Thursday, August 29, 2013

Published 7:47 AM by

The commander of the ISS will be the first representative of Japan

The commander of the ISS will be the first representative of Japan



 In the Japanese space agency Jaxa said that in March next year for the first time in the history of the commander of the crew of the International Space Station will be the Japanese. Until now, the status of the commanders of the ISS were mainly Russians or the Americans. It is about 50-year-old Koichi Wakata. He had once been on the ISS in November and plans to go there again, having received the status of commander in March.

 "This is a great value and responsibility for the Japanese space, we have long wanted to have their own representative team to the ISS. Receive similar experience is essential for Japan's space program" - says he Wakata. in 2009 Wakata has become the first Japanese on board the ISS, carrying both general flight tasks, and working for Japan's space program. Japan - one of the 15 countries participating in the ISS project, formerly the space station was taken to the space laboratory module Kibo.

 expected that Wakata will fly to the ISS in November, along with Russian Mikhail Tyurin and NASA representative Rick Mastracchio. For Mastracchio - this is the first long-term mission to the station, but in the three times he commands the shuttle was a two-week flight, while Tyurin was already on the ISS twice in the long-term operations.
Read More
      edit
Published 7:46 AM by

The U.S. launched a new spy satellite

The U.S. launched a new spy satellite




USA in the night from Wednesday to Thursday launched another military spy satellite, the goals and purposes that have not been announced. Unmanned launch vehicle Delta IV Heavy class started at 21:03 MSK from Vandenberg Air Force Base in California aboard a rocket is a "closed space payload, which will be injected into a polar orbit for the U.S. National Reconnaissance Office." It is not clear that it is for satellite was launched into orbit, but we know that it appears in the official data, as NROL-65. According to regulations, through open communication in the event of launch of spy satellites in the U.S. broadcast messages only the first few minutes. At this time, Broadcast conducted seven minutes, after which press comments were unavailable. Responsible for running the company United Launch Alliance, who oversees satellite launches Atlas and Delta. To run the unit used rocket Delta IV Heavy, established in 2004 and is the lifting of today. The last start was the 364-meters for missiles Delta. Devices Delta IV has eight times been used to launch a series of devices sekternyh NROL Note that although the Delta IV Heavy is the most difficult to date a rocket at NASA are working on the latest rocket giant. 92-meter rocket SLS (Space Launch System) should be in orbit up to 70 tons of cargo. First test runs SLS in 2017, production - in 2021.

Read More
      edit
Published 7:44 AM by

Volvo showed the sports car of the future

Volvo showed the sports car of the future



 Swedish auto manufacturer of business class is not often pleases its fans with new concept cars, but today this is the case. Volvo unveiled a concept car, where Scandinavian engineers tried to implement all the auto-trends in one package. Here and stylish Audi R8-like form, and plug hybrid engine, and the Internet connection and the dynamic range of speeds for those who like to take off on an empty highway under green light. As described in the Volvo, at the heart of the new car is brand new engine on gas -electric traction. Engine capacity is only 2 liters, but it does not prevent it to house a much 400 horsepower.

The company said that the engine performs a role not only in its main purpose, but also acts as a charger for the battery system, which are involved in activation of the electric moments of the twin-engine. Featured prototype machine is a two-door, which, in general, OK for sports cars. The company also said that for the needs of the driver and passenger cars is offering a new computer platform, tentatively called Scalable Product Architecture. Although she still does not allow the vehicle to create an autonomous moving vehicle, but makes a significant step in this direction.

Many routine tasks faced by the driver, then transferred to a computer. Externally, the computer system is completely touch. In general, the dashboard of a car on the driver and passenger get only 5 physical buttons, whereas the rest is merely a plate-like interface with touch control. At Volvo notes that the device shown today - this is only a concept, that is a commercial version of the machine to its basis can greatly differ, in addition, the company found it difficult to tell when a car like this, you will be in dealers' showrooms. 
Read More
      edit
Published 7:42 AM by

Scientists have created a proto-marrow stem cells

Scientists have created a proto-marrow stem cells



Biologists from the Institute of Molecular Biotechnology of the Austrian Academy of Sciences in Vienna turned the culture of "blanks" of neurons in some semblance of a human brain, inside which there are "working" of the network of nerve cells, according to  RIA Novosti.

American biologists were able to grow stem cells from a particular structure of neurons and other cells that resembles a human brain on the device, which will in the near future, the use of such artificial "brains" to study the work of the mind and its disorders, according to a paper published in the journal Nature .

Over the past two decades, biologists have learned to turn stem cells into the "adult" tissue of bones, muscles, skin, and nervous system. Culture "stem" of neurons may be the cure for Alzheimer's and other neurodegenerative diseases. For crops such scientists trying stem cells isolated from the biologically active molecule, causing them to turn at different types of nerve cells.

Team of biologists led by Madeline Lancaster from the Institute of Molecular Biotechnology of the Austrian Academy of Sciences in Vienna took the next step - they transformed the culture of the "blanks" of neurons in some semblance of a human brain, inside which there are "working" of the network of nerve cells.

To do this, scientists have tracked for the way of development of the future of the brain in fetuses of mice and identified a set of proteins and other signaling molecules that "conduct" of its development. The researchers then found similar substances in cultures of embryonic and reprogrammed (iPS) stem cells and were able to use them to grow nerve tissue in a special three-dimensional "matrix".

Accept them "organelle" was very similar to the human brain. Thus, he had easily distinguishable bark set of several divisions, similar parts fetus or infant brain, and there arose a group of interconnected neurons present in similar regions of the human brain. Scientists believe that these crops can be used to study the nature of microcephaly and other genetic abnormalities in brain development today, as well as the mechanics of our consciousness and mind in the future.
Read More
      edit
Published 7:40 AM by

A new release of Check Point R77 enables the service ThreatCloud Emulation to combat zero-day attacks

A new release of Check Point R77 enables the service ThreatCloud Emulation to combat zero-day attacks

Check Point has announced the release of Check Point R77 - a new version of its software blades architecture. In the R77 features more than 50 new features, including new service ThreatCloud Emulation, high performance technology Check Point HyperSpect, Software Blade Check Point Compliance, new means of centralized device management, improved user authentication through RADIUS integration and IF-MAP, and also advanced unified operating system Check Point GAiA. Today cybercriminals are working at lightning speed, constantly inventing new kinds of hidden attacks and using malicious software designed just for their victims. According to analysts, every day is created and distributed by an average of 70 to 100 thousand new samples hacking programs.

A huge amount of malware is sophisticated and increase the flow of hitherto unknown attacks faced by the organization. However, the requirements of the business performance of the network continue to grow exponentially. In such circumstances, a combination of means to prevent threats, security infrastructure and high-speed automated tools to ensure regulatory compliance. Check Point R77 combines proactive security features, monitoring compliance and increase the productivity of existing security gateways. New support service ThreatCloud Emulation, which prevents infection of computer systems from exploits previously unknown (zero-day exploits), new types of malware, targeted attacks and threats of increased complexity (Advanced Persistent Threat, APT). As part of the multi-level Check Point solutions for threat prevention, ThreatCloud Emulation has operational analysis of suspicious files that mimics their implementation with a view to identifying malicious features and instantly blocks the detected malware in email attachments, downloads, and web content.

 Then the information about the attack is transmitted to the network and Check Point ThreatCloud cloud service to provide automatic protection. ThreatCloud Emulation, which was first announced in February 2013, it is now proposed as a new cloud service, based on a global monthly quota scanned files within the organization. Monthly quota allocated to each enterprise network security gateways and features flexible deployment. The quota may be increased depending on usage and growth. ThreatCloud Emulation Service is also available through the device Private Cloud Emulation.

 novelty in the R77 version is Check Point HyperSpect - intelligent adaptive content analysis tool that optimizes the use of hardware through a variety of enhancements and tools speed, including multi-threading technology. HyperSpect provides a significant performance improvement: for all modern platforms increase the actual speed is up to 50%. after the update to R77, organizations can securely consolidate security through the use of multi-level architecture of Check Point software blades on a single platform, while not losing performance. HyperSpect increases the computing power and optimizes ad-hoc analysis of the most popular types of Internet traffic, such as streaming media or http-communication, demand higher bandwidth.

 As part of version R77 went Software Blade Check Point Compliance, first introduced in March 2013 is - the first integrated with next-generation firewall and fully automated solution for monitoring compliance, which is based on a library of regulatory requirements, and over 300 security methods. Check Point Compliance simplifies compliance with external regulations and internal standards in the field of security through instant notifications of policy changes, constant analysis of the situation at all Check Point Software Blades and practical recommendations for optimizing compliance and security. More accurate user authentication systems other than Windows, is achieved through the integration of RADIUS and IF-MAP. R77 provides transparency of licensing by automatic request licenses and synchronize data between Check Point UserCenter safety and control panel.

Read More
      edit
Published 7:39 AM by

Market IDM: what and why?

Market IDM: what and why?

Prologue

At one of the famous western IT vendor, which took a couple of years ago, I saw an interesting rationale for the ups and downs of popularity and demand of various technologies of the IT market. Perhaps it will seem trivial to someone or friends, but it helped me resolve many issues lifecycle.

This methodology is called the Hype Cycle and presented to the international research company Gartner, whose "Magic Quadrant" is widely known in the market of information technologies. The essence of this interpretation of the maturity of the technology cycle is fairly simple. Any product or group (market) products that solve the same problem, are in the process of its evolution from a start-up to steady popularity the same way, which can be represented as a curve on the graph, where the vertical axis are the expectations of consumers, the horizontal axis - time . This path can be divided into several stages, where there is a stage of rapid growth expectations, the stage of frustration (recession expectations) and the stage of growth with adequate access to the so-called "plateau of productivity." Each technology to be provided in the annual Gartner research Hype Cycle, noted on the curve showing its age. Moreover, there are technologies that run this route for 3 years, there is that in 10 years only come to the peak of expectations, and there are "losers" that to the mass consumer is not reach.


Unfortunately, we could not find a relevant picture for the market IDM, but, in my opinion, he has already passed the stage of marketing and boom, and the stage of frustration from the use of Western technology, and currently going through a phase of education to establish itself as a mature solution used the majority of users of the IT market.

The current situation

Of course, we must pay tribute to the pioneers of the market IDM. In my view, these include, first of all, a corporation Oracle, which in the early to mid-2000s, was actively promoting your product on the market. Everything I've heard about the decisions IDM while - it was Oracle, and sources of information were the most diverse, - seminars, conferences, Internet, customers, etc. Large-scale lobby western IT vendor has borne fruit - began implementation in large Oracle-centric companies, some of which continue to this day. This is not to say that the fault was the unrealized expectations vendor or integrator, which introduced IDM. Just before the first implementations there was no understanding that the IDM-solutions - not boxed product, and for its implementation should be approached carefully. Such failures have affected and in general, the market for access control systems, which passed in the period of frustration.

Despite the downturn phase of expectations, technology continued to live IDM. There were new and approved the "old" players in the Russian market. IDM market was no exception, and in terms of globalization, small single-product vendors were bought up by major international players in the IT market, carried out acquisitions and alliances. So the Russian market learned about the decisions IBM Tivoli Identity Manager, Dell has acquired Quest, Oracle has enriched its competence through the purchase of Sun, the company's assets NetIQ and Novell have been merged into a single investment group company, Microsoft has enriched  its range of IT security solution Forefront Identity Manager (FIM).

During this period, begin their development and domestic solutions. But domestic manufacturer, usually having a strong team of developers, much inferior to Western vendors in terms of marketing and sales approach. This is due both to lack of investment, even in a successful start-up projects, as well as the gaps in the strategic development of industrial information security solutions.

But all that is done - for the better. The domestic market is ripe for new proposals expected from the recession, and the last couple of years we can observe a renewed strong demand for access control decisions. In this regard, domestic developers IDM-making invigorated at the right time and a lot of impact on the recovery of the market in its segment. In 2013, we witnessed the marketing activities and other vendors mentioned above. There are new domestic players: in the segment IDM has positioned the product under the brand name "CUB" from the Russian company Trustverse.

But to say that the market IDM currently held - it is too early. It is possible that we have not once hear about new products and future technologies for controlling access to information systems.

Problems of implementation

Why did for over 10 years and with the undoubted efficiency for business solutions IDM just beginning its large-scale development? There are several reasons, which we'll discuss in this section. Conventionally, I would have shared the financial and technological, although the latter, ultimately, it is still possible to express in monetary terms.

With financial reasons, everything is easy. This is the high cost of software licenses and work on implementation. So often the case with many emerging technologies, when the first manufacturers usually foreign, who, guided by the big companies make a proposal to the market. Such a proposal is not convenient for everybody, so there are new players, the market becomes more competitive, and the cost of solutions is adjusted downwards. That is to say that today the market there are different price offers that are of his client.

The second pool of problems - is the technological difficulties associated with the integration of IDM-making in the IT infrastructure of the customer.

The first of the problems of this group is associated with deep integration of IDM in information systems. Without it will not work no IDM-decision because its main objective - is to manage user accounts in information systems. This problem is solved by the so-called connectors, through which the core IDM works with customer applications. As customers use the software applications from multiple vendors to solve their business problems, and a variety of connectors that are appropriate. I do not need to explain how often non-trivial to develop connectors to third-party application, especially when there is no understanding of the core code IDM. In this part of the domestic solutions more competitive, because the development of the connector, usually carries himself vendor.

The next problem is related to a number of process using role-based architecture IDM-systems. Indeed, the effective automation control access to information systems is possible only if there is a role model, which allows you to associate a specific employee with his identity in information systems, and most importantly - to give him the rights corresponding to its role (job description). The development of such a role model - an extremely time-consuming process that can last for years in large companies. This is due to the fact that for each unique position to create a role that has the full set of rights to information systems. And in an ideal situation the same job correspond to a single role, in practice by staff in the same job may have different roles with additional responsibilities. Therefore, in order to effectively determine the role, you must obtain relevant technical information, "unloading" on the Rights of information systems, information systems administrators to interview (or individual modules), security administrators and resource owners, read heads of business units. And then bring it all into a single matrix and align it with all the members of the previous process, and the management of the customer. Who is involved in consulting, they understand how it is "heavy" organizational process. Although I have painted a fairly simplified picture, in real project is much more varied and richer.

But since the introduction of the classic version developed IDM-solutions, namely - by role-based model developed "by hand". To optimize this process leading manufacturers of IDM-systems offered a promising approach that provides the automation process of developing a role model for the built-in intelligence.

The immediate prospects

In the previous section I want to say a few words about the functionality to develop a role model as a promising model introduction IDM-making. The whole idea is not new, it has already offered to the market such IT giants like Oracle and Sun, in the form of a module Role Manager. But the licensing policy did not allow effective use of this mechanism, because its functionality is used only once during the system implementation, and the cost is quite high. Therefore, in the domestic market at the time of the respective implementations did not take place. However, the same functionality is being tested at the company's outpost, and taking into account the negative experience of the market, ignoring the Western vendors are expensive solutions, this solution will be available as a free module Role Management & Analytics to the basic functionality of IDM. It is expected that this will speed up the implementation of projects on IDM in large companies, to few months.

As the current trends of the market IDM also want to note the development of proposals for medium-sized businesses. As noted earlier, the Western vendors initially focused on big business, based on which, the rise and licensing policy. Opportunity to purchase software licenses, for example, 500 people missing quotation started from a few thousand users, the cost of the project for implementation IDM tens of millions of rubles. It is clear that such proposals were not available to companies with fewer than 2-3 thousand employees. In this regard, the domestic industry has adjusted IDM-market, allowing the automation of the process of access control in information systems at a reasonable price and within a reasonable time frame.


Trying to improve their competitive advantage, developers IDM-solutions extend the functionality. Here it is impossible not to note the trend of integrated solutions, where the range of problems solved by the system goes beyond the classic IDM, and includes areas adjacent to access control.

Epilogue

Summarizing, we can say that the market IDM is currently in a stage of rapid development. This confirms the activity of vendors, including Russian, and large-scale demand from customers to resolve problems related to access control. So my article I would like to finish by rephrasing the Soviet poet - all IDM-s good, choose the taste!


Read More
      edit
Published 7:36 AM by

Facebook-spam brings $ 200 million a year

Facebook-spam brings $ 200 million a year

A group of Italian researchers in the field of information security under the leadership of Andrea Stroppa (Andrea Stroppa) and Carlo De Micheli (Carlo De Micheli) has analyzed hundreds of thousands of spam messages in the social network Facebook. Spammers themselves seem to believe that Facebook largely "kept on their shoulders." In the analysis by the expert relied on phrases like, "Hey! Click here to get free software for iPhone! », Short references made ​​by legitimate services Tinyurl.com or bit.ly, as well as links outside the network.

They found a lot of fake fan pages designed to get users to click on the Facebook link. Fighting spammers is an urgent task for the giant social network, currently numbering more than a billion people around the world. Income derived by spammers using it, and by its associated sites do not benefit the community. On average, according to experts, every eighth page on Facebook actually serves to put spam links. Researchers have calculated that the users that are hosting spam posts on pages that have about 30,000 subscribers receive for the post of an average of 13 dollars (from 8 to 20 dollars).

Posts on pages that integrate more than 100 million people, will cost more - an average of $ 58 (35 to 100 dollars). When placed in a social network 18,000 spam messages per day, the annual income of spammers will be from 87 million to 390 million. That is, on average - about $ 200 million. Moreover, spammers assure themselves that their activity is beneficial to the social network. «Facebook does not limit us, because every day we are filling gay funny and interesting content that appeals to users. Without it, Facebook will be an empty place, "- said one of the distributors of spam in the course of communication with researchers
Read More
      edit
Published 7:36 AM by

Julian Assange is confident of the political victory

Julian Assange is confident of the political victory



Ten days before the start of the parliamentary elections in Australia, WikiLeaks editor in chief of the project and the eponymous founder Julian Assange political party was confident of victory. He also noted that the recent resignation of the party will not interfere in the upcoming elections, according to English-language TV channel Russia Today. "It will be a serious fight, but my chances are quite high - said Assange. - Given the recent ratings Labour coalition and "green", I could probably win if you will type more than 4% of the vote. " Last week it was announced that Assange had gone from the party several of its prominent members, including writer Leslie Kennold and Assange close friend Daniel Mathews.

They explained his resignation to the fact that "do not see the necessary clarity and responsibility" within the party, writes The Australian. According to Assange, he is glad that these people left the party. "Thus, the party disappeared source of all conflicts and differences, - he said. - They believed that Wikileaks and "Green" must act together, but I do not share that view. " Party WikiLeaks was founded in March 2013. Its purpose - the protection of civil rights and liberties, transparency of the state apparatus and its accountability to the citizens, as well as resistance to interference with privacy. Recall that on March 17 Assange announced his intention to run for the Australian Senate from the state of Victoria. The possibility of nominating Assange has been questioned, but the lawyers WikiLeaks confirmed that there are no grounds for refusal.
Read More
      edit
Published 7:34 AM by

Verizon Communications wants to buy a stake in Vodafone cellular business

Verizon Communications wants to buy a stake in Vodafone cellular business



 In the U.S. mobile market continues to trend previously taken konsolidiatsiyu. After peretryasok associated with operator Sprint Nextel and talks to merge T-Mobile US, as well as the desire of Japanese Softbank to buy Sprint for more than $ 21 billion, today intensified U.S. Verizon Communications and British Vodafone Group. two companies resumed negotiations regarding the share repurchase Brits more than $ 100 billion in the company of Verizon Wireless, the largest U.S. mobile operator. It is reported by The Wall Street Journal, citing its sources.

 In turn, Bloomberg notes that in this case we are talking about the cost of a 50% stake in Vodafone 130 billion dollars. worth noting that the company is not the first time allowed the rumors of such talks, but in the last couple of months the parties were negotiating Activity reduced to almost zero. Now, however, WSJ reports that Verizon is serious to become the sole owner of the largest U.S. mobile operator and already being in talks with a pool of banks from which loans are required in the "tens of billions of dollars" needed to close the deal with Vodafone.

 Initially it was reported that Verizon was going to buy a 45% stake in Vodafone, but the company did not come to an agreement about the price. If the Americans were talking about $ 100 billion, the British declared that they want 130 billion in the last time the talks collapsed because of price differences. Now is not known whether the parties closer to assess the value of an interest in Verizon Wireless, or is there some other scheme provides for the implementation of the transaction. WSJ notes that the management of Verizon Communications has developed a hypothetical structure of how it might look to buy back transaction, but it is unknown Vodafone agrees to it.

Verizon offers to buy out the Vodafone partly in cash - about $ 50 billion, and the rest - it's credit to banks, plus other financial instruments such as bonds. Sources say that the last time the parties discussed the sale in July, but it was due to price differences they have it and not realized. Lowell McAdam, CEO of Verizon in January of this year, commenting on the quarterly results of cellular subsidiary, announced that the parent company has both the means and desire to buy out Vodafone. According to statistics, as of today Verizon Wireless subscriber base of about 100 million subscribers, and the capitalization amounts to 133 billion dollars. Since the beginning of this year, the company's shares have lost about 14% of their value, they are now trading at 46.56 dollars, against $ 54 in April.

Read More
      edit
Published 7:32 AM by

Google co-founder Sergey Brin and his wife sold

Google co-founder Sergey Brin and his wife sold



Co-founder of Google Sergey Brin at odds with his wife. This was announced today, citing sources in the company said the publication AllThingsD. The newspaper said the couple is not legally formalized a divorce, but together they do not live. Recall that the wife of Sergey Brin, a biologist and techno-entrepreneur Voysitski Ann have been married for over six years and have two children. The reason for the differences between them are not clear, as well as the decision are legally divorced.

 Meanwhile, the California tabloids reported that Breen allegedly struck up a romance with one of the employees of Google, whose name is unknown. interesting to note that earlier in the IT industry cruised juicy rumors in respect of the second and Google co-founder Larry Page. Long tongues attributed to him a secret affair with the current head of Yahoo Marissa Mayer, when she still was not in her current marriage for entrepreneur Zachary Baugh.

Sami Meyer and Paige has never publicly commented on the rumors in the IT industry this is kept confidential at the time of the two managers, which tabloids have already reconciled. Voysitski As for Anne, she is the founder and head of the biotech company 23andMe, which deals with developments in the field DNA and its interpretation.

In addition Brin and Voysitski, while still together, set up a fund Brin Wojcicki Foundation, which invested in the company Tipping Point, fund Wikimedia Foundation and the Institute for Parkinson's. AllThingsD reports that in spite of the disorder in their family life, Brin and Voysitski Fund will continue to work together. In addition, the press noted that the divorce of the spouses does not affect the state of Sergey Brin, estimated at 21 billion dollars. Prior to marriage, the spouses had signed a marriage contract in which Ann Voysitski can not claim the money her husband.
Read More
      edit
Published 7:30 AM by

Google Maps updated on Russian maps

Google Maps updated on Russian maps

Google today launches an updated set of Russian maps available as part of Google Maps. As described in the company, the new version of Google Maps for the Russian people were created updated maps of major cities, and also added previously not represented communities. "Over the past year, we have digitized more than 150 images of streets and added more than 200 Russian cities and commercial organizations to provide place of business photos on maps Google ", - the press-service of Google.

Summary updates related to about 250 cities, including Moscow, St. Petersburg, Novosibirsk, Yekaterinburg and other major towns in the west of the country), with more than 50 of them will appear on Google Maps for the first time. Updated maps - part of the project Ground Truth, which allows you to speed up the pace of updating the maps of the country and provide a more accurate topographic data.

Updated maps of Russia contain detailed information on the footpath in many famous parks and historic sites in the territory, making it easier pedestrian navigation. Now, frequently visited locations (such as universities and hospitals) are also indicated more clearly. However, the number of users in the official blog of the company already criticized the new maps, seeing in them a number of inaccuracies.

 "From this point you can also find lots of important and detailed information on objects located outside the cities, such as national parks and the river. We also inflicted on the cards even more roads across the country, "- said at Google. "We have significantly improved road links, combining data from the unilateral move, turn restrictions, as well as priority roads. This will help to more accurately determine the route when traveling by car."
Read More
      edit
Published 7:29 AM by

Twitter buys Trendrr

Twitter buys Trendrr

Competition between Twitter and Facebook for the attention of advertisers and media analysts, the market continues. Previously, the two companies have already made ​​a number of developments aimed at the study of user-generated content, the company is now competing to see who will be able to better and more productive to use this custom content in their (and advertising) interests. Today, Twitter has acquired the development, by means of which the company will be able to monitor trends in user discussions Twitter.

 On Twitter, bought a company Trendrr, which creates an analytical platform for online analysis of user comments on blogs and social networks in relation to certain projects on television. User Trendrr products are media companies, TV stations and other media professionals of the market, who are studying the audience's reaction to certain news, TV shows or movies. Zest Trendrr products is that they work in real time, ie, the analytical data generated immediately same, with the advent of user of comments on given topics.

Clearly the value of the "live" analysts are significantly higher than statistical reporting week or month ago. transaction value by buying Trendrr not disclosed. recall that in February this year, Twitter acquired the company Bluefin Labs, which has since become a springboard for the program Amplify, implemented by Twitter.

 Here, too, you can create some reports to advertisers by the reaction of consumers of goods and services. interesting to note that in the past month Trendrr, while still being an independent, announced that Facebook - this is one of the most successful platforms for media, analysts, users are five times more likely to discuss the TV program and movies, rather than on other sites and social networks. At the same time, many have rated it as flirting with Facebook and a sign that the latter may soon Trendrr to lay their hands on.

Read More
      edit

Wednesday, August 28, 2013

Published 8:54 AM by

Oracle says the new processors Sparc M6

Oracle says the new processors Sparc M6



A new database system Oracle Database 12C and vysokotrebovatelnye computational load will run much faster on the new microprocessor Sparc M6, announcement is expected soon. This is related to Oracle, adding that the new corporation's flagship application will initially be optimized for the M6. latest generation processor Sparc receive 12 processor cores, double the figure M5, the supply of which began in the spring of this year. Each core M6 can handle up to 8 data streams, allowing the concurrent operation of the chip with 96 parallel streams of data, said at the Hot Chips conference at Stanford (Calif.) Vahidsafa Ali, a senior engineer for the hardware development Oracle. According to him, on the Sparc processors server arena have their place for over 20 years, and the problem M6 - better integrated into the high-performance, highly parallel processing system.

 It is expected that the new chips will expand its portfolio of high-performance servers, Oracle. "These chips will consolidate virtual load the database, especially DB class in-memory, as well as application software with high performance requirements," - says Vahidsafa. At the same time he noticed that the M6 will be fully compatible with the existing Sparc-software so invested in the purchase of new programs is not required. specifics of chips he singled improved support for multithreading, as well as a new mode of Critical Thread for single-threaded applications in which they receive the highest priority processing for maximum performance.

 To build a real performance chips M6, Oracle has increased the size of cache per each core, as well as expanded capacity supported memory. So, M6 will receive up to 46 MB of L3 cache memory and be able to work with 1TB of RAM on the server. About clocked processors in Oracle were reported. however reported that the M6 was "deeply tuned" to work with in-memory databases, as well as a multilevel system is memory, which is useful for servers that run dozens of concurrent applications. It is expected that the processors M6 will work in 2 -, 4 -, and 8-way servers, but special "tuning shop" such as Bixby, plans to produce 32 - and even 48-processor servers based on the M6. For multiprocessor systems implemented here a new system of load-balancing between the chips, and built a set of regulations for the prevention and correction algorithms. Two final points are needed for servers, which are subject to extremely high demands on uptime. At the same time, with the traditional server-ECC-memory, the new processors are working. At Oracle has not said exactly when the Sparc M6 will come to market. Note that on the new chips Oracle is working with Fujitsu.

Read More
      edit
Published 8:52 AM by

Next week will show Intel processors Atom Avoton

Next week will show Intel processors Atom Avoton

Intel Corporation in the next week will announce a new generation of processors Atom Avoton, which will focus on the use of a server may soon appear in servers Hewlett-Packard Moonshot. In addition, Avoton become part of the product line Intel Atom C200, some of the solutions that are already in use in servers, high-density. The official announcement Avoton take place next week in San Francisco. At the same time, the corporation will launch processors Rangeley, also constituting a chip Atom, but focused on the use of network devices such as switches or routers. expected to Avoton will replace the current Atom S1200 Centerton, which are also used in servers HP Moonshot. Avoton new chips will be based on processor architecture Silvermont, as well as the current versions of these processors.

 However, in the Intel claim Avoton be up to seven times faster and up to four times more economical than Centerton. Avoton will be created on 22-nanometer process. Intel has said that the 2014 will be released followers Atom C2000, which will already be based on 14-nanometer technology. C2000 are designed to work with Web applications, e-mail systems, as well as other developments that do not require the exclusive power of the central processor, but operate with a variety of micro-transactions. new chips - this is the first product released under the new CEO Brian Intel Krzhanicha , who took office in May.

 Traditional client server platforms Intel, such as corporations, banks and the public sector is unlikely to be interested mikroserverami and Atom chips in them, but Internet companies, operators, cloud servers, hosting companies and small businesses may find the equipment for themselves. Avoton Atom C2000 support 64-bit system bus can be implemented as a SOC-system and also to have eight cores, and can address up to 64 GB of RAM chip. They also have hardware support for Ethernet networking and support work with SSD-drives. In the company's data does not say anything about the price and the specific models C2000, but said that the specific server models based on these chips will be "later this year."

Read More
      edit
Published 8:51 AM by

Engineers have created a 110-core mobile processor

Engineers have created a 110-core mobile processor

110-core processor has been developed by engineers from the Massachusetts Institute of Technology, who say that the new chip - is an updated look at the energy efficiency and productivity growth in mobile devices, PCs and servers. new chip called Execution Migraine Machine its peculiarity is that it defines ways to reduce the load on the CPU and allows for faster computation and more energy-efficient manner. About novelty was told at the ongoing conference in California Hot Chips. Developers say that the new chip - is a general purpose processor, it is not a chip accelerator or a type of graphics processor, but so far this chip, of course, is an experimental design.

 "This is just a completely experimental model for Christmas you will not find it in the stores," - say the creators. Typically, the work on the transfer of large amounts of data between cores and cache memory - it is quite costly for the system of occupation, so the 110-core processor refuses from the cache memory in the usual sense of the word and replaces it with a pool of shared memory management, which can reduce the amount of data transfer.

Also, there is applied a number of engineering projects, through which the processor itself in fewer clock cycles to process large amounts of data. In addition to this, another brand development is a system of predicting the branching data, which allows the processor to predict what will be the upcoming data packet and plan ahead for his treatment.

"We believe that the benefits of solutions to reduce the amounts of computation must eventually be needed in a mobile environment and the environment for working with databases. Lower costs from the processor to handle large amounts of data - it is also the release of system resources and saving battery power, "- say the creators of solutions. chip makers have gone to any questions regarding the performance of the processor compared to competitors, but said that according to their internal testing, the new chip can achieve a 14-fold reduction measures in the processing of operational data, resulting in significant energy savings. Structurally, the chip is a square matrix in which all 110 cores combined with each interconnect. Also, the developers say that the chip design allows for customization to the needs of some kontretnogo consumer or producer. physical size of the chip - only 1 cm2, he created on 45-nanometer technology normal.
Read More
      edit
Published 8:50 AM by

VMware mobile hypervisor promised by the end of the year

VMware mobile hypervisor promised by the end of the year



The world's largest software maker VMware virtualization as part of their corporate VMworld conference today once again said he was working on a mobile hypervisor that allows smartphones to share their opportunities into two independent areas and to clearly distinguish between the data. The company said that they have not yet finalized the technology Dual-Persona Technology, as a mobile hypervisor is fundamentally different from desktop or server, and then you need to work not only technical, but also the conceptual side of design. Recall that for the first time on mobile virtualization company spoke back in 2010, but has since VMware did not show anything that would, in practice, spoke about the imminent completion of the work. The company has not shown a mobile hypervisor at the current VMworld, although this of us waited. However, the manufacturer promises that this year will be smartphones with mobile virtualization. VMware in say the technology Dual-Persona so far only works on Android, but on iOS and Windows Phone 8 is not. Speaking of Android-powered devices, VMware announced that the mobile hypervisor should appear before the end of the year, it will be compatible with the family of devices Motorola Droid, including the Droid Maxx, Droid Ultra, Droid Mini. He also appears to support LG G2 and HTC One. Later it will be for the Samsung Galaxy S3, S4, and a number of smartphones Sony Mobile. The company said that the devices that support mobile hypervisor will receive a special certificate VMware Ready. VMware is also difficult to say when it will be possible to wait for the mobile hypervisor for Apple iPhone. The company said that interacted with Apple on this subject, and have been studying not yet published iOS 7.0, but today they are not prepared to comment on the results of these efforts. "Innovation is a mobile hypervisor lie largely on the system and even the hardware and Apple are extremely reluctant to let go someone other than yourself" - said in VMware. Today, VMware offers solutions for VMware Horizon, which is a platform for the organization of the mobile users. «VMware Horizon Suite offers a cost-effective and safe transition to the mobile and cloud era for organizations that want to modernize their infrastructure - Punen said Sanjay (Sanjay Poonen), executive vice president and general manager of VMware unit of computing environments for end users. - VMware is the only company that offers a comprehensive, integrated platform for end-user organizations, allowing management to various users, devices and operating systems simple and efficient. " With the new features VMware Horizon View deployment model Desktop-as-a-Service organizations who do not have experience in the management of virtual desktop infrastructure (VDI), will be able to easily make the transition to virtual desktops. By the end of this year, organizations of all sizes will be able to deploy the solution Horizon View, using VMware vCloud Hybrid Service. Thus, IT departments get a common platform through which can easily transfer jobs and data centers to the cloud using the same tools and processes. This new capability allows organizations to select, deploy desktop-as-a-service for vCloud Hybrid Service on their own or with the help of the service provider. Horizon View Desktop-as-A-Service is available today through vCloud Partners. Customers are now able to offer employees greater mobility and availability by deploying desktops from the cloud. VMware Horizon View Desktop-as-A-Service, running on VMware vCloud Hybrid Service, will be available by the end of 2013.
Read More
      edit
Published 8:48 AM by

IDC: the global server market continues to fall

IDC: the global server market continues to fall



Analyst firm IDC today summed up the worldwide server market in the second quarter, showing the deplorable, but for many obvious results. For the period April to June vendors shipped a total of servers in the amount of 11.9 billion dollars, which is 6.2% less than in the second quarter of 2012. The fall recorded in unit shipments - the number of physical servers sold decreased by 1.2% to 2,000,000 units, with marked decline for the third consecutive quarter.

IDC notes that the main causes of the fall of the server market two: First, the objective macroeconomic factors - businesses are reluctant to go to buy not cheap server hardware, and secondly, technology factors - the new servers are becoming more powerful and at the same machine you can hang more objectives, and in addition virtualization and cloud services allow you to post on the same server 2-3 or even 10 different operating systems, each of which is from the point of view of the user is a separate unit.

IDC reports that during the year the number of servers sold in the 12-month cycle has decreased by 2.4%, which is significant, since the objective requirements in computing and data storage capacity grows.

Note that the IDC report covers only the servers, it does not take into account sales of server-like equipment, such as storage, network switching systems, etc.

The report's authors say that in most civilized countries the main driver in the server market are small businesses - a lot of them, and while they are buying mostly cheap solutions, they take scale. Now, however, a small business in the U.S. and Europe is not so rosy look to the future and for many buying a new server takes a back seat.

Worst of all, according to IDC, is the uncertainty in the server market. That is, now we can not say when we see the light at the end of the tunnel. The last factor negatively affects everyone - consumers and producers.

According to the metric IDC, in the second quarter of the world's largest manufacturer of servers was IBM, which took 27.9%, but in monetary terms, the company's revenue from server sales fell 10%. This was a sign of weak demand for key products of the company - the massive servers System X, as well as cheap model IBM Power Systems.

Second place went to Hewlett-Pacakrd, which took 25.9% of the market, and its sales revenue of servers for the year fell by 17.5% and its market share fell by 3.6%. Recall that last year around as IBM, and HP is continually hovered around rumors about the sale of the budget x86-servers. Analysts say that although this area is the most popular, the margin here is balancing within an arithmetic error, so the manufacturers are not so much hold on the business.

In third place with 18.8% of the market has settled Dell, which for years has managed to increase server revenue by 10.3%, while the market share of 2.8%. Oracle Corporation and its Sun-servers failed to shift the company Cisco Systems from 4th to 5th place. The share of Oracle for the quarter amounted to 6%, Cisco - 4,5%. A little less for Fujitsu, which formally dropped out of the top five largest producers.

The report also said that the total market of x86-server in the second quarter amounted to 1.9 million servers and 8.7 billion dollars.


Top 5 Corporate Family, Worldwide Server Systems Factory Revenue, Second Quarter of 2013 (Revenues are in Millions)


Read More
      edit
Published 8:45 AM by

BlackBerry BBM is going to allocate a separate company

BlackBerry BBM is going to allocate a separate company

According to the newspaper The Wall Street Journal, the Canadian BlackBerry vvdeleniya discussing the possibility of a separate company of the division in charge of the release of messenger BBM. In addition, the company is working on Android-version of BBM and plans in the future to release a desktop version of the system.

Sources at the company say that the leadership BlackBerry now is thinking about whether it will be an independent company, or an internal division, but with a high degree of autonomy. One way or another, but the BlackBerry begins to withdraw from the structure of the most valuable assets in anticipation of the sale or technological partnership with any of the other IT players.

 At the same time, the company changes the structure of several leading cadres to a BBM-podrazdelelenii was a full staff management . Recall that in May of this year, the head of the BlackBerry Thorsten Heins said that soon the BBM for the first time in its history, will work on "something other than BlackBerry", competing with WhatsApp, Viber and other popular instant messengers. Also the company is going to present a new previously unannounced service BBM Channels, which will look like a Twitter-like tool that enables the public to people to interact more closely with fans. It can also be used to interact superiors and subordinates, or sellers with buyers.

Read More
      edit
Published 8:43 AM by

NASA is experimenting with 3D-printing

NASA is experimenting with 3D-printing



Future astronauts in space flights are likely to use advanced models of printers that produce a virtually everything they need - from food to rocket parts, and to make it possible to quickly and relatively cheaply. In NASA tell us that one step closer to a global goal - the use of 3D-printing technology to create all aspects of space exploration. We are not talking about using the printer and as such, they say, at any cost, but the use of 3D-printing technology in a simple manner to the astronauts in case of need could print and spare parts for the ship and a particular culinary dish. Needless space agency for nearly 10 years has been working in the field of three-dimensional printing, but some results here have started to appear a couple of years ago. On 22 August, NASA conducted a test of a number of components of rocket engines, which were manufactured by 3D-printer. Testing went well, the engine developed during the tests thrust of 20 000 pounds. With the process known as selective laser melting, which relies on a nickel-chromium alloy, NASA produced 28 injector elements in a rocket engine that operate in the fuel supply . By design, printed injectors were very similar to the injectors in a more powerful rocket engines, RS-25, which in the future will be used in the spaceship for manned missions to Mars. NASA said that in the future they intend to make greater use of 3D-printed parts to explore the corresponding production. Craig Barnett, chief engineer of the project 3D-printing at NASA, said that now his group is working to print larger elements and design of rockets and engines, except now the engineers are working on a model samples for printing elements. Barnett says it is implementing a program at NASA Space Shop, which is concentrated in the Ames Research Center in California. Here, experts are experimenting with different technologies and application areas of 3D-printing.
Read More
      edit
Published 8:42 AM by

Nissan promises autonomous vehicles by 2020

Nissan promises autonomous vehicles by 2020



Nissan is reported to be working on a new version of the car to be moved without any help from the driver. Standalone machine should appear in the commercial market around 2020. Moreover, Nissan does not plan to restrict only one model, the company plans to implement technologies Autonomous Drive in several different cars. The company said that they are working with several different research institutions on the concept of autonomous vehicles, including from Stanford University in Berkeley, with experts from Oxford, with Korean engineers from the National Institute of Advanced Industrial Science and Technology and a number of major institutions in Japan. "In 2007, I dreamed that by 2010, Nissan launched the car with no harmful emissions. Today Nissan Leaf - it's the best-selling electric car stories. Now I am pleased to introduce a new breakthrough technology Autonomous Drive, which will be ready by 2020, "- said the head of Carlos Niassan Gozn. Experts say that over the past few years, Nissan and its luxury division Infiniti has become one of the leaders in the drive direction -assist, in which the solutions are created to help the driver while driving. These systems are equipped with 360-degree cameras, radar, laser range finders and other products, many of which are already in the commercial market. The company said that the next step - the union of all these systems together and develop "command center" for them. The company said that a working version of the center will be available next year in Japan, Nissan will begin to use it as a foundation to build a future commercial system.
Read More
      edit
Published 8:40 AM by

Syrian website hacked New York Times

Syrian website hacked New York Times

Hackers from the group "Syrian Electronic Army", which supports the Syrian government, claimed responsibility for hacking the site of the American newspaper New York Times. They stated on his page on the microblogging network Twitter. According to the news agency ITAR-TASS, the failure of the life emerged on Tuesday at about 15:00 on the East Coast of the USA (23:00 MSK) and continues to this day. When trying to enter the site www.nytimes.com error message. However, some users have reported that they have on the screen "pops" message "hacked" Syrian electronic army.

 " According to experts, the site of the newspaper has undergone DDoS-attack that displays the time on computer servers out of action by increasing the load on them and infection virus programs. "Currently, experts are engaged in eliminating the problem," - said the representative of the newspaper Eileen Murphy. Problems with the site appear in one of America's leading media for the second time in the last two weeks: 14 August due to technical problems, and web page mobile applications, "New York Times" were unavailable for about two hours.

"Syrian Electronic Army" has repeatedly claimed responsibility for the hacking of websites of influential media and their accounts in microblogging Twitter. groups affected by agency actions and AP France Presse, TV France 24, Financial Times, the Broadcasting Corporation BBC. Updated on 7:00 MSK: domain registrar Melbourne IT said that the NYTimes site hacking conducted by obtaining control over the account in the management of domains. nytimes.com domain name is serviced by Melbourne IT. company also claims that hacking was carried out not by them directly, but through compromise of systems of one of the resellers whose name was not called.

"We are now engaged in the study of the situation," - said the Melbourne IT. Updated on 7:10 MSK: In response to the unavailability of the website New York Times newspaper The Wall Street Journal is temporarily withdrew system paid subscription to your articles, having made ​​free to all users of the resource. Recall that the last time during the attack on the NY Times, WSJ acted in the same way .
Read More
      edit
Published 8:39 AM by

Microsoft has expanded disk space on SkyDrive Pro

Microsoft has expanded disk space on SkyDrive Pro

Microsoft has added more disk space for online users of Office 365 and SharePoint, is preserving data in remote storage system SkyDrive Pro. Note that despite its name, SkyDrive Pro - is not a kind SkyDrive. This solution for the storage of business information in the cloud, or (in the case of SharePoint Online), or on local servers (for SharePoint 2013), to which users can access from multiple devices. According to a recent blog post of Office 365, now all new users SkyDrive Pro did not get 7, and 25 gigabytes of disk space (as the limit is increased and existing users). Those users who have previously purchased 25 GB, 50 GB now receive, and those who took 50, will now receive 100 GB.

Also at the service opportunity Shared with Me, allows you to quickly find files that others have shared with the user. Among other innovations, service include: increasing the limit to 2 GB file extension of the standard period of storage in a basket with 30 to 90 days, as well as the original test versioning.
Read More
      edit

Friday, August 23, 2013

Published 9:40 AM by

Google released a beta version of Chrome 30

Google released a beta version of Chrome 30

Google today released the beta version of Chrome 30 browser, implementing the new product support for new web standards and improving the work with the images in the browser. So, now that Chrome users the opportunity to search for an image, similar to what they saw on the site. To do this, open the context menu on the image file and select Search Google for the image.



In addition, Chrome adds support for several new API for Chrome Web Apps or Chrome Packaged Apps. These "packaged applications" - a new method of converting websites for mobile saves battery life on a computer or mobile device. API also have built-in support for new payment mechanisms for mobile and web applications.

Chrome 30 beta for Android has received a welcome gesture support, which are now not inferior to the functionality of Dolphin Browser. The beta version does support three types of gestures: horizontal, vertical and slipping. With this, users can not only navigate the sites, but also to control the browser, such as opening new tabs.

In addition to this, Android-version has a number of internal optimizations more support WebGL for the 2D-and 3D-rendering. It also claims to support Device Orientation API, which allows the browser to understand the position of the gadget in the space, as well as a possible rotation or acceleration of movement in space.

The third major innovation is MediaSource API, which allows developers to create sites for broadcast media content with the mere JavaScript.
Read More
      edit

Thursday, August 22, 2013

Published 7:57 AM by

In Japan, the newly recorded radiation leakage of water into the ocean

In Japan, the newly recorded radiation leakage of water into the ocean

The Japanese company is the operator of nuclear power plants "Fukushima Dai-ichi" says that highly radioactive water to get from the store to the Pacific Ocean. Tokyo Denreku is investigating leaks more than 300 tons of contaminated water from one of the tanks for the storage of radioactive water. The fact of leakage was confirmed on Monday. Staff Tokyo Denreku found contaminated water flowing to the drain channel is about 50 meters away from the store. Inside the channel was recorded high levels of radiation - about 6 millisieverts per hour. Drainage channel goes to the ocean on the south side of nuclear power plants. latter explanation leadership contradicts the first statements that were made ​​on Tuesday. The authorities reported that, in their opinion, the contaminated water could not get into the ocean, as the level of radiation in the sea water was not so high.

The operator still says it does not show any changes in the concentration of radioactive substances in the ocean due to the leakage of contaminated water. The operator of nuclear power plant accident reports that 30 trillion becquerels of radioactive strontium and cesium could get into the ocean, starting in May 2011. According to the company, up to 10 trillion becquerels of strontium 20 trillion becquerels of cesium fell into the ocean from May 2011. The total amount is many times higher than the limit set by the annual emissions from 220 billion becquerels - in normal conditions.

As expected, the numbers will grow as the Tokyo Denreku can not completely stop the leak of contaminated ground water into the ocean. Company cautions that name the exact amount of water leaked from cesium and strontium difficult, as they are easily absorbed into the soil. The company said it will continue to assess the situation in consultation with experts. International Atomic Energy Agency reports that examines the situation in the nuclear power plant emergency, "Fukushima Dai-ichi" as serious, and ready to provide assistance in the event of a request for it. IAEA on Wednesday issued a statement in connection with the leak of about 300 tons of contaminated water with high levels of radiation, which was discovered on Monday. The statement said that the Nuclear Regulatory Commission of Japan thinks increase the hazard assessment of conditions at the nuclear power plant accident in two levels from the original to the third at the recent leak of radioactive water.

The statement also said that the Japanese authorities continue to provide information to the agency about the situation, and that the IAEA experts are closely watching her. The IAEA has made ​​such a declaration in respect of other leaks of contaminated water, which occurred on August 9, but then it is not used in the application of the word "serious". Nuclear Regulatory Commission of Japan has ordered the company-operator to strengthen measures to prevent further leaks of radioactive water. During the meeting, some experts have criticized Tokyo Denreku for the fact that the company has left open the taps in the fence around containers with radioactive water. Others spoke of the need to carry out more checks the storage of contaminated water leak detection.

 Around 350 vessels of the same design built without the use of welding with steel plates and bolts for the temporary storage of contaminated water from the damaged nuclear power plant operator reaktorov.Kompaniya "Fukushima Dai- iti "says highly radioactive water to get from the store to the Pacific Ocean.

Read More
      edit
Published 7:54 AM by

Ford and Russian researchers are working on "smart" communications intercomputer

Ford and Russian researchers are working on "smart" communications intercomputer


 Ford Motor Company has withdrawn its research projects beyond the Earth, and plans to begin experiments in space. To do this, the American Ford Motors teams up with Russian scientists from the Polytechnic University in St. Petersburg, and plans to study communication processes between robots on the International Space Station and Earth. In the future, based on the knowledge gained will create a new generation of so-called "connected car." The company said that they intend to investigate the so-called Mesh-networks in which different communication systems operate by different protocols, but within a single communications medium. Such decisions should be made ​​more convenient communication type "machine to machine" and / or "machine-to-infrastructure.

" Already there are some ideas in this area, but in general the trend is still in its infancy. three-year cooperation program involves sending several models of communication robots in space and the study of how robots can interact both with each other and with the Earth. There will be tested elements of communication with cloud environments, with different elements of the infrastructure, such as "smart" buildings and traffic management systems, as well as others. In the end, a Ford said they hope such projects through a "really smart" generation of cars that will help reduce accidents and congestion on the roads. "For example, a call to emergency services one car can pass through several other, if there is no possible to transmit a signal directly, or you can use the inter-machine communication to retrieve data if the bulk of the cloud has failed, "- said in a Ford. "One of the main areas of research is the search for alternatives to the machine.

If one or more core systems do not work, then the machine should try to use other channels of communication." After testing on robots, Ford engineers hope to develop algorithms that will be incorporated into the connected car. in the near time participants will work robot Justin, Eurobot and Robonaut R2, which are already on the ISS.


Read More
      edit
Published 7:52 AM by

The amount of spam in mail traffic in July was 71.2%

The amount of spam in mail traffic in July was 71.2%

According to the report, "Kaspersky Lab", the share of spam in mail traffic in July increased by 0.1% to 71.2%. Phishing emails in the mail stream as compared to June fell more than doubled and amounted to 0.0012%. Malicious attachments contained in 2.2% of all electronic communications, which is 0.4% higher than last month. in July continued to record the distribution in which spammers have exploited the interest of users in the most important events of the month. Thus, the birth of the son of the Duke and Duchess of Cambridge and a spy scandal involving Edward Snowden did not go unnoticed spammers. Attackers have traditionally sent out letters with malicious links that mimic messages from news agencies with links to breaking news.

 Additionally, users' interest in these events was used to draw attention to spam advertising. So, the excitement of the birth of the heir to Prince William, spammers used in advertising printing services and advertising equipment. In honor of the long-awaited company offered discounts on roller stands. A scandal involving former U.S. intelligence officer Edward Snowden used by spammers in advertising products for weight loss. And in the theme of these letters, these goods could not be mentioned in the message is not asked to learn about methods of weight loss, and details of stories Snowden. A reference to the "details" has led to an advertising page. More precisely Edward Snowden's name was used in the German-language advertising programs for the protection of information. Members urged to buy the advertised product, since recognition of Snowden's definitely proves the existence of the Internet mass surveillance. Ramadan this year, the Muslim holy month of Ramadan occurred at the beginning of July and August. Every year we fix mailing exploit this theme, including to attract attention of recipients.

 This year was no exception: we observed multiple feeds in English, not only with the traditional Ramadan dishes advertising restaurants and nightlife, but also with advertising vehicles and summer recreation for children. Traditionally, the heroes of Nigerian letters are relatives or associates of famous rich people, or dead, or in a difficult life situation. In July, Egypt was toppled President Mohamed Mursi. Within a few days we had been locked scam mail, the name of the operating ex-president of Egypt. Nigerian In the letter, allegedly written by former Secretary of the President, it is reported that the President of frozen accounts, as well as the former president and his secretary are under house arrest , then look for Mursi Muslim who can transfer the money President stored in one of the European banks at their own expense.

 As a reward, of course, offered a tempting amount of money. But the classics of the genre suggests quite different: the naive user not only did not receive any remuneration, but also lose a considerable amount of money, which the fraudsters to lure him under one pretext or another. rare variant fraud report also states opisme, which was a fairly rare option fraud. With the address, which is similar to the address of the bank Australia and New Zealand Banking Group, the user received a letter with a message about restricting access to his account in the on-line banking. To restore access please call the phone number listed in the letter. Call to the specified number will clearly not be safe: at best, with the caller's telephone withdraw money, and at worst - fished him any bank details.

 Relevance of the tourism theme in the summer is very high, and experts continue to commit malicious mailings, allegedly came from behalf of various airlines. In July, it was a fake notification on behalf of the U.S. airline United AirLines. The user is informed that the number of its seats in the plane changed and updated information can be found in the attached file flight document upgrade.doc.zip. The archive contains an executable file named flight document upgrade.doc.exe, which is detected by "Kaspersky Lab" as Backdoor.Win32.Vawtrak.a. This backdoor is used by hackers to steal passwords stored in browsers passwords for FTP and email clients. The malware also sends their owners screenshots of the desktop and gives them full access to the infected computer, allowing attackers to download and run on the user's various files.

Read More
      edit
Published 7:51 AM by

The attacks on online banking systems in disguise for DDoS

The attacks on online banking systems in disguise for DDoS



 Experts say they have found a new strategy to hacker attacks that target funds from accounts in online banking systems. To mask a malicious hacker attacks are starting to use another - DDoS-attack. The company Gartner said that uncovered cases of theft from accounts in online banking systems, under the guise of DDoS-attacks. Among say that revealed at least three cases of attacks on U.S. banks, when the authors of attacks launched artificial DDoS-attacks on the servers of banks, and under their cover was carried out incursions into online banking systems, longer undetected because IT staff engaged in a reflection of DDoS-attacks. In Gartner does not say exactly what the U.S. banks hit by the attacks, but in the past few months, a group of U.S. banks, including JP Morgan, Wells Fargo, Bank of America, Chase, Citigroup, HSBC, reported on activities within their relation DDoS- attacks.

"It was not a politically motivated group. organizers set out to bring down the sites of banks for a few hours, that is itself DDoS-attack was not their ultimate goal," - said in a Gartner. "When a DDoS-attack in full swing , a group of crooks switched to attack payment systems and banking online, trying to get extended privileges in the system "- say in the company. Also in the report, Gartner said that while the organizers of the attacks are almost always trying to gain access to network equipment responsible for the transmission of transactions.

 At the Gartner report does not say exactly how the hackers gained access to online banking, but the advice is given to banks: when a DDoS attacks, reduce or even cancel the financial transactions, and implement a multi-layer protection system IT perimeter. Earlier in the financial and economic division of the U.S. FBI said the growth of DDoS-activity in the U.S. banking sector, and told that they found on the Internet a series of 200-dollar software kits for the most popular attack online banking.
Read More
      edit
Published 7:49 AM by

Microsoft suspected Russian pullback

Microsoft suspected Russian pullback


The U.S. authorities have previously suspected a Microsoft paying bribes in several countries, are expanding their investigation into the corporation. As it became known today, Microsoft U.S. investigators suspected of paying bribes in Russia, as well as in five other countries. The investigation states that Microsoft gave kickbacks in exchange for lucrative contracts and large-scale in the Russian state structures. known that besides Russia instances of bribery on the part of Microsoft is also being investigated in Pakistan, Romania, Italy and several unnamed countries.

 It should be noted that the investigation leading U.S. investigators, whereas in Russia against Microsoft on this fact is not conducted investigations. Sources familiar with the progress of the case, saying that the U.S. Justice Department has launched an investigation against Microsoft in early August, but the very first investigations have shown that the scale of illegal activity here is broader than originally believed. should be noted that so far none of the parties give official comments about the process. Several sources have reported that, with regard to Russia, it can go on paying bribes is not the part of most Microsoft, and from one of its major Russian partners, which specializes in the supply of software in state agencies. Insiders say that Microsoft partner ordered to pay a bribe for getting a lucrative contract to supply software in one of the state-owned companies.

Sources also say that the amount of bribes scope of activities in Russia are the largest among the other five countries. For example, in Pakistan, the illegal activities is to ensure that the consulting company, operating in the local market on behalf of Microsoft, for winning the tender paid 5-day trip to Egypt, one of the Pakistani officials with his wife. As for Russia, which is a consequence of the U.S. fixed Rollback case involving Microsoft and its partner was about eight months ago. should be noted that often in the U.S. to begin investigation into bribery by American companies outside the United States, but they have completed without formal charges, except if it is in Russia 100% of the Russian partner Microsoft, the U.S. Justice Department is also can not do anything. official Microsoft counsel John Frank said Wednesday that he could not comment on such issues to the official announcement of the investigation.

However, he noted that the company first, always cooperating with the investigation, and secondly, often turns out that the "wrong actions" were not caused by the very Microsoft, and its partners, which are separate legal entities, and thirdly, the very Microsoft periodically provides training for partners, which often rise and corruption issues, as well as ethically right thing to do in the event of vymaganiya bribes. Recall that in the United States since 1977, the law "On Foreign Corruption," which prohibits U.S. companies to pay bribes even outside USA. If the fact of bribery will be set, the U.S. company awaits trial in the States themselves.

According to unofficial reports, the Russian direction of the investigation focused on the division of Microsoft Russia, which is suspected of directly or through a partner of bribery for receiving a state contract of a major Russian state-owned telecommunications companies. Recall that the Russian investigators claimed until a similar investigation in the country. Contact with representatives of two major Russian state-owned telecom operators is not possible, as the article was prepared after hours and the press-service operators were not available.
Read More
      edit
Published 7:48 AM by

Entered the commercial version of the web server Nginx

Entered the commercial version of the web server Nginx


 Popular online public web server Nginx is on the way of development of the popular open source programs and produces a commercial version called Nginx Plus. Developers paid version Nginx to position him as a soft alternative to the ADC (Application Delivery Controllers). "functions that are implemented in Nginx Plus very close to what you can find in the hardware ADC. We are the alternative to Apache, but I think we are also an alternative and hardware controllers to deliver content, "- says Nginx CEO Gus Robertson. According to him, the software Nginx Plus Function competes with hardware solutions F5 Networks products or Citrix, which are used to speed up the loaded sites. Recall that Nginx was originally positioned itself as the solution to work with vysokotrafikovymi projects. Now, the commercial version, among other innovations have been implemented features such as load balancing, and advanced caching system. Recall that the first version of Nginx was written by Russian programmer and system administrator Igor Sysoev in 2004, and sold under the BSD-license. The author himself said that he was disappointed with the performance Apache, so I started working on an alternative. According Sysoev, Nginx can handle the load to 10,000 simultaneous connections to the same Web server. The basic version of the product supports a simple load balancing, caching, and the final reverse-proxy service. Today Nginx solutions are used by such online companies like Netflix, Hulu, Pinterest, AirBnB, WordPress.com, GitHub, SoundCloud, Zynga, Eventbrite and Zappos, and and many others. Total running Nginx now runs about 100 million websites. Sysoev Nginx Co founded the company in 2011 and became its technical director. Nginx held a round of financing and was able to raise $ 3 million from investors, the company now employs 15 people, representative of the company is based in San Francisco. Gus Robertson led Nginx in April, and before that he worked at Red Hat. decision Nginx Plus - this is the first in 10 years of commercial product Nginx. Like other opensource-solutions he comes by subscription. For the money, users get the same core Nginx, as in the open version, but in addition to it also goes the extra cover for tuning solutions, the modules to optimize performance, as well as commercial technical support. "Additional functionality extends the capabilities of Nginx in terms of load balancing, routing, requests, monitoring of servers running in mission-critical environments, "- says Andrey Alexeev, co-founder of Nginx. One of the most important innovations of the commercial version is that you can make configuration changes without stopping the running image Nginx, that is, changes made ​​here instantly without disconnects. Alexeyev said that such an approach avoids the request queues and interruptions in service. Nginx for monitoring software uses the format JSON, allowing you to broadcast the incoming data in many commercial products, or use your own HTML / JavaScript-templates to study the data. The commercial version also comes with its own monitoring system. commercial version of the product also works with applications for performance management New Relic, supports video formats Adobe HDS and Apple HLS for broadcasting video on the web. Nginx Plus runs on a standard Linux-distributions - Amazon Linux, Red Hat, CentOS, Ubuntu and Debian. cost commercial version starts at $ 1,350 per year per server.

Read More
      edit
Published 7:35 AM by

In runet will be new data on WWII soldiers

In runet will be new data on WWII soldiers

The corporation ELARA held a press event on technologies for identifying and compiling information about the Great Patriotic War. As part of the preparation for the celebration of the 70th anniversary of the Victory in the Great Patriotic War in Russia begin work to find the unknown heroes of World War II and disclosure of their names. The relevant order the government gave Russian President Vladimir Putin at a meeting of the Russian org. Committee "Victory". The sources of information used to identify and summarize the information about the war are the documents stored in the archives of the military. Work on the discovery and widespread access to these documents is already underway.

Experts ELARA Corporation, Marketing Director Pavel Plotnikov and technical project manager Victor Tumarkin, told reporters technologies create OBD Memorial and "Feat of people in the Great Patriotic War of 1941-1945." - E-Resources of the Ministry of Defense. Portals are electronic banks data and archival documents of the dead and missing, and the award of affairs of the Great Patriotic War. It is through these resources all Russian Internet users are looking for information and documents about the fate of their loved ones - participants in the war. To create electronic databases and documents accumulated considerable effort and resources - the Ministry of Defense, military and government archives and the company that digitizes documents and extracts data for search.

In the OBD Memorial introduced more than 19 million pages of documents on the losses and the graves of the Central Archives of the Ministry of Defense funds, the Central Naval Archive, the Russian State Military Archive, state and regional ¬ tional archives and more than 29 million records on the personalities of dead and missing and 10 million records from the Books of Remembrance. The portal "Feat of people published descriptions of more than 12 million feats of funds and TsAMO TSVMA impressed by awards. Currently, the first phase of the project. But the popularity of resources does not fall: daily OBD Memorial is visited by over 26,000 people, and "The feat of the people" - more than 12,000. Artist projects ELARA Corporation, has received more than 50,000 votes and feedback from the citizens of the different countries attending resources.

Therefore, work on filling in documents and data resources will continue. Preserving the memory of important events in Russian and world history - the goal of another project ELARA - "Calendar of Victory." The project is non-commercial and is implemented entirely on the initiative of the company. The work conducted by employees of corporation, which, together with museums, archives and libraries have been searching for obscure and unknown to the general public information about the fighting on the Soviet-German front.

The actual material "Calendar of victory" is a description of the battles interesting articles from front-line newspapers, stories about the deeds and fates of individuals, the military folklore (songs, poems, anecdotes), photographs and illustrated materials (posters, pictures from newspapers). One of the main sources of information were OBD Memorial and "Feat of the people."
Read More
      edit