Showing posts with label Software. Show all posts
Showing posts with label Software. Show all posts

Tuesday, December 25, 2007

Software errors to delay hybrid drive takeoff

A report from market researcher Objective Analysis predicts that only about 13 million of the hybrid hard disks that incorporate NAND flash for caching key data will ship in 2008 due to software errors.

"Microsoft has a good concept with its ReadyDrive software, but they can't devote attention to it because they have diverted energy to fixing Vista bugs," said Jim Handy, principal of Objective Analysis.

Early benchmarks of the drives have given them mixed results so far, Handy said, indicating performance tuning is needed. "Some of the benchmarks suggest the hybrid drives run some software faster and other software slower," he said.

The new drives, aimed primarily at notebook computers, "will become significant but not next year, and their success is contingent on Microsoft putting adequate attention on the software issues," Handy said.

The firm estimates fewer than one million hybrid drives will ship this year and only about 13 million in 2008. However, shipments could rise to 90 million in 2009 and 220 million in 2010.

Only Samsung and Seagate current have shipping hybrid drives. Both companies have models with 256Mbyte NAND cache and drive capacity of 80-, 120- or 160Gbyte. Other drive makers are waiting for market demand to pick up before launching the products, he said.

Using software in Vista, the hybrid drives are geared to slash the time for booting a system or loading applications. The code can also cache frequently accessed data.

In addition, the hybrid drives may hamper the rise of solid-state drives (SSD) that use flash memory and aim to give a bigger boost in performance and reliability but at a steeper cost. Handy estimated a hybrid drive carries a premium of about $10 while a SSD carries a premium of as much as $300.

"Hybrids offer 80 percent of more of the performance of solid-state drives at a much lower cost," he said.

Source: EETASIA

Tuesday, December 11, 2007

Drive to use legal computer software

Domestic enterprises wanting to go public should aim to use legal computer software, an official said Monday.

The country will work strenuously to encourage and supervise enterprises to build a sound environment for the software industry, head of copyright administration Liu Binjie added at a national legal software conference.

"Strengthening protection for legal software and creating a conducive environment is a significant part of the national intellectual property rights (IPR) strategy", said Vice-Premier Wu Yi, who is also head of the national IPR working team, in a letter to the conference.

Initiated last year by nine authorities including the copyright and information industry, commerce, finance administrations and regulators of banks, insurances and securities firms, the ongoing campaign targeting enterprises is seen as a powerful government effort to realize the wide use of legal software.

Domestic enterprises are responding positively to the country's call to use legal computer software since then, Liu said.

More than 1,500 large enterprises with annual sales of over 300 million yuan ($40.5 million) are currently using legal computer software, a result of the nine ministries' efforts to weed out software piracy nationwide.

The groups include the headquarters of the major 157 State-owned enterprisessuch as Sinopec and Huaneng Group, and their subsidiaries across China.

Another 1,300 large-scale en-terprises are reportedly speeding up efforts to install licensed software on the operating system of their computers.

Source: China Daily

Monday, December 3, 2007

IE Expecting Threats from Hackers

Microsoft Corp said Monday that a flaw in the way its Windows operating system looks up other computers on the Internet has resurfaced, and could expose some customers to online attacks.

The flaw primarily affects corporate users outside of the U.S. It could theoretically be exploited by attackers to silently redirect victims to a malicious Web site.

Microsoft originally patched this flaw in 1999, but it was rediscovered recently in later versions of Windows and subsequently publicized at a recent hacker conference in New Zealand. "This is a variation of that previously reported vulnerability that manifests when certain client-side settings are made," said Mike Reavey, a group manager at Microsoft's Security Response Center.

The bug has to do with the way Windows systems look for DNS (Directory Name Service) information under certain configurations.

Any version of Windows could theoretically be affected by the flaw, but Microsoft issued an advisory Monday explaining which Windows configurations are at risk and offering some possible workarounds for customers. The company said it is working to release a security patch for the problem.

Here's how the attack would work: When a Windows system is specially configured with its own DNS Suffix, it will automatically search the network for DNS information on a Web Proxy Auto-Discovery (WPAD) server. Typically this server would be a trusted machine, running on the victim's own network.

WPAD servers are used to cut down on the manual configuration required to get Windows systems working on the network. DNS suffixes are used to associate computers with certain domains of the network and to simplify administration.

To make it easier for the PC to find a WPAD server, Windows uses a technique called DNS devolution to search the network for the server. For example, if an IDG PC was given a DNS suffix of corp.idg.co.uk, it would automatically look for a WPAD server at wpad.corp.idg.co.uk. If that failed, it would try wpad.idg.co.uk and then wpad.co.uk.

And that's where the problem lies. By looking for DNS information on wpad.co.uk, the Windows machine has now left the IDG network and is doing a DNS look-up on an untrusted PC.

Reavey says that this problem only affects customers whose domain names begin with a "third-level or deeper" domain, meaning that even with the DNS suffix, users on networks like idg.com or dhs.gov are not affected.

Attackers who registered "wpad" domains within second-level domains such as co.uk or co.nz could redirect victims to malicious Web sites without their knowledge -- a "man in the middle" attack." An victim might think he was visiting his bank's Web site, but in reality, he could be sent to a phishing site.

"It's particularly insidious because a lot of people don't realize that this is happening," said Cricket Liu, vice president of architecture with DNS appliance vendor Infoblox. To date, Microsoft has heard of no such attacks actually being carried out, Reavey said.

Customers who have set their own proxy server or who have a WPAD server on their network are not at risk, Microsoft said.

Still, according to the New Zealand security researcher who discovered this flaw, many customers could be affected. Beau Butler, who also happens to own the wpad.co.nz, domain estimates that about 160,000 PCs are affected by the problem in New Zealand alone, according to a published report. Butler could not be reached immediately for comment on this story, but in a note on a local Linux group Web site, he said he is collecting Web server data from this domain.

Monday, October 15, 2007

Computer Software - Blood for PC

Computer software is a general term used to describe a collection of computer programs, procedures and documentation that perform some task on a computer system. The term includes application software such as word processors which perform productive tasks for users, system software such as operating systems, which interface with hardware to provide the necessary services for application software, and middleware which controls and co-ordinates distributed systems.
Practical computer systems divide software systems into three major classes: system software, programming software and application software, although the distinction is arbitrary, and often blurred.
* System software helps run the computer hardware and computer system. It includes operating systems, device drivers, diagnostic tools, servers, windowing systems, utilities and more. The purpose of systems software is to insulate the applications programmer as much as possible from the details of the particular computer complex being used, especially memory and other hardware features, and such accessory devices as communications, printers, readers, displays, keyboards, etc.
* Programming software usually provides tools to assist a programmer in writing computer programs and software using different programming languages in a more convenient way. The tools include text editors, compilers, interpreters, linkers, debuggers, and so on. An Integrated development environment (IDE) merges those tools into a software bundle, and a programmer may not need to type multiple commands for compiling, interpreter, debugging, tracing, and etc., because the IDE usually has an advanced graphical user interface, or GUI.
* Application software allows end users to accomplish one or more specific (non-computer related) tasks. Typical applications include industrial automation, business software, educational software, medical software, databases, and computer games. Businesses are probably the biggest users of application software, but almost every field of human activity now uses some form of application software. It is used to automate all sorts of functions.