Daily Archives: August 14, 2013

who has the manpower to do it with human beings?

Edward Snowden is safe from American “justice” for the moment, and he will certainly go down as the most effective whistle-blower in history. His revelations are going to cause a wholesale restructuring of the world’s most important communications system, the Internet. And that, rather than his whereabouts and fate, is now the real story.

On Aug. 8, Lavabit, a U.S.-based email provider that promised to keep its clients’ communications private, closed down.Series cases for iphone 5 protects against drops and dust. The National Security Agency approached it about six weeks ago demanding the same access to its customers’ emails that it has already extorted from big American Internet companies like Google, Facebook, Yahoo, Amazon and Microsoft.

The company’s owner, Ladar Levison, is under an NSA gag order, but he wrote to his clients: “I have been forced to make a difficult decision: to become complicit in crimes against the American people, or walk away from nearly ten years of hard work by shutting down Lavabit. I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”

Jon Callas, co-founder of Silent Circle, another encrypted email service that has just shut down because it cannot protect its clients’ data, went even further. “Email (that uses standard Internet protocols)…cannot be secure,” he wrote.

The mass surveillance being carried out by the NSA not only gives the U.S. government access to everything Americans say to one another. It also destroys everybody else’s privacy, because Internet routing protocol sends messages not by the shortest route, but by whichever route is fastest. That means, in most cases, through the U.S.Find the perfect leather or synthetic cell phone cellphone cases., and therefore straight into the hands of the NSA.

Snowden’s revelations so far have told us about two major NSA surveillance programs, both probably illegal even under American law. The first collects the mobile phone records of over 200 million Americans.

Don’t worry your pretty head about that, darling, said Sen. Dianne Feinstein, chair of the Senate Intelligence Committee: “This is just metadata, there is no content involved.” The NSA isn’t actually listening to your calls.

Well, of course it isn’t listening to billions of calls. Machines can’t listen to calls, and who has the manpower to do it with human beings? But machines can quickly use the call logs to identify everybody you ever talked to, and everybody they ever talked to, out to the fourth or fifth generation.

If one of those thousands of people ever spoke to somebody abroad with a Muslim name (or somebody who works for Siemens, or Samsung, or some other industrial competitor of the United States), they may take an interest in you. If you’re an American who has never had direct phone contact with anybody abroad, they may then apply to access the content of your calls and emails under the Prism program.

The Foreign Intelligence Surveillance Court which reviews such applications has refused precisely 10 of them (out of 20,919) since 2001. Besides, the content of most Americans’ messages can probably be examined without recourse to the judges under one of the blanket authorizations issued by FISC. And if you’re not American, or an American resident who once spoke to somebody abroad by phone, then you’re in a free-fire zone.

If you are American, you probably don’t care about that, because you are mesmerized by the guff about a huge terrorist threat that the security barons use to justify the endless expansion of their empire (now almost a million employees). A recent opinion poll by the Pew Research Center found that 62 percent of Americans think “fighting terrorism” is more important than worrying about personal privacy.

But if you belong to the great majority of Internet users who are not American,Extend the power on your iphone 5 back cover juice pack. are not in a perpetual sweaty panic about “terrorism” and have no protection whatever under American law from the NSA’s spying, then you will want ways to avoid it. So the market, or other governments, will create such ways.

What’s needed is a big investment in Internet switching capacity in countries where the spies are not completely out of control.expensive version of Replacement parts for iphone 5 screen Supply Store. Then non-Americans can just join one of the many servers that will spring up to meet an exploding demand for secure Internet services.

Finnish Internet servers are already emphasizing the security of their services. Germany, whose memories of the Gestapo and Stasi secret police make it particularly sensitive about the NSA’s spying, may take the lead in building non-US internet capacity, or it may be big countries like Brazil and India that are relatively invulnerable to US pressure. But this is a huge market opportunity, and it will get done.

And the losers? The big U.S. Internet providers, who will find that few of their customers want to store their data in American “cloud” services. “If businesses or governments think they might be spied on,” said Neelie Kroes, vice-president of the European Commission, “they will have less reason to trust the cloud, and it will be (American) cloud providers who ultimately miss out.”

As Jennifer Granick, director of civil liberties at the Stanford Law School’s Center for Internet and Society, put it recently: “America invented the Internet, and our Internet companies are dominant around the world. But the U.S.Check out our daily specials on Cheap Dedicated Server! government, in its rush to spy on everybody, may end up killing our most productive industry.”
Click on their website www.wantbuyletbuy.com/Supply-cases-for-verizon-cdma-iphone-4_c169.

Pricing information for the infrastructure

If you are looking for one throat to choke for a virtualized x86 server stack, the right one is tough to find. But Oracle wants you to wrap your hands around Larry Ellison’s neck, and is betting that its new Virtual Compute Appliance works so well and is such a good bargain that you won’t squeeze.

The system makers that have welded together servers, switches, and storage do not control their own operating systems or hypervisors for those servers, even if they do have their own Unix or proprietary variants. And the dominant operating system suppliers on x86 iron – Microsoft and Red Hat, with a bit of action coming from SUSE Linux and Canonical – who also have hypervisors and control freaks to make them behave do not make and support their own systems.

Oracle, says Adam Hawley, senior director of product management for virtualization products, will be the first tier-one system, operating system, and hypervisor maker who can claim to control a complete server virtualization stack.

The Virtual Compute Appliance is not a member of the Exa family, which is made up of clusters of x86 servers from Oracle tuned up to run parallel databases or middleware software from Oracle atop its own variants of Linux, which is derived from Red Hat Enterprise Linux but with a homegrown Linux kernel that Oracle patches and supports without breaking application compatibility with RHEL. The Exa line is specifically geared for “extreme performance,” while the appliances for running databases, Hadoop, and now hypervisors and virtual machines are more general-purpose.

The new infrastructure cloud appliance is based on Oracle’s X3-2 servers, which are equipped with two of Intel’s current “Sandy Bridge-EP” Xeon E5 processors, which in this case have eight cores running at 2.2GHz. Each server node in the cluster is configured with 256GB of main memory running at 1.6GHz, plus two mirrored 900GB disk drives and a dual-port 40Gb/sec InfiniBand adapter card. There is a Gigabit Ethernet management port on the server node, as well.

The setup comes with two base nodes for storing virtual server slices in a rack, expandable to a total of 25 nodes.Extend the power on your iphone 5 back cover juice pack. There are two more identical server nodes in the rack, which are mirrored for high availability and are used to run Oracle’s management software.

The virtual servers in the appliance are not meant to store the virtual machines on the node’s puny disk drives, but rather link out to a ZFS 7320 Storage Appliance with 24 of those 900GB disk drives. Each dozen of the drives are put in a RAID group and then mirrored, and after all of the Oracle software is on there, there is about 6TB left over for virtual machine images.

Each server has a 40Gb/sec adapter that presents virtualized InfiniBand and Fibre Channel adapters to link the servers to each other and to the core network and, in the case of Fibre Channel, to link out to external storage arrays linked to the I/O director switch.

The Fibre Channel modules are not yet supported, but InfiniBand links to the ZFS 7320 are. There are enough InfiniBand ports to handle 85 server nodes, which is more than three racks,Series cases for iphone 5 protects against drops and dust. but this configuration is not going to be supported initially, either, says Hawley. The setup includes a 36-port InfiniBand spine switch and two 24-port Gigabit Ethernet switches for management.

That’s the hardware in the Virtual Compute Appliance. The software stack includes Oracle VM, Big Larry’s implementation of the Xen hypervisor, as well as Oracle VM Manager, the control freak that is used to manage and monitor the hypervisor and to create and manage virtual machine images. The Oracle SDN software, which runs on the Xsigo I/O director switches and which creates virtual network links between VMs and physical server nodes in the cluster, is also tossed in.

Rather than use the open source OpenStack or CloudStack cloud control freaks to manage the virtual server clusters, Oracle has cooked up its own shiny new control software, which is given the perfectly obvious name of Oracle Virtual Compute Appliance Controller Software. This is the orchestration and automation layer for a single rack of virtual servers, and it has a GUI interface as these tools tend to these days. If you want to manage multiple racks, then Oracle’s Enterprise Manager Cloud Control hooks into the new compute appliance control software.Find the perfect leather or synthetic cell phone cellphone cases.

Oracle supports Linux, Windows, and the x86 variant of its own Solaris Unix as virtualized guests on the Virtual Compute Appliance, and the company is obviously hoping that customers stick with its own Oracle Linux and Solaris distributions. It is not clear if there will be any price incentives for this.Check out our daily specials on Cheap Dedicated Server!

Pricing information for the infrastructure cloud appliance was not made available, but will be on the official Oracle price list when it ships in September. “We will be very aggressive and right there with them,” Hawley says of the competition, which includes the Unified Computing System machines from Cisco Systems and their vBlock and FlexPod stacks, Virtual System and CloudSystem from HP, Flex System from IBM,expensive version of Replacement parts for iphone 5 screen Supply Store. and Active Infrastructure from Dell.

Moreover, Hawley says that while price is important, it will not be a determining factor. One way of interpreting that is that Oracle has a clever templating system and has automated the configuration of the cluster so you can fire it up and it configures itself in under an hour, meaning that Big Larry thinks he can charge a premium.
Click on their website www.mileweb.com/popular-dedicated-server for more information.

We want to make sure people are prepared for that

A recent report from the Center for Strategic and International Studies claims the cost of cyber crime and cyber espionage could be as high as $500billion, with losses of $100bn and 500,000 jobs in the US alone.

The actual figures are hard to ascertain, as the consequences of such things as IP theft are more difficult to assess than emptied bank accounts.

It is no wonder, then,Explore the benefits of having a fully managed dedicated server as your platform. that designers are looking to design in security from the start, rather than think about it as a retrofit option – an option that cannot yield security levels on a par with designed in security solutions.

The key here is the level of connectivity brought about by the Internet of Things. Every connection increases the security risk and if, as predicted, there are some 30bn connected devices by 2020, that represents a lot of security risks.

When charged with developing a secure system, where should the designer start? Is it with the hardware, the operating system or the application software? Three experts in the field – John Blevins, director of marketing for LynuxWorks,Select from a variety of cases for ipad mini or create your own! David Kleidermacher, cto of Green Hills Software, and AJ Shipley, chief security architect at Wind River – believe there is a multitude of considerations involved in developing a secure embedded system.

Shipley believes that problems start with people. “The weakest link is often the human element, although often deeply embedded devices don’t have that – they don’t have to worry about a person clicking on a link and installing some type of software. However, traditionally,desirable Cases for HTC One create an air of sophistication with an extra helping of protection for your flagship smartphone. the biggest weakness has been in how the coding has developed. Weaknesses are typically introduced by accident as a part of the development process, primarily because there is not a good understanding of how code needs to be developed – how security needs to built in through the process.Series cases for iphone 5 protects against drops and dust.”

Part of the problem, at least, goes back to increased connectivity, according to Blevins. “By attaching something to the internet, it becomes subject to all the attacks that are out there against the enterprise world, the pc world, the server world and so on. We want to make sure people are prepared for that – embedded developers have not always had their devices on the internet and have taken the naive approach that they built the device, it runs fine and they are not concerned about the possible attacks that could come when their device is attached to the internet.”

“If you don’t start with a secure foundation, which is the operating system,Fun sell a huge range of Cases for iPad 4, there is no sense in implementing application security because you can always get underneath it,” commented Kleidermacher, who said this, along with skilled security code writers and a knowledge of relevant protocols, provide the three key starting points when developing a secure environment.

When looking from the perspective of designing a secure embedded device, the application software, the most likely point of attack, can have its own levels of security, but the effect on the system in terms of infection or invasion will be determined by the operating system. Equally, the hardware has a bearing on the level of security possible.

“A lot of chips have security features built in; the problem is there is no consistency across different architectures – Intel has some things, ARM has others – so being able to have relatively portable code bringing the security features up to the operating system is probably a better way of doing it, especially when the operating system and the applications are the things that are typically the most vulnerable.”

“If you think of all the attacks in the pc world, they are all against Windows or getting underneath Windows or attacking Windows device drivers,” he continued. “The real vulnerability now is in the operating system and I think that is why a lot of people really don’t trust using a regular operating system in their embedded systems.”

System security, our experts agree, therefore rests largely with the operating system.

In a constantly evolving environment, security levels within operating systems are difficult to guarantee, but one way is using the Common Criteria, the international standard for IT security evaluation. It rates all products from one to seven, where seven is equivalent to a mathematically proven guarantee of total security.

Systems can only be certified to the security level to which they were originally designed. Operating systems like Windows, Linux and Android were designed to be sophisticated, rather than secure. They have a huge ‘surface area’ – millions of lines of code – to attack and so have an security rating (EAL) of 4+ and no amount of patches can allow them to go higher than this.

Dedicated secure embedded operating systems can go further than this. Green Hills’ flagship OS Integrity has been certified EAL7. “Given our pedigree of being the only OS company to have reached that EAL7 certification, there are two things that people should infer,” claimed Kleidermacher. “One, obviously, that we have an OS that is secure – the second is that we have a process for building security and we can help people do it on their software.”
Click on their website www.mileweb.com/popular-dedicated-server for more information.

There has been a lot of interest in tools

As organizations ramp up their mobile development programs, they’re faced with decisions. Should they choose Apple or Android? Native, hybrid, or browser-based? Tablet or smartphone? Once an organization chooses a direction, it risks potentially locking themselves in to that approach. With its history in 4GL development techniques, Magic Software realizes that flexibility is a feature in its own right.

You may remember Magic and its eDeveloper product, a 4GL development environment that supported the capability to generate RPG code that deployed on AS/400 servers. eDeveloper is no longer actively developed, but its heritage lives on in newer products, namely xpa (formerly uniPaaS), the application development and runtime stack and the flagship of Magic’s suite.

Developed using Microsoft .NET technology, xpa features a metadata-driven development approach that harkens back to the 4GL days and eDeveloper. The software enables developers to design business apps that run natively on IBM i,Fun sell a huge range of Cases for iPad 4, Windows, Linux, and Windows, and feature Web, Windows, or mobile interfaces.

Magic has focused much of its own development efforts for xpa on rounding out its mobile capabilities. To that end, it gives developers the option of deploying mobile interfaces as native apps on Apple iOS, Google Android, and Blackberry. It also supports HTML5 interfaces for those developers that want to take a pure Web browser approach, or blend native with HTML5 technology with the hybrid approach.

That level of flexibility is central to Magic’s strategy, explains Regev Yativ, CEO of Magic Software Enterprises Americas, the Irvine, California-based division of the Israeli company.

“Once you write [the app], you run it through specialized codes and wizards that take that one piece of code and, based on your configuration, actually changes and modifies it for the designated targeted OS,” Yativ explains in an interview with IT Jungle.

“So for example, if you developed an app for an iPad, but now you have people who want to use with the Nexus 7 tablet from Google, you would take that same piece of code, run it through our emulators and wizards, and the output would be something that looks like an Android application,” he says.

There will be some “tweaking and changes” that need to be done to optimize the app to utilize the particular screen elements used by iOS and Android, such as scroll bars, he says. “But you would not be redeveloping that code just because now some people want it to run on an Android tablet,” he says.

There has been a lot of interest in tools that enable multi-device deployments, such as PhoneGap, a free and open source framework that competes with Magic’s mobile solutions. But Yativ argues that the actual development process is faster using Magic’s metadata-driven approach.

“Our tools from day one,Select from a variety of cases for ipad mini or create your own! with eDeveloper, were very interoperable. Magic traditionally had that strength in its tools,” Yativ says. “We advanced this interoperability over the years into a cross-platform environment with client-server apps. Now we’ve taken these capabilities into mobility. It’s slightly different, but the metadata principle is still the same.”

Magic has a long history with the AS/400, and it continues to support the IBM i server today. Yativ says that Magic’s IBM i customers are a little slower on the uptake of new technology,Explore the benefits of having a fully managed dedicated server as your platform. such as mobile,desirable Cases for HTC One create an air of sophistication with an extra helping of protection for your flagship smartphone. than customers who run primarily on Windows, Linux, or Unix servers.

“The way I know this market, I think they’ll always lag 10 to 20 percent behind,” he says. “Not because they’re laggards in nature, but because the installations are heavier. It takes more time to do the change management, and they’re restricted by regulations. But it [adoption of mobility] is coming.Series cases for iphone 5 protects against drops and dust. It’s definitely coming for this community just like any other community.”

“Enterprises certainly need connectivity to the backend,” Yativ says. “Otherwise they would have very fancy apps, but completely empty of data. It’s almost pointless not to have it.”

The prospect of having ERP data on a smartphone or tablet is certainly driving lots of interest in the technology. But along with that freedom comes the fear of losing a wireless network connection, and suddenly losing what one is working on.

Magic will address that fear with a new offline mode that it expects to announce next month. The new data caching feature will allow users to continue to work on a record they have open on their devices, even if the network connection is lost. When the network connection is re-established, it automatically syncs any changes made to the record with the business application.

Supporting Microsoft’s new mobile platform is also in the works. “Microsoft has been a bit elusive about that,” Yativ says. “We’re getting ready to support that platform. But we wanted to give them a bit of time to take market share. It seems like they’re doing it. We hope to fully support that in the coming short period. That’s certainly on the table.”

Magic licenses the enterprise mobility feature of xpa on a per user basis, with prices starting in the mid four figures. The company provides a variety of training programs for xpa, which a C#-C++ or Java developer would probably pick up faster than an RPG or COBOL developer. Professional xpa development services are also available from Magic and its partners for customers who prefer to have turnkey applications developed for them.
Read the full story at www.mileweb.com/terms-of-service!

Walking along the beach in Cornwall

I was sitting on some rocks by the Cornish coast when a teenager swanned by on the sun-warmed boardwalk in front of me. The boy stood on the burning deck,Fun sell a huge range of Cases for iPad 4, preparing to dash across the sand, dive.desirable Cases for HTC One create an air of sophistication with an extra helping of protection for your flagship smartphone. Then his phone rang.

Rage washed over me. I was angry because the boy had broken the sound of the waves with his silly ringtone and sillier chatter. I was angry because he had spoiled my own picturesque vision of him by doing something as banal as taking a call. But most of all, I was angry because he had distracted me while I was trying to take a scenic photo on my smartphone. I had been about to snap, click send and watch my message whoosh off from my Samsung Galaxy.

At the same time, a thought entered my head that’s been buzzing there ever since: we’ll never truly be on holiday again, any of us. The idea of escaping, switching off, is a thing of the past. Even when abroad, we’re at home because we’re in our usual place online. What is to become of us?

We can no longer live without our iPads and iPhones, even while — or especially while — on holiday. Something about being away from our familiar surroundings makes us reach for our gizmos as a drowning person clings to driftwood. We’ve only had smartphones for a few years, and suddenly we’re unmoored, all at sea, without them. The very thought of travelling without my mobile leaves me immobile with fear.

Many of my holiday rites now centre around my information technology toys. They are the last things I pack into my bag, because I use them to the very last minute. Also, I must ensure they’re all charged up, so I don’t have to suffer the agony of a juiceless phone during my journey.

As for the Internet — how to leave home without it? The places I venture to and stay in are influenced by TripAdvisor. My tickets and reservations are made online, with barcodes and booking numbers that I show to various receptionists by waving my more-vivid-than-life high-pixel-density mobile screen in their faces. At my holiday spot I spend a lot of time bent over Google Maps.

Perhaps next time I’ll just check into the world’s first Twitter-themed hotel, Sol Wave House in Majorca, where guests are urged to communicate with the staff and each other with tweets. Chirrup!

The summer makes our year-round obsession with technology especially obvious. It’s okay to be reliant on gadgets when you’re at the office, but when you’re lying on a beach in your bathers and you feel an unbearable urge to check your Twitter feed, it feels far weirder.

Walking along the beach in Cornwall it was astonishing how many people were stooped over their iPhones, cyber-surfing when they could be surfing, scrolling when they could stroll.

The fact is, our beings are now split in two — one occupies the physical world, the other the world wide Web, and while the real-world self may be on holiday, the Web-self is not. Or at least not until the holiday photos are posted online.

This is true of all of us these days, but it is especially true of our children and their children, the ones who grew up online, “digital natives”. It’s no longer enough to be somewhere lovely: it’s not quite real until the photos have been thumbsed-up,Explore the benefits of having a fully managed dedicated server as your platform. retweeted or liked. It’s as though if nobody online witnesses us next to the Empire State Building or the leaning tower of Pisa, then we weren’t really there.

We refresh our email inboxes, our Twitter and Facebook feeds every few minutes the same way we keep pulling on the lever of a -casino slot machine: something fantastic may land in our laps, if not a heap of coins then a hyperlink to an interesting article, or a text from that bloke you rather fancy, or a poke from a friend we haven’t met in years.

And on the bright side, this particular addiction isn’t likely to destroy our minds, in fact it might even enhance them. There’s evidence to suggest that all the flicking to and from different devices and conversations helps you think faster, more flexibly and more creatively. While your teenager seems inert on her beach towel, staring at a touchscreen, she is in fact teaching her brain to multi-task.

In China there are addiction camps for children and teens, where attendees are weaned off their digital obsession, sometimes in drastic ways such as being forced to do push-ups. There’s a nightmare holiday for you.

But perhaps there’s an idea here for us. Why don’t we all take an Internet break this summer? At first it will feel like you’ve pulled the plug from your oxygen tank,Select from a variety of cases for ipad mini or create your own! but after a couple of days, as I discovered, you will sink into your restful environment with a sense of relief and freedom.

The truth is that we text and tweet and email as much to feel like we’re in touch, to be part of things, as to pass on information. But we should temper this with a little old-fashioned respect for language. Just because it takes only a second to send a missive doesn’t mean we should take only a second to compose that missive.

There is no reason we cannot see ourselves as living in a new age of letters, and write all our texts and mail, craft all our photos, with the kind of care, thoughtfulness, and sense of grace, style and humour required.

All these thoughts were streaming through my mind on the train from Penzance back to London, as the English countryside flashed past, a series of windowed postcards. The passenger next to me was busy filling in bricks on his Excel spreadsheet, creating a wall of blues and yellows and greens.Series cases for iphone 5 protects against drops and dust. Others sat as if in prayer, heads bent over their smartphones composing texts that began: “Just on the train…”
Click on their website www.wantbuyletbuy.com/Supply-cases-for-htc-one-m7_c283.