Amazon Web Services Goes Zocalo
Amazon Web Services (AWS) has announced two much-needed boosts to its fledgling Zocalo productivity platform, making the service mobile and allowing for file capacities of up to 5TB.
The service, which is designed to do what Drive does for Google and what Office 365 does for software rental, has gained mobile apps for the first time as Zocalo appears on the Google Play store and Apple App Store.
Amazon also mentions availability on the Kindle store, but we’re not sure about that bit. We assume it means the Amazon App Store for Fire tablet users.
The AWS blog says that the apps allow the user to “work offline, make comments, and securely share documents while you are in the air or on the go.”
A second announcement brings Zocalo into line with the AWS S3 storage on which it is built. Users will receive an update to their Zocalo sync client which will enable file capacities up to 5TB, the same maximum allowed by the Amazon S3 cloud.
To facilitate this, multi-part uploads will allow users to carry on an upload from where it was after a break, deliberate or accidental.
Zocalo was launched in July as the fight for enterprise storage productivity hots up. The service can be trialled for 30 days free of charge, offering 200GB each for up to 50 users.
Rival services from companies including the aforementioned Microsoft and Google, as well as Dropbox and Box, coupled with aggressive price cuts across the sector, have led to burgeoning wars for the hearts and minds of IT managers as Microsoft’s Office monopoly begins to wane.
Should Encryption Be The Norm?
Encryption should be a matter of priority and used by default. That’s the message from the Internet Architecture Board (IAB), the worldwide body in charge of the internet’s technology infrastructure.
The IAB warned in a statement that “the capabilities and activities of attackers are greater and more pervasive than previously known”.
It goes on to say: “The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default.
“We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic.”
The purpose, the IAB claims, is to instill public trust in the internet after the myriad high-profile cases in which computer traffic has been intercepted, ranging from bank details to email addresses and all points in between.
The news will be unwelcome to the security services, which have repeatedly objected to initiatives such as the default encryption in iOS8 and Android L, claiming that it is in the interest of the population to retain the right to intercept data for the prevention of terrorism.
However, leaked information, mostly from files appropriated by rogue NSA contractor Edward Snowden, suggests that the right of information interception is abused by security services including the UK’s GCHQ.
These allegations include the collection of irrelevant data, the investigation of cold cases not in the public interest, and the passing of pictures of nude ladies to colleagues.
Amazon Intel Zeon Inside
Amazon has become the latest vendor to commission a customized Xeon chip from Intel to meet its exact compute requirements, in this case powering new high-performance C4 virtual machine instances on the AWS cloud computing platform.
Amazon announced at the firm’s AWS re:Invent conference in Las Vegas that the latest generation of compute-optimized Amazon Elastic Compute Cloud (EC2) virtual machine instances offer up to 36 virtual CPUs and 60GB of memory.
“These instances are designed to deliver the highest level of processor performance on EC2. If you’ve got the workload, we’ve got the instance,” said AWS chief evangelist Jeff Barr, detailing the new instances on the AWS blog.
The instances are powered by a custom version of Intel’s latest Xeon E5 v3 processor family, identified by Amazon as the Xeon E5-2666 v3. This runs at a base speed of 2.9GHz, and can achieve clock speeds as high as 3.5GHz with Turbo boost.
Amazon is not the first company to commission a customized processor from Intel. Earlier this year, Oracle unveiled new Sun Server X4-4 and Sun Server X4-8 systems with a custom Xeon E7 v2 processor.
The processor is capable of dynamically switching core count, clock frequency and power consumption without the need for a system level reboot, in order to deliver an elastic compute capability that adapts to the demands of the workload.
However, these are just the vendors that have gone public; Intel claims it is delivering over 35 customized versions of the Intel Xeon E5 v3 processor family to various customers.
This is an area the chipmaker seems to be keen on pursuing, especially with companies like cloud service providers that purchase a great many chips.
“We’re really excited to be working with Amazon. Amazon’s platform is the landing zone for a lot of new software development and it’s really exciting to partner with those guys on a SKU that really meets their needs,” said Dave Hill, senior systems engineer in Intel’s Datacenter Group.
Also at AWS re:Invent, Amazon announced the Amazon EC2 Container Service, adding support for Docker on its cloud platform.
Currently available as a preview, the EC2 Container Service is designed to make it easy to run and manage distributed applications on AWS using containers.
Customers will be able to start, stop and manage thousands of containers in seconds, scaling from one container to hundreds of thousands across a managed cluster of Amazon EC2 instances, the firm said.
Self-Healing Software On The Way
Researchers at the University of Utah have developed self-healing software that detects, expunges and protects against malware in virtual machines.
Called Advanced Adaptive Applications (A3), the software suite was created in collaboration with US defence contractor Raytheon BBN over a period of four years.
It was funded by DARPA through its Clean-Slate Design of Resilient, Adaptive, Secure Hosts programme, and was completed in September, Science Daily reported on Thursday.
A3 features “stackable debuggers”, a number of debugging applications that cooperate to monitor virtual machines for indications of unusual behaviour.
Instead of checking computer object code against a catalogue of known viruses and other malware, the A3 software suite can detect the operation of malicious code heuristically, based on the types of function it attempts.
Once the A3 software detects malicious code, it can apparently suspend the offending process or thread – stopping it in its tracks – repair the damage and remove it from the virtual machine environment, and learn to recognise that piece of malware to prevent it entering the system again.
The self-healing software was developed for military applications to support cyber security for mission-critical systems, but it could also be useful in commercial web hosting and cloud computing operations.
If malware gets into such systems, A3 software could detect and repair the attack within minutes.
The university and Raytheon demonstrated the A3 software suite to DARPA in September by testing it against the notorious Shellshock exploit known as the Bash Bug.
A3 detected and repaired the Shellshock attack on a web server within four minutes. The project team also tested A3 successfully on another six examples of malware.
Eric Eide, the research associate professor of computer science who led the A3 project team along with computer science associate professor John Regehr, said: “It’s pretty cool when you can pick the Bug of the Week and it works.”
The A3 self-healing software suite is open source, so it’s free for anyone to use, and the university researchers would like to extend its applicability to cloud computing environments and, perhaps eventually, end-user computing.
Professor Eide said: “A3 technologies could find their way into consumer products someday, which would help consumer devices protect themselves against fast-spreading malware or internal corruption of software components. But we haven’t tried those experiments yet.”
New Malware Targeting Apple Devices
Comments Off on New Malware Targeting Apple Devices
Palo Alto Networks Inc has uncovered a new group of malware that can infect Apple Inc’s desktop and mobile operating systems, underscoring the increasing sophistication of attacks on iPhones and Mac computers.
The “WireLurker” malware can install third-party applications on regular, non-jailbroken iOS devices and hop from infected Macs onto iPhones through USB connector-cables, said Ryan Olson, intelligence director for the company’s Unit 42 division.
Palo Alto Networks said on Wednesday it had seen indications that the attackers were Chinese. The malware originated from a Chinese third-party apps store and appeared to have mostly affected users within the country.
The malware spread through infected apps uploaded to the apps store, that were in turn downloaded onto Mac computers. According to the company, more than 400 such infected apps had been downloaded over 350,000 times so far.
It’s unclear what the objective of the attacks was. There is no evidence that the attackers had made off with anything more sensitive than messaging IDs and contacts from users’ address books, Olson added.
But “they could just as easily take your Apple ID or do something else that’s bad news,” he said in an interview.
Apple, which Olson said was notified a couple weeks ago, did not respond to requests for comment.
Once WireLurker gets on an iPhone, it can go on to infect existing apps on the device, somewhat akin to how a traditional virus infects computer software programs. Olson said it was the first time he had seen it in action. “It’s the first time we’ve seen anyone doing it in the wild,” he added.
Adobe Eases Privacy Concerns
November 14, 2014 by admin
Filed under Around The Net
Comments Off on Adobe Eases Privacy Concerns
Tests on the latest version of Adobe System’s e-reader software reveals the company is now collecting less data following a privacy-related row last month, according to the Electronic Frontier Foundation.
Digital Editions version 4.0.1 appears to only collect data on e-books that have DRM (Digital Rights Management), wrote Cooper Quintin, a staff technologist with the EFF. DRM places restrictions on how content can be used with the intent of thwarting piracy.
Adobe was criticized in early October after it was discovered Digital Editions collected metadata about e-books on a device, even if the e-books did not have DRM. Those logs were also sent to Adobe in plain text.
Since that data was not encrypted, critics including the EFF contended it posed major privacy risks for users. For example, plain text content could be intercepted by an interloper from a user who is on the same public Wi-Fi network.
Adobe said on Oct. 23 it fixed the issues in 4.0.1, saying it would not collect data on e-books without DRM and encrypt data that is transmitted back to the company.
Quintin wrote the EFF’s latest test showed the “only time we saw data going back to an Adobe server was when an e-book with DRM was opened for the first time. This data is most likely being sent back for DRM verification purposes, and it is being sent over HTTPS.”
If an e-book has DRM, Adobe may record how long a person reads it or the percentage of the content that is read, which is used for “metered” pricing models.
Other technical metrics are also collected, such as the IP address of the device downloading a book, a unique ID assigned to the specific applications being used at the time and a unique ID for the device, according to Adobe.
IBM To Offer Assistance To Battle Ebola
Comments Off on IBM To Offer Assistance To Battle Ebola
IBM is helping to contain the Ebola outbreak with tracking software that acts as a platform for sharing information about the disease.
Backed by supercomputer-powered, cloud-based software, IBM’s communications and data analysis system allows African citizens to communicate their concerns and report cases of the virus with voice calls or toll-free SMS directly to the government.
The data from the messages and locations can then be used by government agencies and health bodies to mobilise resources where they are most needed across the country.
It can also be used to find specific regions with growing numbers of suspected Ebola cases which require urgent supplies, as well as speeding up response times for body collection and burial.
The software was set up via a partnership between IBM’s recently established Africa research lab and Sierra Leone’s Open Government Initiative.
IBM’s chief scientist at the African research centre, Dr Uyi Stewart, said that the firm saw the need to quickly develop a system to enable communities directly affected by Ebola to provide valuable insight about how to fight it.
“Using mobile technology, we have given them a voice and a channel to communicate their experiences directly to the government,” he said.
Affected countries such as Sierra Leone have already benefited from the system, which has seen expedited deliveries of essential items such as soap and electricity.
The system also takes advantage of radio broadcasts to encourage people to get in touch and express their opinions about the outbreak. The general public are being alerted to the entire programme via this medium.
“Radio is a powerful medium in Africa but its potential to gather and analyse audience feedback has not been fully seized,” added Dr Sharath Srinivasan, director of the Centre of Governance and Human Rights at Cambridge University.
“We are working with IBM to offer people across Sierra Leone a channel to voice their opinions and, crucially, to ensure that the data is rapidly analysed and turned into valuable insight about the effectiveness of public service announcements and possible public misconceptions about Ebola.”
IBM said it is currently looking to extend the work to analyse mobile phone signal data in order to monitor and track population movement, enabling scientists to map and predict the spread of disease.
Last week, it emerged that cyber criminals have been taking advantage of the recent Ebola outbreak to trick unsuspecting web users into downloading malware sent in emails that purport to come from the World Health Organisation (WHO).
Uncovered by security researchers at Trustwave, the malware was flagged when it appeared that criminals had crafted bogus WHO emails encouraging people to open a .RAR attachment to find out how they can protect themselves against Ebola.
HP’s Helion Goes Commercial
HP has announced general availability of its Helion OpenStack cloud platform and Helion Development Platform based on Cloud Foundry.
The Helion portfolio was announced by HP earlier this year, when the firm disclosed that it was backing the OpenStack project as the foundation piece for its cloud strategy.
At the time, HP issued the HP Helion OpenStack Community edition for pilot deployments, and promised a full commercial release to follow, along with a developer platform based on the Cloud Foundry code.
HP revealed today that the commercial release of HP Helion OpenStack is now available as a fully supported product for customers looking to build their own on-premise infrastructure-as-a-service cloud, along with the HP Helion Development platform-as-a-service designed to run on top of it.
“We’ve now gone GA [general availability] on our first full commercial OpenStack product and actually started shipping it a couple of weeks ago, so we’re now open for business and we already have a number of customers that are using it for proof of concept,” HP’s CloudSystem director for EMEA, Paul Morgan said.
Like other OpenStack vendors, HP is offering more than just the bare OpenStack code. Its distribution is underpinned by a hardened version of HP Linux, and is integrated with other HP infrastructure and management tools, Morgan said.
“We’ve put in a ton of HP value add, so there’s a common look and feel across the different management layers, and we are supporting other elements of our cloud infrastructure software today, things like HP OneView, things like our Cloud Service Automation in CloudSystem,” he added.
The commercial Helion build has also been updated to include Juno, the latest version of the OpenStack framework released last week.
Likewise, the HP Helion Development Platform takes the open source Cloud Foundry platform and integrates it with HP’s OpenStack release to provide an environment for developers to build and deploy cloud-based applications and services.
HP also announced an optimised reference model for building a scalable object storage platform based on its OpenStack release.
HP Helion Content Depot is essentially a blueprint to allow organisations or service providers to put together a highly available, secure storage solution using HP ProLiant servers and HP Networking hardware, with access to storage provided via the standard OpenStack Swift application programming interfaces.
Morgan said that the most interest in this solution is likely to come from service providers looking to offer a cloud-based storage service, although enterprise customers may also deploy it internally.
“It’s completely customisable, so you might start off with half a petabyte, with the need to scale to maybe 2PB per year, and it is a certified and fully tested solution that takes all of the guesswork out of setting up this type of service,” he said.
Content Depot joins the recently announced HP Helion Continuity Services as one of the growing number of solutions that the firm aims to offer around its Helion platform, he explained. These will include point solutions aimed at solving specific customer needs.
The firm also last month started up its HP Helion OpenStack Professional Services division to help customers with consulting and deployment services to implement an OpenStack-based private cloud.
Pricing for HP Helion OpenStack comes in at $1,200 per server with 9×5 support for one year. Pricing for 24×7 support will be $2,200 per server per year.
“We see that is very competitively priced compared with what else is already out there,” Morgan said.
China Using Home Servers Admidst Cyber Concerns
Comments Off on China Using Home Servers Admidst Cyber Concerns
A Chinese firm has developed the country’s first homegrown servers, built entirely out of domestic technologies including a processor from local chip maker Loongson Technology.
China’s Dawning Information Industry, also known as Sugon, has developed a series of four servers using the Loongson 3B processor, the country’s state-run Xinhua News Agency reported Thursday.
“Servers are crucial applications in a country’s politics, economy, and information security. We must fully master all these technologies,” Dawning’s vice president Sha Chaoqun was quoted as saying.
The servers, including their operating systems, have all been developed from Chinese technology. The Loongson 3B processor inside them has eight cores made with a total of 1.1 billion transistors built using a 28-nanometer production process.
The Xinhua report quoted Li Guojie, a top computing researcher in the country, as saying the new servers would ensure that the security around China’s military, financial and energy sectors would no longer be in foreign control.
Dawning was contacted on Friday, but an employee declined to offer more specifics about the servers. “We don’t want to promote this product in the U.S. media,” she said. “It involves propriety intellectual property rights, and Chinese government organizations.”
News of the servers has just been among the ongoing developments in China for the country to build up its own homegrown technology. Work is being done on local mobile operating systems, supercomputing, and in chip making, with much of it government-backed. Earlier this year, China outlined a plan to make the country into a major player in the semiconductor space.
But it also comes at a time when cybersecurity has become a major concern for the Chinese government, following revelations about the U.S. government’s own secret surveillance programs. “Without cybersecurity there is no national security,” declared China’s Xi Jinping in March, as he announced plans to turn the country into an “Internet power.”
Two months later, China threatened to block companiesfrom selling IT products to the country if they failed to pass a new vetting system meant to comb out secret spying programs.
Dawning, which was founded using local government-supported research, is perhaps best known for developing some of China’s supercomputers. But it also sells server products built with Intel chips. In this year’s first quarter, it had an 8.7 percent share of China’s server market, putting it in 7th place, according to research firm IDC.
Is Unity Up to Something Big?
Earlier today Unity Technologies caused quite a stir in the games industry with the announcement that former Electronic Arts chief exec John Riccitiello would be taking over the CEO job for David Helgason. While EA struggled to make shareholders happy, Unity has been seeing tremendous growth, becoming a favorite toolset for large and small publishers and especially indies. In fact, the company serves over 600,000 monthly developers. But what does Unity really have up its sleeve? Is the hiring of a notable leader like Riccitiello a sign that the company is indeed being groomed for a buyout or public offering?
“John Riccitiello’s corporate moves will rightfully inspire speculation about major changes in the companies involved and as Unity is the dominant independent development platform, what happens next could affect most developers and publishers outside of the top ten,” remarked independent analyst Billy Pidgeon. “An acquisition is very possible although Unity CTO Joachim Ante has denied this. Unity needs to be independent and available to all to retain and grow its value, so a sale to a major publisher or developer would sharply decrease the company’s revenue flow. But a buyer outside the industry could allow Unity to remain somewhat independent, although clients might be wary of doing business with Unity’s new owner.”
EEDAR’s Patrick Walker, head of insights and analytics, largely agreed with Pidgeon, commenting, “While the stature of Riccitiello as a hire and his interest in helming the Unity ship suggest that there are big plans in the works for the company, it is unlikely that these plans are focused on the short term, such as preparation for a near-term buyout. A buyout has been rumored for a while, and the Unity executive team, including founder David Helgason and CTO Joachim Ante, has been consistent in their messaging statement focusing on the company mission rather than pursuit of a buyout. More likely, Riccitiello is being brought on board to spur growth for a longer-term play, such as an eventual IPO or larger-scale buyout.”
Regardless of whether a longer-term buyout is in the cards, Riccitiello has the experience to help accelerate Unity’s growth in the next few years, most believe.
“Unity is a well-positioned company with several paths to increase growth. While game publishing is one route to spur growth, there is also an opportunity for the company to leverage the strengths, such as cross-platform flexibility, that have given it such broad penetration in the indie market to increase penetration in other development verticals,” Walker continued. “Riccitiello has an ideal background, having led major companies both inside and outside the games industry and having served on the Unity board for the past year, to drive partnerships that will help grow Unity as a major development platform across the full spectrum of publishers and developers.”
Wedbush Securities’ Michael Pachter added, “He is certainly capable of leading them, and also well equipped to sell the company. [But] I don’t know the reason for the change.”
Perhaps one major reason for the change is to offload some of the business responsibility from Helgason who may wish to focus more on product development.
“Unity has been growing quickly for several years. The company now has over 300 employees and its technology is being used by hundreds of thousands of developers on practically every platform out there. I suspect that Dave recognized some time ago that the company had to get an experienced business manager at the helm or risk flying off the rails at some point, and that’s exactly what JR is,” observed Lewis Ward, IDC’s gaming research director.
“Some people just aren’t cut out to be CEOs of big businesses – just look at Notch. I suspect that Dave is going to be happier staying focused on the core product strategy and building relationships with studios and indie developers. From JR’s perspective, it’s a great opportunity to ride the beast that has been Unity growth over the past 3+ years. It’s a remarkable story, and I think John is probably going to enjoy the role and stepping back into an important spotlight in the industry.”