In July of 2008, Twitter will purchase the search engine Summize of real-time information, the handkerchief Sri Lankan of founder Greg of union of Summize joins Twitter at the same time too, and gone through the key developing period of company with Twitter together. But last Friday, Twitter united the creator Stone Biz Stone than now Have revealed the news that the handkerchief Sri Lankan leaves office. He releases news and claims in Twitter: “Twitter purchase Summize three years ago, Greg of union creator the intersection of handkerchief and duty, Radix Paeoniae Alba of Sri Lankan, its, we can have him accompany such a long time while being very lucky. ”
Twitter spokeswoman Caroline wears and receivesCarolyn Penner Show today: “We have not looked for successors, Grey person does not have any next plan. ” But wear and receive and has not left office and provided and further explained on the handkerchief Sri Lankan.
Wear and pay showing, Twitter will not look for CTO suitable person inside the company, but keep vacancy of this position.
The analyst disagrees
The grandfather, analyst of Yankee group draws Zeus Kerravala one carat of tiles in Sri Lankan Show, this is a strange method. He says: “I think this is very strange. Lasting innovation ability based on this company of long-term existence of any scientific
Tags: biz stone, last friday, sri lankan, long time, suitable person, term existence, technology officer
Electricity trader’s stream is developed simultaneously ” it is sent that the meal is urgent ” Want to make and order the meal and wash the treasure on the net
With the flourishing development of the E-business, a lot of consumption demands of people can all be satisfied on the platform of Internet, even as small as toilet soap such light casting item of toothbrush, is even as big as such a large goods of air conditioner of TV, have an opportunity to let them land in front if click the mouse slightly. However, people occupy the demand of food and beverage for the vast scale very in daily consumption, have not employed on the platform of the E-business extensively. But recent, a family meal by name is urgent to give www.canjisong.com Website reach the standard grade formally at China, be lasted ” it is if you can’t book by meal, last treasure on the net not to make ” Slogan,want last China that the maximums book on the net meal platform.
Easy to understand, the reason why the E-business of food and beverage was not launched even after stalling for a long time, a great master crux is that the stream provides and delivers the question. The dish of food and beverage is different from other consumables after all, expect extremely much to the prescroption provided and delivered, the overwhelming majority needs problem solving within an hour. Meanwhile, have stream provide and deliver ability, do foundation, how platform of E-business put up food and beverage then, how do the intersection of supply and demand and of both sides detail well, serve, how ensure high user of satisfaction experience All this kind undoubtedly need the careful and solution of systematization. And the meal is urgent send on earth how to come to make this one and open ordering the meal platform on the net of trade beginning?
Set up the stage: Kind wash the modal C2C platform of treasure
Land the intersection of meal and worried website of handing over, can find this whether one wash the intersection of treasure and modal the intersection of C2C and the intersection of E-business and platform, C on one end is the numerous restaurants, exhibit and sell one’s own dish by running a shop on the net; And C of another end is the masses of users, after so long as register and land and become the website membering, can select to order suiting oneself in the area and restaurant dish of the taste, through paying treasure and network silver trade.
According to meal being worried to give creator Li Jia introduction, meal anxious to hand over, make a ” net point ” ” the restaurant is produced ” ” the thing is sluiced ” If you can’t take, manage by platforming,one of taste network that be chosen consumer for being the masses of mores swift manies lights last passway after appearing building.
Li Jia shows, though food problem seems to be the minor matter, perplex a worry of office clan in the city frequently. For example meal very slow at the definite the intersection of lunch and the intersection of time and full restaurant, wipe out until unit nearby restaurant difficult to seek the fresh taste, and it is really difficult to take out the convenient boxed meal the following is swallowed In such cases, the ones that book the meal through the network to expand consumers have dinner the radius and taste are chosen, undoubtedly solve the good method of only meal problem.
At present, the meal is urgent to give to absorb and include the hotel, special dining room, flavor snack bar, Chinese and Western food and beverage shop, fast food restaurant, family kitchen, the intersection of peasant family and various forms such as being happy worried to give at the platform running a shop in meal in inner the intersection of entity and food and beverage enterprise, and each restaurant will exhibit and sell between several kinds and several dozen kinds of dishes. Obviously, in the face of restaurant and dish of such order of magnitude, the choice space of users will undoubtedly be maximal and abundant.
And to restaurant, through worried to give form that run a shop at the network in meal, come on and expand the autogenous dish to sell, it is undoubtedly a new way to create income in the restaurant too, and this new way also saves the store front to expand the cost of leasing and management.
Obviously, through meal being worried to give platform, demand of C of both ends will get valid activation and enlarge, thus made the meal urgent and senting possesses the viscous foundation that is strengthened and developed. Then, user’s stream after ordering the meal on the net provides and delivers the question, is it solved that how will it is sent that meal is urgent?
Tags: long time, treasure land, last treasure, supply and demand, toilet soap
The expert DaveLinthicum claims, when involving the question of SOA, has a lot of wrong information. Though we will understand SOA better after you may think through so many years, but have a lot of misunderstanding need us dispel or clarify misunderstanding these at least still.
The mistaken idea 1: SOA has enormous investment repayment
Though SOA generally has some investment repayment, however, in the middle of enterprises and problematic field, investment repayment has very great difference. The fact is, the quantity of investment repayment basically depends on business properties. The business that the more dynamic and constantly changeable, the more valuable SOA is. If is because is static, the value of SOA is small, there is no very great change. Remember, the core of SOA is value or the flexibility.
The mistaken idea 2: SOA is about new technology
We once criticized this view severely. However, it is the technology in some apparatuses that I still hear some people talk about SOA. Certainly, SOA is some things that you want to do, but not some things which you bought.
The mistaken idea 3: The cloud calculates that will replace SOA quickly
Linthicum claims, statements like this a lot of times that I hear more too recently. SOA is a framework method. Cloud it calculates to be some respect to dispose framework ‘ Including SOA A method. They are relevant, however, there are very great differences. I once wrote a book on this question. I hope to have a lot of people to read this book, consider some this concept obscured.
The mistaken idea 4: SOA died
It perhaps in the long run will be dangerous as an abbreviation. However, SOA is a framework way, can resolve a framework into the basic element, then make it up a set of services and form a solution after setting up or setting up again. This concept is earlier than ” SOA ” ,And existing for a long time after we stop discussing SOA.
Tags: mistaken idea, basic element, business properties, mistaken ideas, new technology, long time
Pain of the memory that can’t be born
Our world is submerging in the machine format ocean gradually. The mighty torrent of information brings the magnanimity data, this is an opportunity, it is a challenge too. On one hand, the data have value stored for a long time, we must keep a lot of old data, on the other hand also face new machine format growth. According to ZDNet investigation result regarding users stored the sore spot, 21% of the users are being increased by the memory capacity and perplexed too fast, and there is 31% annual data increasing degree of enterprise among 30%- 40% among them, and the enterprises of over 40% of increasing degree account for more than 35% of interviewees. As increasing the machine format owner constantly in a large amount, the difficult problem that the old and new system brings is outstanding day by day too.
Investigate that can see according to this user’s sore spot, about 40% of data hold of snowball, it causes system performance to be unable to satisfy the demands thus potential, what bulky data to lack valid backup means and is dealt with, and isomerize the management burden further aggravating users systematically
According to this investigation result, more than 50% of users’ storage equipment systems are all unable to satisfy the demands. Most storage systems of people have been already used for many years among them, the old system can’t meet performance requirements without can abandon, use immediately as enterprises ” The legacy ” ,And isomerize and non- standardized phenomena and generally exist, according to the investigation result, the users adopting the system of 3 manufacturers at the same time have accounted for 40%, and only depend on only 5% of enterprise of the products of a manufacturer, most enterprises are using the polytype systems from many manufacturers, already the unitary standardized platform of none, the products that and even the same manufacturer’s different series all have a problem of interoperability.
Secondly, the importance of data assets is self-evident, becomes particularly important how to protect these data. However, a lot of users have not made a piece of reasonable backup tactics, has led to the fact the data bulk accumulates over a long period and makes huger and huger, in addition not utilized appropriate data compaction technology, cause the redundant data to be packed with the whole environment, have not reached and protected machine format original intention, bring heavier burden instead.
When a great deal of difficult problems and challenges are confronted at the same time, the classic method has been already no longer effective even condemned and grown thickly, so, users must raise and store efficiency by reforming and storing the framework by appropriate technology and means. Then how to reform and store the framework? Since the budget is limited, add and can’t store the problem solving fundamentally briefly, then regard improve characteristics and does not lose a kind of ideal route ing as optimally above existing resources.
Memory management calls automation
Except IT budget being limited, the human resources are different to allocate too, if optimize and manage manually through the controller, efficiency is extremely low, will consume a large amount of time and do useless work instead without careful planning. So, it is to utilize the unattended way to store optimally that the reformation that we say here stores one of the key principles of the framework, replacing by automatic processing of the software may consume a large number of artificial work.
If users have much application, the old system will usually give and employ excessively to distribute the storage space, and a lot of capacity is in idle state, so should assign the capacity to be the efficient method in fact according to the actual demand. But let the intersection of controller and moment pay close attention to the fact the intersection of capacity and operating position and assign storage space to consume time and energy very much obviously for employ manually, if simplify and dispose in this way automatically technology can distribute the storage space automatically, and will remind users automatically, avoid influencing the normal operation of the business before the capacity is used up.
A lot of users had needed that is frequently visited ” The focus ” The demands of data and high IO, on one hand, the hot data of artificial perception aggravate the controller’s burden promptly, need quite careful planning, on the other hand, it is possible for us to just offer high IO by increasing the quantity of hard disk in the past, but the actual data bulk is not so large, cause the utilization factor of the capacity to be even fewer than 10%. At this time, cooperate with the solid condition one SSD The technical advantage of automatic zoning used will be prominent, the software is automaticallied process and tracked, let us can visit frequent data, keep in high-speed storage medium or important data, visit the data lower in frequency to put in characteristic and cost relatively lower medium, reduce the handling cost while raising assets use.
To backup user of the magnetic disc, each time finishing the backups, all know a large number of of backup with the same file and data before this, produce the same and a plurality of machine format duplicates, with time lapse, the redundant data will be flooding the valuable disk space, it is obviously impractical for the controller to position and delete the redundant data manually at this time, need a kind of unattended data compaction tool to reduce the data bulk of backup. Moreover, no matter the backup inside the data centre, or the long-range backup taking disaster-tolerance as purpose, need to take up a large number of bandwidth, repeat the data and delete technology and compare the new backup data with backup data before this, dispel the redundant data, reduce to the above two kinds of transmissive bandwidth demands, thus accelerate the backup speed.
According to investigating, 26% of the users think the main difficult problem of the backup lie in the enormous data bulk, have just lengthened the time of backup accordingly. So solve primary task of the backup, it is to simplify the data bulk of backup, shorten the backup window
In a word, in cases the expenses deflation of present IT, human resources are definite, increase the data bulk newly to catch up with and surpass for previous year every year, the outmoded storage system was unable to meet the performance requirement, newly-increased data and old data should be all managed, if none’s effective and unattended management tool, will then bring higher requirement and difficulty to controller, then when users will need to purchase the new storage equipment inevitably, can choose the storage system with automatic function, relieve all sorts of challenges and difficult problems. Now we will introduce master some and can bring automatic characteristic, technology and means to store optimally effectively in detail.
Tags: performance requirements, storage systems, bulky data, management burden
Facebook introduces the group purchase service in U.S.A. Pay attention to sharing with the good friend
Since Tuesday, Facebook will test Deals in Atlanta, Austin, Dallas, San Diego and San Francisco. This company shows, hope to offer the service more attractive than the rival to user through the social network advantage.
Facebook localized business director Emily and White Emily White Show, Facebook users can share the trade of group purchase with the good friend very easily. She says: “You can receive the group purchase trade that Facebook offers through the E-mail. But if a certain trade is very suitable for you, perhaps will have a certain point of time on the same day appear in your News Feed. ”
Though other group purchase websites allow users to use Facebook user name and password to log on, and share the trade of group purchase with the good friend, but White shows, Deals, in order to closely carry on integration with Facebook. She says: “The trade of a lot of other group purchase websites has social element too, but I do not think they and Facebook realize real integration. ”
Facebook has planned to put out one section and Groupon and LivingSocial competitive products for a long time. Company this begin, allow, hope, receive the intersection of group purchase and user of message, go on voting to Facebook Deals through E-mail last month.
Deals is expected to promote Facebook Credits fictitious coin business by a wide margin. Users can use the credit card to participate in group purchase, can buy with the fictitious coin directly too. Before this, Credits can only be used for buying game props and some digital products.
“This is that Credits is used for buying the entity goods for the first time. ” White says. The insider thinks, Facebook undoubtedly hopes to make Credits to become a important one in the line payment products.
Facebook will rely on one’s own sales-force to look for intending to offer the trade company of group purchase.
Tags: credit card, long time, news feed, time company, group purchase, network advantage
ITSM in China implementation have quite a long time, come, up to high-efficient IT, manage the purpose through management of procedure, want, think, raise the intersection of business and efficiency of turning round and implement procedure management final to reach very kind result fast in every case, because the implementation of the procedure takes some time and course, the procedure management mode will need adjusting and optimizing with IT department and corresponding alteration of the business system constantly too at the same time, so users need following in order and advancing step by step, deepen progressively procedure management.
Crux of procedure difficult realization of management
The first typical case is transporting and linking supporting in order to raise to the business system of one enterprise of manufacturing industry, having implemented ITSM system, though this system has complete procedure tools, in use in the course meeting very old trouble, the intersection of IT and the intersection of department and scale and big of enterprise actually, need, set up each function person in charge of module, this itself first very much complicated thing for IT department with hard work, and after finding frequently that transports and links the trouble, can’t make a reservation in time, resume business system’s running fast, often suffer the appeal of the business segments. Such a ITSM can’t be paid attention to by enterprises naturally, will be abandoned finally too.
Watch its reason, ITSM the reason why the implementation in China is not perfect, has very great factor to fall to follow it, ITSM is introduced by foreign countries, the foundation of its realization has strong technological groups to help enterprises to make IT procedure to manage, and these in China the intersection of telecommunication and operator and financial full-length bank of trade, it is very difficult for other enterprises and organizations to reach such a technological height. It needs to carry on certain improvement to the detailed conditions of China in the course of implementing naturally. So, implementation difficult points met can be summarized as the following aspects in the concrete course:
First, enterprises imitate foreign transporting and linking the management mode, the understanding to ITSM only stays on five major procedure, hardly realize enterprises do not presume incident, question, alter, release, five major managers of configuration management simply, can well circulate to stand up this management, need to orient every great manager’s duty according to the actual conditions of enterprises, at the same time enterprise’s users’ IT may overlap to link personnel in management to transport or a person takes upon oneself several posts, because the user IT departments in the present stage manage the scale decides not to be equal to with the foreign quality of user IT administrative staff of enterprise. What we can accomplish is according to the concrete demands of enterprises, it is most urgent to solve the trouble, presume the incident manager, really do incident management, the daily luck of incorporating enterprises is linked to the management, demands of functions of management such as the possible question that, altering, releasing, disposing,etc. are not all very urgent, so do the incident well, can solve the transporting and linking the difficult problem of the present stage, this can become the most ocular income that ITSM can bring for enterprise naturally, will help enterprises to further implement the management of other procedure.
Second, procedure management needs a large amount of manpower and materials, and the promotion that behind what these resources are consumed can really bring efficiency, that is that can reduce the technological reliance on the key administrative staff after discovering the problems through incident management, it is the key point but could solve the problem satisfactorily, just as hereinbefore the case that is proposed, it can not be high-efficient naturally that such management can not ensure the business to run. This is to transport a most severe phenomenon of linking the market in China IT at present, if a product has very good procedure frames only, can not discover the problems, solve the problem within this frame in time, and carry on the corresponding summary, that procedure like this will undoubtedly be run into OA system of IT department, but the negative effect brought is serious. So the control of the infrastructure must put in place solidly, gather to the data of facilities of ground floor, intelligence it is related merge into analyze,thus can orientation problem origin fast on condition that initiate and report an emergency and ask for help or increased vigilance, but not produced a dozen and reported an emergency and asked for help or increased vigilance, produce a dozen incidents, need walking the incident that a dozen engineering forms finish, so will reduce the efficiency of management notably instead.
Thinking of software procedure management of north tower
Because of the above-mentioned two points, a lot of users in China will meet all sorts of setbacks when implementing ITSM at present, but there is not a market in China without representing ITSM in this, pass in telecommunication, finance success of trade employing, indicating ITSM whether the intersection of China and IT transporting, linking one main trend that marketting developing future while being opposite, and the north tower software complied with this trend too to offer the corresponding procedure consultation, implementation which manages the module for enterprise and work, and control the platform through its strong ground floor and really make the question fall, solved, but does not buy a set of magnificent impracticable mere skeleton of products.
The software of north tower is directed against user’s demand in procedure management, has put out a series of solution, offer consultation and relevant service implemented to user, this has already made the good result in a lot of customers, for example the incident that users care about most is managed. The software of north tower helps users’ IT department to set up procedure system, define personnel divide the work, dispose corresponding IT and transport and link the software on this basis, thus control the whole IT system from the foundation of the ground floor, procedure to get upper strata management combine one take and manage the platform in unison, realize that orients the hidden danger of the trouble rapidly, fix a breakdown in time, resume business and run, transport and link efficiency after raising IT. This’s the procedure which users can implement manage, improve the management mode of the value of IT department.
Tags: business system, long time, full length, manufacturing industry, business segments, foreign countries
American Microsoft and Yahoo is close and reach the agreement on Internet searches for the business cooperatively on the 29th. American media reports, the refined brave general is responsible for selling in online advertisement in cooperating, Microsoft will get it and covet Internet user for a long time and search for the data.
If both sides realize cooperation finally, Microsoft will search for the giant as the second leading Internet second only to the valley song company.
Yahoo gives in and gives up searching for the business
Microsoft and Yahoo expect to announce cooperative details on the 29th of this month at local time, both sides do not decide final agreement yet by the 28th.
Associated Press quote well-informed person report, according to the intersection of agreement and content, Yahoo and Microsoft share at the websites of both sides searching for the income producing in advertisement, but not Microsoft spoken needs to pay the expenses to Yahoo in advance before.
This clause may make investor of Yahoo disappointed. Carol, CEO of Yahoo, the intersection of Palestinian and thatch say Yahoo it unites Microsoft to be ” the one ship first ship of bank notes ” only .
Meanwhile, Yahoo searches for and uses the search engine that Microsoft puts out in June of this year instead and ” must answer ” Bing . ” should drive ” The words may present in the pages of Yahoo’s websites when the time comes.
Yahoo and Microsoft will both use the advertising technology of Microsoft, will be searching for and throwing in the advertisement by the result. The refined brave general is responsible for advertisement selling and customer service.
” field of search engine ” Daniel of website editor Sulivan say Palestine thatch, CEO of Yahoo, ” basically give up searching for the business ” .
Microsoft will grasp the whole gambling party
Though Yahoo and Microsoft eight two divide into in advertising sale, Microsoft obtain, have long-term wealth of value even more, namely the Internet user searches for and consumes the data online. Microsoft can promote and arrange the ability to search for relevant advertisement of the result automatically through these data.
“If Microsoft controls advertising technology, then someone is unimportant in the sale advertising, “Sulivan says, ” finally, Microsoft will grasp the whole gambling party. ”
If both sides reach an agreement, Microsoft will be satisfactory in order to repay in other respects. The refined brave general enables to form an alliance ” Must answer ” The market share of the search engine is promoted to 30% rapidly. Though this proportion is still lower than the market share of the valley song search engine 65%, this contributes to retorting some analysts have something to do and ” must answer ” Will not transform into the statement of real market share, ” must answer ” Push away and rise to ” Above ten thousand people under a person ” Position.
Microsoft may be said in the cooperation with Yahoo that it is cheap to gain all. But in the view of thatch of Palestine, Yahoo does not suffer a loss either. On one hand, Yahoo can be expanding the advertising income and cutting down and counting the technology research and development cost by a million dollars at the same time; On the other hand, Yahoo can strive for more time in order to polish the development strategy, develops other projects of making money at the same time. In addition, can prevent the VIP customer from being taken on and go by Microsoft while continuing selling and searching for the advertisement.
Sulivan says, to keep advertising selling operation is more beautiful than the actual conditions for Yahoo, ” because Yahoo will lose technology that the competition needs finally ” .
Must get the antitrust organization’s approval
Yahoo and Microsoft both refuse to comment to the agreement. Once this agreement is reached, must get U.S.A.’s antitrust organization’s approval.
” the Business Weekly ” think Yahoo and Microsoft search for the market share that field account for, far lower than the valley song in Internet, so the antitrust organization may form an alliance to release for these two enterprises.
It is reported, the advertiser may applaud by cooperating with Microsoft for Yahoo too, because giant’s valley song of the search engine welcomed challengers at last.
Microsoft expressed friendship to Yahoo many years ago, is in the hope of expanding and searching for market share online. Repeatly after being refused, Microsoft put forward the purchase of 44,600 million dollars of total price to Yahoo to invite by price of 31 dollars for every strand last February, raise the bid to every strand of 33 dollars, total price is 47,500 million dollars at early May.
Zhi Yang, former CEO of Yahoo, think it is too low for Microsoft to offer, refuse the other side for several times purchase is suggested totally far, later refused to buy the inviting of some stocks and search engine business of Yahoo in Microsoft again.
After the financial crisis breaks out, Yahoo stock price gone back to rise to Microsoft to suggest the price when being purchased, company’s market value is probably 24 billion dollars this week.
According to Xinhua News Agency
Tags: ceo of yahoo, search engine, associated press
On September 11, 802.11n standard already been passed, has become Wi-Fi standard of 100Mbps and higher speed. Whether you hail or send out to this ” Why use for such a long time ” Sigh with deep feeling,have while suring you by reason that is one’s own.
After all, IEEE has finished this standard finally in seven years. A what is called one ” Before the standard ” The products have already gone on the market as far back as 2007. In fact, some wireless manufacturer’s reports claim, its one that sells products at present is for the most part 802.11n apparatus before the standards.
Special topic: 802.11n wireless network chooses and disposes the complete attack strategy
This surprising achievement is unquestionable. This standard will probably become the leading network technique in enterprises in the wireless technical field.
First of all, as to participating in several hundred experts of wireless trade and other trade that have made the details of various fields of this standard over the past five years, we should express thanks.
In this course, the formulation work of the standard is not light frequently. The final edition is that have totally written the final wireless standard of 1997 version again, have introduced a lot of technology of lower floor, has established the technological foundation in foreseeable future for hundreds of millions of wireless users and the whole wireless LAN trade.
Though some other wireless technology is at developing stage at present, but no technology can replace the position of 802.11n in the near future. While 802.11n replaces 802.11b and g progressively, it can still offer with early and standard downward compatibility.
Under many kinds of possible dispositions, 802.11n can offer higher throughput, coverage and dependability, therefore has reduced cost and price effectively.
Implement very much simple course – launches the end and receives the end and place a wireless device respectively, can offer and is up to 150Mbps transfer rate, and the transfer rate of 802.11g can only reach 54Mbps at most. And some more complicated disposition ways, namely 2×2 and 2×3 usually disposed dispose, the transfer rate of this kind of disposition can reach 300Mbps at most, and 4×4 disposes the transfer rate of the way and can be up to 600Mbps all these data are the peak value .
The price of 802.11n products drops by a wide margin, this relates to manufacturing cost of VLSI chip to a great extent, the price level of 802.11n products at present already and the cost of 802.11g has been very nearly the same two years ago.
At present, have already built the adapter of 802.11n in installation in most note-books and a lot of Net surfing one, and the manufacturers of every enterprise layer Wi-Fi system begin to offer 802.11n products.
It is Wi-Fi
The reason why can make such success, the key lies in Wi-Fi alliance sanctioned a 802.11n temporary interoperability specification based on second draft of this standard in 2007.
This specification has been influenced by a kind of idea to a great extent, namely 802.11n had already finalized a text a long time ago, but what we want to buy finally is Wi-Fi, but not any 802.11 or something like that. As to 802.11, no consistency, according with or compatible test, the work will be undertaken by Wi-Fi alliance, and this organization relies on one’s own efforts to already become the most successful employer’s organization since the dawn of human civilization.
In fact, after going through 802.11n early long torment, manufacturer’s groups such as MitMot, TGnSync and WWiSE,etc. have carried on a large amount of politics include technology The internal conflict of the field, the involvement of Wi-Fi alliance is very necessary, the trouble course that can be established to the standard at least brings some quiet and orders.
The one that is similar to this is, 802.11 initial standards finalize a text finally in seven years, so, the temporary specification that Wi-Fi alliance sanctions makes the key factor of success of market as this technology.
In establishing and finishing the time that 802.11n standard needs, developing course in standard of IEEE is to limit the standard throughput, thus realize the best result.
The standard which this kind of standard organization sets up basically has legal effect as IEEE. IEEE has been making great efforts to guarantee the development course of the standard accords with ” Rational course, opening, common understanding are and balanced ” Principle,and be kept at every step yes, ” the appeal right ” .
Certainly, produce standard of result, complain, really is very little really, because time that course need this dawdle, blow by everyone. The majority conflicts internally and is resulted from technological position, namely hope one’s own intellectual property right can be incorporated in the standard, or in order to keep the technological leading position of oneself in the market.
Wi-Fi alliance already declared, the authentication course after revising according to the standard will ” keep interoperability with the present specification ” ,And this specification is still based on second standard draft. Because existing investment has got very good protection, we expect to accelerate 802.11n and make the sure process of dominating the status in the world in this.
Certainly, the reason which causes this result is that almost there is not any substantive modification between the second draft and final edition. The most important problem that the standard solves is the coexistent ability to strengthen standardized product and 802.11 existing products and some other products.
Tags: 802 11b, seven years, wireless technology, downward compatibility, attack strategy
Perhaps one of the most fearful points is losing and keeping machine format control secret to oneself the most privately ownedly and most in the transitional course of cloud. It is not anything new for commercial world that the technological way changes the worry brought, but this kind transforms into network to make enterprises face the unprecedented risk, current enterprises weigh between efficiency of the cloud and competitive edge and risk that it brings.
When each enterprise weighs in the cloud calculates commercial opportunity and risk brought, the suppliers come in a continuous stream, new security solution and framework of all kinds that accompanied by. Fortunately, in terms of safe risk of a series of extremely overhanging cloud which people often talk about, a kind of technology that has already been proved brings good news to people, that is SSL Secure Sockets Layer Certificate technology.
As one of the main safety standards that is established in the computing technique for a long time, SSL encrypts and authorizes and becomes modal security solutions of cloud without any suspicion, because the latter depends on the security transmission of sensitive information among line user.
SSL: How to retrieve a hopeless situation
SSL is Internet 1.0, but the cloud calculates it is the future. However, an unquestionable one is, SSL has played an enormous role in tackling a series of terrible cloud security challenge. The data isolate, regulation complying with and data position, separately should disclose private the intersection of data and nightmare that bring to the intersection of data and safe protection, 21st century the intersection of regulation and problem not faced engaged in business. Fortunately, SSL has offered the coding technique, can prevent the data from being peeped while conveying in the cloud. SSL has offered and authorized technology, can examine the identity of any server or die Datenannahme end point.
The data are isolated: SSL protects and bursts forth the brilliant rays. It is ubiquitous in the cloud stores that the data isolate the risk. While adopting the traditional local memory technology, the intersection of enterprise and owner can overall the intersection of control data and position and visit the machine format person. In the cloud, all has changed, the cloud service supplier is controlling the machine format storage position.
Users should require the cloud service supplier to not merely use SSL, also adopt and support 128 coding techniques at least ‘ Certainly the better one is to adopt 256 stronger coding techniques Server. So can guarantee the intersection of data and move or moving safety between server and browser among server of user, thus prevent the person who intercepts data flow without permission from reading data fetch.
SSL apparatus authorized and can be further guaranteed before data transmission is between the servers or from server to browser, each apparatus will be passed and authorized. Data that in this way, can prevent the illegal apparatus and is connected to the cloud and visits users.
The regulation is complied with: SSL keeps watch for you. And then the challenge that the regulation complies with the respect, if is satisfied <> Sarbanes-Oxley ” the the intersection of medical insurance and convenient and responsibility bill ” HIPPA Requirement. In isolating in data, SSL coding technique can prevent being protected and the private data are revealed in surprise, because it can automated implementation is protected. SSL coding technique can let the sensitive data be of no use when catching or have a look around to those third parties who has not been authorized in advance.
The position of data: SSL becomes in the severe environment ” The green area ” . If data deposite cloud in, distinguish the intersection of it and concrete physical location while being difficult really. This data may be may convey arbitrarily among any local server too the backupped. However, if the cloud service supplier fully adopts SSL technology to encrypt in data movement, then, the data will become safe. In addition, if the cloud service supplier is adopting the legal third party SSL provider, such as GeoTrust or majestic auspicious letter, then, to lying in the country such as North Korea or Iran forbidden Server,it is neither will issue SSL certificate, nor been in they will have data stored in these servers at country.
Not all SSL are uniform
Service supplier should use and come from SSL that the famous, reliable, safe authoritative organization of independent authentication issues the cloud. This SSL certificate should offer 128 coding techniques at least, it is preferably 256 coding techniques based on 2048 new global root systems. In addition, also need rigorous authentication course.
Releasing the organization in SSL certificate has data protection and optimal military grade of data centres of usability and disaster-tolerance site. SSL authorizes the responsible institution to need to be audited him and authorized the method by the audit agency of third party let every year.
As each enterprise moves in the cloud fast, become the problem to be solved urgently safely, need to cause the high-level attention. The method to establish meticulously contributes to realizing safer choice, SSL technology substantially as guaranteeing service supplier adopt the cloud the safe and reliable authentication authority releases. However, not all SSL are uniform, need to make the wise choice.
One of many kinds of magic weapons?
The emperor’s sword that SSL does not meet the challenge of cloud security, but it is one of many kinds of schemes which we can choose, it is stupid to ignore it. True, the new technology is very essential for solving the risk of the cloud environment. No doubt, known and new developing technical driving force comes from the standards of trade and government mostly. And as a technology, brilliant history of SSL will become the choice that this field will be taken as own duty. The understanding of enormous value of technology such as SSL etc. has put forward an obvious question for us: Whether we worry oneself about nothing, overdraw the complicated safe solution of cloud looking for? Also or, have a lot of original document most ideal, most appropriate solutions been already extremely easy to obtain? These are really worth our pondering deeply it.
Tags: certificate technology, security challenge, long time, security solutions, 21st century, new security, enormous role
PC manufacturer Cherrypal has already put out a style sold for 99 dollars ” The mini foundation of surfing the Net ” Cherrypal Africa, it originally aims at helping the global population below the poverty line to insert Internet that this fund surfs the Net cheap.
OLPC was organized ” 100 dollars note-book ” The project has already been launched for a long time, this project is directed primarily to the demand of developing country’s children education. However, OLPC has not put out any price in the real products at 100 dollars yet at present. So Cherrypal Africa is that first prices in the world are lower than the note-book at 100 dollars.
The disposition of Cherrypal Africa is not outstanding. This Marcos, founder of company, is comparable to Boulder Max Seybold Say: “Cheryypal Africa is not a strong system. This note-book measurement is very small, the screen is 7 inches, running speed is not quick. But this note-book is more than sufficient for surfing the Net. ”
He says, this note-book was designed for those persons who affords several hundred dollars note-book at the same time. This note-book is named as ” Africa ” It is for organizing PAAJAF to salute to the humanitarianism of Ghana.
Besides 7 inches of screens, this note-book adopts 400MHz processor, the flashing memory of 256MB RAM and 2GB. This note actually could adopt Linux or Windows CE system. Users can already buy this note-book through the online shop of Cherrypal at present.
Comparable to Boulder to think, Cherrypal Africa can find the market in the developed country too. He says: “15 million Americans can not afford note-books, they can only go to the public library to surf the Net, or does not use Internet in life at all. ”
Cherrypal is a subsidiary of Tristate Hong Kong group, there are offices in California Palo Alto and Hong Kong at present. Cherrypal Africa is not Cherrypal first ultra low price note-books. In July of 2008, this company claims to put out ” cheapest note-book in the world ” NPX-9000, the price at that time of this note-book is 139 dollars. But only the customer at one time sells more than 100 in batches, could obtain such a price.
Cherrypal Africa is a section of reliable, low end products used for inserting Internet. A lot of users may not be interested in the note-book of this low-performance, but on the low developed area of the whole world, this future development situation is good that mini this fund surfs the Net.
Tags: hong kong group, pc manufacturer, note books, global population, note book