ARAX (Asynchronous Ruby and XML)

ARAX (Asynchronous Ruby and XML) is a development tool created for Silverlight, Microsoft's competitor for Adobe Flash and similar Web technologies. ARAX allows developers who prefer the open source, object-oriented Ruby programming language to create interactive applications similar to those created in AJAX (Asynchronous JavaScript and XML) but without requiring JavaScript.

Here's how John Lam, creator of Microsoft's IronRuby project, explains the purpose of ARAX:
If you're a Ruby programmer and you like Ruby as a language, context-switching into JavaScript is just something you have to do. It's a tax. You're trading productivity away arbitrarily because that's just what runs in the browser. And it's much more interesting when you can run the same language on both sides [the client and the server] so you don't have to do that context switch.
ARAX enables Silverlight developers using Ruby to bypass the Ruby JavaScript (RJS) utility when building applications in the Ruby on Rails framework. Bypassing RJS eliminates the need to translate Ruby code into JavaScript so that an application can run in a Web browser.
ARAX was introduced in May 2008 at RailsConf, a conference for Ruby on Rails developers. APAX, a similar language that replaces Ajax's JavaScript with Python, was introduced at the same conference.

Source: www.whatis.techtarget.com

More sites to visit... Shared Pool Amazing Davao Tribu Hagtik A Day Called Today Davao Life

Platform as a Service (PaaS)



Platform as a Service (PaaS) is a paradigm for delivering operating systems and associated services over the Internet without downloads or installation. PaaS is sometimes called "cloudware" because it moves resources from privately owned computers into the Internet "cloud." Platform as a Service (PaaS) is an outgrowth of Software as a Service (SaaS), a software distribution model in which applications are hosted by a vendor or service provider and made available to customers over the Internet.

Ning.com, Google, Microsoft, Salesforce.com and Amazon are all offering some form of PaaS

Long Term Evolution (LTE)



Long Term Evolution (LTE) is a 4G wireless broadband technology developed by the Third Generation Partnership Project (3GPP), an industry trade group. 3GPP engineers named it "Long Term Evolution" because it represents the next step in a progression from GSM, a 2G standard, to UMTS, the 3G technologies based upon GSM. LTE provides significantly increased peak data rates, with the potential for 100 Mbps downstream and 30 Mbps upstream, reduced latency, scalable bandwidth capacity, and backwards compatibility with existing GSM and UMTS technology. Future developments could yield peak throughput on the order of 300 Mbps.

The upper layers of LTE are based upon TCP/IP, which will likely result in an all-IP network similar to the current state of wired communications. LTE will support mixed data, voice, video and messaging traffic. LTE uses OFDM (Orthogonal Frequency Division Multiplexing) and, in later releases, MIMO (Multiple Input Multiple Output) antenna technology similar to that used in the IEEE 802.11n wireless local area network (WLAN) standard. The higher signal to noise ratio (SNR) at the receiver enabled by MIMO, along with OFDM, provides improved coverage and throughput, especially in dense urban areas.

LTE is scheduled to be launched commercially in 2010 by Verizon Wireless and AT&T Wireless. T-Mobile and Alltel have also announced plans to roll out 4G capabilities based on LTE. These networks will compete with Clearwire's WiMAX for both enterprise and consumer broadband wireless customers. Outside of the US telecommunications market, GSM is the dominant mobile standard, with more than 80% of the world's cellular phone users. As a result, HSDPA and then LTE are the likely wireless broadband technologies of choice for most users. Nortel and other infrastructure vendors are focusing significant research and development efforts on the creation of LTE base stations to meet the expected demand. When implemented, LTE has the potential to bring pervasive computing to a global audience, with a wire-like experience for mobile users everywhere.

Source: www.whatis.techtarget.com

More sites to visit... Shared Pool Amazing Davao Tribu Hagtik A Day Called Today

Impact-based Advertising



Impact-based advertising is a form of advertising designed to have a lasting psychological effect on viewers so they will remember the product or vendor. This approach can help advertising produce the greatest results for a given expenditure.

Impact-based advertising is often contrasted with impression-based advertising, which is focused on the number of times that an ad is seen and does not differentiate between segments of the audience. Impact-based advertising seeks to give the user something of value, whether that is entertainment or information, and create a positive association with the product or service advertised.

On the Internet, impact-based advertising applies mainly to Web-based content although it can take the form of marketing email messages. With the increasing availability of high-speed Internet connections, sophisticated Web-based ads have become practical. A good example is a video that plays while the viewer looks at a Web page. Such videos often have distracting features such as handsome heroes, dancing dogs, crashing cars or marauding monsters.

When an advertiser wants to maximize the impact of an ad, the placement of the ad is a critical consideration. Effective ad locations are in transitional Web pages or in pages that viewers are likely to look at for a sustained period of time. Some advertisers use pop-ups that block desired content or pop-unders that remain on the screen even after the user exits the browser. However, many Web users find these tactics annoying and may react to them negatively.
Ads that come between users and the content they have requested are a form of interruption marketing, a category that also includes telemarketing calls during the dinner hour and commercials during your favorite television show. According to a report from IBM, The End of Advertising as We Know It, the advertising world will go through more change in the next five years than it did in the previous 50. An increasing trend towards impact-based and permission-based marketing is expected to be a part of that change.

More sites to visit... Shared Pool Amazing Davao Tribu Hagtik A Day Called Today

Windows 7



Windows 7 is the working name for the successor to the Microsoft Windows Vista operating system. The new OS, expected to be released somewhere between mid-2009 and early 2010, was previously known by the code names Blackcomb and Vienna.

The new operating system will ship in client and server versions. The client version will be available in 32-bit and 64-bit editions. The server version, also called Windows 2008, will be available only in a 64-bit edition.

Windows 7 is expected to incorporate a new version of Media Center as well as support for multiple video adapters. Other anticipated new features include:
  • Gadgets integrated into Windows Explorer
  • Improved network connections
  • Integrated XML Paper Specification (XPS) Essentials Pack
  • Enhanced Control Panel
  • Enhanced Calculator program with statistics and unit conversion capabilities
  • Ability to store Internet Explorer settings on a Windows Live account
  • Updated version of the Paint program
  • Updated version of the WordPad program
  • A new Mapping program
  • A new Virtual Piano program

Source: www.whatis.techtarget.com

More sites to visit... Shared Pool Amazing Davao Tribu Hagtik A Day Called Today

NBAR (Network Based Application Recognition)



Network Based Application Recognition (NBAR) is a mechanism that classifies and regulates bandwidth for network applications to ensure that available resources are utilized as efficiently as possible. Cisco Systems developed NBAR as part of its Content Networking platform for implementing intelligent network services.

NBAR allows network routers to recognize programs and take various actions based on that information. For example, a router might allocate all necessary bandwidth for mission-critical applications or flag low-priority, bandwidth-intensive applications for bandwidth throttling. The network administrator can view the mix of applications in use by the network at any given time and decide how much bandwidth to allow each application. (This regulation process is called bandwidth policing.)

Other capabilities of NBAR include:
  • Optimizing multiple-service performance.
  • Eliminating data-flow bottlenecks.
  • Minimizing latency.
  • Reducing or blocking spam.
  • Detecting and blocking malware.
  • Enhancing network security.
  • Easy addition of new protocols.
  • Reducing expenses and maximizing revenue.
One real-life example of NBAR in use was during the Code Red worm attacks of 2001. Most firewalls couldn't look into the HTTP data stream to identify Code Red traffic. However, implementation of NBAR made it possible to identify the suspect traffic and block access.

Source: www.whatis.techtarget.com

More sites to visit... Shared Pool Amazing Davao Tribu Hagtik A Day Called Today

Write In C

For all programmers out there who loves C programming language, this song is for you!
The melody of this song is similar to John Lenon’s “Let It Be…”

Write In C

When I find my code in tons of trouble;Friends and colleagues come to me;
Speaking words of wisdom;
Write in C;

As the deadline fast approaches;
And bugs are all that I can see;
Somewhere, someone whispers;
Write in C;

Write in C, Write in C;
Write in C, oh, Write in C;
COBOL’s dead and buried;
Write in C;

I used to write a lot of FORTRAN;
For science it worked flawlessly;
Try using it for graphics;
Write in C;

If you’ve just spent nearly 30 hours;
Debugging some assembly;
Soon you will be glad to
Write in C;

Write in C, Write in C;
Write in C, yeah, Write in C;
BASIC’s not the answer;
Write in C;

Write in C, Write in C;
Write in C, oh, Write in C;
Pascal won’t quite cut it;
Write in C;



More sites to visit... Shared Pool Amazing Davao Tribu Hagtik A Day Called Today

Softcooling

Softcooling is a software-based method of computer component cooling, conducted either by adjusting component settings or by using softcooling products. The practice reduces system heat by decreasing the power used by the CPU, graphics card and motherboard when the computer is idle or under light use.

Softcooling typically reduces component power consumption by one or a combination of three methods:
  • Undervolting: setting the processor core voltage lower than the default value specified by the manufacturer.
  • Underclocking: setting the processor speed lower than that specified by the manufacturer. (This is the opposite of overclocking.)
  • Controlling halt instructions: turning off inactive components or putting them in standby mode.
A home user might use softcooling to improve hardware function. For example, undervolting a laptop can keep it cooler and extend battery life. In a data center, softcooling can reduce power costs and help control ambient temperature. The practice can also save hardware and maintenance costs: Computer parts that overheat usually have a shorter life span and may not work reliably. Network administrators can install softcooling software on both servers and desktops. As a rule, the end user should not be aware of any reduction in computing power.

source: www.whatis.techtarget.com

More sites to visit... Shared Pool Amazing Davao Tribu Hagtik

The Lighter Side of Software Development Life Cycle

Those who are designated as Software Engineers will recognize these pictures as their Software Development Life Cycle (SDLC).


More sites to visit... Shared Pool Amazing Davao Tribu Hagtik

Communications-enabled Business Process

Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies. CEBP enables communication between applications as well as between applications and humans to automate many components of business processes. The purpose is to optimize those processes and to ensure continuous, low-latency, real-time communications among the customers, suppliers and employees of an enterprise.

One of the better known CEBP vendors is Avaya Inc. of Basking Ridge, New Jersey, USA. The Avaya CEBP solution consists of a communications process manager, an event processor and software integration services:
  • The communications process manager keeps track of data exchanged by business-related systems, flagging significant events.

  • When an important or unusual event occurs, the event processor brings key players together using unified communications (UC) encompassing all available technologies such as conventional telephone, voice over IP (VoIP), cellular telephone, instant messaging (IM), texting and email.

  • Software integration ensures compatibility among all devices, systems, technologies and programs to minimize conflicts, bottlenecks and delays, allowing decision-makers to do their jobs with a minimum of distraction.


source: www.whatis.techtarget.com

More sites to visit... Shared Pool Amazing Davao Tribu Hagtik

Blu-Ray


Blu-ray is an optical disc format designed to display high definition video and store large amounts of data.

Blu-ray is the successor to DVD. The standard was developed collaboratively by Hitachi, LG, Matsushita (Panasonic), Pioneer, Philips, Samsung, Sharp, Sony, and Thomson. It became the default optical disk standard for HD content and optical data storage after winning a format war with HD-DVD, the format promoted by Toshiba and NEC.

The format is called Blu-ray because of the blue laser used to read from and write to the disc. DVD players use red lasers. The blue laser has a 405 nanometer (nm) wavelength that can focus more tightly than the red laser used for DVD. As a consequence, a Blu-ray disc can store much more data in the same 12 centimeter space. Blu-ray discs will not play on current CD and DVD players, as the players lack the laser required to read the discs. Blu-ray players equipped with multiple laser heads can play CDs and DVDs. Like the rewritable DVD formats, Blu-ray uses phase change technology to enable repeated writing to the disc.

Blu-ray disks have a standard capacity of 27 gigabyte (GB) single-sided capacity and 50 GB on dual-layer discs. Single-sided Blu-ray discs can store up to 13 hours of standard video data, compared to single-sided DVD's 133 minutes Blu-ray also features data streams at 36 megabytes per second (Mbps), fast enough for high quality video recording. In July 2008, Pioneer announced that they had found a way to increase capacity to 500 GB by creating 20-layer discs. These discs are not, however, expected to be commercially available in the near future.

Blu-ray disc players (BDPs) are available from a number of manufacturers, including Panasonic, Pioneer, Samsung and Sony. Sony's Playstation 3 also has a Blu-ray drive installed.

source: www.whatis.techtarget.com

More sites to visit... Shared Pool Amazing Davao Tribu Hagtik

P4P


P4P (proactive provider participation for P2P) is a protocol designed to improve the use of available bandwidth in a P2P network by reducing the overall volume of traffic. The term P2P (peer-to-peer) refers to any transient network on the Internet that allows a geographically dispersed group of end users to directly access files from each other's computers. P4P differs from the traditional P2P protocol by intelligently selecting peers to optimize routing efficiency.

Originally, P2P technology was used for simple file sharing such as text and images. However, in recent years, more bandwidth-hungry applications have evolved such as streaming media, Internet television, full-motion videoconference activity and online gaming. The extensive use of these applications has given rise among some experts to a concern that the Internet might "break under the strain." A major part of the problem is a tendency for traffic among routers to be unevenly distributed, resulting in inefficient routing with unnecessary hops between end users.

P4P minimizes the number of routers and hops involved in media distribution by means of devices called peer trackers and Internet trackers. When a peer has data to send, it queries the peer tracker for available peers in the local network. The peer tracker returns the information, if any is available, to the sending peer. If no local peers are available, the peer tracker queries the Internet tracker for available peers on the larger Internet. The Internet tracker returns a list of active peers to the peer tracker, which in turn provides the information to the original initiating peer. In effect, P4P does "proactive research" to determine the most efficient possible way for data to be routed between end users before any data is actually exchanged.

P4P technology, originally introduced by Verizon, has been shown to increase performance by as much as several hundred percent over traditional P2P. The extent of the improvement in any particular situation depends on the nature of the data to be shared, the overall volume of traffic, the number of routers involved, the available bandwidth and the network topology.

Source: http://whatis.techtarget.com

More sites to visit... Shared Pool Amazing Davao Tribu Hagtik

Drive By Download


A drive-by download is a program that is automatically downloaded to your computer without your consent or even your knowledge. Unlike a pop-up download, which asks for assent (albeit in a calculated manner likely to lead to a "yes"), a drive-by download can be initiated by simply visiting a Web site or viewing an HTML e-mail message. If your computer's security settings are lax, it may be possible for drive-by downloads to occur without any further action on your part.

Frequently, a drive-by download is installed along with a user-requested application. (In this case, the unwanted application is sometimes called a barnacle.) For example, a file sharing program might be included with a spyware program that tracks and reports user information for targeted marketing purposes. An associated adware program can then generate pop-up advertisements using that information.

Xupiter, an Internet Explorer toolbar program, was frequently installed as a drive-by download in the early 2000s. The program replaced a user's home page, changed browser settings, and used a redirect to take all searches to the Xupiter Web site. In some versions, the program initiated drive-by downloads of other programs. Furthermore, although it came with an uninstall utility, Xupiter was quite challenging for the average computer user to remove.

Drive-by downloads continue to be a major security issue online. In April 2007, researchers at Google discovered hundreds of thousands of Web pages that initiated drive-by downloads. One in ten pages was found to be suspect. Sophos researchers in 2008 reported that they were discovering more than 6,000 new infected Web pages every day, or about one every 14 seconds. Many of these infections are connected to botnets, in which each PC is turned into a zombie that may then be directed to further malicious activity, like spam or DDoS attacks

Source: http://whatis.techtarget.com

VAR to VAR


VAR-to-VAR is a business model based on cooperation between value-added resellers (VARs) that allows the companies to obtain professional services and solutions that would not have been accessible to them otherwise.

Successful VAR-to-VAR partnerships expand geographic reach, tap each other's expertise and enhance the brainstorming process. Such cooperative ventures can increase the buying power of both companies and reduce overhead and production cost. By buying in bulk, VAR-to-VAR partnerships are sometimes able to negotiate pricing from suppliers of critical components. VAR-to-VAR partnerships have successfully challenged larger, consolidated enterprises for lucrative contracts when neither of the smaller companies could have done so alone.

VARs tend to be ideal clients for one another because they understand each other's service-related challenges. The ultimate result is good for the end user because it encourages the evolution of the best possible product. Nevertheless, some companies find the VAR-to-VAR paradigm difficult to accept, especially if their past experiences have involved rivalries with other players in their field.

Source: http://whatis.techtarget.com

XNA Game Studio


XNA Game Studio is an integrated development environment (IDE) that includes tools and code development libraries that hobbyists, students and other nonprofessionals can use to create computer games for Microsoft Windows and X-Box 360.
To get started with XNA Game Studio, you'll need to have a basic working knowledge of C# and object-oriented programming (OOP). The basic version of XNA Game Studio, which includes Visual C# 2005 Express, development tools and a runtime environment, is free of charge. Debugging can be done from the Windows desktop. XNA Game Studio does require a Direct 3D video adapter card that can support Shader Model 1.1 or later, along with the latest DirectX runtime updates, so some hardware expense may be involved.

If a programmer wants to develop, debug or play games on an Xbox 360, however, he or she must subscribe to the XNA Creator's Club. Friends or family that want to play a game created with XNA Game Studio on Xbox 360 must also have XNA Game Studio installed on the gaming console, along with the runtime environment and a subscription to creator's club. Games developed with XNA Game Studio cannot be shared using any removable storage medium or burned to disc.

Games created with XNA Game Studio or XNA Game Studio Express for Windows can be sold commercially. Games created for XBox 360, however, are limited to non-commercial use by the Microsoft EULA and technical requirements.

With this initiative, Microsoft hopes to attract developers to create games for Windows and its popular Xbox 360. Programmers that create and upload games to the Creators Club community will have the opportunity to receive up to 70% of the revenue from sales of the applications.

Source: http://whatis.techtarget.com

Virtual Flopply Disk


A virtual floppy disk is an alternative to the traditional floppy that exists as a file rather than physical media. A virtual floppy is mounted to the same drive letter (A:) and accessed in the same way but is actually a disk image stored as a file on the hard drive.

Virtual floppy disks are used for a number of reasons. Although many manufacturers are no longer including floppy drives on computers and fewer retailers are selling floppy disks, some software installation processes still require their use. Other uses include partitioning a hard drive, accessing the command line prompt and transfering files between virtual machines. Some people prefer to use virtual floppies simply because they are easier to manage - there is no physical media to get damaged or lost.
A virtual floppy disk can be created by copying a physical disk to an image file.

There are also a number of programs, such as Diskcopy, Virtual Floppy Drive (VFD) and Floppy Image Creator, that can create a virtual floppy in the absence of a physical disk (or, possibly, the absence of a computer with a floppy disk drive).

Source: http://whatis.techtarget.com

Enlightenment



Enlightenment, also called E, is a popular free and open source (FOSS) windows manager that can serve as a standalone desktop environment. E can also be used along with other desktop environments like KDE and GNOME.

Enlightenment is highly customizable and includes the types of themes and high-end graphics familiar to users of Windows and the Mac OS. Many functions can be performed from the keyboard, without the need for mouse manipulation. The command line-driven mode is said to streamline operation. The portable, user-friendly interface is favored by graphics professionals and sophisticated hobbyists.
The three components of the Enlightenment project are Enlightenment DR16, Englightenment DR17 and the Enlightenment Foundation Libraries.

Carsten 'Rasterman' Haitzler released the first Enlightenment Windows Manager in 1997. Enlightenment DR16 (V.0.16), released in 2000, is still used today. V.16.8.13 was released in May 2008. Enlightenment DR17 (V.0.17), in development, is a complete rewriting of DR16, including a desktop shell. DR17 is expected to enhance graphics quality, improve performance and support new and emerging applications

Source: http://whatis.techtarget.com

Genetic Programming

Lately I was introduced to a new methodology of programming called Genetic Programming. Genetic Programming is a revolutionary algorithm based methodology inspired by biological evolution to find computer programs that performs a user-defined task. It is a specialization of genetic algorithms where each individual is a computer program.

Therefore it is a machine learning technique used to optimize a population of computer programs according to a fitness landscape determined by a program's ability to perform a given computational task.

Genetic Programming involves creating an environment in which tiny computer programs can evolve. This environment, also known as "the Universe", is a breeding pool for programs to pair and swap lines of codes as well as mutating.

In an article posted by NASA, Genetic Algorithms were used in designing high-efficiency antenna for space technology projects. The team were able to produce two designs using GA and was dubbed as the two best designs based on a criteria.

References
Genetic Programming using VB6
Genetic Programming - Wikipedia
Automated Antenna design using Genetic Algorithm

NetBeans 6.5 now in beta release


Good news to all Java guys! NetBeans 6.5 is already available on beta release. The NetBeans IDE is an award-winning Integrated Development Environment available for Windows, Mac, Linux, and Solaris. The NetBeans project consists of an open-source IDE and an application platform which enable developers to rapidly create web, enterprise, desktop, and mobile applications using the Java platform, C/C++, JavaScript, Ruby, Groovy, and PHP. It is supported by a vibrant developer community and offers a diverse selection of third-party plugins. The NetBeans IDE is a must-download for software developers.

Release Overview

The NetBeans IDE 6.5 Beta release provides several new features and enhancements, such as a new IDE-wide QuickSearch shortcut, more user-friendly interface, and automatic Compile on Save. In addition to full support of all Java editions (Java SE, Java EE, Java ME), the NetBeans IDE is the ideal tool for software development with PHP, C/C++, Groovy and Grails, Ruby and Rails, Ajax and JavaScript. The 6.5 release also includes enhanced support for web frameworks (Hibernate, Spring, JSF, JPA), the GlassFish application server, and databases.


Feature Highlights

PHP

  • PHP Editor (Code completion, syntactic and semantic code highlighting)
  • Support for heredoc notation and PHTML
  • Xdebug
  • Generators for MySQL database code snippets

JavaScript and Ajax

  • JavaScript Editor and Debugger
  • JavaScript Library Manager
  • Yahoo UI, Woodstock, jQuery, Dojo, Scriptaculous, Prototype libraries
  • CSS Editor

Java EE & Web Development

  • Enhanced support for Spring, Hibernate, JSF, JSF CRUD generator, JPA (Java Persistence API)
  • Create RESTful web services from database tables or from JPA entities
  • Drag and drop SaaS services into PHP files
  • SQL Editor Improvements (code completion, save/recall queries, and more)

Groovy and Grails

  • Develop pure Groovy apps or use Groovy in Java SE projects
  • Groovy editor (code completion, highlighting, and more)
  • Grails web application framework
  • Open existing Grails applications without adding metadata

Ruby and Rails

  • Rake improvements: Rake Runner and a pre-generated Rake file
  • Debugger: Conditional breakpoints and catchpoints
  • Ruby projects accept JVM options from command line
  • New Test Runner interface for displaying test results

GlassFish v3 Prelude for Web Development

  • Modular, OSGi based architecture
  • Small footprint, fast startup and deployment
  • Support for scripting, including JRuby

C/C++

  • Improved code completion, error highlighting, and semantic highlighting
  • Call graph, Memory window
  • Remote development
  • Packaging of application as tar files, zip files, or SVR4 packages

Java ME

  • New project wizard for adding custom components to the Visual Designer Palette
  • New SVG UI components in the enhanced SVG Composer enable rich UI design
  • New Data Binding Custom Components in the Visual Designer Palette
  • Upgraded obfuscation tool to ProGuard 4.2 and test framework to JMUnit 1.1.0

Java SE

  • Multi-threaded Java debugging
  • Java Swing GUI Builder: TreeModel Editor for JTrees
  • Improved Eclipse project import and synchronization

IDE Tools and Usability

  • One QuickSearch shortcut for IDE actions, files, options, and docs
  • Support for Windows UNC paths (shared network folders)
  • Automatic Compile on Save / Deploy on Save

For more information visit http://www.netbeans.org/community/releases/65/

Heartbeat

Heartbeat is a program that automatically runs specialized scripts whenever a system is initialized or rebooted. Originally designed for two-node Linux-based clusters, Heartbeat is extensible to larger configurations.

In a system running Heartbeat, nodes communicate by exchanging packets called "heartbeats" at the rate of approximately 2 Hz (twice per second). The name of the program comes from the regularity of the packet exchanges.

When Heartbeat is used in a multi-node system, one machine is designated as the primary node and the other as the secondary node. If the primary node fails or requires downtime, the secondary node can take over the primary role. A script called "shoot the other node in the head (STONITH)" shuts down the primary node before the secondary node comes online. STONITH prevents "split-brain" operation, with the consequent risk of file corruption, that could occur if both nodes attempt to play the primary role at the same time.

Heartbeat is commonly bundled with Distributed Replicated Block Device (DRBD), a software component that facilitates the replacement of shared storage systems.

Source: http://whatis.techtarget.com

Honey Monkey


A honey monkey is a program that imitates a human user to lure, detect and identify malicious activity on the Internet.

According to Microsoft, who developed the concept, a honey monkey is an active client-based honey pot. The honey monkey behaves like a highly active and extremely unwary human Internet user, logging onto many suspect websites. The programs detect harmful coding that could jeopardize the security of human visitors.

Certain types of websites are more likely to contain malicious coding, whether by design or as a result of hacking. Favored targets include the home pages of celebrities, sites that offer downloadable music and videos (particularly those that operate in violation of copyright law), pornographic sites and sites with gaming cheat codes. Sophisticated hackers operate according to the principle of "minimizing the effort and maximizing the results." Effective honey monkeys take advantage of the same paradigm, scanning the Web for URLs most likely to be compromised. In some cases, individual hackers can be personally identified.

Microsoft developed a Web patrol system called Strider HoneyMonkeys to detect Web sites that frequently install spyware, Trojans and viruses on the computers of Internet users. Microsoft's system consists of multiple monkey programs running on virtual machines (VMs). Host systems have a range of patch levels to detect specific types of exploits.

In addition to identifying and isolating uniform resource locators (URLs) that propagate malware, a program called Strider Tracer can detect configuration and file changes that occur following an exploit. Using this method, interconnected communities of Web sites have been discovered that use targeted URLs to exploit client-side vulnerabilities on unpatched computers. Once such a site and the nature of its activity has been identified, a patch is generated to counter the threat.

For more information on Honey Monkeys visit Microsoft Research discusses how Strider HoneyMonkeys work. (PDF)

Source: http://whatis.techtarget.com

HTML5

HTML5 is the next generation of HTML. It is a revision of the Hypertext Markup Language, a set of markup tags used in creating web pages. HTML5 was adopted by the World Wide Web Consortium (W3C) in 2007, who published the draft in January 2008.

HTML5 offers several features over its predecessor HTML4 which includes
  • New parsing rules for enhanced flexibility
  • New attributes
  • Elimination of outmoded and redundant attributes
  • Immediate-mode drawing
  • Drag and drop
  • Back button management
  • Timed media playback
  • Offline editing
  • Messaging enhancements
  • Detailed rules for parsing
  • Multipurpose Internet Mail Extensions (MIME) and protocol handler extensions
  • Improved canvass support

HTML5 is designed that older browsers that do not support the new version can ignore its new constructs without affecting the presentation of the web page.

For more information on HTML5 visit http://en.wikipedia.org/wiki/HTML5
Reference http://whatis.techtarget.com

Squid Proxy Server


Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin. Squid supports caching of many different kinds of Web objects, including those accessed through HTTP and FTP. Caching frequently requested Web pages, media files and other content accelerates response time and reduces bandwidth congestion.

A Squid proxy server is generally installed on a separate server than the Web server with the original files. Squid works by tracking object use over the network. Squid will initially act as an intermediary, simply passing the client's request on to the server and saving a copy of the requested object. If the same client or multiple clients request the same object before it expires from Squid's cache, Squid can then immediately serve it, accelerating the download and saving bandwidth.

Internet Service Providers (ISPs) have used Squid proxy servers since the early 1990s to provide faster download speeds and reduce latency, especially for delivering rich media and streaming video. Website operators frequently will use a Squid proxy server as a content accelerator, caching frequently viewed content and easing loads on Web servers. Content delivery networks and media companies employ Squid proxy servers and deploy them throughout their networks to improve the experience of viewers requesting programming, particularly for load balancing and handling traffic spikes for popular content.

Squid is provided as free, open source software and can be used under the GNU General Public License (GPL) of the Free Software Foundation. Squid was originally designed to run on Unix-based systems but can also be run on Windows machines.

Squid was originally an outgrowth from the Harvest Project, an ARPA-funded open source information gathering and storage tool. "Squid" was the code name used to differentiate the project when development in the new direction was initially begun.

For more information on Squid proxy servers visit: http://www.squid-cache.org/

Source: http://whatis.techtarget.com

Setting up Oracle Unbreakable Linux using VMWare


For all you guys who want to experience Oracle Unbreakable Linux without replacing your current OS this is good news. There are several ways in running Linux OS in your PC without removing your current OS,
  1. Using a Live CD - some flavors of Linux OS have Live CDs available. To name a few, we have Knoppix, Ubuntu, Kubuntu, etc... This method allows you to run the OS using the Live CD. Load the CD in your drive and reboot your PC; make sure that your system will boot first from your CD drive, and away you go!
  2. Dual Boot - this method allows you to run two different OS in your PC one at a time. Which means that once the PC starts running, you will be asked to select which OS to run. This method is a lot faster than that of using the Live CD. Just make sure that you know how to perform dual boot installation or your existing OS is history.
  3. Using a Virtual Machine - this method is what I preferred most, but first, you need to install a program that allows you to create virtual machines in your PC. A lot of virtual machine programs are out there - some are free while others are not. I am using VMWare.
Oracle Enterprise Linux is based from Red Had Enterprise Linux, so when I created my virtual machine, I chose Red Hat Enterprise settings to make sure that all the drivers for my Oracle Linux can run. The installation is very straightforward, just read the instructions and choose your preferences and click next!


I am taking my virtual class from www.LinuxBasics.org. Now I can perform the exercises in the course using my preferred Linux flavor. Oracle Unbreakable Linux is available for download for free!

Microsoft Visual Studio Express

Visual Studio Express (VSE) is a freeware version of Microsoft's Visual Studio development environment toolset. VSE is scaled-down but still reasonably functional. Microsoft describes the VSE toolset as "free, lightweight, easy-to-use and easy-to-learn tools for the hobbyist, novice, and student developer."
Microsoft breaks its Visual Studio Express offerings into four overlapping categories, each of which includes its own specific components:
  • Windows Development: Includes Visual Basic 2008 Express Edition, Visual C# 2008 Express Edition, and Visual C++ 2008 Express Edition, a Beginner Developer Learning Center, a Facebook Development Toolkit and a Coding4Fun Developer Pack 2008.
  • Web Development: Includes Visual Web Developer 2008 Express Edition, a Beginner Developer Learning Center and access to the ASP.NET community, as well as a Personal Web Site Starter Kit and the Facebook Development Toolkit.
  • Game Development: Includes Visual Basic 2008 Express Edition, Visual C# 2008 Express Edition, and Visual C++ 2008 Express Edition, the Beginning Game Development series, and some example games (Space Blitz, Rocket Commander).
  • Hardware Development: Includes descriptions of projects for A Disco Dance Floor, various hardware projects that include Xbox 360, a digital camera, a remote control car, Visual Studio Express, and the Microsoft Robotics Studio, along with home automation projects. The three primary programming languages: Visual Basic 2008 Express Edition, Visual C# 2008 Express Edition, and Visual C++ 2008 Express Edition are featured here as well.
You can download VSE on this site: http://www.microsoft.com/express/

Source: www.whatis.com

STI College - Davao 10th Commencement Exercises

Last May 16, 2008. STI College Davao conducted its 10th commencement exercise. The activity was held at the CAP Auditorium, Anda Street, Davao City. The auditorium was filled with excitement as the candidates for graduation from different courses are about to take the next step in their careers.

As as instructor, I was happy seeing my students marched the stage and received their diplomas. Its a happy feeling seeing the them successfully finished their course. I also like the sight of seeing proud parents accompanied their graduates.

To the graduates and parents - Congratulations!

Distribution Mangement System (DMS)

I was invited to attend a product demo on DMS (Distribution Management System). The system was presented by the DMS Group from Serbia. DMS is a program used to manage electric distribution networks. This system provides a schematic and geographic presentation of the electric distribution network. Large DMS systems provide interfaces to SCADA Systems (Supervisory Control and Data Aquisition Systems), GIS (Geographic Information Systems) and OMS (Outage Management Systems). The product demo was conducted by Nenad Katic - the groups sales manager.


DMS Structure

The DMS provides a high-quality realization of all electrical engineering tasks in a DC, including monitoring, operation management and planning, optimization and incidents analyses, control and network development planning. SCADA was one of the first systems developed to enhance distribution automation. It consists of computer software, hardware and telecommunications equipment. SCADA is used for remote monitoring, centralized acquisition of substation data (measuring, alarms and statuses of switches), remote operation of switchgear and remote setting of local control devices (relay protection and voltage/reactive power control).

DMS software consists of DataBase, a DMS server that integrates all components, user interfaces and DMS analytical functions. Many DCs in Serbia and throughout the world now use DMS software produced by the DMS Group Ltd. (Serbia and Montenegro, office@dmsgroup.co.yu.). The system encompasses power analytical calculations and optimization, providing the tools necessary for efficient monitoring, management and design of distribution systems.

The DataBase is a software system necessary for operation of all other DMS software components, as well as for several other DC technical tasks, including maintenance and trouble call management. DataBase is implemented as a Relational Data Base Management System (RDBMS) and consists of three basic parts:

  • Static data (electric parameters, history of the load, state and network topology).

  • Slowly varying data (changes of switchgear statuses, control devices settings).

  • Periodically varying data (values of state variable — measurements, alarms).

DMS Server is implemented as an Object Linking and Embedding (OLE) for Process Control (OPC) server. It integrates a real-time OPC server, an historical OPC server and an ODBC (Open DataBase Connectivity) gateway for DataBase access. The DMS Server provides multi-user operation for a large number of users over the same set of real-time data or DataBase data; open architecture of the system that offers full connectivity with different SCADA systems and DataBases; enhanced support for real-time operation and fully automated control room operations.

User interfaces are the software tools necessary for the application of DMS Software. The most important user interfaces are:

Distribution Network Builder (DNB) is the main front-end application for DB editing. This editor enables efficient editing and overview of all data about the distribution network. It provides a multi-user and user-friendly, fully graphical environment for DB browsing and editing. DNB is capable of editing alphanumeric as well as graphic data — schematic and geographic schemes.


Dynamic Mimic Diagram (DMD) is a multi-user graphical (schematic and geographical) user interface for visualization of the distribution system, and efficient managing and monitoring of the distribution system state. It is a modern replacement for the old wall-diagram schemes. DMD clients are provided with views of distribution network, SCADA view of all substations and technical data on every element.

DMS Analytical Functions System is the most sophisticated component of the DMS. Its foundation is the mathematical model of the distribution network, Network Model. It transforms the distribution network elements (transformers, lines and switchgear) into scaled, normalized equivalent circuits (mathematical models of elements) and graphs. These graphs provide efficient processing of the topology, state and performances of the distribution network. Network Model provides the basic platform for integration and running of all other DMS analytical functions. DMS analytical functions are classified into four groups:

  • Preparatory analytical functions (Network Model, Topology Analyzer, Load Calibration, Load Forecasting).

  • Analytical functions (Load Flow, Fault Calculation, Reliability Analysis, State Estimation, Circuit Breakers/Fuses Capacity, Performance Indices, Motor Start).

  • Basic analytical functions (Under-load Switching, Voltage Control, Relay Protection, Supply Restoration, Network Reconfiguration, Capacitor Placement, Energy Losses, Volt/VAR Control, Switching Sequence Management, Security Assessment, Maintenance Scheduling, Load Management, RTU Placement, Network Reinforcement, Network Development).

  • Composite analytical functions (Operation Improvement, Fault Management, Network Scanner, Dispatcher Training Simulator).


Source: Transmission and Distribution World Magazine

General Public License (GPL)

The GNU General Public License, often shortened for GNU GPL (or simply GPL), lists the terms and conditions for copying, modifying and distributing free software. The GPL was created by Richard Stallman in order to protect GNU software from being made proprietary. It is a specific implementation of his "copyleft" concept. According to Stallman, copyleft is a derivative from copyright law that serves "the opposite of its usual purpose: instead of a means of privatizing software, it means of keeping the software free." (The name was taken from a humorous slogan, "Copyleft -- all rights reversed.")

The first term of the GPL states that programmers may freely copy and distribute verbatim copies of a software program's source code, under the condition that each copy displays a copyright notice, disclaimer warranty, intact GPL notices, and a copy of the GPL. The second term of the GPL, which deals with modification and redistribution of software, requires the same conditions as the first, along with notification of any changes made to the software.

The GPL itself is under the copyright ownership of the Free Software Foundation (FSF), a tax-exempt charity organization founded by Stallman's GNU project in order to generate funding for free software development.

source: www.whatis.com

Java Learning Materials

Lately I was searching the Internet for learning materials on Java and I was brought to this site: www.javapassion.com. This site is maintained by Sang Shin, a Java Technology Architect. The site offers learning materials like presentations, exercises and more.
What I like with this site is that the materials are free for download! You can also take the online course (which is for a price) from this site and at your own pace. Not bad! This site has was created last March 2006, and already has more than 400,000 visits.
There are many sites that offers Java learning materials, but this one looks promising. The presentations are concise and clear. I have added this site in my links. Great work Sang Shin! Keep the Java passion burning!

Instant web searches

Performing web searches can sometimes become lumpy. First you have to type the search provider site (i.e. www.google.com, www.yahoo.com) and type your search key work in the search box.

So what? Thats only two steps. Yes, but step 1 can take longer if your internet connection is slow.
Good thing browsers today have Instant Search boxes. Firefox and Internet Explorer 7 offer this tool.
It allows you to perform web searches using your favorite search provider by entering your search keyword in a textbox within your browser toolbar. You can also choose you provider from a dropdown list and add more providers.

My Instant toolbar contains the following providers Google, Wikipedia and Dictionary.Com and more...

Anti-money Laundering Software (AML)

Anti-money laundering (AML) software is a type of computer program used by financial institutions to analyze customer data and detect suspicious transactions.
AML systems filter customer data, classify it according to level of suspicion and flags it for for inspection for anomalies. Such anomalies include any sudden or substantial increase in funds or a large withdrawal, and structuring - depositing multiple smaller amounts with in a certain period that sums up to a large amount.
The software flags these transaction. The software mines the data and flagged suspect transaction and generate the report, which is evaluated or will be subject for investigation and call the customer, if necessary.

Reference: http://searchfinancialsecurity.techtarget.com

Vista Reliability Monitoring Tool

Since I used Microsoft Vista last year, I have been exploring its features and tools. I am using Microsoft Vista - Ultimate in my laptop which is running on Dual Core 1.73 GHz and 2Gb RAM.

I came across a tool called Reliability Monitoring, which you can find in the Performance Diagnostic Console. There are several ways to run this tool.
  1. Type perfmon in the Search Box and click on the perfmon shortcut when it appears. or
  2. Open the Run Dialog (Windows + R), type perfmon and press Enter. or
  3. Click Start, Control Panel, System and Maintenance, Performance Rating and Tools, Advanced Tools, Open Windows Diagnostic Console.
For the past days my reliability declines rapidly. My Vista has suffered several problems lately like some program not responding.


I think this is a potentially useful tool since it allows you to monitor you systems reliability and performance. It has the ability to track and organize system events such as Software installations, Application Failures, Hardware Failures, Windows Failures and Miscellaneous Failures. This tool provides us useful information how our Vista is been doing and what unpleasant system events it has encountered.

Welcome

Welcome to my site. I hope you enjoy your visit!