3.87 GB and 3786 packages. Thats what you need to install the whole of R as on CRAN
( Note- Many IT administrators /Compliance Policies in enterprises forbid installing from the Internet in work offices.
Which is where the analytics,$$, and people are)
As downloaded from the CRAN Mirror at UCLA.
Takes 3 hours to download at 1 mbps (I was on an Amazon Ec2 instance)
Next question- who is the man responsible in the R project for deleting old /depreciated/redundant packages if the authors dont do it.
The amazing tabplot package creates the tableplot feature for visualizing huge chunks of data. This is a great example of creative data visualization that is resource lite and extremely fast in a first look at the data. (note- The tabplot package is being used and table plot function is being used . The TABLEPLOT package is different and is NOT being used here).
visualizing a 50000 row by 10 variable dataset in 0.7 s is fast !!
click on screenshot to see it
and some say R is slow ;)
Note I used a free Windows Amazon EC2 Instance for it-
See screenshot for hardware configuration
the best thing is there is a handy GTK GUI for this package. You can check it out at
This is not about hacking the cloud. Instead this is about using the cloud to hack
Some articles last year wrote on how hackers used Amazon Ec2 for hacking/ddos attacks.
Roth claims that a typical wireless password can be guessed by EC2 and his software in about six minutes. He proved this by hacking networks in the area where he lives. The type of EC2 computers used in the attack costs 28 cents per minute, so $1.68 is all it could take to lay open a wireless network.
Cloud services are also attractive for hackers because the use of multiple servers can facilitate tasks such as cracking passwords, said Ray Valdes, an analyst at Gartner Inc. Amazon could improve measures to weed out bogus accounts, he said.
and this article by Anti-Sec pointed out how one can obtain a debit card anonymously
VPN Account without paper trail
- Purchase prepaid visa card with cash
- Purchase Bitcoins with Money Order
- Donate Bitcoins to different account
Masking your IP address to log on is done by TOR
and the actual flooding is done by tools like LOIC or HOIC
So what safeguards can be expected from the next wave of Teenage Mutant Ninjas..?