Wednesday, December 30, 2009

World is in your home now



Turn your living room TV into a video phone with an optional webcam.Create a video conference with the office.Record holidays without setting up the tripod and camcorder.

The Home Theater PC-the center of your new home theater network.Blu-Ray drive for playing and burning your movies and recorded television.Standard DVD dual layer burner plays and records your media.Touch screen LCD.Completely integrates with your existing home theater hardware(including DVD players and recorders,Stereo head units,speaker system,etc.)

Connects your Standard or HD TV to your PC network, allowing you to stream multimedia content from your Home Theater PC to any TV in the house.Stream pictures, music,even videos.Works with wired eithernet or wireless G.

Built in mouse and remote control give you ultimate control of your Home Theater PC-from your couch.One button access allows you to switch between writing e-mails and watching TV instantly.

Your optional Universal Remote is totally programmable.Plug your remote into your PC to program each device in your home theater.Program combinations-Turn on your TV and Stereo system with one button.Built in LCD screen lets you see exactly what options, menus and devices you are selecting.Program your TV,VCR,DVD player,Cable or Satellite box,everything but the kitchen sink.

DVD Jukebox allows you to load up to 200 movies at once,all of which instantly accessible on your Home Theater PC.Totally expandable.Add additional jukebox's as needed-capable of storing and accessing over 1000 DVD's at the touch of a button.Burns your recorded TV shows.

Holding up to 1,000 GB of data,this network accessible hard drive expands your storage capacity and simplifies file sharing.Built in USB port allows you to connect a printer-which every PC in the house can print to.Gigabit eithernet ensures blazing fast access to your data.Forget your work disk at home? Not a problem.Access this drive from ANY PC with an internet connection.

Wifi routers allow your PC's to connect to each other and the internet, safely and securely.Walk from one room to another with your laptop PC while surfing the internet.

Multimedia drive allows you to download your multimedia from your flash memory disks from your digital cameras, camcorders, and cell phones.Additional ports allow you to directly connect a camcorder or camera to download media.

Computer Spyware Protection

What is Spyware/Adware

Spyware is software that has been created to track and report what you do on the computer! Some of the "worst" spyware will actually search your hard drive for personal information, credit card numbers, bank accounts, passwords, and other confidential information.

Why Do I Need to Remove Spyware/Adware

Spyware and or, malware has been specifically designed to be difficult to remove. Once you have spyware or adware on your computer, many virus removal programs and few firewalls will not be able to "touch" or "remove" it. Spyware has become the number one threat to all internet users world wide. It is possible that 9 out of every 10 computers are infected. Spyware can destroy your pc and the functions you are tyring to accomplish on the internet.

Home Wireless Networks


That One Computer Guy can set up your secure, home wireless network. A sample network is shown here:

Monday, December 14, 2009

Cloud Computing

Cloud computing is Internet-("cloud-") based development and use of computer technology ("computing").In concept, it is a paradigm shift whereby details are abstracted from the users who no longer need knowledge of, expertise in, or control over the technology infrastructure "in the cloud" that supports them.It typically involves the provision of dynamically scalable and often virtualized resources as a service over the Internet.

The term cloud is used as a metaphor for the Internet, based on how the Internet is depicted in computer network diagrams and is an abstraction of the underlying infrastructure it conceals.Typical cloud computing providers deliver common business applications online which are accessed from a web browser, while the software and data are stored on the servers.

These applications are broadly divided into the following categories: Software as a Service (SaaS), Utility Computing, Web Services, Platform as a Service (PaaS), Managed Service Providers (MSP), Service Commerce, and Internet Integration. The name cloud computing was inspired by the cloud symbol that is often used to represent the Internet in flow charts and diagrams."

Cloud computing users can avoid capital expenditure (CapEx) on hardware, software, and services when they pay a provider only for what they use. Consumption is usually billed on a utility (resources consumed, like electricity) or subscription (time-based, like a newspaper) basis with little or no upfront cost. Other benefits of this time sharing-style approach are low barriers to entry, shared infrastructure and costs, low management overhead, and immediate access to a broad range of applications. In general, users can terminate the contract at any time (thereby avoiding return on investment risk and uncertainty), and the services are often covered by service level agreements (SLAs) with financial penalties.

According to Nicholas Carr, the strategic importance of information technology is diminishing as it becomes standardized and less expensive. He argues that the cloud computing paradigm shift is similar to the displacement of electricity generators by electricity grids early in the 20th century.

Although companies might be able to save on upfront capital expenditures, they might not save much and might actually pay more for operating expenses. In situations where the capital expense would be relatively small, or where the organization has more flexibility in their capital budget than their operating budget, the cloud model might not make great fiscal sense. Other factors impacting the scale of any potential cost savings include the efficiency of a company’s data center as compared to the cloud vendor’s, the company's existing operating costs, the level of adoption of cloud computing, and the type of functionality being hosted in the cloud.

Types by visibility

Public cloud

Public cloud or external cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third-party provider who shares resources and bills on a fine-grained utility computing basis.

Hybrid cloud

A hybrid cloud environment consisting of multiple internal and/or external providers "will be typical for most enterprises".A hybrid cloud can describe configuration combining a local device, such as a Plug computer with cloud services. It can also describe configurations combining virtual and physical, colocated assets—for example, a mostly virtualized environment that requires physical servers, routers, or other hardware such as a network appliance acting as a firewall or spam filter.

Private cloud

Private cloud and internal cloud are neologisms that some vendors have recently used to describe offerings that emulate cloud computing on private networks. These (typically virtualisation automation) products claim to "deliver some benefits of cloud computing without the pitfalls", capitalising on data security, corporate governance, and reliability concerns. They have been criticized on the basis that users "still have to buy, build, and manage them" and as such do not benefit from lower up-front capital costs and less hands-on management, essentially "[lacking] the economic model that makes cloud computing such an intriguing concept".

While an analyst predicted in 2008 that private cloud networks would be the future of corporate IT,there is some uncertainty whether they are a reality even within the same firm.Analysts also claim that within five years a "huge percentage" of small and medium enterprises will get most of their computing resources from external cloud computing providers as they "will not have economies of scale to make it worth staying in the IT business" or be able to afford private clouds.Analysts have reported on Platform's view that private clouds are a stepping stone to external clouds, particularly for the financial services, and that future datacenters will look like internal clouds.

The term has also been used in the logical rather than physical sense, for example in reference to platform as a service offerings,though such offerings including Microsoft's Azure Services Platform are not available for on-premises deployment.

Types by services

Services provided by cloud computing can be split into three major categories.

Infrastructure-as-a-Service (IaaS)

Infrastructure-as-a-Service like Amazon Web Services provides virtual servers with unique IP addresses and blocks of storage on demand. Customers benefit from an API from which they can control their servers. Because customers can pay for exactly the amount of service they use, like for electricity or water, this service is also called utility computing.

Platform-as-a-Service (PaaS)

Platform-as-a-Service is a set of software and development tools hosted on the provider's servers. Developers can create applications using the provider's APIs. Google Apps is one of the most famous Platform-as-a-Service providers. Developers should take notice that there aren't any interoperability standards (yet), so some providers may not allow you to take your application and put it on another platform.

Software-as-a-Service (SaaS)

Software-as-a-Service (SaaS) is the broadest market. In this case the provider allows the customer only to use its applications. The software interacts with the user through a user interface. These applications can be anything from web based email, to applications like Twitter or Last FM.

Friday, December 4, 2009

E-mail Security

Did you know that when you send your email messages, they do not go directly to recipient mailboxes? Did you know that your Internet Service Provider (ISP) stores copies of all your email messages on its mail servers before it tries to deliver them? Do you know that someday all the information kept on the servers can be easily used against you? Email Security is a system-tray local SMTP server program for Windows that lets you send email messages directly from your PC to recipient mailboxes ensuring your email security and privacy by means of bypassing your ISP's mail servers where your relevant information can be stored and viewed.

Did you also know that when you send an email message to a list of email addresses, the respondents can see each other in the email message header? You think it is secure? While sending, Email Security always breaks email messages addressed to a group of people to individual messages to ensure your security and security of your respondents. Also, Email Security does not leave any traces on your PC because it just gets your email messages from your email client and puts them in the recipient mailboxes at the same time without making any temporary files on your PC. Email Security supports all email programs like Outlook Express, Outlook, Eudora, etc. The email program you already use for sending and receiving messages can be connected to Email Security in a very easy way - just by using the word localhost instead of your current SMTP host. Having done so, you can send messages in a usual manner. Install Email Security on your PC before it is too late!

Thursday, November 26, 2009

The World's First Programmable Quantum Computer

With only a few intense lasers, electrodes and some ultracold ions, researchers at the University of Sussex in Brighton, England, have been able to build the first programmable quantum computer.

What makes this experiment different is that this new system is able to perform more than 150 random processing routines.

For Quantum computers to become more useful, these machines should be able to be progammed just like a normal computer can be programmed. This will of course mean that the system will be able to run many different programs. Up until now, earlier versions of quantum computers have been very restricted with regards to the amount of specific tasks they could perform.

The new study is "a powerful demonstration of the technological advances towards producing a real-world quantum computer," says quantum physicist Winfried Hensinger of the University of Sussex in Brighton, England. The researchers, led by David Hanneke of the National Institute of Standards and Technology in Boulder, Colo. built the computer based on two cooled beryllium ions with a temperature of just above zero.

The ions formed the quantum bits, or qubits, analogous to the bits in normal computers represented by 0s and 1s, and were trapped by a magnetic field on a gold-plated aluminum chip. To perform the processing operations, short laser bursts were used to manipulate the beryllium ions. Magnesium ions kept the beryllium ions stationary, and from getting hot. It is believed that this system may be applied to larger-scale systems.

The system built was mostly experimental, but what is important is the fact that the principal may be applied on a larger scale, and therefor become practical.

Sunday, November 22, 2009

HP SkyRoom Brings 21st Century Innovation To VideoConferencing

September 22, 2009 saw the introduction of HP SkyRoom - high definition videoconferencing software that offers affordable, live real time face-to-face meeting with no subscription fees.

The technology was developed in HP Labs, and some elements were used by Nasa's rovers on Mars to transfer high-resolution images back to our planet.

The software is reported to be the only videoconferencing tool that offers real-time communication for up to 4 people on a standard business network. The software is priced at $149.

Until now, videoconferencing has been somewhat limited and expensive, and also limited users in the areas of video sharing, rich media content and design manipulation.

HP SkyRoom will be included on select HP business desktop and mobile workstations, and also on a free trial basis for many HP premium business notebooks and PCs. The software can be used on Dell, Sun or Lenovo PCs that meet the minimum technology requirements.

This technology will have a significant impact on the way companies do business, in that travel costs and even environmental impact will be reduced significantly. 'Finally, video meetings with genuine eye contact and natural human interaction are as easy as starting an instant messaging connection,' said Jim Zafarana, vice president and general manager, Workstations, HP. 'It takes business productivity and collaboration to a completely new level when we can connect people around the world in a day via HP SkyRoom and let them get home to family dinner and bedtime stories – without the wear and tear of travel.'

HP SkyRoom enables users to share any kind of application used on their PC or workstation. Some of these include documents, interacive 3-D applications and also office documents. The software is easy to operate, and quick to launch, simply clicking 'contact to connect', which initiates a real-time, live SkyRoom session, and with only one more click, users can instanly share rich media content.

The success of HP SkyRoom lies in three years of design and research to compress image and video algorithms. The software gives remote users a glimpse of the presenter's display, and also of each other. It only updates changes in the screen display, not the entire display, which is then encrypted and compressed before being sent to the other participants. This method reduces limiting factors such as bandwith and network traffic, which in itself allows for faster transfer speed of the data.

Minimum requirements to run HP SkyRoom includes Intel® Core 2™ Duo 2.33-GHz or equivalent processor with 2 GB RAM, as well as a webcam and Microsoft Windows® XP or Vista®. Networking requirements consist of a broadband connection with at least 400kb/second, and needs to run over a corporate VPN to connect to systems outside the local firewall.

HP Z800, Z600, Z400 and xw4600 workstations will feature the software preinstalled at no cost.

Embedded systems

Embedded computer systems must be fast and efficient. A European consortium has created a new modelling framework that lets designers strike the best balance between static, reconfigurable and analogue hardware and the software that runs on it.

A typical desktop PC contains an all-purpose processor and many different software programs that allow it to do a huge range of tasks. It gets things done, not always as efficiently as possible, but well enough for most purposes.

Embedded systems are different. These specialised computers can be found everywhere from aircraft to cars to washing machines. They are built to do one job extremely well, and usually that means that a lot of processing work which might be done in software on a normal computer is done by a purpose-made – and efficient – hardware chip.

The trick is to get the right balance between software and hardware. “Software is flexible, but it requires fast and expensive processors and can be too slow for very computation-intensive tasks,” says Frank Oppenheimer, of the OFFIS research centre in Oldenburg. “Hardware in embedded systems is efficient but usually static – that is, a piece of hardware can be used in exactly one specific way.”

In recent years industrial designers have become interested in dynamically reconfigurable hardware. It comes in programmable modules which can rewire themselves to do different tasks, so combining the processing muscle of hardware with the flexibility of software.

Assistive technologies used for web browsing

Individuals living with a disability use assistive technologies such as the following to enable and assist web browsing:

* Screen reader software, which can read out, using synthesized speech, either selected elements of what is being displayed on the monitor (helpful for users with reading or learning difficulties), or which can read out everything that is happening on the computer (used by blind and vision impaired users).

* Braille terminals, consisting of a Refreshable Braille display which renders text as Braille characters (usually by means of raising pegs through holes in a flat surface) and either a QWERTY or Braille keyboard.

* Screen magnification software, which enlarges what is displayed on the computer monitor, making it easier to read for vision impaired users.

* Speech recognition software that can accept spoken commands to the computer, or turn dictation into grammatically correct text - useful for those who have difficulty using a mouse or a keyboard.

* Keyboard overlays, which can make typing easier and more accurate for those who have motor control difficulties.

Monday, November 16, 2009

Wireless Technologies

Terrestrial Microwave

Terrestrial microwaves use Earth-based transmitter and receiver. The equipment look similar to satellite dishes. Terrestrial microwaves use low-gigahertz range, which limits all communications to line-of-sight. Path between relay stations spaced approx. 30 miles apart. Microwave antennas are usually placed on top of buildings, towers, hills, and mountain peaks.

Communications Satellites

The satellites use microwave radio as their telecommunications medium which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically 22,000 miles above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals.

Cellular and PCS Systems

Use several radio communications technologies. The systems are divided to different geographic area. Each area has low-power transmitter or radio relay antenna device to relay calls from one area to the next area.

Wireless LANs

Wireless local area network use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANS use spread spectrum technology to enable communication between multiple devices in a limited area. Example of open-standard wireless radio-wave technology is IEEE 802.11b.

Bluetooth

A short range wireless technology. Operate at approx. 1Mbps with range from 10 to 100 meters. Bluetooth is an open wireless protocol for data exchange over short distances.

The Wireless Web

The wireless web refers to the use of the World Wide Web through equipments like cellular phones, pagers,PDAs, and other portable communications devices. The wireless web service offers anytime/anywhere connection.

Monday, November 9, 2009

ICT-The impact on Society

The far-reaching changes taking place as a result of ICT developments touch many aspects of our lives.ICT now provides us with the means to process, store, retrieve and communicate a vast amount of information in digital form. This digital information is communicated irrespective of whether it encodes text, data, sound or video. This has hugely enhanced the variety and quantity of information that individuals and organizations can communicate on a virtually instantaneous basis.

The following illustrates just some of the changes that the digital revolution is bringing to our lives:

  • An ever-growing number of businesses and families at home are profiting from high-speed computer links (via modems using standard phone lines, TV cables or ADSL, via digital interfaces to ISDN or Ethernet networks, or via mobile GSM or GPRS technologies). This will enable much easier and richer access to new services such as distance learning. With physical distance from the teacher no longer a constraint, individuals and educational institutes alike can 'attend' lectures taking place far away and access information stored elsewhere, thereby broadening the scope and possibilities of education. Distance learning complements the increasing focus on life-long learning for all, as it makes it easier for people to follow education and training courses without having to move or leave their current employment.
  • The convergence of satellite, cellular telephony and computer technologies means that we can communicate with people all around the world -while we ourselves are on the move. This is already possible using GSM (within Europe) or dual-mode (for transatlantic journeys) cellular phones, notebook computers for connecting with colleagues based in offices all around the world, or satellite phones for more extreme applications.
  • It is increasingly easy for us to live and work where we choose, rather than being forced to commute to particular locations, such as city centres. Those of us who are unable to leave the house, or who live in a geographically isolated region, can now be fully integrated into the labour market. This helps fight de-population of rural areas.
  • Teleworking is helping to improve Europeans' quality of life. With more people able to work from home - or from almost any other location that they choose - traffic congestion in overcrowded city centres may be reduced. The range of employment options available to us will also rise, along with the range of choices within each job.
  • Most Europeans can access important services without having to travel to a particular location. For example, we can now pay bills, check a bank balance or communicate with our bank manager without having to travel to a bank outlet. This increases the convenience of such services. But ICT is also increasing the quality of important services. Telemedicine, for instance, gives doctors greater resources that include health applications networks linking patients and their local doctor with specialists all over the world, who will have been able to study laboratory results, X-rays and other medical information sent to them electronically. Patients therefore benefit from the advice of the top medical experts, wherever they are located.
  • People with special needs, such as people with physical disabilities and the elderly, can now access a multitude of information and entertainment services from around the world. This can help alleviate problems caused by a reduction in mobility. As electronic commerce becomes more common, distributors can now more easily sell products across the world and - if need be - around the clock, in a truly global market that is not constrained by geography or time-zones. Electronic commerce provides smaller companies with a very practical and cheap medium through which to advertise and sell their products, and gives enterprises around the world a larger market to aim at. The consumer is also benefiting. From work or the home, we can 'shop' for a range of goods and services from around the world, giving us greatly expanded choices and lower prices.

Tuesday, October 13, 2009

Get a unique insight into the way hackers use the latest exploits

All systems engineers and IT managers that have any responsibilty in their companys security systems should keep themselves updated with the latest exploits and techniques used by hackers.

We are listing below the sites that I use and keep an eye on to ensure the systems that are important to my network and customers are not affected.

astalavista.net
Currently down, but coming back soon - Was always great for discussions and info on the latest exploits.

milw0rm.com
A searchable library of exploits in just about anything searchable by OS - check it out to ensure your business systems aren’t affected.

digitalmunition.com
Another site that lists security advisories - see how insecure Apple OSX is here…..

xssed.com
A cross site scripting resource database with lists of vulnerable websites, also has information on defending against XSS attacks.

secumania.org
Basically a security news site that also has lists of the latest exploits and vulnerabilities.

It’s always a good idea to try to get into the heads of the people who are trying to attack corporate networks. Keeping an eye on these sites gives you an insight into the minds and motivations of these people.

Wednesday, October 7, 2009

Service-Driven Networks for Next Generation Technology


AT&T Synaptic Hosting Conceptual Network AT&T's Synaptic Hosting is the operator's next-generation utility-computing service with managed networking, security, and storage for business. The new service combines technology acquired from applications service provider USinternetworking with five "super IDCs," or internet data centers (IDCs), across the U.S., Europe, and Asia. Customers receive managed servers, LAN, security, storage, designated account support, and enterprise-class service level agreements.

One the of first announced customers for the AT&T Synaptic Hosting Service is the U.S. Olympic Committee (USOC), which has powered the teamusa.org Website with AT&T Synaptic Hosting. Given the buildup of Website activity leading up to and during the Beijing Olympic games and the subsequent fall-off in activity in the months following the games' conclusion, the flexibility enabled by the utility computing model was ideal for the USOC.

Network operators around the world face tremendous challenges and opportunities as they transform themselves from traditional telcos of the 20th century to the next-generation communications providers of the 21st century. As network services and network traffic migrate from TDM, voice-to-packets, and IP, network operators have no choice but to transform themselves or decline and, ultimately, fail in this new and highly competitive environment. As network operators, the network must play a primary role in this telecom industry transition. Clearly, this explains the unveiling of various network operator NGN initiatives around the world over the past couple of years. At the network level, key requirements for operators to realize this

vision of the future include:
• End-to-end connection and resource management
• Ubiquitous connectivity between networks
• IP-aware transport
• Increased service awareness in access and metro
• Service-aware data, control, and management planes
• High availability
• Network flexibility
• On-demand connection abilities

Despite much talk about NGNs, the industry is still in the early stages of this transformation. We will see a great deal of change over the next decade and beyond. The winning network operators will be those able to successfully embrace today's data/IP growth applications, adapt quickly to deliver the as-yet unknown applications that will drive revenue growth in the future, and build the bridge between legacy TDM and packets, as long as TDM continues to exist in the network.

Sunday, October 4, 2009

WPA Security Encryption can be Penetrated

Encryption WPA (Wi-Fi Protected Access) should be tough right? However, Japanese scientists had only takes 60 seconds to penetrate the WPA encryption used in wireless router. Note this time brought down the previous record for 15 minutes. Toshihiro Ohigashi from Hiroshima University and Masakatu Morii of Kobe University will reveal how they do over at a conference in Hiroshima 25 September next. This inroad is not given full control of Wi-Fi connection, but allows the reading and spoofing packets.

But the ease of penetrate WPA encryption TKIP (Temporal Key Integrity Protocol) to make that anyone who cares about security should start thinking to move to WPA2 with AES encryption (Advanced Encryption Standard) which is more secure. The attack was carried out on a PC and Wi-Fi Access Point that were located far enough away so that the two devices see each other indirectly. Computer attacks carried out between them by acting as a relay using the correct checksum to trick the network. The good news, until now WPA2 with AES encryption newer remain safe from attacks by hackers.

Welcome to the blog of ICT Consortium

Here the place to discuss about new technologies, standards, technical issues of ICT