Showing posts with label Computer. Show all posts
Showing posts with label Computer. Show all posts

Thursday, June 30, 2011


Hackers are a very diverse bunch, a group simultaneously blamed with causing billions of dollars in damages as well as credited with the development of the World Wide Web and the founding of major tech companies. In this article, we test the theory that truth is better than fiction by introducing you to ten of the most famous hackers, both nefarious and heroic, to let you decide for yourself.

Here's our Top 10 of the Most Famous Computer Hacks of All Time.

Black Hat Crackers

The Internet abounds with hackers, known as crackers or "black hats," who work to exploit computer systems. They are the ones you've seen on the news being hauled away for cybercrimes. Some of them do it for fun and curiosity, while others are looking for personal gain. In this section we profile five of the most famous and interesting "black hat" hackers.

1 - Jonathan James

James gained notoriety when he became the first juvenile to be sent to prison for hacking. He was sentenced at 16 years old. In an anonymous PBS interview, he professes, "I was just looking around, playing around. What was fun for me was a challenge to see what I could pull off."

James's major intrusions targeted high-profile organizations. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee usernames and passwords.

James also cracked into NASA computers, stealing software worth approximately $1.7 million. According to the Department of Justice, "The software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." NASA was forced to shut down its computer systems, ultimately racking up a $41,000 cost. James explained that he downloaded the code to supplement his studies on C programming, but contended, "The code itself was crappy . . . certainly not worth $1.7 million like they claimed."

Given the extent of his intrusions, if James, also known as "c0mrade," had been an adult he likely would have served at least 10 years. Instead, he was banned from recreational computer use and was slated to serve a six-month sentence under house arrest with probation. However, he served six months in prison for violation of parole. Today, James asserts that he's learned his lesson and might start a computer security company.
2 - Adrian Lamo

Lamo's claim to fame is his break-ins at major organizations like The New York Times and Microsoft. Dubbed the "homeless hacker," he used Internet connections at Kinko's, coffee shops and libraries to do his intrusions. In a profile article, "He Hacks by Day, Squats by Night," Lamo reflects, "I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional."

Lamo's intrusions consisted mainly of penetration testing, in which he found flaws in security, exploited them and then informed companies of their shortcomings. His hits include Yahoo!, Bank of America, Citigroup and Cingular. When white hat hackers are hired by companies to do penetration testing, it's legal. What Lamo did is not.

When he broke into The New York Times' intranet, things got serious. He added himself to a list of experts and viewed personal information on contributors, including Social Security numbers. Lamo also hacked into The Times' LexisNexis account to research high-profile subject matter.

For his intrusion at The New York Times, Lamo was ordered to pay approximately $65,000 in restitution. He was also sentenced to six months of home confinement and two years of probation, which expired January 16, 2007. Lamo is currently working as an award-winning journalist and public speaker.
3 - Kevin Mitnick

A self-proclaimed "hacker poster boy," Mitnick went through a highly publicized pursuit by authorities. His mischief was hyped by the media but his actual offenses may be less notable than his notoriety suggests. The Department of Justice describes him as "the most wanted computer criminal in United States history." His exploits were detailed in two movies: Freedom Downtime and Takedown.

Mitnick had a bit of hacking experience before committing the offenses that made him famous. He started out exploiting the Los Angeles bus punch card system to get free rides. Then, like Apple co-founder Steve Wozniak, dabbled in phone phreaking. Although there were numerous offenses, Mitnick was ultimately convicted for breaking into the Digital Equipment Corporation's computer network and stealing software.

Mitnick's mischief got serious when he went on a two and a half year "coast-to-coast hacking spree." The CNN article, "Legendary computer hacker released from prison," explains that "he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system." He then hacked into computer expert and fellow hacker Tsutomu Shimomura's home computer, which led to his undoing.

Today, Mitnick has been able to move past his role as a black hat hacker and become a productive member of society. He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.
4 - Kevin Poulsen

Also known as Dark Dante, Poulsen gained recognition for his hack of LA radio's KIIS-FM phone lines, which earned him a brand new Porsche, among other items. Law enforcement dubbed him "the Hannibal Lecter of computer crime."

Authorities began to pursue Poulsen after he hacked into a federal investigation database. During this pursuit, he further drew the ire of the FBI by hacking into federal computers for wiretap information.

His hacking specialty, however, revolved around telephones. Poulsen's most famous hack, KIIS-FM, was accomplished by taking over all of the station's phone lines. In a related feat, Poulsen also "reactivated old Yellow Page escort telephone numbers for an acquaintance who then ran a virtual escort agency." Later, when his photo came up on the show Unsolved Mysteries, 1-800 phone lines for the program crashed. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.

Since serving time, Poulsen has worked as a journalist. He is now a senior editor for Wired News. His most prominent article details his work on identifying 744 sex offenders with MySpace profiles.
5 - Robert Tappan Morris

Morris, son of former National Security Agency scientist Robert Morris, is known as the creator of the Morris Worm, the first computer worm to be unleashed on the Internet. As a result of this crime, he was the first person prosecuted under the 1986 Computer Fraud and Abuse Act.

Morris wrote the code for the worm while he was a student at Cornell. He asserts that he intended to use it to see how large the Internet was. The worm, however, replicated itself excessively, slowing computers down so that they were no longer usable. It is not possible to know exactly how many computers were affected, but experts estimate an impact of 6,000 machines. He was sentenced to three years' probation, 400 hours of community service and a fined $10,500.

Morris is currently working as a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. He principally researches computer network architectures including distributed hash tables such as Chord and wireless mesh networks such as Roofnet.

White Hat Hackers

Hackers that use their skills for good are classified as "white hat." These white hats often work as certified "Ethical Hackers," hired by companies to test the integrity of their systems. Others, operate without company permission by bending but not breaking laws and in the process have created some really cool stuff. In this section we profile five white hat hackers and the technologies they have developed.

1 - Stephen Wozniak

"Woz" is famous for being the "other Steve" of Apple. Wozniak, along with current Apple CEO Steve Jobs, co-founded Apple Computer. He has been awarded with the National Medal of Technology as well as honorary doctorates from Kettering University and Nova Southeastern University. Additionally, Woz was inducted into the National Inventors Hall of Fame in September 2000.

Woz got his start in hacking making blue boxes, devices that bypass telephone-switching mechanisms to make free long-distance calls. After reading an article about phone phreaking in Esquire, Wozniak called up his buddy Jobs. The pair did research on frequencies, then built and sold blue boxes to their classmates in college. Wozniak even used a blue box to call the Pope while pretending to be Henry Kissinger.

Wozniak dropped out of college and came up with the computer that eventually made him famous. Jobs had the bright idea to sell the computer as a fully assembled PC board. The Steves sold Wozniak's cherished scientific calculator and Jobs' VW van for capital and got to work assembling prototypes in Jobs' garage. Wozniak designed the hardware and most of the software. In the Letters section of Woz.org, he recalls doing "what Ed Roberts and Bill Gates and Paul Allen did and tons more, with no help." Wozniak and Jobs sold the first 100 of the Apple I to a local dealer for $666.66 each.

Woz no longer works full time for Apple, focusing primarily on philanthropy instead. Most notable is his function as fairy godfather to the Los Gatos, Calif. School District. "Wozniak 'adopted' the Los Gatos School District, providing students and teachers with hands-on teaching and donations of state-of-the-art technology equipment."
2 - Tim Berners-Lee

Berners-Lee is famed as the inventor of the World Wide Web, the system that we use to access sites, documents and files on the Internet. He has received numerous recognitions, most notably the Millennium Technology Prize.

While a student at Oxford University, Berners-Lee was caught hacking access with a friend and subsequently banned from University computers. w3.org reports, "Whilst [at Oxford], he built his first computer with a soldering iron, TTL gates, an M6800 processor and an old television." Technological innovation seems to have run in his genes, as Berners-Lee's parents were mathematicians who worked on the Manchester Mark1, one of the earliest electronic computers.

While working with CERN, a European nuclear research organization, Berners-Lee created a hypertext prototype system that helped researchers share and update information easily. He later realized that hypertext could be joined with the Internet. Berners-Lee recounts how he put them together: "I just had to take the hypertext idea and connect it to the TCP and DNS ideas and – ta-da! – the World Wide Web."

Since his creation of the World Wide Web, Berners-Lee founded the World Wide Web Consortium at MIT. The W3C describes itself as "an international consortium where Member organizations, a full-time staff and the public work together to develop Web standards." Berners-Lee's World Wide Web idea, as well as standards from the W3C, is distributed freely with no patent or royalties due.
3 - Linus Torvalds

Torvalds fathered Linux, the very popular Unix-based operating system. He calls himself "an engineer," and has said that his aspirations are simple, "I just want to have fun making the best damn operating system I can."

Torvalds got his start in computers with a Commodore VIC-20, an 8-bit home computer. He then moved on to a Sinclair QL. Wikipedia reports that he modified the Sinclair "extensively, especially its operating system." Specifically, Torvalds hacks included "an assembler and a text editor…as well as a few games."

Torvalds created the Linux kernel in 1991, using the Minix operating system as inspiration. He started with a task switcher in Intel 80386 assembly and a terminal driver. After that, he put out a call for others to contribute code, which they did. Currently, only about 2 percent of the current Linux kernel is written by Torvalds himself. The success of this public invitation to contribute code for Linux is touted as one of the most prominent examples of free/open source software.

Currently, Torvalds serves as the Linux ringleader, coordinating the code that volunteer programmers contribute to the kernel. He has had an asteroid named after him and received honorary doctorates from Stockholm University and University of Helsinki. He was also featured in Time Magazine's "60 Years of Heroes."
4 - Richard Stallman

Stallman's fame derives from the GNU Project, which he founded to develop a free operating system. For this, he's known as the father of free software. His "Serious Bio" asserts, "Non-free software keeps users divided and helpless, forbidden to share it and unable to change it. A free operating system is essential for people to be able to use computers in freedom."

Stallman, who prefers to be called rms, got his start hacking at MIT. He worked as a "staff hacker" on the Emacs project and others. He was a critic of restricted computer access in the lab. When a password system was installed, Stallman broke it down, resetting passwords to null strings, then sent users messages informing them of the removal of the password system.

Stallman's crusade for free software started with a printer. At the MIT lab, he and other hackers were allowed to modify code on printers so that they sent convenient alert messages. However, a new printer came along – one that they were not allowed to modify. It was located away from the lab and the absence of the alerts presented an inconvenience. It was at this point that he was "convinced…of the ethical need to require free software."

With this inspiration, he began work on GNU. Stallman wrote an essay, "The GNU Project," in which he recalls choosing to work on an operating system because it's a foundation, "the crucial software to use a computer." At this time, the GNU/Linux version of the operating system uses the Linux kernel started by Torvalds. GNU is distributed under "copyleft," a method that employs copyright law to allow users to use, modify, copy and distribute the software.

Stallman's life continues to revolve around the promotion of free software. He works against movements like Digital Rights Management (or as he prefers, Digital Restrictions Management) through organizations like Free Software Foundation and League for Programming Freedom. He has received extensive recognition for his work, including awards, fellowships and four honorary doctorates.
5 - Tsutomu Shimomura

Shimomura reached fame in an unfortunate manner: he was hacked by Kevin Mitnick. Following this personal attack, he made it his cause to help the FBI capture him.

Shimomura's work to catch Mitnick is commendable, but he is not without his own dark side. Author Bruce Sterling recalls: "He pulls out this AT&T cellphone, pulls it out of the shrinkwrap, finger-hacks it, and starts monitoring phone calls going up and down Capitol Hill while an FBI agent is standing at his shoulder, listening to him."

Shimomura out-hacked Mitnick to bring him down. Shortly after finding out about the intrusion, he rallied a team and got to work finding Mitnick. Using Mitnick's cell phone, they tracked him near Raleigh-Durham International Airport. The article, "SDSC Computer Experts Help FBI Capture Computer Terrorist" recounts how Shimomura pinpointed Mitnick's location. Armed with a technician from the phone company, Shimomura "used a cellular frequency direction-finding antenna hooked up to a laptop to narrow the search to an apartment complex." Mitnick was arrested shortly thereafter. Following the pursuit, Shimomura wrote a book about the incident with journalist John Markoff, which was later turned into a movie.
  • Reference/Source: Focus.com by IT Security Editors

Thursday, December 16, 2010

Just as with many popular arguments — Red Sox v. Yankees, Chelsea v. Manchester United, Ford v. Chevy — IT certifications are popular fodder for debate. Except that certifications, in an IT professional’s microcosm of a world, have a bigger impact on the future. Just which certifications hold the most value today? Here’s my list of the 10 accreditations with the greatest potential for technology support professionals, administrators, and managers seeking employment within consulting firms or small and midsize organizations.


1: MCITP
This best certification list could be built using 10 Microsoft certifications, many of which would be MCITP accreditations. The world runs on Microsoft. Those professionals earning Microsoft Certified IT Professional (MCITP) certification give employers and clients confidence that they’ve developed the knowledge and skills necessary to plan, deploy, support, maintain, and optimize Windows technologies. Specifically, the Enterprise Desktop Administrator 7 and Server Administrator tracks hold great appeal, as will Enterprise Messaging Administrator 2010, as older Exchange servers are retired in favor of the newer platform.

2: MCTS
With operating systems (Windows 2000, 2003, 2008, etc.) cycling through every several years, many IT professionals simply aren’t going to invest the effort to earn MCITP or MCSE accreditation on every version. That’s understandable. But mastering a single exam, especially when available examinations help IT pros demonstrate expertise with such popular platforms as Windows Server 2008, Windows 7, and Microsoft SQL Server 2008, is more than reasonable. That’s why the Microsoft Certified Technology Specialist (MCTS) accreditation earns a spot on the list; it provides the opportunity for IT pros to demonstrate expertise on a specific technology that an organization may require right here, right now.

3: Network+
There’s simply no denying that IT professionals must know and understand the network principles and concepts that power everything within an organization’s IT infrastructure, whether running Windows, Linux, Apple, or other technologies. Instead of dismissing CompTIA’s Network+ as a baseline accreditation, every IT professional should add it to their resume.

4: A+
Just as with CompTIA’s Network+ certification, the A+ accreditation is another cert that all IT professionals should have on their resume. Proving baseline knowledge and expertise with the hardware components that power today’s computers should be required of all technicians. I’m amazed at the number of smart, intelligent, and seasoned IT pros who aren’t sure how to crack the case of a Sony Vaio or diagnose failed capacitors with a simple glance. The more industry staff can learn about the fundamental hardware components, the better.

5: CSSA
SonicWALLs power countless SMB VPNs. The company’s network devices also provide firewall and routing services, while extending gateway and perimeter security protections to organizations of all sizes. By gaining Certified SonicWALL Security Administrator (CSSA) certification, engineers can demonstrate their mastery of network security essentials, secure remote access, or secure wireless administration. There’s an immediate need for engineers with the knowledge and expertise required to configure and troubleshoot SonicWALL devices providing security services.

6: CCNA
Although SonicWALL has eaten some of Cisco’s lunch, the demand for Cisco skills remains strong. Adding Cisco Certified Network Associate (CCNA) expertise to your resume does no harm and helps convince larger organizations, in particular, that you have the knowledge and skills necessary to deploy and troubleshoot Cisco routing and switching hardware.

: ACTC
Here’s where the debate really begins. Increasingly, my office is being asked to deploy and administer Mac OS X networks. In the real world, divorced from IT-industry rhetoric, we’re being asked to replace older Windows networks with Mac OS X client-server environments. We’re particularly seeing Apple traction within nonprofit environments. We’ve found the best bet is to get up to speed on the technologies clients are requesting, so it stands to reason that earning Apple Certified Technical Coordinator (ACTC) 10.6 accreditation won’t hurt. In fact, developing mastery over Mac OS X Snow Leopard Server will help provide confidence needed to actually begin pursuing Apple projects, instead of reactively responding to client requests to deploy and maintain Apple infrastructure.

8: ACSP
Apple Certified Support Professional (ACSP) 10.6 accreditation helps IT professionals demonstrate expertise supporting Mac OS X client workstations. If you work for a single organization, and that firm doesn’t use Macs, you won’t need this certification. But larger organizations adding Macs due to demand within different departments or consultants working with a wide client base will do well to ensure they have Snow Leopard client skills. The ACSP is the perfect way to prove mastery.

9: CISSP
Unchanged from the last 10 best certifications list, ISC2’s security accreditation for industry professionals with at least five years of full-time experience is internationally recognized for its value and validity. The Certified Information Systems Security Professional (CISSP) title demonstrates expertise with operations and network security, subjects that will only increase in importance as legal compliance, privacy, and risk mitigation continue commanding larger organizations’ attention.

10: PMP
I fear organizations begin cutting project managers first when times get tough. Management roles and responsibilities often get passed to technical staff when layoffs occur. Even in challenging economic times, though, IT departments require staff familiar with planning, scheduling, budgeting, and project management. That’s why the Project Management Institute’s (PMI) Project Management Professional (PMP) accreditation makes the list. The cert measures candidates’ expertise in managing and planning projects, budgeting expenses, and keeping initiatives on track. While there’s an argument to place CompTIA’s Project+ certification in this slot, PMI is a respected organization that exists solely to further professional project management and, as such, deserves the nod.

Honorable mentions:

MCSE, ITIL, RHCP, Linux+, VCP, ACE, QuickBooks, Security+

In the previous version of this article, readers asked where NetWare certification stands. It’s not on the list. That’s not a mistake. It’s gone the way of BNC connectors, in my opinion. Microsoft owns the market. MCSEs have more value.

ITIL has its place, particularly in larger environments. RHCP (or Linux+) and VCP have roles within enterprises dependent upon Red Hat/Linux and VMware virtualization technologies certainly, but those organizations remain hit or miss.

Acronis’ ACE deserves a look. With some 3 million systems being backed up now by Acronis image software, it would behoove technology professionals to learn how to properly use the software. I think it’s fair to say there’s still some confusion as to the software’s tremendous potential.

SMBs are also demonstrating a surge of interest in QuickBooks technologies. From QuickBooks Point-of-Sale to QuickBooks Enterprise platforms, there’s strong, growing demand for QuickBooks expertise in the field. The company’s growth is impressive. There’s no other way to describe it. In a crappy economy, Intuit’s growing.

Security+, really, is a no brainer, but I’ll get lit up if I include nothing but CompTIA certifications in the top 10 list. However, my advice for anyone entering the industry or even veterans seeking their first accreditations would be to load up on CompTIA certs. How can you go wrong with the manufacturer-independent certifications that demonstrate mastery of fundamentals across a range of topics, including project management, hardware, networking, security, and voice networks? You could do much worse.


A word on the methodology
There’s no double-blind statistically valid data analysis run through a Bayesian probability calculus formula here. I’ve worked in IT long enough, however, and with enough different SMBs, to know what skills we need when the firm I co-own hires engineers and sends technicians onsite to deploy new systems or troubleshoot issues.

Sure, I could have thrown in ITIL to satisfy enterprise professionals, included RHCP to sate the rabid open source crowd, and added VCP to look hip modernizing the list with a virtualization element. But I’m just not seeing the demand for those skills in companies with up to several hundred employees. My firm’s been asked to deploy exactly one Linux server in almost seven years. And we’ve virtualized maybe a dozen systems. Therefore, I feel it would be a disservice to readers to include such accreditations when I see, on a daily basis, vastly greater demand for these other skill sets.

Saturday, December 4, 2010

Gartner, Inc. today highlighted the top 10 technologies and trends that will be strategic for most organizations in 2011. The analysts presented their findings during Gartner Symposium/ITxpo, being held here through October 21.


Gartner defines a strategic technology as one with the potential for significant impact on the enterprise in the next three years. Factors that denote significant impact include a high potential for disruption to IT or the business, the need for a major dollar investment, or the risk of being late to adopt.

A strategic technology may be an existing technology that has matured and/or become suitable for a wider range of uses. It may also be an emerging technology that offers an opportunity for strategic business advantage for early adopters or with potential for significant market disruption in the next five years. As such, these technologies impact the organization's long-term plans, programs and initiatives.

“Companies should factor these top 10 technologies in their strategic planning process by asking key questions and making deliberate decisions about them during the next two years,” said David Cearley, vice president and distinguished analyst at Gartner.

“Sometimes the decision will be to do nothing with a particular technology,” said Carl Claunch, vice president and distinguished analyst at Gartner. “In other cases, it will be to continue investing in the technology at the current rate. In still other cases, the decision may be to test or more aggressively deploy the technology.”

The top 10 strategic technologies for 2011 include:
Cloud Computing. Cloud computing services exist along a spectrum from open public to closed private. The next three years will see the delivery of a range of cloud service approaches that fall between these two extremes. Vendors will offer packaged private cloud implementations that deliver the vendor's public cloud service technologies (software and/or hardware) and methodologies (i.e., best practices to build and run the service) in a form that can be implemented inside the consumer's enterprise. Many will also offer management services to remotely manage the cloud service implementation. Gartner expects large enterprises to have a dynamic sourcing team in place by 2012 that is responsible for ongoing cloudsourcing decisions and management.

Mobile Applications and Media Tablets. Gartner estimates that by the end of 2010, 1.2 billion people will carry handsets capable of rich, mobile commerce providing an ideal environment for the convergence of mobility and the Web. Mobile devices are becoming computers in their own right, with an astounding amount of processing ability and bandwidth. There are already hundreds of thousands of applications for platforms like the Apple iPhone, in spite of the limited market (only for the one platform) and need for unique coding.

The quality of the experience of applications on these devices, which can apply location, motion and other context in their behavior, is leading customers to interact with companies preferentially through mobile devices. This has lead to a race to push out applications as a competitive tool to improve relationships and gain advantage over competitors whose interfaces are purely browser-based.


Social Communications and Collaboration. Social media can be divided into: (1) Social networking —social profile management products, such as MySpace, Facebook, LinkedIn and Friendster as well as social networking analysis (SNA) technologies that employ algorithms to understand and utilize human relationships for the discovery of people and expertise. (2) Social collaboration —technologies, such as wikis, blogs, instant messaging, collaborative office, and crowdsourcing. (3) Social publishing —technologies that assist communities in pooling individual content into a usable and community accessible content repository such as YouTube and flickr. (4) Social feedback - gaining feedback and opinion from the community on specific items as witnessed on YouTube, flickr, Digg, Del.icio.us, and Amazon. Gartner predicts that by 2016, social technologies will be integrated with most business applications. Companies should bring together their social CRM, internal communications and collaboration, and public social site initiatives into a coordinated strategy.

Video. Video is not a new media form, but its use as a standard media type used in non-media companies is expanding rapidly. Technology trends in digital photography, consumer electronics, the web, social software, unified communications, digital and Internet-based television and mobile computing are all reaching critical tipping points that bring video into the mainstream. Over the next three years Gartner believes that video will become a commonplace content type and interaction model for most users, and by 2013, more than 25 percent of the content that workers see in a day will be dominated by pictures, video or audio.

Next Generation Analytics. Increasing compute capabilities of computers including mobile devices along with improving connectivity are enabling a shift in how businesses support operational decisions. It is becoming possible to run simulations or models to predict the future outcome, rather than to simply provide backward looking data about past interactions, and to do these predictions in real-time to support each individual business action. While this may require significant changes to existing operational and business intelligence infrastructure, the potential exists to unlock significant improvements in business results and other success rates.

Social Analytics. Social analytics describes the process of measuring, analyzing and interpreting the results of interactions and associations among people, topics and ideas. These interactions may occur on social software applications used in the workplace, in internally or externally facing communities or on the social web. Social analytics is an umbrella term that includes a number of specialized analysis techniques such as social filtering, social-network analysis, sentiment analysis and social-media analytics. Social network analysis tools are useful for examining social structure and interdependencies as well as the work patterns of individuals, groups or organizations. Social network analysis involves collecting data from multiple sources, identifying relationships, and evaluating the impact, quality or effectiveness of a relationship.

Context-Aware Computing. Context-aware computing centers on the concept of using information about an end user or object’s environment, activities connections and preferences to improve the quality of interaction with that end user. The end user may be a customer, business partner or employee. A contextually aware system anticipates the user's needs and proactively serves up the most appropriate and customized content, product or service. Gartner predicts that by 2013, more than half of Fortune 500 companies will have context-aware computing initiatives and by 2016, one-third of worldwide mobile consumer marketing will be context-awareness-based.


Storage Class Memory. Gartner sees huge use of flash memory in consumer devices, entertainment equipment and other embedded IT systems. It also offers a new layer of the storage hierarchy in servers and client computers that has key advantages — space, heat, performance and ruggedness among them. Unlike RAM, the main memory in servers and PCs, flash memory is persistent even when power is removed. In that way, it looks more like disk drives where information is placed and must survive power-downs and reboots. Given the cost premium, simply building solid state disk drives from flash will tie up that valuable space on all the data in a file or entire volume, while a new explicitly addressed layer, not part of the file system, permits targeted placement of only the high-leverage items of information that need to experience the mix of performance and persistence available with flash memory.

Ubiquitous Computing. The work of Mark Weiser and other researchers at Xerox's PARC paints a picture of the coming third wave of computing where computers are invisibly embedded into the world. As computers proliferate and as everyday objects are given the ability to communicate with RFID tags and their successors, networks will approach and surpass the scale that can be managed in traditional centralized ways. This leads to the important trend of imbuing computing systems into operational technology, whether done as calming technology or explicitly managed and integrated with IT. In addition, it gives us important guidance on what to expect with proliferating personal devices, the effect of consumerization on IT decisions, and the necessary capabilities that will be driven by the pressure of rapid inflation in the number of computers for each person.

Fabric-Based Infrastructure and Computers. A fabric-based computer is a modular form of computing where a system can be aggregated from separate building-block modules connected over a fabric or switched backplane. In its basic form, a fabric-based computer comprises a separate processor, memory, I/O, and offload modules (GPU, NPU, etc.) that are connected to a switched interconnect and, importantly, the software required to configure and manage the resulting system(s). The fabric-based infrastructure (FBI) model abstracts physical resources — processor cores, network bandwidth and links and storage — into pools of resources that are managed by the Fabric Resource Pool Manager (FRPM), software functionality. The FRPM in turn is driven by the Real Time Infrastructure (RTI) Service Governor software component. An FBI can be supplied by a single vendor or by a group of vendors working closely together, or by an integrator — internal or external.
  • Reference/Source: gartner.com | Analysts Examine Latest Industry Trends During Gartner Symposium/ITxpo, October 17-21, in Orlando

Monday, November 29, 2010

Most Antivirus companies have already released their latest software, the 2011 version of their antivirus software. Since the numbers of viruses over the internet are exceeding to the unbearable limits, antivirus companies are aggressively working on their antivirus programs to provide the best security and thus making their way in the top ten antivirus 2011 worldwide. It was extremely interesting to test various antivirus software on our lab computers. We infected our computer systems to fully test the capabilities of these antivirus programs. Among the best we found are the Norton antivirus, Bitdefender, F-Secure, ESET Nod32 and Kaspersky antivirus 2011. While Norton antivirus 2011 continues to be the best antivirus software, Kaspersky is still the best antivirus and security software manufacturer for business computers. Bitdefender and F-Secure are both good for home and business computers.

Here are the much awaited results. We have already tested these antivirus software and so far, this is the most comprehensive and best “top ten antivirus 2011″ review on the internet! If you plan to buy any of these software, you can check for antivirus coupons to save money on these top ten antivirus 2011 programs.


Antivirus Speed Stealth Configuration Price
BitDefender Antivirus 2011
Review | Download
ranks ranks ranks ranks
Norton Antivirus 2011
Review | Download
ranks ranks ranks ranks
F-Secure Antivirus 2011
Review | Download
ranks ranks ranks ranks
ESET NOD32 Antivirus 4
Review | Download
ranks ranks ranks ranks
Kaspersky Antivirus 2011
Review | Download
ranks ranks ranks ranks
TrendMicro Antivirus 2011
Review | Download
ranks ranks ranks ranks
Panda Antivirus 2011
Review | Download
ranks ranks ranks ranks
AVG Antivirus 2011
Review | Download
ranks ranks ranks ranks
ZoneAlarm Antivirus 2011
Review | Download
ranks ranks ranks ranks
G Data Antivirus 2011
Review | Download
ranks ranks ranks ranks




Top Ten Antivirus 2011 Testing

To rate the top ten antivirus 2011 a strong criteria is used. The antivirus software are measured on various factors like technology, stealth, speed, price, support, configuration, ease of use and more. As we move on with time, speed keeps becoming even more important factor. Also, pricing is another major factor that we included while ranking the top ten antivirus 2011 software. The list of best antivirus software 2011 is quite long. We considered the following antivirus software list to come up with the top ten antivirus 2011.


  • BitDefender Antivirus 2011
  • Norton Antivirus 2011
  • F-Secure Antivirus 2011
  • ESET NOD32 Antivirus 4
  • Kaspersky Antivirus 2011
  • TrendMicro Titanium Security
  • Panda Antivirus 2011
  • AVG Antivirus 2011
  • G Data Antivirus 2011
  • ZoneAlarm Antivirus 2011
  • Vipre Antivirus 2011
  • McAfee Antivirus Plus 2011
  • CA Antivirus 2011
  • Avanquest SystemSuite 11 Professional
  • Avira Antivir Premium 2011
  • Sophos Endpoint Security 2011
  • Comodo Antivirus 2011
  • PC Tools Spyware Doctor with Antivirus 2011
  • Quick Heal Antivirus 2011
  • Microsoft Security Essentials 2011
These are some of the best-of-the-best antivirus software and we have selected the top ten antivirus 2011 out of these antivirus programs. These security software were tested on various factors. Some of the factors we considered to judge these antivirus software are:
  • Speed – Antivirus software should be fast. Only the fastest antivirus will make for the top ten list.
  • Price – Antivirus software should be cheaper. The last thing we want is an expensive piece of software.
  • Stealth – Antivirus software should be able to detect and remove all virus, spyware and malicious codes.
  • Configuration – Antivirus software should be easy to configure and easy to run scans.
  • Updates – Updates should be regular and should not interrupt a user.
  • Real-time – Antivirus programs should provide real-time scanning options to detect and block real-time threats.
  • Support – Antivirus Companies should provide adequate after-sale support, related to the product.
These are just a few factors that have been considered while ranking the top ten antivirus 2011 software. Based on these factors, we have provided our lab test results. What do you think about this list of top 10 antivirus 2011?
| Reference/Source: devduff.com