51 posts • joined Wednesday 20th June 2007 05:50 GMT
Re: Research? Better get the launch costs down first...
>> It's going to be a research centre? Not until the PRC can get seat prices way, way down & seat availability way, way up...
This isn't the 60's - aside an abundance of existing research and experimental results and the average first world citizen carrying a full scale NASA supercomputer in his/her pocket, there are now even commercial operators in this market; http://www.virgingalactic.com/booking/
Just take a look at the cost of computing over time; http://www.britannica.com/blogs/2010/04/computers-just-keep-getting-cheaper-and-better-and-we-should-eagerly-await-the-days-ahead/
>> Nuclear winter would block out much of the world's sunlight, which coupled with the lack of machinery, fertilizers, and pesticides, (as well as radioactive topsoil) would have led to mass starvation.
We'll get there, we just chose the scenic route.
Re: Confused - it's a security thang
> From what very little I understand, I don't see why it was not adopted by linux.
By default - in a Desktop mode it does - brings up a log-out screen while you're in a session. But it can be anything you want it to be (http://www.ghacks.net/2009/06/09/linux-tips-modify-ctrl-alt-del-behavior/).
For DOS-like brilliance you can either create /etc/event.d/control-alt-delete with this content (exec /sbin/shutdown -r now "Control-Alt-Delete pressed") or add the following content to /etc/inittab (ca:12345:ctrlaltdel:/sbin/shutdown -r now "Control-Alt-Delete pressed").
For Windows-like brilliance you can assign the key binding using Metacity or Compiz to bring up the system monitor (gnome-system-monitor) like in this example (http://www.webupd8.org/2009/09/change-ctrl-alt-delete-behavior-to-open.html) or take the desktop session back to the login screen (logout-gnome="gnome-session-save --force-logout") via this example (http://askubuntu.com/questions/15795/how-can-you-log-out-via-the-terminal)
Linux's true equivalent is Alt-SysReq-Func; http://en.wikipedia.org/wiki/Control-Alt-Delete
>> The equation (below as an image) is a statistical expression of the size of sub-communities in the network, based on the statistical concept of the H-index.
So now we can standardise the X-axis complexity milestones - from lowest to highest complexity;
- Home / Small Office
- LAN Party
- Homogeneous global enterprise (Facebook / Amazon / Google / Twitter / Salesforce)
- Legacy global enterprise (IBM / HP / Microsoft)
- Any Data Centre more than 30 years old (National Governments, Universities, Hospitals)
- We will add your distinctiveness to our own
>> As such, it has been welcomed by industry groups as one of the ways Australia can ensure the IT&T industry has a well-educated pool of people to employ, even if those people won't hit the jobs market until 2030.
Just in time to in-source again ..
Larry, still teaching.
15 Ways to Tell Its Not Cloud Computing
If you know where the CEO is... it's not a cloud.
> Perfect job opening for 3 wise monkeys
I'd settle for them hiring one replacement monkey, the next time Clapper's role is up: Shizaru, symbolising the principle of "do no evil" (depicted crossing his arms) .. assuming he has any power ..
Re: Implausible, except for the demo
> Did you not understand this is about servers?
Can you find where "server" appears in the article?
The article is about vPro and Sandy Bridge, and the features questioned in the article ("No evidence is offered for the assertions detailed above") were features Intel - via Intel's director of distribution sales, North America, David Allen - advocated/promoted for vPro in Sandy Bridge as "market opportunities" in 2010 (so you can also ignore Popular Resistance forming in 2011): http://forums.theregister.co.uk/forum/1/2013/09/23/intel_stuns_world_with_wakeon3g/#c_1965254
And now for something completely different
Quoth the Reg >> Other tactics include attempting to persuade technology companies to insert backdoors in their products, including it is claimed Microsoft's Outlook.com, and running so-called man-in-the-middle attacks to hoover up the world's online chatter and transactions.
Meanwhile, 15 years ago ..
The long, strong arm of the NSA (July 27, 1998)
It's gotten to the point where no vendor hip to the NSA's power will even start building products without checking in with Fort Meade first. This includes even that supposed ruler of the software universe, Microsoft Corp. "It's inevitable that you design products with specific [encryption] algorithms and key lengths in mind," said Ira Rubenstein, Microsoft attorney and a top lieutenant to Bill Gates. By his own account, Rubenstein acts as a "filter" between the NSA and Microsoft's design teams in Redmond, Wash. "Any time that you're developing a new product, you will be working closely with the NSA," he noted.
Clearly wary of granting the government supervision over its products, Microsoft has stubbornly refused to submit a data-recovery plan, even though the Redmond giant already includes a data-recovery feature in its Exchange Server. "The Exchange Server can only be used when this feature is present," Rubenstein said. "Because we haven't filed a product plan, it's harder for us to export this than for companies that have filed plans."
Re: Implausible, except for the demo
2nd Generation Intel® Core™ vPro™ Processor, Intel® Anti-Theft Technology 3.0
Uploaded on Mar 7, 2011 channelintel
Intel demonstrates Intel® Anti-Theft Technology 3.0 on the 2nd Generation Intel® Core™ vPro™ processor. Learn more at http://newsroom.intel.com/docs/DOC-1903.
Not so far to fetch
Intel’s Sandy Bridge will debut at CES
Published: December 14th, 2010
With Intel anti-theft technology built into Sandy Bridge, Allen said users can set it up so that if their laptop gets lost or stolen, it can be shut down remotely. The microprocessor also comes with enhanced recovery and patching capabilities.
Welcome back, 1992
The Virus Writer's Handbook: The Complete Guide
(c) 1992 Terminator Z (AKA Harry McBungus)
5.22 Disinfecting on-the-fly
These are the fundamentals of the stealth capability - when to disinfect. On all calls to open the file, add the name & handle to a "database" in free memory after the end of your virus. When it comes to close-time, simply scan your database for the handle and re-infect its corresponding file, and erase that entry from the database. How simple can it get? (See? It's a lot easier in theory than most people imagine!)
AC, you've lost the security challenge before you've altered even a single binary digit in defense.
You see a difference between your "staff" and "irrelevant drones from other departments". I haven't seen a corporate activity that has been precluded from the outsourcing market-place -- right through to, and including, the CEO. We are all just corporate drones poised to become redundant to a cheaper alternative, but neigh one of us want to believe that.
"Real security", in relation to anything, comes from an environment of trust, respect, nurture and education. Justice keeps the peace. Integrity keeps the faith. You can take away a man's will to fight if you provide him with no enemy, and keep him content. And the reverse is true.
I disagree with Big Boomer as I am yet to see an enterprise that has been hardened to a degree that is commensurate with the effort required to pry and jimmy it for the market (street) value of its information assets. But that wasn't all of Boomer's point. He has authored a declaration - an affirmation that your aggravation will create (and therefore, is) your enemy, not halt him. And to that end, I agree with Mr Big.
Come on AC, you paint Boomer's point too clearly. Besides you're not offering any real security - the Big man would probably just boot ERD Tool, back-out those silly registry settings, create his own local administrator (for future quick fixes), delete those untrusted corporate issued signing certs, and change the rights on a couple of DLL files so that Group Policy was no longer a concern of his. If you were lucky he'd probably stop there, but after you took away his USB access he was delighted to come to the rescue of the local executive assistant pool and liberate their PC's (they were so pleased with him when they could load their favourite kitten-oriented screen savers, when they could load programs faster without that dreadful anti-whatever software, and when their machines no longer played patch-bingo each month).
Lightweight, distributed and automated
Nice - a handful of guys on the dunes with backpacks and a couple of guys in dinghy's or wet-suits and you'd have yourself a cute little portable coastal defense system. A "return to sender" for UAV bombers, if you will.
I love the smell of trust models in the morning.
I believe I said "post the URL for that live list of clear information restrictions (restrictions by URL and reason, thanks)".
I know there are restrictions by country - an elderly relation of mine, in one western country, was put-out that she was not legally entitled to access web sites on assisted suicide. Those born of an age where information came through direct contact with something (people you knew, or paper produced locally for example) don't seem to understand the current impact of these restrictions that have always been in place - that books aren't imported, that news isn't published, that video footage is re-edited - let alone complex interplay such as press on Microsoft products in *MSN/MSN* news agencies; when you can access first hand reporting of sources these deficiencies become clear.
Let's see Google really clearly (and theres nothing more clear than transparent) show us those restrictions - take poster 1's method as a short-stop that doesn't divulge the filter explicitly, for example. Or try, say, http://[google-domain-of-your-choice]/filters/ for a list of filters in your current view (domain and geo-location), updated real-time with, say;
"http://*.stureeves.org/*", "US FBI Miscreant List"
"http://*/~MotherHubbard/*", "UK ElRej Bollocks Assessment 08-02"
.. for every user on earth.
Use the Internet Luke ..
"The answer is correct as much as 35 per cent of the time. [...] It's also possible the spammers have found a new type of Captcha-cracking software."
How familiar does that sound?
"A team of Russian hackers has found a way to decipher a Yahoo CAPTCHA, thought to be one of the most difficult, with 35% accuracy. The Russian group's notice, posted by one "John Wane," is dated January 16. This site hosts a rapidshare link to what looks to be demonstration software for Windows" [http://it.slashdot.org/article.pl?sid=08/01/30/0037254]
The author called it ("Its discovery comes a few weeks after the release of proof-of-concept code that defeats a similar Captcha used by Yahoo! Mail."), as did the first poster, so why didn't Websense?
Do more evil ..
"They are a business. They are not obligated to you, me, or anyone else other than their owners and shareholders." - Chris C.
I didn't see in that article where it said he wasn't a shareholder (China even has its own *economy* now - it's true!)
Mind you for a company touting such an altruistic mission ("Google's mission is to organize the world's information and make it universally accessible and useful.", http://www.google.com/intl/en/corporate/index.html), then I'd say he has grounds on any of false advertising, corporate misconduct, or misleading the SEC; shareholder or otherwise.
"By being in China, we help people access more information, and when we do restrict information, we make clear that we've done so." - Gabriel Stricker.
I'd be mighty pleased if Gabriel Stricker would post the URL for that live list of clear information restrictions (restrictions by URL and reason, thanks). I'd want to know what my western government would like me not to see.
Space version was conceived too
For those of you having the revolutionary and unique idea to put this thing into orbit (and there's some Newtonian physics that you guys are ignoring when you think of explosive projectiles in space), that was a Regan-era Star Wars brain-child version of this already - aka "Rods from Gods";
HOW DO THE RODS WORK? The system would likely be comprised of tandem satellites, one serving as a communications platform, the other carrying an indeterminate number of tungsten rods, each up to 20 feet in length and 1 foot in diameter. These rods, which could be dropped on a target with as little as 15 minutes notice, would enter the Earth's atmosphere at a speed of 36,000 feet per second--about as fast as a meteor. Upon impact, the rod would be capable of producing all the effects of an earth-penetrating nuclear weapon, without any of the radioactive fallout. This type of weapon relies on kinetic energy, rather than high-explosives, to generate destructive force (as do smart spears, another weapon system which would rely on tungsten rods, though not space-based).
Just in time!
"Geraud cited familiar reasons for the switch: diversifying suppliers, reducing costs and gaining control of the software."
Right, just in time to (big) house Steve Ballmer and Bill Gates after the findings of the next round of the European Commission investigation. I mean, the last thing you'd want is to have them locked up someplace where the local guvna can be bought with "cheap licenses" *cough*.gov.uk*cough*, so the French seem an obvious choice. And the second last thing you'd want is to find that your lock-up gear was nobbled by vendor or external government backdoors - if the boys were able to do a runner then it would appear that even the EU couldn't put a ball-n-chain to Microsoft.
(And who doesn't want to hear French chicks saying "ooh-bu'n-too le'nukz" between cigarette puffs?)
We are all made of SpySats, not Stars
Do searches, be afraid, you can measure the affects of previous satellite burn-ups in each and every one of us;
"2.10 SNAP-9A RE-ENTRY
Satellite nuclear auxiliary power (or `SNAP') units utilize the decay heat of radionuclides to supply electrical energy for space satellite equipment. The re-entry of a navigational satellite containing such an isotopic power unit (known as SNAP 9A) occurred on 21 April 1964, over the Indian Ocean, after failure to attain orbital velocity. The heat of re-entry caused volatilization of the SNAP 9A device which contained 629 TBq of 238Pu. The deposition of around 95 per cent of the plutonium intially injected was estimated to have occurred by the end of 1970. The device's re-entry resulted in a 50 year dose commitment of approximately 0.36 Sv to the respiratory lymph nodes of the world's population due to exposure between 1961 and 1968 (Shleien et al., 1970)."
"1964, April 21: US Navy 5BN-3 Transit navigation satellite, carrying a SNAP 9-A RTG powered by 2.2 lb of plutonium-238, failed to achieve orbit and the RTG disintegrated in the atmosphere at an altitude of 50 km. It sprinkled radioactive particles of plutonium over a wide area of the southern hemisphere, a fact confirmed by soil samples taken from 65 sites around the world between October 1970 and January 1971. The 17,000 curies of plutonium-238 released by this one accident increased the total world environmental burden of plutonium, principally from atmospheric weapons tests, by about 4 per cent.
1968, May 18: following a launch failure, a US Nimbus B-1 weather satellite was aborted and its two SNAP-19A RTGs fell into the Santa Barbara Channel, off southern California. They were recovered intact after a five-month search.
1970, April 17: as part of the dramatic rescue of Apollo 13, the lunar module, carrying a SNAP-27 plutonium power supply, was jettisoned at 18,000 km over the South Pacific. It splashed down near the island of Tonga. It was never recovered but US officials claim that radiation levels in the area indicate that no plutonium has been released."
And that's just the (publicly acknowledged) American disasters. Oh yeah, cancer is a complete mystery .. where could it possibly be coming from ..
Since I first read about this I had assumed, despite the 2006 references, that this was the Spy Sat that was dumped in the wrong orbit; http://www.theregister.co.uk/2007/06/18/us_spy_sat_cockup/
RE: An easy way to upset the system
"Lets train it on this face:
Then see if it can still recognise it after a quick shave."
Oooooh, I see it now!
For a moment there I thought she was up-side-down.
@ Security Risk -v- Virtualisation Licensing
How hard do you guys hit the bong after work? Seriously, six months ago should not be hard to remember. Alright. Set the way-back machine to June 2007, you hippies, to when Microsoft did their first "flip-flop" on the EULA and "virtualization";
"When it announced licensing rules for Vista last year, Microsoft said that only Vista Business and Vista Ultimate could run as guest operating systems. The company said virtualization presents inherent security risks and that it hoped by limiting which versions of the OS could act as virtual machines, only sophisticated users and businesses would employ the tactic."
Microsoft flip-flops on Vista virtualization / Published on ZDNet News: Jun 20, 2007 1:25:00 AM (http://news.zdnet.com/2100-3513_22-6191787.html)
The security risk is really straight-forward; you can skirt around the Vista DRM novelty once you've virtualised the underlying infrastructure, because you can intercept the hyper-visor calls and virtual hardware interfaces in the Host system, outside of the control of all of those signed and encrypted drivers in the Guest system (i.e. at the virtual CPU, virtual RAM, virtual GPU or even easier at the virtual Screen and virtual Speaker [you know, the interface that HDMI was supposed to secure]). This is not a risk to you, it's a risk to Microsoft and its ambition as a media server in every living room - as explained in their (way, waaay-back) Vista Ultimate EULA from 2006;
"6. USE WITH VIRTUALIZATION TECHNOLOGIES. You may use the software installed on the licensed device within a virtual (or otherwise emulated) hardware system on the licensed device. If you do so, you may not play or access content or use applications protected by any Microsoft digital, information or enterprise rights management technology or other Microsoft rights management services or use BitLocker. We advise against playing or accessing content or using applications protected by other digital, information or enterprise rights management technology or other rights management services or using full volume disk drive encryption."
Surprises inside Microsoft Vista's EULA / Published Sunday 29th October 2006 23:32 GMT (http://www.theregister.co.uk/2006/10/29/microsoft_vista_eula_analysis/page2.html)
In lay terms, its okay for enterprises protecting billions of dollars with electronic security measures to virtualise using Vista, because that only hurts them. But if home-users were to virtualise using Vista, and then play a HDDVD or BluRay Disc with MediaPlayer, then that would be ... a security risk.
I can see it now ..
One of those "funny warning labels" lists in 2030, includes a photo of the label under the 200 foot long airplane-dropping ray-gun that reads "Aim away from face, and cover genitals".
Tesla would be proud. Maybe the FBI will bid on it - don't they still have his many trunks of documentation (outside of the handful that were released back to the family/trust)?
Cloud OS spin
This song is being played to death (I'm sure amanfrommars would agree);
I'm still waiting to hear about how great that new "cloud" security architecture is going to be (presumably from the same people who brought us "Web 2.0 - client-side validation vulnerability bonanza").
FOSS or BAU?
>> Over the next two years, a program with the same name and containing identical source code turned up on boards in China, Guatemala, Russia and Argentina and then again in China. As the program moved, it gained new capabilities, including support for Spanish and Chinese languages.
Right, like Vista ..
>> windows vista ultimate lite edition its damn good version contain all vista extras and very speed version u gotta try it ..tested by me fixed the home premium reales i done
.. like the iPhone ..
>> This week homebrew hackers at the #iPhone IRC channel have enabled Apache, Python and other Open Source apps for the iPhone so you can a web server in your pocket.
.. like the Madonna "What the Fuck" P2P MP3 ..
>> This album was triggered by a small sound byte of speech left by Madonna as a decoy to frustrate users sharing her songs via Peer-to-peer (P2P) networks on the internet. Any holes a goal in this riotous wondrous fairy tale journey through 14.5 tracks of deep anal hilarity.
.. like etc ad nausea.
On the Individuality of Fingerprints, 2001.
From; "On the Individuality of Fingerprints", 2001.
Our results show that (i) contrary to the popular belief, fingerprint matching is not infallible and leads to some false associations, (ii) while there is an overwhelming amount of discriminatory information present in the fingerprints, the strength of the evidence degrades drastically with noise in the sensed fingerprint images, (iii) the performance of the state-of-the-art automatic fingerprint matchers is not even close to the theoretical limit, and (iv) because automatic fingerprint verification systems use only a part of the discriminatory information present in the fingerprints, it may desirable to explore additional complementary representations of fingerprints for automatic matching.
Meanwhile, at Scottland Yard: "Allo allo allo - The computa' says we can nick 17 people across 4 continents for the John Doe print off that SIM card, guv!" "Blighty! .. get your coat PC Williams .. and tell Miss Jenkins to get a pot on for when we're back next Tuesday .."
Statistical fallibility ..
Out of this entire debate, why is no-one questioning the statistical fallibilty of millions of biological-based samples - particularly fingerprints? Even El Reg challenged this in 2004, based on a US DoJ study and New Scientist comments; http://www.theregister.co.uk/2004/04/06/identity/
This isn't just two people with the same name - this is two people with the same fingerprint (something that is not deemed as legally challengable).
As for SkyNet; Look, we all know that the "Server in the Sky" label is the "official" line produced by the Auditor General when investigating the .gov.uk CD "losses". You know; "But daddy, where did the CD's go?" "Well, son, as is the cycle of life - when a CD has had his day, he goes to the big server in the sky .."
Like Elvis, the CD's aren't "gone", they've just .. "moved on" .. its easier that way.
Re: There is nothing newly restrictive in this
The good news is, Keith, that your subject is right .
There's no border more porous than the Internet - so netcat et al are all just an FTP, HTTP, SCP, NNTP (uuencode, etc), Rsync, SMTP, etc, (or even an NSTX, ICMP payload, etc) away from a usable state. Assuming you want a binary copy, of course.
What's particularly disappointing about your argument is that you seem to ignore the fact that the UK is already a "participating state" to the Wassenaar Arrangement [http://www.wassenaar.org/introduction/index.html] which provides international guidance on export controls for munitions, including dual use goods, and including computer technology and software (particularly "information security" per chapter 5, part 2); surely a superb guide for those participating states seeking to draft domestic policy on the topic. I could, however, understand your omission given that even the regulatory framework for international munitions admits;
Controls do not apply to "technology" "in the public domain", to "basic scientific research" or to the minimum necessary information for patent applications. [WA-LIST (07) 2 Corr. 6-12-2007; GENERAL TECHNOLOGY NOTE]
The Lists do not control "software" which is either: [...] or 2. "In the public domain". [WA-LIST (07) 2 Corr. 6-12-2007; GENERAL SOFTWARE NOTE]
Where the following definitions are key;
"Basic scientific research" - Experimental or theoretical work undertaken principally to acquire new knowledge of the fundamental principles of phenomena or observable facts, not primarily directed towards a specific practical aim or objective. [WA-LIST (07) 2 Corr. 6-12-2007; DEFINITIONS]
"In the public domain" - This means "technology" or "software" which has been made available without restrictions upon its further dissemination. Note Copyright restrictions do not remove "technology" or "software" from being "in the public domain". [WA-LIST (07) 2 Corr. 6-12-2007; DEFINITIONS]
This would seem to be a far more pragmatic condition-set to be considered against the "article" of software, particularly before the "likelihood" of misuse or intent to misuse was tested against a given defendant.
As for your further consideration;
>> As for the comment that there is really nothing wrong with breaking into and exploring other people's networks provided there is no malicious intent: The failure to recognize this attitude as a criminal attitude is another part of what needs to change.
Given your predisposition to aligning computer concepts to UK law, I'd be interested to know why you wouldn't want hackers to be able to replace a given system MOTD message with a Section 6 statement (as in Section 6 of the Criminal Law Act 1977, as amended by Criminal Justice and Public Order Act 1994) in order to legally validate a computer version of Squatting.
This would, in-turn, validate adverse possession of a computer system. As such, after 10 years of possession, a hacker must apply to a Computer Registry (the Internet already has the NIC structure in place) to have their title recognised as the owner in fee simple. The original owner of the computer system will receive notification from the Registry and will be able to defeat the application by simple objection.
Though this may not agree with your "buffet meal" argument.
>> Goodness knows we can't have anyone under the age of forty viewing exactly how Mommy and Daddy started the chain of events ending up with you ;)
I had no idea you were the bastard son of a heavily tattoo'd midget, a shetland pony and a wild woodland woman who can lift bricks with her mudflaps.
You've all missed the point .. er .. points ..
For starters, this is a marketing problem; when was the last time you saw Arnold Schwartznsomethingorother (aka: "Dutch") in the south American jungle, smokin' a big-arse cuban cigar and heaving orders out to his crew from the driver's side of a two-door electric vehicle? It just isn't cricket.
Then there is just big arses; the average American has two chins, four stomachs and three arses - roughly the equivalent of two middle-aged Parisians with a full set of matching holiday luggage, all squeezed snugly into a brand-name jogging outfit. There's a reason these people buy SUVs, and *is* because they're all-American. No Texan wants to drive with a gear-shift in their jixy.
To top it all off; until the US knock-off a decent Jeremy Clarkson clone, then they'll never understand the essence of *selling* a car. Lets face it, the American version of a "channel" is equivalent to the European process for making Foie Gras, and until they get a genuine geezer into the selling process, the consumer will be forever condemned to buy on cabin features and paint colour, or the sheer glossyness of the brochure.
New MS Data Center ..?
I think an industry insider would be a more likely recipient of these goods. So, who, in the industry, would need a whole lot of enterprise-class and Data-Center-ready hardware?
And, as BillG said just before he "bought out" CompuGlobalHyperMegaNet;
"Oh, I didn't get rich by writing a lot of checks!"
Or maybe when these people get their insurance money, and buy their new hardware, they'll be forced into MS Server 2008 .. which will drive them to Vista desktops .. a lure to drag up new OS sales through hardware acquisition, by shortening the hardware lifecycle?
I know MS are involved here somewhere ... its cunning plan .. Baldrick-cunning ..
VoIP should be a boon then
With imperical evidence available it remains difficult to fathom why Voice over IP security is poo-poo'd by tech vendors and OEMs (it was difficult to fathom before the evidence). I can only assume that the need for interception still outweights the need for integrity.
<quote>What is REALLY worrying is that Microsoft claim to have spent many thousands of man hours creating this documentation - which tells me one thing, that they didn't have it documented at all !</quote>
Actually, Microsoft have already declared that they don't know how their protocols work (ROFL);
Newsmaker: Microsoft exec takes on services, Google (Published: June 15, 2006, 4:00 AM PDT) -- http://news.com.com/Microsoft+exec+takes+on+services%2C+Google/2008-1010_3-6083894.html
Let's talk a bit about your responsibility for technical documentation related to the U.S. Department of Justice consent decree. Is the documentation up to snuff now?
Muglia: We were confused about this, and frankly everybody was confused about this...The feedback was clear from the government agencies and others that we had to rethink this. When we went in and took a look, we realized that we thought of this as doing documentation and we put people who are quite qualified at doing technical documentation on the job. But it ain't that. It's an engineering project. It's especially an engineering job because it isn't a core part of our development process yet. It will become part of the core process moving forward.
But the first piece of work that needs to be done is an archeology project to go through the protocols that are in the system, some of which date back 15-plus years, many of which (were written) by engineers that are no longer with the company, and we've had to pull quite a few of our key engineers onto this and they're working to get standardized formats in place and all of the basics. We're making really good progress on it and we are working as hard as is humanly possible and we'll be doing that for a bit of time now.
@ Stuart @ Craig
Stuart, your analogy could only have better if you mentioned that your landlord also owned 93.6% of all apartments world-wide.
As for Craig, this might seem alien, but the world doesn't exist to create a better Microsoft.
Microsoft will be jealous of the turn-out
20 people turned up at the BBC to protest in the rain, and you think that's a shite turn-out? Microsoft had less than that turn up to their Vista launch in Sydney and that was covered, air-conditioned, catered and included free software that was autographed by Bill Gates!
So, Microsoft "certifies" binary code that will run with elevated privileges on 90% of desktop computer systems, and that means users shouldn't trust it, right? Speaking of "due-freaking-dilligence" - it is absolutely Microsoft's fault that code with their explicit trust applied, that wasn't audited, was vulnerable.
I've checked with my bank - my real house isn't even virtually mine. A virtual two bedder at this stage seems much more "where the market is right now" .. eonomically speaking.
VRML and competition
Like Lexx and Adrian, I recall the VRML "good-ol-days" - as two SysAdmin's my friend and I coded a VRML2 version of our Data Centre (including every modem and keyboard) in the hopes of VRML3 arriving and allowing us to integrate management functions (the VRML roadmap was very clear - but the timeline wasn't). However, I'm not so idolising or idealising as to forget the tremendous browser crashing episodes that would come with using the technology.
These were also the days where the Doom source code had been used to create a proof-of-concept that made the host OS Process IDs (PIDs) monsters that could be "shot" to be "killed". We were so close ..
Of course the problem, since, has been the death of Netscape. Netscape was driving VRML adoption via the browser (through its common plugins) which resulted in the ever "innovative" Microsoft to copy them to keep up .. and well .. we've seen what's happened since (the US Department of Justice has a file detailling the history if you're not up to speed). No more VRML on the web.
Though in the mean time the OpenGL (Sillicon Graphics') standard has done what was needed and what it was designed to do; despite DirectX, there's been massive OpenGL integration out of Software and directly into the video Hardware; so times have definitely changed.
I can easily see how selling massive processing power for 3D worlds will fuel Sun, IBM, Fujitsu, Cisco, Intel, AMD, etc ad nausea - take a look at the changes in the media industry as a recent example, the web as an older one, or VoIP as a communications parallel. Every player will get fatter .. and the US government will be ready for the taxation as the US intelligence will be ready for the bugging as the US millitary will be ready for the pacifying.
Microsoft, amongst many others, have constantly kept 3D-world type projects on their research lists .. they know it will be an area that they'll need to productise very quickly - one day - when the game starts; like surface computing, integrated media platforms, cross-platform binary software, web browsing, WYSIWYG word processing, GUIs or Operating Systems (to name a few).
However, it will take one big player (Google, for example) - or a "culty" upstart with a keen eye and sweet business model (like models from the mind of Trent Reznor) to throw the big switch and get the 3D game started. It aint Linden. Linden has an image problem, in that Linden can't stop admiring Linden in the mirror. At the technology level - his world is closed and clunky.
The winner will be the player who makes entry and adoption free - and who provides the tools to allow every business, kid and other goth freak able to add their distinctiveness to his own -- just like the web. You don't win without the ecosystem, and you don't get the ecosystem with a strict protocol (at any level - even at the enterprise integration level - you won't get Sovreign trust until portions can be hosted independently on multiple continents, and the US won't even do that with DNS).
They'll be turbulent times before the winner emerges, and after that there will be a great time of peace followed by a massive time of tribulation - see CyberPunk, Ghost in the Shell, The Matrix, etc ad nausea (if you think Hacking has impact now - when sites go down and pages get defaced - you wait until you interact with Hacked rooms, Hacked people and then the future beyond - ala Richard Clarke - when your mind is on the wire .. lol .. our kids are in for one hell of a ride ..)
Cloud OS spin
I don't see the big deal - this is just the ground work for the MS "Cloud OS" buzz - the Vista replacement that is theoretically 18 months away (two years between desktops now, remember?) This is why Vista has the DRM and why Server 2008 has the "components" that can be installed (or not) .. no? Let me explain ...
- There's the OS in the Could, based on Live* (previosly MSN*) services;
Sniffing out Microsoft's 'OS in the cloud' skunk-works project / November 28th 2006 (http://blogs.zdnet.com/microsoft/?p=119)
"Over time, we're figuring out how Windows Live (meshes with)Windows," Berkowitz explained. "It's not so much a set of features that makes Windows what it is. Windows is a bunch of feature sets." And in the future, some of these features will reside in the "Internet cloud," while others will reside locally on PCs, cell phones and other devices.
Microsoft already is beginning to turn that part of the vision into reality with Windows Vista. With Vista, Microsoft will offer users links via which they can download a number of Live services, including Windows Live Messenger, Windows Live Mail Desktop,Windows Live Mail and Windows Live OneCare.
- There's Ray Ozzie's new role at MS, and his network service OS integration;
Can Microsoft morph Windows into an Internet service? / November 27th, 2006 (http://blogs.zdnet.com/microsoft/?p=116)
It seems Microsoft itself is considering seriously such a possibility. There's a nugget buried deep in a November 27 (ever so-dully-titled "Life After Vista: Can Microsoft Retool for Web?") Wall Street Journal story. Skip to the very end of the article and you'll find this little gem:
"Meanwhile, a cadre of respected Microsoft computer scientists and programmers formed a group under Chief Software Architect Ray Ozzie to start building software that could be a critical piece of what Windows might become, say people familiar with the work. That group, says a person familiar with the matter, sees the future of Windows as much more as an Internet service than software that runs on a PC."
There's that Microsoft Patent from January;
- A Brave New Modular World - Another MS Patent Application / January 29th 2007 (http://www.groklaw.net/article.php?story=2007012808444146)
The application relates to a method of delivery of operating systems where one initially obtains a very basic operating system (for example, one that can do little more than display a web browser restricted to one site or domain) and thereafter is presented with the option to select (and purchase) additional functionality.
- There's BillG's vision of the OS that comes after Vista (and his resignation);
Finally, Vista Makes Its Debut. Now What? Bill Gates explains why you should buy his new operating system, what he's doing next and why John Hodgman bugs him / February 1st 2007 (http://www.msnbc.msn.com/id/16934083/site/newsweek/)
I> So can you give us an indication of what the next Windows will be like?
B> Well, it will be more user-centric.
I> What does that mean?
B> That means that right now when you move from one PC to another, you've got to install apps on each one, do upgrades on each one. Moving information between them is very painful. We can use Live Services [a way to connect to Microsoft via the Internet] to know what you're interested in. So even if you drop by a [public] kiosk or somebody else's PC, we can bring down your home page, your files, your fonts, your favorites and those things. So that's kind of the user-centric thing that Live Services can enable. [Also,] in Vista things got a lot better with [digital] ink and speech but by the next release there will be a much bigger bet. Students won't need textbooks, they can just use these tablet devices. Parallel computing is pretty important for the next release. We'll make it so that a lot of the high-level graphics will be just built into the operating system. So we've got a pretty good outline.
- And there's Ballmer's little spin to the investor community;
Ballmer's list: Microsoft's CEO shares his top nine Microsoft growth picks / February 15th 2007 (http://blogs.zdnet.com/microsoft/?p=263)
I was surprised that Windows Live - supposedly one of Microsoft's most important strategic efforts - didn't make either of Ballmer's lists. Ballmer did mention services, but talked about it more from a platform perspective, than as a bunch of individual point products.
"We need a strong services platform" akin to Windows client and Windows server, Ballmer told analysts. "We are building a cloud platform." The cloud platform is Microsoft's evolving "Cloud OS" that will consist of a set of services that are an adjunct to Windows.
So the way it looks to me, Ballmer had better talk-up the Microsoft version of "the network is the computer", or his next OS might sink like a Vista. Of course, he'd also want to back-up that cloud talk with one hell of a solid security architecture, as the security industry has long used "the cloud" to represent miscellaneous evil; not the kind of place you'd put your enterprise's core/mission-critical infrastructure.
> BTW, is 'facetious' the only word that contains all five vowels in alphabetic order?
No, search via;
Scotty, check the sensor array ...
If I saw an anomoly in one group of one type of sensor, but not in another group of the same type or of any other type of sensor, then I'd be checking the sensors, before checking the target.
The alleged mining of the Internet by the NSA is reminiscent of the passive acoustic array and its parent, the passive acoustic barrier strategy, of the US Navy circa 1968-ish. Good times - then and now.
- World's OLDEST human DNA found in leg bone – but that's not the only boning going on...
- Lightning strikes USB bosses: Next-gen jacks will be REVERSIBLE
- Pics Brit inventors' GRAVITY POWERED LIGHT ships out after just 1 year
- Microsoft teams up with Feds, Europol in ZeroAccess botnet zombie hunt
- Storagebod Oh no, RBS has gone titsup again... but is it JUST BAD LUCK?