Introduction About Site Map

XML
RSS 2 Feed RSS 2 Feed
Navigation

Main Page | Blog Index

Archive for the ‘Technology’ Category

Funny Data Loss Disasters

Data Recovery - presentation
A single slide from my talk on data recovery (XHTML)

Below is a snippet from an amusing BBC article.

One incident involved a dog that used a USB flash drive as a chew toy and almost ate all its owner’s data.

[...]

But top of the list is an old laptop containing key company data that was found filled with cockroach corpses.

It seems as though computer disasters and Darwin awards are becoming a golden source of joy to the computer literate. This could leverage tentions. People should never be humiliated for being unfamiliar with technology, but then again, this is a blog…

Similar items:

Wikipedia Introduces New Restrictions

Book shelves

Wikipedia will never collect dust on the shelves

A story that has hit many headlines speaks of Wikipedia closing a few doors, making it slightly more difficult to contribute content.

For more details, select your favourite source:

Related item: Wikipedia Statistics

OpenDocument Embraced by IBM

TinyMCE
OpenDocument may lead the way to Web-based office suites
(TinyMCE is shown for illustrational purposes only)

STAGED acceptance of the OpenDocument standard was discussed in the context of Massachusetts. It was also argued, with timely backing from the media, that corporate Open Source migrations are no longer the exception. Finally, IBM have big plans for OpenDocument, which they can vigorously employ and help spread.

IBM plans to support early next year the OpenDocument standard in its desktop software, a product the company intends to market aggressively in developing countries.

IBM and their occasional Open Source push gets mentioned in an article titled “Is Open Source Really Just as Good”? (Part I, Part II – published today)

While I didn’t say it explicitly, when companies like IBM, HP, Novell, Dell and even Sun are driving the adoption, deployment and support of various parts of the LAMP stack in the enterprise, it’s safe to say that the ecosystem for many open source projects is thriving…

Hotter among the gamers’ headlines: Quake4 Demo for Linux

Microsoft Continue to Imitate Google

Big brother
Has Google become Microsoft’s Big Brother as well as ours?

LET us assemble and review at a list of ideas where Microsoft have been claimed to imitate rather than innovate. Most of all, they appear follow Google’s footsteps, rather anxious about the looming threats .

By embarking on projects which have been recently proposed, Microsoft simply make an inimitable Google appear highly inspirational. All are implementations, which have been within their capabilities for years. These were ignored until Google initiatives surfaced or when innovative value was finally realised. It seems as though brainstorming is suppressed in Redmond. Examples:

There must be more, but I cannot think of any at the moment.

Microsoft Come Under Pressure

Small clock
The clock ticks for Microsoft while their competition evolves

MAKERS of Windows are expected to ship its next version in line with their promises. Release dates get postponed time after time while immature products develop and skip the conventional testing cycle. Having had to re-build Windows Vista from scratch, this becomes worrisome. More worrisome if the fact that a million users migrated from Windows to Apple Mac last year alone. With a flow of critical, and yet unpatched flaws, one wonders: why has Microsoft not fixed them all?

Almost 4 years after the launch of Trustworthy Computing, I found myself wondering why am I staying up till 4:00 AM to deliver an emergency set of instructions (Home and Enterprise) to my readers because Microsoft felt it unnecessary to patch a flaw six months ago that was originally low risk but mutated in to something extremely dangerous.

Timely link: Novell: Vista to Drive User to Linux

Internet Explorer Trojan

Plastic troops
The Trojan horse effect

News headlines refer to this recent critical flaw, which affects Windows users (as Internet Explorer can never be uninstalled).

The security bug, exploited by the Trojan downloader, was originally reported in May

[...]

The vulnerability puts computers running Windows 98, Windows Millennium Edition, Windows 2000 and Windows XP at risk. An attacker could gain complete control of vulnerable systems by hosting malicious code on a Web site. Once an IE user visits the site, the malicious program would run without any user interaction.

Sounds re-assuring. In the mean time, until a patch gets released, Internet Explorer users are discouraged from clicking ‘stuff’ or strongly advised to disable necessary functionality. Otherwise, the Internet may continue to suffer from the existence of Windows zombies, which persistently carry out Denial of Service (DoS) attacks.

Related items:

RAID Redundancy

Servers stack

RAID stands for Redundant Array of Independent (or Inexpensive) Disks. As yet, I find RAID somewhat redundant, at least in my individual scenarios and for my personal purposes.

RAID is associated with backups on multiple disks, which in turn enables easy data recovery. The disks may also be distributed across geographically isolated and thus independent places. RAID does not directly cater for synchronation of data, applications, settings. That, for instance, is one of the powers of on-line services and network-hosted environments. This, as a matter of fact, is what pushes computers towards becoming relics.

One question to consider in RAID is the target of a write/read operations. This point refers to where data should be fetched from or save onto and how changes should propagated among the multiple disks. These issues are easily resolved in the following way:

Let us look at this conundrum, which is flawless management of files across computers. The confusion over where data gets stored and fetched from can be resolved owing to remote login. Assuming we speak of high-bandwidth networks here (100Mbit LAN in my case), the ‘cost’ of using SSH bandwidth is almost negligible. Even 10Mbit connections would give you a very responsive UI behaviour over the network. I know this because I tried it. The exception are cases where you stream many large frames over the network (e.g. video, games).

I have never looked deep into RAID technologies. Why not just scp (or rsync) the entire content of a hard-drive periodically? I maintain files on just a single machine, which I always SSH to from elsewhere. Its contents get mirrored on two other remote machines. Files that change on a daily basis are backed on the SAN overnight using cron jobs. This simplifies life a great deal. I still see no compelling reason for using RAID, especially with the existence high-speed networks.

As for Web site backups, these can conveniently be downloaded unless an automated job is set up, which is something I hope to do one day.

Related short items:

Retrieval statistics: 21 queries taking a total of 0.217 seconds • Please report low bandwidth using the feedback form
Original styles created by Ian Main (all acknowledgements) • PHP scripts and styles later modified by Roy Schestowitz • Help yourself to a GPL'd copy
|— Proudly powered by W o r d P r e s s — based on a heavily-hacked version 1.2.1 (Mingus) installation —|