Wednesday, February 28, 2007

High-performance computing environments by IBM

IBM on Wednesday unveiled a technology, marketing, and sales initiative to widen adoption of networked x86-based computers in high-performance computing (HPC) environments.

Normally HPC is used in large organizations, but in new initiative, IBM going to make this techology available for smaller businesses and departments of larger enterprises.

HPC initiative based on IBM hardware; third-party applications pre-architected for the life sciences; computer-aided engineering software; and middleware for finance sectors. Initially they are going to make the product for Linux and Microsoft WindowsComputer Cluster Server 2003 operations systems, and would feature networking technology from Cisco Systems.


Source: http://www.informationweek.com

Tuesday, February 20, 2007

Protect your Computer with Windows Vista


There are number of security features in Windows Vista. Most of which are newly introduced in this version. Along with them old security features also available with some advanced protection mechanism.

UAC (User Account Control) is the most significant security update in Vista. With this feature, all users, including users with administrative privileges, run in a standard user mode by default. When any action require Administration privilege such as software installation or changing system setting, Windows prompts for Administrator authentication. This security implemented in Vista to protect your computer from malware software. If any of those malware softwares tries to change any setting or install any software in your system, they will be prompted for consent first. System administrators also have the option to configure the system to require an administrator password for such elevations.

Microsoft added another layer of security ‘Windows Defender’. Windows defender going to scan the system periodically to detect spyware, addition to that it includes Real Time Security Agents which is going to monitor the important settings of the systems if there any system configuration changes caused by spyware.

Windows vista introduced several parental controls. As an administrator it is possible to locking web content and limit web browsing to only Kids website. As well as controlling based on categories such as “Pornography” or “Chatting” and so on. Administrator can restrict other users from executing certain programs. Also there is option to restrict certain hours of the day when gaming or other activities are permitted.

It also introduced BitLocker Drive Encryption to protect data from a lost or stolen computer. There is a big threat of data theft or exposure from lost or stolen computer. Data on lost or stolen machines can often be viewed by installing a different operating system. BitLocker Drive Encryption is a hardware-enabled data protection feature that helps protect data on a PC when the machine is in unauthorized hands. By encrypting the entire Windows volume, it prevents unauthorized users from accessing Windows file and attempting the offline viewing of information on the secured drive.

The Encryption File System (EFS) is a powerful tool for encrypting information on client computers and remote file server to protect them from unauthorized users. EFS support storing user keys as well as administrative recovery keys on smart cards. If smart cards are used for logon, EFS operates in a Single Sign On mode, where it uses the logon smart card for file encryption without further prompting for the PIN. The Client Side Cache, which stores offline copies of files from remote servers, can also be encrypted with EFS.

Another way that malicious software makes its way onto a user’s machine is by taking advantage of buffer overruns. Address Space Layout Randomization (ASLR) is a defense capability in Windows Vista that makes it harder for malicious code to exploit a system function. Whenever a Windows Vista computer is rebooted, ASLR randomly assigns executable images such as DLLs and EXEs to one of 256 possible locations in memory. This makes it harder for exploit code to locate and therefore take advantage of functionality inside the executables.

It is very common in office environment that somehow malware got into one of the systems and from there malware spread into other systems in the local network. To avoid those circumstances vista introduced Network Access Protection(NAP) that performs computer health policy validation. Independent hardware and software vendors can plug their security solutions into NAP, so IT administrators can choose the security solutions that meet their unique needs — and NAP helps ensure that every machine on the network makes full use of those solutions.

Vista also includes the much improved Internet Explorer 7, which includes more than a dozen new security enhancements.



Wednesday, February 14, 2007

Nokia Music manager in Nokia 5300



Music Manger in Nokia 5300 is very good application to manage music.

You can import music from your CDs to computer, and then transfer all your best songs from your computer straight to your Nokia phone. Nokia music manager can help you to copy music from CDs to Computer. It can also act as your desktop music player so you can sample and play your music files on your PC.

Once you copied your music to your PC, next step is to copy music to your mobile. To transfer music you need to connect the mobile phone with Computer. Connection can be done using USB cable or blue tooth. But USB connection is preferable since it is faster. Once it is connected, you can see your phone name on the Nokia Music manager Display.

Next step is to select the songs in the Music manager, which you want to transfer to your mobile. Select your phone name that will start transferring songs. After transfer, select your mobile in the Music manager to see the files available in the mobile. There it is possible to organize the files based on title, artist or Album. Also you can create new playlists, add or remove files from existing play list.

Thursday, February 1, 2007

High-Speed Wireless connection from Verizon

  • Verizon Wireless announced that it's rolling out a next-generation network in scattered locations across the country.
  • Specifically, Verizon said it's deploying CDMA 1x Evolution-Data Optimized (EV-DO) Revision A (Rev. A) in metropolitan Boston, metropolitan Richmond and Hampton Roads, Va., metropolitan Chicago, Utah cities including Salt Lake City, and areas of Florida.
  • The key breakthrough for Verizon, according to one wireless spectrum expert, is the more robust uplink offered by Rev.
  • The new service will be available for some customers of Verizon's BroadbandAccess, which is available to more than 200 million Americans in major metropolitan areas.
  • EV-DO Rev. A represents an important step in wireless network evolution because the improved up and down link speeds will allow for many new services like VoIP and better push-to-talk service
Source : http://www.informationweek.com