.

Video streamer Netflix comes in ranked #10 by Vodien.

Microsoft (MSFT) controls 7 of the top 100 websites with recently purchased LinkedIn at #11, Live.com #14. so-so search engine Bing is #17, followed by Office.com (#23), Microsoft Online Services (#24), MSN (#37), and Microsoft.com (#41).


Vodien lists the 100 highest ranking websites

rb-

The consolidation of all of this web traffic is troubling. The current administration is going to allow online firms to sell all the personal information they collect to the government, data aggregators or anybody else to make a buck.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

How Much Code Does It Take?

How Much Code Does It Take?David McCandless from Information is Beautiful tries to answer the question of how many millions of lines of code does it take to? For reference, the Visual Capitalist calculates that a million lines of code (MLOC), if printed, would be about 18,000 pages of text. That’s 14x the length of Leo Tolstoy’s War and Peace. The total lines of code to run systems vary widely as Mr. McCandless shows in the infographic.

  • Stack of paperIt took less than a million lines of code to run the NASA Space Shuttle.
    • The Mars Rover Curiosity takes less than 5 million lines of code to run.
    • The latest version of the Firefox web browser includes just under 10 million lines of code.
    General Motors’ (GM) Chevy Volt requires just over 10 million lines of code.
    Microsoft (MSFT) Office 2008 for the Apple (AAPL) Mac consists of over 35 million lines of code.
    • And it took 50 million lines of code to bring us Microsoft Vista.
    • Finally, all Google (GOOG) services combine for a whopping 2 billion lines – that means it would take 36 million pages to “print out” all of the code behind all Google services. That would be a stack of paper 2.2 miles high!

Information is Beautiful Infographic
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Reducing Your LinkedIn Risks

Reducing Your LinkedIn RisksMicrosoft’s recent purchase of LinkedIn has pushed the struggling ersatz professional networking site back into the limelight. There is plenty of speculation why Microsoft (MSFT) purchased the site for over $2.6 billion. Undoubtedly it has to do with LinkedIn’s (LNKD) cache of over 430 million online users. Whatever Redmond’s designs are, now is probably a good time to check LinkedIn security to reduce your LinkedIn risks.

LinkedIn logoAttackers have long used social networking as part of their reconnaissance activities. They cull personal information posted on the site to craft targeted attacks that have a higher chance of succeeding. The cyber-criminals rely on the fact that people tend to trust people within their personal network.Their targets are more likely to fall for a spear phishing email if it appeared to come from a fellow member. The victims would also be more likely to visit a website if a member of their network suggested it.

LinkedIn risks

The fake LinkedIn profiles “significantly increase” the likelihood that these social engineering attacks will work according to research by Dell SecureWorks. The SecureWorks article describes how attackers use fake LinkedIn profiles. Most of these fake accounts follow a specific pattern:

  1. LinkedIn RisksThey bill themselves as recruiters for fake firms or are supposedly self-employed. Under the guise of a recruiter, the attackers have an easy entry point into the networks of real business professionals. Real recruiters already use the service as a way to find potential candidates. LinkedIn users expect to be contacted by recruiters, so this ruse works out in the scammers’ favor.
  2. They primarily use photos of women pulled from stock image sites or of real professionals. Many of the fake LinkedIn accounts use unoriginal photographs. Their profile photos were found on stock image sites, other LinkedIn profiles, or other social networking sites.
  3. Attackers copy text from profiles of real professionals. They then paste it into their own. The text used in the Summary and Experience sections were usually lifted verbatim, from real professionals on LinkedIn.
  4. They keyword-stuff their profile for visibility in search results. Fake LinkedIn accounts stuff their profiles with keywords to gain visibility in to specific industries or firms.  Northrup Grumman and Airbus Group are popular.

The primary goal of these fake LinkedIn accounts is to map out the networks of business professionals. Using these fake LinkedIn accounts, scammers can establish a sense of credibility among professionals to start further connections. The fake network was created to help attackers target victims via social engineering.

disguise it as a résumé applicationIn addition to mapping connections, scammers can also scrape contact information from their connections. The attackers collect personal and professional email addresses as well as phone numbers. This information could be used to send spear-phishing emails.

LinkedIn cyber-thieves use TinyZbotmalware (a password stealer, keystroke logger, multifunctional Trojan) and disguise it as a résumé application. The Dell researchers advise organizations to educate their users of the specific and general LinkedIn risks in their report:

  • Avoid contact with known fake personas.
  • Only connect with people you know and trust.
  • Use caution when engaging with members of colleagues’ or friends’ networks that they have not verified outside of LinkedIn.
  • When evaluating employment offers, confirm the person is legitimate by directly contacting the purported employer.

Reduce your risks

There are a few ways users can identify fake LinkedIn accounts:

  • search engineDo a reverse-image search. Tineye.com offers a browser plugin or use Google’s Search by Image to confirm the in picture is legit.
  • Copy and paste profile information into a search engine to find real profiles.
  • If someone you know is already connected with one of these fake accounts, reach out to them and find out how they know them.
  • If you suspect that you’ve identified a fake LinkedIn account, you should report it.

LinkedIn told Panda Security:

We investigate suspected violations of our Terms of Service, including the creation of false profiles, and take immediate action when violations are uncovered. We have a number of measures in place to confirm authenticity of profiles and remove those that are fake. We urge members to use our Help Center to report inaccurate profiles and specific profile content to LinkedIn.

As always, it pays to be careful with information that you share online as it can save you many potential problems in the future.

Here are some tips to keep your LinkedIn experience as secure as possible. Update Privacy Settings to understand how you’re sharing information. Smart options include:

  • ApathyTurn your activity broadcasts on or off. If you don’t want your connections to see when you change your profile, follow companies or recommend connections, uncheck this option.
  • Select what others can see when you’ve viewed their profile. When you visit other profiles on LinkedIn, those people can then see your name, photo, and headline. If you want more privacy, display anonymous profile information or show up as an anonymous member.
  • Select who can see your connections. You can share your connections’ names with your other first-degree connections, or you can make your connections list visible only to you.
  • Change your profile photo and visibility. You can choose to have your photo displayed only to your first-degree connections, only to your network, or to everyone who views your profile.

Opt into Two-Step Verification to prevent other people from accessing your account. LinkedIn lets members turn on two-step verification for their accounts. This will require an account password and a numeric code sent to your phone when you attempt to sign in from a device your account doesn’t recognize.

Opt into Secure Browsing for extra protection against unauthorized access to your Internet activity and to make sure you’re connected to the real LinkedIn website. While LinkedIn automatically secures a connection when you’re on certain pages that require sensitive information, you also have the option to turn on this protected connection when viewing any page.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him at LinkedInFacebook and Twitter. Email the Bach Seat here.

Linux Turns 25

Linux Turns 25Linus Torvalds released the first Linux operating system kernel on Oct. 5, 1991. On Oct. 6, 1991, Torvalds began arguing with volunteer developers who would go on to make Linux an open-source powerhouse and eventually a household name. Today the Linux community is upwards of 86 million users strong.

Linux Turns 25As part of celebrations to mark Linux’s 25th birthday the Linux Foundation has published its annual Linux Kernel Development Report (PDF reg required). According to the Register, the report concludes that Linux is in great shape, “There may be no other examples of such a large, common resource being supported by such a large group of independent actors in such a collaborative way.”

The independent actors have a lot to collaborate on. The report notes that the first versions of the Linux kernel comprised about 10,000 lines of code. Now it’s nearing 22 million and growing at a rate of 4,600 lines a day.

Wall StreetWhile Linux may have started out as a hobby OS, that changed in the early 2000s. At the turn of the century, Wall Street banks demanded Linux support for their enterprise application servers says Tech News World.

“That was a moment that broke down resistance to Linux in the big IT vendors like BEA, IBM, and Oracle (ORCL). That hole in the dam was the start of a flood,” said Cloud Foundry CEO Sam Ramji. “Today Linux is the home of operating system innovation.

Linux user and open source advocateAporeto Virtualization Expert Stefano Stabellini, who has been a Linux user and open source advocate since the 1990s explained the transition. “… back when I started with Linux in the ’90s … [companies] did not understand it. They thought that open source was unsustainable, and Linux was niche and hobbyist.” He says that now everything has changed. Every company has an open source strategy now. “Microsoft (MSFT) was the biggest foe and now is a strong ally. Linux is the most widely adopted operating system of all times.

Dice points out that the most active contributors to the growth of Linux have included (in descending order) Intel (INTC), Red Hat, Linaro, Samsung (005930), SUSE, IBM (IBM), and various corporate consultants. Google (GOOG), AMD (AMD), and Texas Instruments (TXN) also ranked in the top 15.

rb-

So my first pass at Linux was Red Hat Linux 5.0. when Novell bought into Linux. Yeap I was a Novell CNE 5 way back in the day.

The last couple of projects I have been involved with have used Linux and not Windows, CMS, IVR, PAFW’s, and storage.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

AT&T Tries Broadband over Powerline

AT&T Tries Broadband over PowerlineIt’s alive. It’s alive! BPL has risen from dead. Longtime readers of the Bach Seat, know the history of Broadband over Powerline. I covered it many years ago here, here, and here. Imagine my surprise when there were a number of articles popping up all over the interwebs touting mega-telecom AT&T’s (T) try at BPL 10 years after everybody else gave up on the technology.

Broadband over PowerlineComputerWorld described this latest incarnation of BPL from AT&T as a low-cost, high-speed wireless internet technology. This time Broadband over Powerline relies on plastic antennas positioned along medium-voltage power lines and not through the conductive materials inside the power lines. FierceTelecom says that AT&T will attach the plastic antennas to the power lines and serve as a mesh network to distribute signals to homes and businesses. The Project AirGig low-cost plastic antennas and devices will regenerate millimeter wave (mmWave) signals. Millimeter-wave technology relies on electromagnetic waves that are longer than x-rays but shorter than radio waves (they are found in the 10 mm to 1 mm range and are also known as extremely high-frequency waves according to New Atlas. The EHF waves can be used for 4G LTE and 5G multi-gigabit mobile and fixed deployments.

John Donovan, chief strategy officer and group president of AT&T technology and operations, told FierceTelecom that Project AirGig delivers last-mile access without any new FTTH technology and is flexible enough to be configured with small cells or distributed antenna systems.

Broadband over PowerlineTo test the technology, AT&T is looking for a place somewhere in the next year with a favorable regulatory environment, since the carrier would need to partner with an existing electric utility. John Donovan, chief strategy officer for AT&T said the trial could be in an area where existing broadband is expensive, even in the U.S.

The AirGig project relies on over 100 patents, according to an AT&T statement. There is no direct electrical connection to the power lines, although network components could receive their needed power through inductive wireless electricity from the near by power lines, AT&T Chief Technology Officer Andre Fuetsch explained to Computerworld.

ATT logoAT&T said the testing will decide what frequency AirGig will use for commercial deployment, which could occur sometime around 2020 after the carrier rolls out 5G wireless. The frequency AT&T uses will affect the range of the signal and the speed, as well as whether it is over a licensed or unlicensed band. This decision is important if AT&T plans to use BPL as another weapon in its fight with Google Fiber. Earlier versions of Broadband over Powerline were incapable of delivering the Google (GOOG) promised Gigabit of Internet access.

“It’s a transformative technology that delivers low-cost and multi-gigabit speeds using power lines,” AT&T’s Donovan said, “There’s no need for enhancements for new towers, and it’s over existing infrastructure.”

Google (GOOG) promised Gigabit of Internet accessAirGig has already been tested in outdoor locations on-campus settings. “We’ve had it up and running 4k video and cameras on campuses for quite some time,” Mr. Donovan said.

Besides using the AirGig technology as an alternative broadband service delivery option, for urban, rural, and under-served markets AT&T wants to convince the electrical utility industry to apply AirGig technology to their unique needs. ComputerWorld says utility companies would be able to use the technology to help spot problems on their power lines from something like a downed tree or cracks in the cable sheath.

rb-

New Atlas points out that earlier this year, a millimeter-wave technology system set a new world record for wireless data transmission by sending data at 6 Gbps. The technology is also showing up in other applications, including heart-rate monitors, car-safety systems, and luggage scanners.

AirGig could be profitable for AT&T. If they can make a deal with an electrical company, they can avoid expensive make ready. Which Google Fiber is struggling mightily with. By using power lines, AirGig avoids the cost of digging trenches to lay fiber optic cable.

Still, questions remain about how this version of Broadband over Powerline will do in the real world.

  • What impact will heavy rain, snow or ice have on the signal?
  • What if a tree branch falls on a power line or the lines are swinging in the wind?
  • Since mmWave transmissions need a direct line-of-sight between antennae, what happens when critters like birds or squirrels decide to perch on the antennae? Will that lead to an outage?

The ham radio lobby will likely be up in arms again when they find AT&T still likes the idea of BPL in the 30-300 GHz bands. The ARRL was a key player in killing BPL 1.0.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.