Tuesday, January 26, 2010

NASA space telescope quickly spots first asteroid

Almost as soon as it came online, NASA’s Wide-field Infrared Survey Explorer has spotted a new, little over half-mile wide asteroid some 98 million miles from Earth.

The near-Earth object, designated 2010 AB78 and circles the Sun in an elliptical orbit tilted to the plane of our solar system. The object comes as close to the Sun as Earth, but because of its tilted orbit, it will not pass very close to Earth for many centuries. This asteroid does not pose any foreseeable impact threat to Earth, but scientists will continue to monitor it.

NASA telescopes watch cosmic violence, mysteries unravel

WISE spotted AB78 Jan. 12 as it circled the Earth and observed the asteroid several times during a period of one-and-a-half days before the object moved beyond its view. Researchers then used the University of Hawaii’s 2.2-meter (88-inch) visible-light telescope near the summit of Mauna Kea to follow up and confirm the discovery, NASA said. There is no danger of the newly discovered asteroid hitting Earth, NASA noted.

NASA said WISE has already opened a firehouse of space information and said more asteroid and comet detections will be forthcoming. The observations will be sent to the clearinghouse for solar system bodies, the Minor Planet Center in Cambridge, Mass., for comparison against the known catalog of solar system objects. A community of professional and amateur astronomers will provide follow-up observations, establishing firm orbits for the previously unseen objects, NASA said.

The WISE spacecraft in December successfully popped the cover off its infrared telescope and began what NASA called a"celestial treasure hunt" mission of sending back what will be millions of images of space. The first WISE infrared image was taken shortly after the space telescope's cover was removed, NASA said.

In January WISE, has captured its first image showing the over 3,000 stars in the Carina constellation.

The initial image - which was taken while the spacecraft was staring at a fixed patch of sky and is being used to calibrate the spacecraft's pointing system -- covered a patch of space about three times larger than the full moon, NASA stated.

The area was selected because it does not contain any unusually bright objects, which could damage instrument detectors if observed for too long, NASA stated. The "first-light" picture shows thousands of stars and covers an area three times the size of the moon. WISE takes about 7,500 images a day, NASA stated.

WISE will spend six months – about through May -- mapping the whole sky. It will then begin a second scan to uncover even more objects and to look for any changes in the sky that might have occurred since the first survey, according to NASA. This second partial sky survey will end about three months later when the spacecraft's frozen-hydrogen cryogen runs out. Data from the mission will be released to the astronomical community in two stages: a preliminary release will take place six months after the end of the survey, or about 16 months after launch, and a final release is scheduled for 17 months after the end of the survey, or about 27 months after launch.

WISE observes infrared light, letting it show the darkest components of the near-Earth object population -- those that don’t reflect much visible light. Visible-light estimates of an asteroid’s size can be deceiving, because a small, light-colored space rock can look the same as a big, dark one. In infrared, however, a big dark rock will give off more of a thermal or infrared glow, and reveal its true size, NASA stated.

NASA said WISE is expected to find about 100,000 previously unknown asteroids in our main asteroid belt, a rocky ring of debris between the orbits of Mars and Jupiter. It will also spot hundreds of previously unseen near-Earth objects NASA said.

The asteroid topic is a hot one as the National Research Council last week issued a report -- “Defending Planet Earth: Near-Earth Object Surveys and Hazard Mitigation Strategies" -- that said NASA needs to do way more to detect asteroids.

The report said combinations of space- and ground-based telescopes may be the most economically palpable defenses NASA can mount against asteroids and comets heading toward Earth, but there are more advanced defenses involving spacecraft and nuclear explosions that might be plausible in the future.

The report says the $4 million the US currently spends annually to search for comets and asteroids is insufficient to meet a congressionally mandated requirement on NASA to detect NEOs that could threaten Earth.

The report states that while impacts by large comets or asteroids are rare, "a single impact could inflict extreme damage, raising the classic problem of how to confront a possibility that is both very rare and very important. Far more likely are those impacts that cause only moderate damage and few fatalities."

An asteroid or comet about 10 kilometers in diameter struck the Yucatan peninsula 65 million years ago and caused global devastation, probably wiping out large numbers of plant and animal species including the dinosaurs, the report states.

Objects as large as that strike Earth only about once every 100 million years on average, the report notes. NASA has been highly successful at detecting and tracking objects 1 kilometer in diameter or larger, and continues to search for these large objects. The report notes that NASA has managed to accomplish some of the killer asteroids mandate with existing telescopes but with over 6,000 known objects and countless others the task is relentless.


source : itnews.com
Continue Reading...

Intego releases report on Mac, iPhone security for 2009

Security firm Intego has added to the bevy of year-in-review pieces for 2009 with a comprehensive report on Mac and iPhone security of the past year. While this may seem more than a little self-serving for the authors of VirusBarrier, the report is fair, comprehensive and hyperbole-free.

When it comes to Mac malware, there are only known two Trojan horses in the wild, which were respectively found via pornographic video websites and pirated software shared on Bit Torrent. There was also one non-functional proof-of-concept malware that only targeted the RealBasic runtime and a game that deletes files randomly, completely with the user's consent.

OS X itself fared pretty well when it came to operating system level exploits, with the report outright stating that "Mac OS X, while more secure than Windows, contains its share of flaws, and Apple has to constantly keep on its toes to issue several dozen security updates each year."

For most security holes, Apple issued a patch within a month of the vulnerability being brought to public attention, with the one exception being OS X's Java runtime. A security researcher brought up how one Java vulnerability remained un-patched for more than six months, but Apple released a patch only a month after his concerns were made public. One kernel-level vulnerability in April allowed hackers to potentially break into OS X without a user's consent, but that was patched in May.

Non-jailbroken iPhones faired even better. The sole major security flaw was the iPhone's SMS vulnerability, which Apple quickly released a patch for.

For jailbreakers, though, it was another story entirely. Jailbroken iPhones turned out to be at a significant risk for malware. Security researcher Charlie Miller claims the jailbreaking process "removes about 80 percent of the security protections built into the iPhone software."

The biggest target on the iPhone was the ssh remote login protocol, which allowed hackers and worms to get into the iPhone by correctly guessing the default password--a password which was not changed by most jailbreaking software. The first worm to exploit this ssh flaw actually "fixed" it by turning off ssh, but subsequently both a worm and hacking tool were each able to successfully download and upload software as well as other information to and from users' iPhones without their consent, paving the way for phishing attacks and the creation of a botnet.


source : itnews.com
Continue Reading...

Chinese human rights sites hit by DDoS attack

The news comes amid a row between Google and China over political cyberattacks


Five Web sites run by Chinese human rights activists were attacked by hackers over the weekend, as a separate row continued between Google and China over political cyberattacks.

The Web site of Chinese Human Rights Defenders, an advocacy group, was hit by a distributed denial of service (DDoS) attack that lasted 16 hours starting Saturday afternoon, the group said in an e-mailed statement on Monday. A DDoS attack involves the attacker ordering a legion of compromised computers all to visit a certain Web site at once, overwhelming its server with requests for communication and leaving the site inaccessible to normal visitors. The group said it could not confirm the origin of the attackers but called the Chinese government the most likely suspect.

Google this month said it had been hit by cyberattacks from China partly aimed at accessing the Gmail accounts of human rights activists. The company cited the attacks, which also resulted in the theft of Google intellectual property, as one reason it plans to stop censoring its Chinese search engine, even if that means closing down its China offices.

The latest hacking attack also targeted another Chinese rights group named Civil Rights and Livelihood Watch; two news sites run by Chinese activists, Canyu and New Century News; and the Independent Chinese Pen Center, which posts essays by dissident writers, according to the e-mailed statement. Public records show the Web sites all share two neighboring IP (Internet Protocol) addresses, suggesting the sites were all affected by the DDoS attack.

The bandwidth consumed by the attack hit 2GB per second at its peak, the statement said, citing the Internet service provider for the Web sites.

The targeted IP addresses belong to The Planet, a server hosting provider based in Texas. No one at The Planet was immediately available to comment.

Hackers also placed malware on two of the Web sites before the attack, but that is now being removed, the statement said. The group that sent out the statement has often been hit by cyberattacks, sometimes leaving its Web site down for days, it said.

An advocacy group for foreign journalists in China last week said the Gmail accounts of at least two reporters there had been recently hijacked.


source : itnews.com
Continue Reading...

Astronauts can now surf the Web, use Twitter from space

A software upgrade this week connected the International Space Station to the Web


The International Space Station received an upgrade this week that gives astronauts aboard personal access to the Internet.

Shortly after the software update, flight engineer T.J. Creamer sent the first unassisted update to his Twitter account.

"Hello Twitterverse! We r now LIVE tweeting from the International Space Station -- the 1st live tweet from Space! :) More soon, send your ?s," wrote Creamer.

Typically astronauts would e-mail messages from space to the ground where support personnel would post them to Twitter. Prior to the rollout of personal Web access, called the Crew Support LAN, astronauts had access to official e-mail, but weren't able to surf the Web, according to NASA spokesman Kelly Humphries. The crew now has access to the Internet via a ground computer when the space station is actively communicating with Earth using high-speed Ku-band communications. Humphries said that he could not discuss the speed of the connection due to security reasons.

Despite some "hiccups" that Humphries could not discuss the astronauts and ground crew had been working for about a month to get the service online. The space station crew is subject to the same computer usage policies as Earth-based employees. These rules prohibit visits to pornography, gambling and other sites. Humphries said that there are content filters on the network level that prohibit access to those and other sites.

At some points the space station can be viewed from Earth by the naked eye. It looks like a bright star moving quickly through the sky and typically can only be seen for a few minutes. NASA provides a Web site to track the station and can tell sky watchers exactly when and where it can be seen. A service on Twitter called Twisst creates custom alerts, based on a user's location, and alerts them when the space station will pass through the sky.

NASA astronauts weren't the only newcomers to Twitter this week. President Barack Obama and Microsoft Chairman Bill Gates also joined.


source : itnews.com
Continue Reading...

China slams Clinton's call for Internet freedom

China on Friday slammed remarks made by U.S. Secretary of State Hillary Clinton promoting Internet freedom worldwide, saying her words harmed U.S.-China relations.

China resolutely opposes Clinton's remarks and it is not true that the country restricts online freedom, Chinese Foreign Ministry spokesman Ma Zhaoxu said in a statement on the ministry's Web site.

Clinton's speech and China's response both come after Google last week said it planned to reverse its long-standing position in China by ending censorship of its Chinese search engine. Google cited increasingly tough censorship and recent cyberattacks on the Gmail accounts of human rights activists for its decision, which it said might force it to close its offices in China altogether.

China blocks Web sites including Facebook, Twitter and YouTube, and has long forced domestic Internet companies to censor their own services. Blog providers, for instance, are expected to delete user posts that include pornographic content or talk of sensitive political issues.

On Thursday in Washington, D.C., Clinton unveiled U.S. initiatives to help people living under repressive governments access the Internet for purposes such as reporting corruption. The U.S. will support circumvention tools for dissidents whose Internet connections are blocked, she said.

China's Ma called for the U.S. "to respect the facts and stop using the issue of so-called Internet freedom to unreasonably criticize China." Chinese law forbids hacking attacks and violations of citizens' privacy, the statement said, apparently referring to the issues raised by Google.

"China's constitution protects the right of citizens to free speech and promoting development of the Internet has been our consistent policy," the statement said. "China has its own national condition and cultural traditions."

U.S. "information hegemony" was also criticized in the state-run newspaper China Daily on Friday in an article about how the Internet is regulated.

China officially had 384 million Internet users at the end of last month, the most in any country.


source : itnews.com
Continue Reading...

What Business Can Learn from Gates' New Web Site

Want Bill Gates as a corporate advisor? Care to hear and read his thinking on the big issues facing the world today? Want to apply his approach to your own business? Then his new site--The Gates Notes--has something for you.

Since leaving his fulltime job at Microsoft in mid-2008, Gates has worked fulltime at his charitable foundation, which invests over $3-billion-a-year in solving the world's most critical problems, generally related to health and education.

The site, subtitled "An inside look at global matters," follows Gates around the world, both physically and intellectually. It includes essays, videos, and links to sources Gates is using to expand his own education. If there is such a thing as "progressive capitalism" it would describe the site's vague political bent.

The Bill & Melinda Gates Foundation has shaken the philanthropic world because it is run not like some sleepy do-gooder but like Microsoft: Making big bets and expecting both wins and losses along the way. Gates puts the same sort of thinking and management style that helped Microsoft change the world into the foundation's work.

The foundation is managed by former Microsoft execs, including Gates, his wife Melinda, Patty Stonesifer, and Jeff Raikes. Warren Buffet is a top advisor and Gate's father, William H. Gates, Sr., is co-chair with the son and daughter-in-law.

I'll repeat my prediction, made nearly a decade ago, that someday Gates and/or the foundation will win a Nobel Prize for its humanitarian work, which has grown to include Warren Buffet's charitable foundation as well.

The Gates Notes is an exceptionally well-done site, allowing Bill to present his wide range of interests in a variety of forms. I was quickly reminded that the reason Bill has all that money is because he really is that smart.

The question-and-answer page, where readers ask Gates questions, include topics such as "Is there progress on an AIDS vaccine?" to "Should companies help the poor?" to "Where can I get unbiased news?"

Gates even defends why his foundation isn't involved in climate change issues, saying they are better solved by the marketplace.

"I'm a believer that whenever markets can work, that's where you will find the best answers because you'll get entrepreneurs from all over the world who can pursue thousands and thousands of ideas in parallel," Gates wrote.

"Depending on how you measure it, energy is probably the biggest market in the world. That means somebody can make a risky bet and try it, and you have clear metrics of success. So if you have a promising idea about sequestering carbon, or a cheap nuclear plant, or solar photovoltaic, you can get the capital to build plants, to hire people, and to demonstrate whether it works at scale.

"This is perfect for the marketplace. But it's not something any foundation should try to do. In the areas that the Bill & Melinda Gates Foundation focuses on, it's where you have diseases that don't exist in the rich world and so the research dollars aren't there because there's no market-driven opportunity."

In other words: Capitalists are do-gooders, too, but foundations and, according to Gates, governments have their places, too.

The site may also put to rest any remaining fear the Gates is some sort of evil genius. His areas of interest--renewable energy, tropical diseases, family planning, climate change, pandemic response, the earthquake in Haiti--are more those of saint than sinner.

How can this help your business?

The Gates Notes, more than his books, shows how the man's mind works and shares his thoughts on current issues. It's not a how-to for businesspeople, but in seeing how Bill is trying to help change the world, you might pick-up some hints on changing your company, too. Since he's no longer competing with anybody, Gates has no reason to hold back or misdirect.

The Gates Notes also show that while business can certainly be a source of the world's problems, it can offer many of the answers, too. And if you're down on the world, Bill Gates might even make you an optimist.

David Coursey has been writing about technology products and companies for more than 25 years. He tweets as @techinciter and may be contacted via his Web site.


source : itnews.com
Continue Reading...

Web sites must support IPv6 by 2012, expert warns

Corporations and government agencies must IPv6-enable their public-facing Web sites in the next 24 months or risk upsetting a growing number of visitors with lower-grade connectivity.

"The drop-dead deadline for external Web sites to support IPv6 is January 1, 2012," warns John Curran, President and CEO of the American Registry for Internet Numbers, which distributes blocks of IP addresses to North American ISPs and other network operators. "When we get to the end of 2011, we're going to have a lot of people connecting over IPv6 and that doesn't bode well for the content providers who don't support IPv6."

IPv6 is the long-anticipated upgrade to the Internet's main communications protocol, which is called IPv4.

IPv6: The essential guide

IPv4 uses 32-bit addresses and can support around 4 billion IP addresses. The Regional Internet Registries including ARIN announced Tuesday that more than 90% of IPv4 addresses have been allocated.

IPv6 is designed to solve the problem of IPv4 address depletion. It uses a 128-bit addressing scheme and can support so many billions of IP addresses that the number is too big for most non-techies to understand. (IPv6 supports 2 to the 128th power of IP addresses.)

Curran is urging Web site operators to deploy IPv6 following this week's revelation that less than 10% of IPv4 addresses are available.

Industry experts predict the rest of the IPv4 address supply will run out in 2012.

"We're down to the final 10% in the glass," Curran says. "Most people understand that when you're down to 10% of something, you're pretty much running out. We're there now."

When IPv4 addresses run out, carriers will give IPv6 addresses to their new customers. Those IPv6 users are likely to favor IPv6-enabled content rather than traverse gateways in order to access lesser-performing IPv4 content.

"Unless you're willing to have the path between you and one of your customers go through a third-party gateway that you don't know and that you don't have control over, you want to add IPv6 to your Web site," Curran says. "Then when customers try to access your site, you have a straight path with IPv6 and with IPv4."

Curran says it's more important for U.S. CIOs to IPv6-enable their Web sites than it is for them to support IPv6 on their internal networks.

"The most important thing for enterprises is to make sure the content on the Internet gets IPv6 connectivity turned on in addition to IPv4. That's the top priority," Curran says. "Changing your internal network to support IPv6 is really based on when you see the benefits of making that transition, and that will vary by company. But your external, public-facing Web site affects many other organizations."

Only a handful of popular U.S. Web sites support IPv6, including those operated by Google, Netflix, Limelight and Comcast.

Usage of IPv6 grew significantly in 2009, although it still represents a sliver of overall Internet traffic. Several carriers including Hurricane Electric and NTT America reported that IPv6 traffic on their networks doubled in 2009.


source : itnews.com
Continue Reading...

Firefox 3.6 Brings Performance Improvements

Firefox 3.6 is here. While it isn't bursting at the seams with new features, it's an update that users should pick up

Earlier today, Mozilla released Firefox 3.6, the latest version of its popular browser. While it's not as big of an update as the more ambitious Firefox 3.5, it includes a number of under-the-hood improvements, and a handful of changes that you might discover as you use it. Here are some of the most notable improvements.

Plugin Check for Better Security

Firefox 3.6 can now detect whether any of your installed browser plugins (Flash, etc...) are out of date. Why is this important? Cyber-criminals often use bugs in outdated versions of some browser plugins--particularly Flash and QuickTime--to attack your PC and potentially install malware that can be used to steal your personal information, or turn your PC into a spam bot. In essence, Firefox 3.6 now automatically does what Mozilla's Plugin Check page did for earlier versions of Firefox.

Full-screen Video

You can now watch certain types of videos in full screen with Firefox 3.6. If the video is in the Oog Vorbis format, you can right-click the video and select an option to see it in full-screen. To give this a try, check out this time-lapse video of a drive through Downtown Seattle. To view it in full-screen, start playing it, right-click it and select Full Screen from the menu. Just like that, you're going down the streets of Seattle.

Well, sort of.

The downside to this feature, of course, is that it only works with certain videos, and unless you pay close attention to video formats, you may be confused as to why this only works part of the time.

Under the Hood

When we last tested browser page loading speed, we found that Firefox 3.5 was a good deal faster than earlier Firefox versions. Mozilla claims that Firefox 3.6 is even faster, with improvements to JavaScript performance in particular, which should result in faster load times for Web pages and Web apps. Firefox also improves support for some of the latest Web design technologies, which should make it easier for designers to create better, more attractive sites.

And, perhaps as a sign of things to come (with tablets starting to gain more attention), if your notebook or tablet (or whatever gadget you're using) has an accelerometer that detects changes in orientation, Firefox 3.6 will now be able to tell when you rotate your gadget, and it'll rotate with it.

The most noticeable change--at least from a visual perspective--is support for Firefox Personas. Personas are basically interface skins that you can apply with one click, and they're actually pretty similar to the skins available for the Google Chrome browser. Mozilla has a gallery of personas at getpersonas.com that features over 35,000 designs to choose from.

Applying a Persona is easy: Visit the Personas gallery using Firefox 3.6. To "try on" a Persona, mouse over it; Firefox will temporarily change its appearance to that Persona. If you like it, click it. If you decide to revert to the default theme, select Add-ons from the Tools menu, click Themes, then select Default.

One thing I noticed is that these themes look better on the Windows version than the Mac version; it looks like Personas were designed to take the Windows titlebar into account, but not the "unified" look of a Firefox window on Mac OS X (where the toolbar and titlebar appear to be one). Also, while Personas won't necessarily boost your productivity, some of the ones I toyed with make the text in the toolbar difficult to read.

If you use Firefox 3.5, upgrading to 3.6 should be a no-brainer. And if you use an earlier version, you too should upgrade, if for no other reason than to avoid any known security flaws that might affect older versions. It's a free download (of course) from getfirefox.com.


source : itnews.com
Continue Reading...

Bill Gates launches Gates Notes to share his thoughts

After joining Twitter and Facebook, former Microsoft chairman launches Web site
by Sharon Gaudin

As if joining Twitter and rejoining Facebook in the same week weren't enough, Bill Gates has now launched a Web site on which he can share his thoughts.

Sure, most people can share their thoughts and opinions using Facebook and Twitter . But most people aren't the former chairman of Microsoft Corp. and a world-renowned philanthropist.

So to better let people know what's going on in his world, Gates launched a site today called the Gates Notes .

"Since leaving my full-time job at Microsoft to dedicate more time to our foundation, a lot of people have asked me what I'm working on," wrote Gates as a welcome message on his new site. "It often feels like I'm back in school, as I spend a lot of my time learning about issues I'm passionate about. I'm fortunate because the people I'm working with and learning from are true experts in their fields. I take a lot of notes, and often share them and my own thoughts on the subject with others through email, so I can learn from them and expand the conversation.

"I thought it would be interesting to share these conversations more widely with a Website, in the hope of getting more people thinking and learning about the issues I think are interesting and important," he added.

So far, the site has information about the Bill and Melinda Gates Foundation, epidemic preparedness, relief for Haiti and climate change.

It's been a busy week for Gates.

Yesterday, he joined Twitter , sending out his first tweet . Since that first tweet on Tuesday afternoon, Gates has twittered six more times, and he quickly amassed a following of more than 236,000 people. He also made it onto more than 67,000 Twitter lists.

A little after 3 p.m. EDT Wednesday he Twittered about his new Web site. "My new Website is live check out www.thegatesnotes.com . Excited to share more about what I'm learning, hope you like it!"

And after quitting Facebook last summer and publicly saying that being on the social networking site was more trouble than it was worth, he made a return on Tuesday. To avoid being crushed with friend requests this time around, Gates has opted to let people become "fans" of his page instead.

Sharon Gaudin covers Internet and Web 2.0, emerging technologies and desktop/laptop chips for Computerworld . Follow Sharon on Twitter @sgaudin , send e-mail at sgaudin@computerworld.com or subscribe to Sharon's RSS feed? .


source : itnews.com
Continue Reading...

Infor looks to raise profile with personnel, strategy moves

Although Infor is one of the largest ERP (enterprise resource planning) vendors in the world after SAP and Oracle, you might never know it from scanning the tech headlines.

The privately held company is looking to change that, and has set the stage with a string of product initiatives and executive changes. One key move occurred earlier this month, when Infor announced that veteran industry analyst Bruce Richardson would become its chief strategy officer.

Infor is "about to move to the next level," said Ray Wang, partner with the analyst firm Altimeter Group. "They're poised to do a lot more. They're making selective hires that are going to make a big difference."

Since it was formed in 2002, Infor has already grown quite rapidly through dozens of acquisitions, with a major one being SSA Global in 2006. It now reports having 8,000 employees, 70,000 customers, and more than US$2 billion in revenue.

Richardson's long tenure in the software industry means he has seen multiple boom-and-bust cycles -- experience that should help inform his advice to the company on future deals, Wang said.

His hiring represents "the last step in basically a transformation of the management team," said Infor's director of public relations, Robert Keosheyan, who is a new arrival as well. During the past 18 months, CEO Jim Schaper has made a string of high-level executive changes, Keosheyan said.

A key challenge for Infor moving forward is keeping its large and diverse customer base happy, while reducing overall development costs.

Infor's general policy has been that it will "not de-support a customer that's paying maintenance," said Forrester Research analyst Paul Hamerman. "That's a good strategy. On the other hand, they need to advance their portfolio and migrate their customers forward as much as possible."

Work is afoot on those fronts. Last year, Infor introduced Flex, a program meant to make it easier for customers to upgrade or switch to other Infor products. It has also been developing a SOA (service-oriented architecture) platform called Open SOA. Infor's SOA platform is solid, but "they haven't necessarily used it to develop new products -- more to integrate them," Hamerman said.

"The company does need to have a long-term portfolio strategy in terms of the products," he added. "I see some areas of weakness there they need to shore up."

Infor has been strong in areas such as manufacturing and supply chain, but needs better technology for financials and human resources in order to have a cohesive ERP suite with appeal for multinational enterprises, Hamerman said.

Some of those capabilities could come through further acquisitions.

ERP vendors such as Lawson Software and Epicor, with revenues of roughly $750 million and $500 million, respectively, could be on Infor's target list, as well as smaller vertical players, Hamerman said.

Richardson is also expecting to help prepare Infor to go public. Infor investor Golden Gate Capital, has $9 billion under management, he noted.

"With big private equity companies, it's always about exit," he said.


source : itnews.com
Continue Reading...

Monday, January 18, 2010

Bringing virtualization to the branch office

In a recent newsletter we introduced the concept of Application Delivery 2.0, a major component of which is virtualization. This is the fourth in a series of newsletters that discusses how we think that virtualization will dramatically shape 2010 and beyond. This newsletter and the subsequent newsletter will focus on the challenges associated with implementing virtualized desktops.

Desktop virtualization cheat sheet

There is no doubt that there is more buzz in the industry surrounding virtualized servers than there is surrounding virtualized desktops. For example, our research indicates that whereas 8% of IT organizations have already implemented at least some server virtualization, only 50% of IT organizations have already implemented at least some desktop virtualization. That research, however, also indicates that within the next year that the number of IT organizations that have virtualized the majority of their desktops will almost double. In addition, the number of IT organizations that have not implemented any desktop virtualization will be cut in half. While cutting cost is the primary factor causing IT organizations to implement desktop virtualization, other key factors include increasing the productivity of the IT organization and having more control over the company's data from a security perspective.

Desktop virtualization centralizes the management of desktop applications including applications that are streamed on-demand to client devices (client-side virtualization) and applications hosted at the central site (server-side virtualization). In both of these models, the application is virtualized in the sense that it appears to be installed on the client device when that is not actually the case.

Client-side virtualization is comprised of two primary functions: application isolation and application streaming. Application isolation is based on the encapsulation of the application by an abstraction layer inserted between the application and the operating system of the client system. Application streaming is the process whereby the virtualized application is delivered to an end system's isolation environment from a centralized application repository over the WAN in an on-demand fashion.

When applications are streamed over the WAN it often results in some significant performance problems that require the deployment of a WAN optimization controller (WOC). For example, the code for streamed applications is typically transferred via a distributed file system protocol, such as CIFS, which is well known to be a chatty protocol. Hence, in order to effectively support application streaming, IT organizations need to be able to optimize the performance of protocols such as CIFS, MAPI, HTTP and TCP. In addition, IT organizations need to implement techniques that reduce the bandwidth requirements of application streaming. For example, by using a WOC it is sometimes possible to cache the virtual application at the client's site. Caching greatly reduces the volume of traffic for client-side virtualized applications and it also allows applications to be run locally in the event of a WAN outage.

The bottom line is that client-side virtualization increases the need for IT organizations to deploy a WOC. In our next newsletter we will discuss the impact of server-side virtualization. More insight into the changes we expect to see in 2010, as well as the drivers of desktop virtualization, can be found in Jim's recent report on cloud computing.


source : itnews.com

Continue Reading...

Cisco acquired nearly 50 start-ups in decade, most in M&A market

Head: Cisco acquired nearly 50 start-ups in decade, most in M&A market

Cisco acquired more start-ups than any other corporation over the past decade, in a list dominated by IT vendors such as IBM, Microsoft, EMC and Oracle.

Cisco purchased 48 venture capital-backed companies between 2000 and 2009, followed by IBM with 35, Microsoft with 30, EMC with 25 and Oracle with 23.

Hottest tech M&A deals of 2009

The data was compiled by Dow Jones VentureSource and published in the Wall Street Journal earlier this week.

The numbers, while impressive, don't fully reflect how acquisitive these vendors were in the past decade because they only include venture-backed companies, mainly start-ups. Cisco completed several billion-dollar deals last decade, including the $3.2 billion acquisition of WebEx and a $6.9 billion purchase of http://www.networkworld.com/news/2005/111805-cisco-scientific-atlanta.html ">Scientific-Atlanta, which weren't included in the Dow Jones calculation.

Cisco's biggest purchase of a venture-backed company in the 2000s, according to Dow Jones, was an $830 million deal for IronPort Systems in 2007, an e-mail security vendor.

Microsoft's top acquisition of a venture-backed company was $800 million for Tellme Networks in 2007, an Internet phone service vendor. EMC's biggest was the $625 million purchase of virtualization vendor VMware in 2004, while IBM's was a $225 million deal for database security vendor Guardium in 2009. Statistics for Oracle were incomplete.

The top 10 acquirers of VC-backed companies also included Broadcom, Symantec and HP, with 18 acquisitions each, Google with 17 and Sun with 16. Notable deals included Google's $1.65 billion purchase of YouTube, Sun's $1 billion purchase of MySQL and HP's $360 million deal for LeftHand Networks.

Sun, of course, has agreed to be acquired by Oracle for more than $7 billion, but the deal hasn't been completed yet because of regulatory hurdles in Europe. In addition to its activity with Sun, Oracle acquired five venture capital-backed start-ups in 2009, more than any other company, while EMC came in second place with four such acquisitions in '09.

2009 was a slow year for tech acquisitions, but experts believe buying activity will pick up in 2010.

Follow Jon Brodkin on Twitter at http://www.twitter.com/jbrodkin


source : itnews.com

Continue Reading...

EXPLOITS / VULNERABILITIES Juniper patches router-crashing bug

Hackers could take down routers with malicious packets
by Robert McMillan

Juniper Networks has issued seven security advisories for its products, including a fix for a nasty bug that could be used to crash the company's routers.

The number-two router vendor isn't releasing a public security advisory on any of the bugs -- that information is available to registered customers only -- but the problem is now being patched by telecommunications companies that use Juniper's high-end routers, according to security consultancy Praetorian Prefect.

"This was a serious issue which appears to have been averted through a coordinated response," the company wrote in a blog post at its Web site.

Though the bug was first identified early last year, security experts only recently figured out how it could be exploited in Internet-based attacks, making it a much more critical issue. By sending a specially crafted packet to the router, an attacker could cause it to crash and then reboot, Juniper said in the Tuesday advisory that was seen by the IDG News Service.

"The fact that you can start [rebooting] high-end equipment is a big thing," Praetorian's Daniel Kennedy said in an interview. "Some of those big routers handle a lot of traffic."

Kennedy said he didn't know of any public attacks that exploited the flaw.

All routers that use the JunOS operating system are affected, but any version of the OS built after Jan 28., 2009, includes the patch, the Juniper advisory said.

A Juniper spokeswoman declined to provide more technical details on the issue, saying that the company only passes on this information to customers and partners. The advisory was one of seven issued recently by the company, she said via e-mail.


source : itnews.com
Continue Reading...

Wall Street Beat: Intel, IT forecasts stoke expectations

The year will mark a new cycle of growth and innovation, Forrester says
by Marc Ferranti

Intel's earnings highlighted another upbeat week for the tech sector, as fresh market-research reports on PC sales and overall IT spending fueled confidence that global demand for IT, as well as vendor revenue, is poised to take off.

Boosted by predictions that IT will lead the global economy out of recession, the Nasdaq, heavily weighted with IT vendors, has for weeks remained at levels not seen since Wall Street started to collapse in September 2008.

The exchange hit a 52-week high last Friday, then retreated a bit along with broader indexes on continued concerns about unemployment, new taxes and regulations on the U.S. financial community. But the investor and analyst mood on tech remains optimistic.

Intel added to the upbeat sentiment when it reported Thursday that its 2009 fourth-quarter revenue rose to US$10.6 billion from $8.2 billion a year earlier. Profit was $2.28 billion, or $0.40 a share, compared with a profit of $234 million and $0.04 a share a year earlier. The 875 percent jump in profit came about partly because Intel earnings a year earlier were dampened by the company's almost $1 billion in investments in Clearwire. Still, the Intel numbers handily beat expectations.

The high side of Intel's projection for the current quarter also beat analyst forecasts. Intel said it expects revenue of $9.7 billion, plus or minus $400 million. Analysts currently project sales of $9.35 billion, according to Thomson Reuters.

The Intel results followed reports from Gartner and IDC that worldwide PC shipments jumped during the last three months of 2009, as low prices enticed consumers and businesses that had been delaying purchases during the turbulent economic times of the past year. Shipments totaled 85.8 million units during the fourth quarter, growing 15.2 percent compared to the same period in 2008, IDC said Wednesday. Gartner results were similar, and both market-research companies noted an increased demand for laptops and netbooks.

"The technology downturn of 2008 and 2009 is unofficially over," wrote Forrester analyst Andrew Bartels in a new IT spending forecast released Tuesday. After declining 8.2 percent in 2009, U.S. IT spending will increase by 6.6 percent this year, to $568 billion, Forrester said. Global IT spending, after dropping 8.9 percent last year, will rise 8.1 percent to more than $1.6 trillion, according to Forrester.

These increases will still not bring spending in line with 2008 levels, Bartels said in an interview. However, Forrester sees this year as the beginning of a new cycle where IT spending will grow at rates approaching those of the past decade.

"We see a new cycle of innovation and growth similar to the 1992-2000 period," Bartels said. As in that period, tech sector growth could be twice that of gross domestic product, which through 2012 could be as much as 5 percent or 6 percent on the upside, Bartels noted. This means tech sector growth could hit possibly double digits over the next few years.

The new cycle for tech is based on the adoption of "smart computing," Bartels said, with businesses and governments starting to make big investments in leading-edge technologies such as analytics, as well as service-oriented architecture, server and storage virtualization, and unified communications.

Demand for these technologies started to ignite above-average tech market growth in the U.S. in late 2007 and early 2008, before the collapse of credit markets, Bartels noted. "As financial markets recover and the freeze on capital investment thaws, we expect that deferred demand will come back in 2010, especially in the second half of the year," Bartels said.

The financial sector itself will help boost demand, according to Celent, a financial research and consulting firm. After a 2.5 percent decline in 2009, global IT spending by financial services institutions is expected to hit $357.4 billion in 2010, an increase of 2.9 percent. Global spending on IT products and services should grow to $393.5 billion by 2012, a 4.9 percent compound annual growth rate from 2010 to 2012, according to a report released Thursday by Celent.

Infosys Technologies, meanwhile, had good news for the services sector Tuesday, reporting revenue of $1.2 billion for the fourth quarter, up 5.2 percent over the same quarter in 2008.

The week also saw a range of mergers and acquisitions. Though the deals were small -- the terms of most of them were not disclosed -- the continuing M&A adds to the general sense that the tech market remains dynamic. Among the deals:

--Science Applications International Corporation (SAIC), a big U.S. government contractor, said Thursday it had signed an agreement to acquire CloudShield Technologies, a cybersecurity and management applications provider.

--CA Monday announced it had acquired Oblicore, a maker of service-level management technology that could help develop capabilities for companies that want to extend management to cloud computing environments.

--Also, Monday, middleware vendor Progress Software said it had purchased BPM (business process management) vendor Savvion for approximately $49 million.


source : itnews.com


Continue Reading...

Nortel's bankruptcy: A year of major change

Thursday marks the end of a very busy year of bankruptcy for Nortel, one that saw painful dismantling of the once mighty telecom giant and that leaves Avaya on the verge of revealing exactly what it plans to do with the enterprise VoIP and switching assets it bought.

Since last January, the company has sold its CDMA division to Ericsson for $1.13 billion; sold its enterprise division to Avaya for $915 million; sold its core packet network business to Hitachi for $10 million; and is in the process of auctioning off its carrier VoIP gear with an initial bid of $282 million.

The rise and fall of Nortel

Nortel entered the bankruptcy with its then-CEO Mike Zafirovski vowing to bring the company back from the brink, but started selling off bits and pieces of the company almost immediately. By the end of summer he was gone, as were the hopes of a resurrection. Zafirovski reappeared in the fall seeking $12 million, mainly severance pay, an annuity and bonuses.

On Tuesday Avaya will flesh details of its so-far broad-brush promises about how it will treat overlap in Avaya/Nortel product lines and draw a road map of a VoIP/unified communication migration for Nortel's corporate customers.

The overriding principle of creating the road map is to continue selling and supporting all Nortel lines for 12 to 18 months, but that is about as detailed as the company gets. Tuesday will reveal what products it plans to phase out and the migration path for customers that own them.

Avaya owns the Nortel line of enterprise switches and security gear that the company says it will keep and promote. Key to that is branch-office equipment that supports voice, data and -- more important to Avaya long-term -- unified communications.Avaya won't say until next week what it plans for Nortel's enterprise security products except that it can bring added value to UC infrastructure. The Nortel switching gear creates a one-stop-shop for UC and data infrastructure, but it's unclear how customers would respond to that given Avaya's already extensive partnerships with switch vendors such as Extreme Networks, Brocade and Juniper.

Clearly one of the biggest assets gained by buying Nortel was its extensive stable of corporate PBX customers that Avaya hopes to bring into the fold by transitioning them toward UC. Combined, Avaya and Nortel last year held 42% of all the phone lines shipped in North America.


source : itnews.com

Continue Reading...

SAP shakes up support structure, executive organization

SAP said Thursday that it would once again offer customers a choice of application support tiers, in a stunning reversal of a decision that had rankled many customers worldwide.

In 2008, SAP announced that customers would be transitioned to a fuller-featured but pricier Enterprise Support service. But Thursday, the company said a lower-priced Standard Support option would now also be offered.

SAP also said that a planned incremental price increase for existing Enterprise Support contracts would not occur this year.

Along with the shakeup to its support structure, SAP also announced a series of organizational changes.

A new Industry and Solution Management Board will be led by executive board member John Schwarz, and another board member, Jim Hagemann Snabe, will head up a Product Design and Development Board.

The company also announced leadership changes for its Asia-Pacific-Japan region and the Germany, Austria and Switzerland territory.

Executives are expected to discuss the announcements during a press conference Thursday.

(More to follow).


source : itnews.com

Continue Reading...

Haiti relief effort draws overwhelming flood of tech-trained volunteers

Tech-savvy volunteers have swamped the relief agency Telecoms Sans Frontieres with offers to deploy with the earthquake-relief effort in Haiti where the group has already deployed two SWAT teams armed with satellite gear, Wi-Fi equipment and rapid-response training.

But the offers have been turned down because volunteers need extensive training in how to survive and how best to operate in areas where disaster has struck, says Paul Margie, TSF's U.S. representative.

Tech Tools Tell the Story of Earthquake in Haiti

The group sends its workers to school at the University of Pisa in Italy before assigning them to one of TSF's three permanent bases around the globe. "We just can't add people in the middle of a disaster," Margie says.

In Haiti, the agency's teams are trying to create access to the local telecommunications systems so survivors can call out to let relatives know how they are, but also to set up communications between rescue centers on the island.

Each team member comes in with one suitcase for personal belongings and a limited array of technical equipment, which consists mainly of three things: a Bgan communications hub, an M4 satellite transceiver and a very small aperture terminal (VSAT) ground station.

The equipment is used to establish satellite links out of the disaster zone to connect relief workers to support staff and to provide connections for residents to phone out.

If the core of the local phone system works, the TSF volunteers use their training to tap into it and establish telecommunications centers where banks of phones can serve local populations.

The group works in partnership with United Nations relief agencies that have more resources. TSFs role is to fulfill the communications needs of these groups, Margie says.

Beyond broad telecom knowledge, volunteers need training in disaster logistics and part of the curriculum is training in hostage situations, he says. TSF has sent teams to Iraq, Pakistan, Indonesia and the Philippines, among other places in its 10-year history.

The group was founded by general aid workers in the Balkans who found that civilians affected by war sought use of the communications gear before asking for food and clothing.

Before heading off to Haiti, a TSF team based in Nicaragua was working with health officials there to gather infection data via SMS to map out where an outbreak of dengue fever is worst to help plan mosquito-spraying efforts, Margie says.

Corporate sponsors of the group include Vodafone, Cable & Wireless, Inmarsat, Comcast, AT&T, PCCW International and Eutelsat.


source : itnews.com

Continue Reading...
 

Free Online IT Information Copyright © 2009