Cyber Frontiers

Using Big Data and Graph Theory to Map the WWW – CF016

This week Ashton and Christian kick off the new year by discussing plans to launch the first major cybersecurity research project on the development sandbox: mapping the internet with traceroute, distributed Nmap, and Hadoop. We discuss strategies and design challenges that will be present early on in development and potential solutions that may be employed. Furthermore, we tie back the project to the latest developments in the North Korea cyber fiasco with Sony Corporation. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Full show notes and video at Listen Mobile:     Ideas for use of hadoop cluster -Original idea: Set up complete ipv4 scanner to ingest and analyze data, for monday I could easily set up the distributed nmap and load it into hbase -Set up real time log management system, again using hbase to store multiple different log files.  We could then set up one more small VM as a honeypot and track different logs from it. -Using a publicly available DNS dataset as training data, we could inject a bunch of malicious server names from a blacklist and try to use machine learning with hadoop to identify malicious URLs just using the names.  I have read research papers where this is done with decent success rates. Any of the above could be accompanied by another article on cyberfrontierlabs with associated code etc. and could probably be completed in a few hours. General idea: (0) sample insertion to hbase so I understand format start distributed nmap scanning and storing information in xml format on multiple nodes Use some method to convert xml into json or csv Store results in hive (and thereby hadoop) — Nmap: Various scans which can be used to identify hosts, services, operating systems etc. Distributed nmap: Can be used in a cluster to speed up network scanning using nmap Zenmap: nmap GUI which gave us the idea for network graph   Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Home Gadget Geeks

College Tech and the Gadgets it Takes to Make it Thru the School Year – HGG195

Christian Johnson () and Ashton Webster join Jim () for show #195 of Home Gadget Geeks brought to you by the Average Guy Network, part of #160; We spend some time catch up with Christian and Ashton and discuss what is going on over at Cyber Frontier and #160; We also ask how are the new dorms outfitted?  What have you found really useful?  What was a bust?  What tech did you bring with you to school this year?  Different than last?  What do you wish you had that you don’t?  Have you seen any major changes in what the students use over the last year? What about fitness tech?   What are you learning thru Cyber Frontiers? Support the Average Guy Tech Scholarship Fund: or if you are in Canada, WANT TO SUBSCRIBE? Join us for the show live each Thursday at 8pmC/9E/1UTC at or call in your questions or comments to be played on the show at (402) 478-8450 Full show notes and video at Listen Mobile:     The Promise of the Internet is Real and Is for Everyone -  OnAir Box Kickstarter Project –   Catch all the subscription links at Facebook Group: Jim’s Twitter: #!/jcollison Contact the show at Find this and other great Podcasts from the Average Guy Network at
Continue Reading »
Cyber Frontiers

Part 2: Exploring Big Data Through the Twitterverse – CF014

This week Ashton and Christian continue their exploration of Big Data through tweets around the world using Twitter’s Streaming API. In particular, Christian walks through improvements to his starter kit, showing how to manipulate and filter tweets, as well as do the classic Word Count example using tweets and hashtags. Ashton walks us through how to use Storm to push streaming tweets directly to the data platform, allowing for large-scale analysis that can support millions of tweets in the dataset. Between the in-show code walkthroughs and our project starter kit out at – you should have everything you need to begin mastering data analytics concepts through the Twitterverse! Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Full show notes and video at Listen Mobile:     Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

Exploring Big Data Through the Twitterverse – CF013

This week Ashton and Christian begin an exciting, multi-part series on how to leverage big data technologies to learn new skills in data analytics using one of the world’s cheapest and largest value data sources – tweets! We take a look at the Twitter Streaming API, techniques for collecting and storing these data sets, and basic visualization exercises in Java and HTML5. We also take a look at some automated Twitter interactions using Python scripting and basic rule sets. This is a great show to follow along with on our video feed if you typically are an audio-only listener. We’ll pick-up with how this project integrates with the data analytics sandbox we built and discussed in previous episodes. There is something for everyone in this conversation. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile:   This week Christian, Ashton, and their host Jim take a look at some of the opportunities to process Tweets using real time #160; Demonstrations include a letter count for tweets as well as a geolocation application, illustrating a small example of how Tweets can be used to create interesting pictures of the world around us. Register an application here so that you can gain access to the API. The Java library to interface with the Twitter API. This article was particularly helpful in coming up with the storm topology.   Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: / 
Continue Reading »
Cyber Frontiers

Building a Big Data Development Environment on the Cheap, Virtualization Tech & SDN, and the Big Bad ShellShock – CF009

This week on Cyber Frontiers, Christian Johnson and Ashton Webster, joined by Jim Collison, talk about how to setup a multi-node distributed Hadoop cluster on a single box. The discussion on the technology quickly dives into newer technology in virtualization in SDN, and we even get a little bit of time to talk about the relevancy of the shellshock news to our big data research on the show. This should be a treat to newcomers in the big data space as well as veteran data geeks! Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does. Support the Average Guy Tech Scholarship Fund: WANT TO SUBSCRIBE? We now have Video Large / Small and Video iTunes options at You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile:     CYBERSECURITY Why the internet is broken The actual code which you can use (if you have shell access) to test a machine for the vulnerability Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at Music courtesy of Ryan King. Check out the Die Hard Cafe band and other original works at: /  Some links may contain affiliate codes that benefit the Average Guy Podcast Network.
Continue Reading »
LIVE

Matthew Monahan from Inflection talks Digital Identities, Big Data, Millennial Trends and Entrepreneurs – Infotec 2014

  Jim Collison is an employee of Gallup Inc. in Omaha Nebraska. Find out more about Gallup Careers at , and start your strengths journey at These videos were created in partnership with AIM, Gallup and Matthew Monahan is the CEO and co-founder of Inflection. He attended the entrepreneurship program at the University of Southern California. After dropping out and selling his first business, he came to Silicon Valley and joined forces with his brother, Brian. Inflection develops data services that help people build trust and connection on the Internet. By organizing directory information, public records, and digital identities, Inflection helps bring order to the Big Data landscape with a portfolio of innovative products. Matthew and Brian also won Entrepreneur of the Year award in 2012.  The company has created , , , , and TWITTER:@Inflection LastPass – Amber Gott from LastPass on Home Tech with Jim – Jim’s Twitter: #!/jcollison Contact Jim at
Continue Reading »
Cyber Frontiers

Cyber Frontiers – Exploring Cyber Security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective – CF001

Christian Johnson joins Jim (@jcollison) for show #1 and the Pilot of Cyber Frontiers brought to you by the Average Guy Network. Cyber Frontiers is all about Exploring Cyber security, Big Data, and the Technologies Shaping the Future Through an Academic Perspective!   Christian Johnson, a student at the University of Maryland will bring fresh and relevant topics to the show based on the current work he does.  Never on a schedule, but always up to date! You can contact us via email at or call in your questions or comments to be played on the show at (402) 478-8450 Listen Mobile: Welcome/Podcast Introduction — Origins from Christian’s Corner —What’s the purpose – History, Current Events, and Technical Training —Interactive Events Planned What is Big Data? What is Cyber security? Definitions Big data – term for a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications. Cyber security – the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this. History of Big Data in a nutshell “Big data and network science are going to merge, marrying the internet of data with the internet of things in new ways, and this will be world changing. Just as in the 1800s there was a shift from electricity as a curiosity to a commodity made possible by the emergence of electrical engineering, so too now are we in the midst of a shift in data as a commodity, and more importantly as a resource, in ways not previously imagined” — Shirley Ann Jackson, RPI History of Cyber Security in a Nutshell —It’s more than just the technical aspects. Legal, economic, personal, etc. Privacy implications, living implications, to the point where our most important functions in society have moved to a cyber world. How are these topics related? (Discussion) Education Institutions Are at the Forefront Support the Average Guy Tech Scholarship Fund: Facebook Page:  Facebook Group: Jim’s Twitter: #!/jcollison Contact Christian: Contact the show at Find this and other great Podcasts from the Average Guy Network at
Continue Reading »