Monthly Archives: August 2011
VMware CEO: Cloud to End Computer Desktop Era
The PC is DEAD!! Long live the…TERMINAL?!?!?!
IMHO, a cloud is theoretically a collection of networked computers that together create a virtual space wherein instances of OSes and programs run. Accessing these instances is accomplished with any mobile device that is powerful enough to access the Internet. Basically, the mobile-to-cloud process is an updated version of the terminal-to-mainframe process. The terminals are now portable or even pocket-sized and the mainframe is pretty much infinitely expandable, but the concept is the same. Our stuff is stored and processed on hardware we don’t own, but don’t have to maintain either.
“PCs are not the only animal in the zoo anymore. Increasingly, users are holding other devices in their hands,” he said, speaking at the kick-off of the VMworld 2011, being held this week in Las Vegas.
Within five years, less than 20 percent of computing clients will be running Microsoft Windows, he predicted. The job of providing applications and data “can no longer belong to any one device, or any one operating system. So we have to float away from that aspect of the desktop,” he said. Read more…
Just in case you were wondering, VMware makes virtualization software which is used in cloud computing systems both public and private. In other words, it is to his benefit that the PC go away since there will be more need for his company’s product.
There are benefits and drawbacks to The Cloud as I like to call it. The Cloud is accessible from any authorized device that can access the Internet, but your experience is defined by what you want to do versus your screen size. It is directly proportional. The more complex the activity, the bigger your screen needs to be for it to be comfortable. The Cloud does not require you to have a lot of horsepower under the hood of your device but is subject to Internet availability. The Cloud does not require you to maintain the computers but you have to have a service agreement which means you pay for Internet access and then pay extra for the service. The Cloud is hosted by someone else but your data is on someone else’s servers (unless it’s a private cloud but that is basically having the computers yourself).
Thirty dollars a month may not sound like much, but that would be $360 a year to start. If they raise prices, you have no option but to continue to pay or go somewhere else. If anything happens to you and for some reason you miss payment they will stop access; if the FBI serves a warrant to the company hosting your cloud, you could lose access (and not get any apology from the government whatsoever); if your mobile device gets stolen out of your pocket or you happen to leave it at a bar or restaurant you’ll need to get hold of your provider and change all access, etc. There is a lot of convenience to having your stuff hosted on an off-site system, but there’s also a lot of convenience to having your stuff on your own computer. There is also the fact that with a mobile terminal you are ALWAYS at work…not always a good thing.
‘Kill tool’ released for unpatched Apache server vulnerability
Even open source implementations aren’t invulnerable. There are, however, many people looking at open source code specifically for flaws and patching them. Proprietary software gets patched because it’s a job; a lot of open source software is patched to just make it better.
“The attack can be done remotely and with a modest number of requests can cause very significant memory and CPU usage on the server,” according to an advisory that documents a denial-of-service flaw in the default Apache HTTPD installation. Read more…
There are going to be people out there who just want to create mischief. There will be those who think they are, or may actually be, part of a cause. Now, however the focus seems to be on money. Get into a system and grab stuff while causing havoc to hide what was stolen. That’s what it sounds like this actually is. A patch to fix this problem is expected soon.
Hackers compete in security breach league
If the targets are ones that have been set up by the RankMyHack then I could see this as a sort of National Breacher League or International Infiltration League. If the targets are actually real companies then this, IMHO, is a convenient list of more than the Usual Suspects.
Competitors win points on the leader board by breaching the security of websites. The bigger the website, the more points a hack is worth. Likewise more technically accomplished attacks attract more kudos.
The highest-scoring attack so far targeted Huffingtonpost.com, the American liberal political website. It was carried out by a hacker using the alias “Mudkip”, who currently leads the RankMyHack.com league, having breached the security of 16 websites since 28 July. Read more…
So, if a site was hacked now they know where to look. Sure, there’ll be resistance at first but at some point it will be worth the effort to listen in on the packets flying to and from this site. I understand bragging, but it is not necessarily the safest course of action when doing something illegal. Someone once said “I’m the best, not the most famous.” It’s very much like being in battle: move slowly, keep low, and you can put a bullet in your adversary; pop your head up and you will likely get a bullet in it which will ruin your squad’s day.
HP To Apple: You Win.
Some things work, others don’t. HP used to be pricey, then they bought Compaq and dropped to their level. Unfortunately, they seemed to rise to the same irritation level Compaq had as well. Still, that didn’t stop them from becoming huge. The only problem is that trying to compete with what is for all intents and purposes a luxury item using a bargain item is doomed from the start: you can get high numbers but your individual margin is slim. Think of it this way: a Bugatti Veyron and a Chevrolet Corvette are both sports cars but the return for a Veyron is much higher than that of the Corvette. That’s not to say that the Corvette is a poor car; just that the profit margin is much slimmer.
After all, while HP may be the worldwide leader in PC sales with massive revenues, their actual profit from those sales has already been far surpassed by Apple. Further, while overall PC growth continues to contract, Apple’s Mac sales continue to grow and have outpaced the rest of the PC industry for 21 consecutive quarters. That’s over five consecutive years. That’s certainly another way to interpret ”Post-PC world”. Read more…
If we are now in the “Post-PC world” then that means that soon there will be no more Macs since those are “Personal Computers” too. But that would be fine with Apple; they want you to duplicate all your stuff on their servers anyway so that should some catastrophe occur you can simply reload from your backup. That’s great from their standpoint as it makes you more dependent on them. At some point soon we will go back to the ” you – terminal – mainframe” way of doing things. It’s just that it will be called “you – phone – cloud” which, IMHO, is the same thing.
Apple has figured out how to make people prefer a luxury item over a bargain item. In the scheme of things, that’s what every company wants. They will grudgingly have bargain items for sale, but they really want you to buy the expensive, luxury stuff which has higher margins. That’s tough to do if you’re seen as a “work” machine rather than a “cool” machine. And remember, Apple doesn’t have any bargain items; it’s all luxury.
Researchers modify harmless bacteria to kill harmful bacteria
Ordinarily, you would think that they perhaps took a predatory bacteria and modified something to make a species normally not considered to be prey worthy of reconsideration. Or perhaps they inserted a gene that excretes something not toxic to the engineered bacteria but very toxic to the target species. They actually did something similar to what is going on in the macro-world today: they made terrorists.
The general approach to treating it is massive amounts of antibiotics which don’t always work and also tend to kill off good bacteria in the process.
To get around this problem Poh and Chang modified the DNA of E. coli in such a way as to allow it to be able to detect LasR, a molecule used by P.aeruginosa bacteria to communicate with one another. When the LasR is detected, the E. coli begins producing a toxin called pyocin until it’s full, at which point it explodes releasing the pyocin which kills P.aeruginosa by eating holes in its exterior, allowing its innards to pour out.
They have made the bacteriological equivalent of suicide bombers. The thing I wonder is if there is any other way for P.aeruginosa to communicate other than LasR. If there is, these micro killers won’t be effective for long…just until they kill off the normal LasR-using sort. Hopefully the little equivalent of fanatics won’t then mutate to kill something else…something that may be beneficial like Lactobacillus.
Four ways the Google-Motorola deal will change the tech industry
Yeah, I can see that there are definitely three (the fourth is iffy) but the most important of the group is patent windfall.
With Motorola’s 17,000 patents on its side, Google has essentially put an end to the Android patent wars. There will still be some final skirmishes, but don’t expect much carnage. Read more…
Since the plan of the day seems to be “Yes, we do infringe on a few of your patents BUT you infringe on more of ours…” Google needed a battleship. They got a drone carrier. At first, it may seem that they got the short end of the stick but think of it this way: a battleship can launch a lot of shells on ballistic trajectories and a few guided missiles to specific targets but a drone carrier can launch a lot of guided munitions to specific targets and then rearm the drones to do it all again.
Google still has the Oracle problem and I’m sure the pit bull they have for a CEO will not give up chewing on the Google bone easily but things look a lot brighter for Google than they did a week ago. We will see if they manage to piss off any of their Android friends.
After 30 years, IBM says PC going way of vacuum tube and typewriter
Let me start by saying that, yes, tablets and smartphones are computers…but then again so is my digital watch. The memory in my watch is shared among functions and I have a limited amount of storage with a cumbersome input method. Smartphones and tablets have shared memory with a limited amount of storage but a friendlier input method. Are they great consumption devices? Sure, just like a TV. Are they great creation devices? Not really. They can do basic things but for real use they require help.
IBM, of course, sold its PC division to Lenovo in 2005. Dean, in a blog post, writes that “I, personally, have moved beyond the PC as well. My primary computer now is a tablet. When I helped design the PC, I didn’t think I’d live long enough to witness its decline. But, while PCs will continue to be much-used devices, they’re no longer at the leading edge of computing.”
Dean’s remarks continue a debate over whether we are now in a so-called “post-PC” era, in which smartphones and tablets are replacing desktops and laptops. Not surprisingly, Microsoft — seller of 400 million Windows 7 licenses — isn’t a fan of that term. Read more…
I find it fascinating that so many consider the tablet and smartphone as PC replacements. While they can look like laptops if you add a few things the only way they can actually replace the laptop or desktop is to be connected to a repository of your information that is stored somewhere online. In other words, the device is serving as a display for the browser. The browser is attached through the Internet to the place where your information is actually stored. In this fashion, the tablet and smartphone can truly replace a PC. Mind you, in order for this to work someone else has your information. Someone who can be subpoenaed and forced to give up a machine that has your information on it because of someone else, or eventually charge you a monthly fee for access to your information because it’s on their machines.
I do not see the PC going away any time soon. Unless something dramatic happens with the Cloud (like the Singularity) any advance made in computing will be mirrored by handheld devices. They will become more powerful and they will reach a point where they will become the PC. Right now, the only thing happening is companies are trying to get you to go back to the old days when you had a dumb terminal which was attached to a mainframe computer. It looks much slicker now with networks replacing mainframes and terminals no longer being completely dumb, but the end result is the same: your information is stored on someone else’s network and accessed through a browser window on a terminal that happens to be wireless.