It is not a fun time to be peddling servers, but it is probably a great time to be buying them, according to the box-counting wizards at IDC.
Both server revenues and shipments were down in the first quarter, marking the fifth of the past six quarters where revenues took a dip. There are so many different kinds of transitions going on in Server Land it is a wonder it isn’t worse, frankly.
In the quarter ended in March, IDC reckons that server revenues worldwide (at the vendor factory level, not at the retail level) came to $10.94bn, a drop of 7.7 per cent from the year-ago period. Shipments dropped by 3.9 per cent to 1.89 million boxes across all form factors, which include tower, rack, blade, and density optimized machines.
“Customer demand for new servers is being impacted by ongoing server consolidation, technology transitions, and challenging macroeconomic conditions across the globe,” explained Matt Eastwood, general manager of enterprise platforms at IDC, in a statement accompanying the ships and bucks of the server biz.
“In fact, every geographic region except Asia/Pacific experienced revenue contraction in the quarter. It is clear that challenging market conditions are increasing the competitive dynamics for server market share globally, particularly since compute represents a critical element of larger IT transformations that continue to reshape broader enterprise IT market opportunities.”
IDC concurs with Gartner: The server biz was challenged in the first quarter
By IDC’s numbers, as HP’s server business contracted by 14.8 per cent, nearly twice as fast as the market at large, but it was still able to retain its top spot ahead of Big Blue, which shrank by 13.4 per cent. Both HP and IBM are having issues in their Unix systems businesses, as are Oracle and Fujitsu, and Dell, Cisco Systems, and a bunch of original design manufacturers (ODMs) who build boxes directly for hyperscale data centers are all taking share from them in the x86 racket.
As it is, IDC says Cisco, which grew its sales of blade and rack servers (which only use Intel Xeon processors) by 34.9 per cent to $450m, putting it in a statistical tie with Fujitsu and Oracle. And, interestingly, Fujitsu generated more revenues from server iron than did Oracle, something that Gartner also showed in its numbers and something that has never happened since Sun Microsystems got into the Unix server racket nearly three decades ago.
Oracle is still bleeding revenues like crazy, with another 26.2 per cent drop in the first quarter. Big Larry can talk about how Oracle is committed to Sparc T and M processors as much as he wants, but the sliding has not stopped for two years now and it will not be long before Cisco passes by Oracle.
IDC likes to take a stab at figuring out what the primary operating system is on each box that gets sold, just to give a platform flavor to its numbers. (Yes, we all know machines ship barebones in a lot of cases, but you can put some operating system on it, even a freebie Linux or Unix, and put it in an OS bucket for counting.)
By IDCs guesstimations, the Windows server space is still the biggest part of the server market (as Unix was 15 years ago), accounting for 52.2 per cent of all sales and driving $5.7bn in iron. But Windows declined 4.4 per cent in the quarter just the same.
That is better than dropping at market rate, mind you, but machines that would ultimately run Linux accounted for $2.5bn in sales, up 3.4 per cent. It is hard to believe that Linux will ever catch Windows, but we’ll see how this whole cloud thing plays out in a decade or so.
“Unix systems are the new mainframe” is the nicest way to say it, with Unix-based revenues declining a stunning 35.9 per cent to $1.4bn in the quarter. Yes, IBM, HP, Oracle, and Fujitsu are all smack-dab in the middle of processor transitions, but business had better pick up in the coming quarters or a slew of people are going to lose their jobs.
IBM’s System z mainframes, which missed their sales targets in Big Blue’s first quarter, still had a 7 per cent revenue bump to $800m in the quarter, bucking the overall trend but not as much as IBM needed it to.
By form factor, blade and rack servers both took hits in the quarter as enterprise customers hesitated in their spending, while the density optimized machines preferred by hyperscale data center operators, who either run online services or provide raw and virtualized server capacity to customers on their clouds, continued to spend more money on machines.
This could be workloads shifting, or this could just be the effect of all the consumer stuff we now do on the cloud (that is also sometimes used by businesses, admittedly).
IDC thinks that 235,836 blade servers shipped in the quarter, down 18 points, but ASPs were on the rise thanks to virtualization in the data center and the upsurge of Cisco Systems, which can command a premium for its product because of the integrated networking. (Yes, El Reg is aware of the counter-intuitive nature of that in the serve biz. But some folks just love Cisco.) So blade revenues only shrank by 6 points to $1.87bn.
Vendors shipped 1.05 million rack servers in Q1, down 4.9 percent year-on-year, and prices slipped a bit and so revenues across all vendors were down 5.8 per cent to $5.8bn.
Tower machines lost air on ASPs due to competition (Dell is being very aggressive at the low-end, and HP is really feeling it), and shipments were also down as SMBs are skittish about spending money in many of the regions of the globe, and thus overall revenues for tower machines dropped by 23.8 per cent to $2.45bn.
Those density optimized machines were the bright spot in the market, and very bright indeed, with shipments up 21.7 per cent to 211,172 machines and revenues up 51.4 per cent to $736m thanks to rising ASPs. Dell, by the way, is said by IDC to have a 47.3 per cent share of this density optimized biz. ®
Oracle and managed services provider ServiceKey have come to a proposed settlement of an intellectual-property lawsuit Oracle filed against the company last year.
Oracle sued ServiceKey in February 2012, alleging that it and another company, Federal Business Systems Corporation, were part of a “gray market” conspiracy that unlawfully used Oracle’s software code and log-in credentials with the goal of selling “support on Oracle hardware to customers with no active support contract with Oracle.”
ServiceKey had been paying Oracle for technical support on a small number of computers it owned, but then used its log-in credentials to provide hardware support to third parties, Oracle alleged.
But now Oracle and ServiceKey are poised to settle the suit in a deal that would see ServiceKey pay no monetary damages but face a number of conditions and restrictions, according to a court filing Thursday in U.S. District Court for the Northern District of California.
For one, ServiceKey officials must search their systems for Oracle software and support materials and “destroy” anything they find.
Oracle must also be allowed to “perform an annual audit of [ServiceKey’s] work relating to Oracle/Sun hardware for the next five (5) years,” the proposed settlement adds. “They shall maintain complete and detailed records regarding their performance of any and all support services on Oracle/Sun hardware in their customer support record system, shall retain all emails sent to or from their IT Help Desk personnel.”
ServiceKey would also be barred from logging into “any password-protected portion of any Oracle website or any Oracle FTP site, whether on their own behalf or as an agent or a contractor for any third party,” as well as giving or receiving “any Oracle/Sun software and/or support materials,” it adds.
But Oracle will receive no damages for its claim of unjust enrichment, and each side will pay their own court costs and attorneys’ fees, according to the filing.
A judge has yet to issue an order on the proposed joint settlement, but one is expected “shortly,” ServiceKey said in a statement. An Oracle spokeswoman declined comment on Friday.
“The proposed settlement represents significant progress toward an understanding between Oracle and ServiceKey, with respect to ServiceKey’s appropriate role in the hardware service support market for Sun/Oracle systems,” ServiceKey CEO Angela Vines said in a statement.
Since Oracle got into the hardware business with its purchase of Sun Microsystems, it has seen hardware revenue fall while insisting it is focused on higher-margin “engineered systems” rather than commodity servers.
Oracle has also sought to derive more revenue from hardware support, moving in 2010 to what amounts to an all-or-nothing policy.
“When acquiring technical support, all hardware systems must be supported (e.g., Oracle Premier Support for Systems or Oracle Premier Support for Operating Systems) or all hardware systems must be unsupported,” Oracle’s official policy states. It is believed that under Sun, some customers were able to use patches on unsupported machines while the company essentially looked the other way.
Oracle’s case against FBSC is still ongoing.
The allegations against ServiceKey and FBSC bear some resemblance to those made by Oracle against former SAP subsidiary TomorrowNow, which provided lower-cost support for Oracle applications.
Oracle won a sizable judgment against SAP, which admitted liability for illegal support-site downloads conducted by TomorrowNow, but that case has yet to be fully resolved.
Oracle has also sued third-party support provider Rimini Street, claiming it duplicated TomorrowNow’s business model. Rimini Street maintains its innocence and has countersued Oracle, saying it acts within the boundaries of its customers’ software license agreements.
Support services provide lucrative profit margins for Oracle and other vendors, who are loath to see any part of that money slip away.
But third-party providers say they provide a legal choice for customers in the marketplace, much like the option of going to an independent garage for auto repairs rather than the dealership where the vehicle was purchased.
Chris Kanaracus covers enterprise software and general technology breaking news for The IDG News Service. Chris’ email address is Chris_Kanaracus@idg.com
I’ve been cleaning out my closets and finding some real gems. I came across my old ad portfolio a few days ago.
With all the increasing tension between transparency and privacy and the role of Internet freedoms, it’s hard to believe there was once a time not too long ago that computers didn’t “talk” to each other. So-called “closed systems” enabled large manufacturers to secure unfair advantage in the market for hardware, software, and services. Entire walled garden ecosystems surrounded the largest technology vendors in the world. The UNIX operating system changed all that. I remember when the ”UNIX Wars” cropped up when I was working with ATT on the company’s (ill-fated) foray into the computer market. I was the liaison between the client, our account team, and our creatives at Ogilvy Mather to explain the significance of UNIX to, well, the world. (Lucky me!) I recall we had about a million dollar media budget (in ’88 dollars) to brand ATT’s special version of UNIX: System V.
These were the days pre-Internet where influence and power had to be levied with massive spend. ATT could afford it at the time. We ran this 1988 full-page ad in the Wall Street Journal, The New York Times, and the Washington Post to flex muscle in the negotiations ATT was having with its ecosystem and to position it against its rivals. There’s a great narrative for all you deeply geeky readers on what happened behind the scenes by Christopher Kelty in his book, “Two Bigs – The Cultural Significance of Free Software.”
I’m an avid Mad Men fan. As I watch the series, I wonder if it will approach the period of time I was in advertising (the 80s). When I joined the advertising world, computer advertising was the #3 spending category. IBM launched the PC in 1981 and it created a bonanza of new media spend for large agencies, as well as publishing media empires that seized the opportunity to track the industry and attract the newly minted print dollars.
Symantec 250-223 exam contains up-to-date Questions Answers that will provide you enough knowlege to pass the exam at fist attempt. Prepare all the questions/answers provided in the exam Symantec Data Protection Administration for UNIX�using NBU 5.0 thoroughly that will upgrade your overall knowlege as well as knowledge about the topic. Passing the exam will be as simple as 1 2 3.
Symantec Data Protection Administration for UNIX�using NBU 5.0
Acquiring Symantec certifications are becoming a huge task in the field of I.T. More over these exams like 250-223 exam are now continuously updating and accepting this challenge is itself a task. This 250-223 test is an important part of Symantec certifications. We have the resources to prepare you for this. The 250-223 exam is essential and core part of Symantec certifications and once you clear the exam you will be able to solve the real time problems yourself.Want to take advantage of the Real 250-223 Test and save time and money while developing your skills to pass your Symantec Data Protection Administration for UNIX�using NBU 5.0 Exam’? Let us help you climb that ladder of success and pass your 250-223 now!
Download updated Exam Prep Questions and Answers from ipass4sure.com and Pass the 250-223 Exam in First Attempt.
Many hours have been spent developing the content and software being used to train you for the 250-223 exam. The Symantec experts in our online training staff have created the best content available with the highest rated quality in both Symantec questions and Symantec study help. If you take the time to use the Symantec training materials, you will pass your exam guaranteed.
Passing the Symantec 250-223 exam has never been faster, cheaper and easier, now with real exam questions and answers, without the messy 250-223 brain dumps that are frequently incorrect. iPass4sure provides cheapest way to pass without 250-223 free dumps.
Symantec Data Protection Administration for UNIX�using NBU 5.0 250-223 Exam Features
Detailed questions and answers for 250-223 exam
Try a demo before buying any Symantec exam
250-223 questions and answers, updated regularly
Verified 250-223 answers by Experts and bear almost 100% accuracy
250-223 tested and verified before publishing
250-223 exam questions with exhibits
250-223 same questions as real exam with multiple choice options
Our up-to-date exam training will prepare you for your exam with guaranteed results, surpassing other Symantec 250-223 Labs, or our competitor’s dopey Symantec 250-223 study guide. Symantec 250-223 will download as a single 250-223 PDF or ZIP file. Forget buying your prep materials from highly expensive resources, Try our cheapest and up-to-date offer and pass the official test guaranteed – skip the Symantec 250-223 practice exams and select the one source that fits your needs.
One of the best and most rewarding features of the 250-223 training materials are that they are guaranteed to bring you success in the testing room. Pass with total confidence and say farewell to the Symantec Data Protection Administration for UNIX�using NBU 5.0 blues.
Proper training for Symantec 250-223 begins with preparation products designed to deliver real Symantec Data Protection Administration for UNIX�using NBU 5.0 results by making you pass the exam the first time. You will spend both time and money, so make the most of both with iPass4sure’s Symantec 250-223 questions and answers. Learn more than just the Symantec 250-223 answers to score high, learn the material from the ground up, building a solid foundation for re-certification and advancements in the Symantec 250-223 life cycle.
Don’t trust Symantec 250-223 dumps or the shortcut using Symantec 250-223 cheats. Prepare for your Symantec 250-223 tests like a professional using the same Symantec 250-223 practice test that thousands of others have used successfully. What you will not find at iPass4sure are Symantec 250-223 latest braindumps, Symantec 250-223 lab, Symantec 250-223 CBT but you will find the most advanced, correct and guaranteed Symantec 250-223 practice questions available to IT people around the planet.
Pass4sure Software is Downloadable .Use of crack, warez passwords, patches, serial numbers, registration codes, key generator, keymaker or keygen for Pass4sure downloaded product is not recommended. Download links are directly from our member area . Use of rapidshare, megashare, fileserve, filesonic, 4shared, hotfile, wupload and filejungle etc are not recommended!
LONDON, UK—The four British Lulzsec hackers—Mustafa “tflow” al-Bassam, Ryan “kayla” Ackroyd, Jake “topiary” Davis, and Ryan “ViraL” Cleary—were sentenced today to between 20 and 32 months in jail for crimes committed during Lulzsec’s 50 day hacking spree in 2011. Prosecutors described the men as being at the “cutting edge of contemporary and emerging criminal offending known as cybercrime” and as “latter-day pirates.”
At previous hearings, al-Bassam, 18, of Peckham, London, and Davis, 20, of the Shetland Islands, entered guilty pleas to charges of conspiracy to commit DDoS attacks against targets including Westboro Baptist Church, Sony, Bethesda, and EVE Online. They also pled to conspiracy to hack targets including Nintendo, Sony (again), PBS, and HBGary. Ackroyd, 26, of Yorkshire, pled guilty only to the hacking charge.
For these crimes, al-Bassam was sentenced to 20 months, suspended for two years and received 300 hours of community service. Davis was sentenced to 24 months in a young offender’s institute. Ackroyd was sentenced to 30 months.
Cleary, 21, of Wickford, Essex, pled guilty to both of these charges and a further four: constructing a massive botnet, making that botnet available to others, hacking into a Pentagon system, and performing DDoS attacks against DreamHost. Cleary also entered a guilty plea against three counts of possession of indecent images of children. (After his arrest, forensic examination of his PC revealed a deleted directory containing 172 sexual images of children as young as six months.)
For building the botnet Cleary was sentenced to 18 months, which will run concurrent with an eight month sentence for making the botnet available to Anonymous. For the charges shared with al-Bassam and Davis he was sentenced to 20 months. That sentence will also run concurrent with the botnet charges. For the Pentagon and Dreamhost attacks he was sentenced to 12 and eight months respectively. These sentences will run concurrent with each other—but consecutive to the other four sentences.
This yields a total of 32 months. Cleary will serve 16 more as he has already spent more than 16 months in remand awaiting trial. Sentencing for the child pornography charges was adjourned until June pending further psychiatric evaluation.
Two further charges of conspiracy to commit fraud were brought against all four. The prosecution declined to present evidence for these charges, and accordingly verdicts of not guilty were entered.
The handling of these charges was an important issue. The Crown wanted to leave them on file (which may have proven useful if the other charges had gone to trial and resulted in not guilty verdicts, as it would have offered a second chance to go after the four). The court was concerned however that if the charges were not conclusively handled there was risk of extradition to the US since the four have also been indicted in America for the Lulzsec crimes. The not guilty verdicts should substantially preclude any extradition as all charges related to Lulzsec have been handled by the UK courts. Similarly, Ryan Ackroyd has a not guilty verdict entered against the DDoS charge.
The crimes committed were deemed “serious crimes,” and all four hackers will receive Serious Crime Prevention Orders that will impose various restrictions on their behavior. (Restrictions include requiring the police to be notified of the whereabouts of all Internet-connected computers they possess subsequent to their release from prison.) This is due to what the judge called a “substantial” risk of reoffending.
Summing up, judge Deborah Taylor said that the four “cared nothing about the privacy of others” even as they used various technical measures to protect their own identities. Though not motivated by financial gain the four were aware that their behavior could, and did, lead to substantial or catastrophic losses for others. In particular the taunting of Penny Leavy and Greg Hoglund of HBGary made “chilling reading,” yet this behavior was described by Jake Davis as the “most fun” thing that Lulzsec did.
The sentences were more severe than those given to hackers involved in DDoS attacks earlier this year due to the widespread dissemination of personal information that caused losses claimed to run into the tens of millions of dollars.
Speaking after the sentences were handed down Detective Superintendent Charlie McMurdie, head of the Police Central e-Crime Unit that investigated the crimes after being tipped off by the FBI, said that the four were the “worst kind of vandal,” and that they acted “without care of cost or harm to those they affected.” She said that “cybercrime” is a “Tier 1 threat” against the UK and that these sentences should “serve as a deterrent to others who use the Internet to commit cyber attacks.” McMurdie added that the successful prosecution should be a “warning to other cybercriminals that they are not invincible.”
A history of lulz
With all four members entering guilty pleas, the court had not previously heard the major evidence against them or the specifics of their involvement. The prosecution gave an outline of the charges and recounted a chronological history of Lulzsec’s exploits.
The court heard that HBGary was the group’s first major attack—with the hackers still using the name Internet Feds—with the Lulzsec name created in the aftermath. The prosecution claimed that the four core members of Lulzsec were tflow, kayla, topiary, and American FBI informant Hector “Sabu” Monsegur. Ryan Cleary was not a core member, though he wanted to be one, and IRC chat records indicate that he was heavily involved with the group’s operations.
Each of the five had a clear role. Sabu and Kayla were the hackers, responsible for both exploiting vulnerable software and vulnerable people, socially engineering access to privileged accounts. The pair was described as the “rooters,” a term that the Crown Prosecution Service defined as the ability to access the “root directory” of the systems they attacked. For example, said the prosecution—if you put a DVD into your PC, then the “D drive” is the root directory. (The term “rooter” has, of course, nothing to do with root directories and everything to do with Unix’s root account. The pair was versed in using exploits to escalate privileges and gain access to user id zero.)
Topiary ran the group’s Twitter account and, for lack of a better description, was a PR agent. tflow ran the Lulzsec website, helped disseminate information, and recruited hackers to the cause in addition to identifying vulnerable target systems.
Cleary provided extensive material support. The prosecution described his botnet, which was constructed using Python software that, it claims, Cleary himself developed. The court heard that at its peak, this botnet could call on the bandwidth and resources of 100,000 systems. This figured represented perhaps 10 percent of the machines infected with Cleary’s malware.
This botnet used a common structure: the malware on each infected PC connected to an IRC command and control server that Cleary operated to pick up new instructions. The prosecution was quite unclear on how technically adept Cleary was. On the one hand, it claimed that he wrote the botnet software himself, using Stackless Python, and that he took advantage of Internet Explorer flaws to recruit machines. On the other hand, it also said that he used the well-known Zeus malware to infect systems.
Though the antecedent Anonymous organization was (in a broad sense) sociopolitically motivated, Lulzsec initially eschewed such rationalizations for its actions, acting only to amuse its members and promote itself. Demonstrating this through chat transcripts read in court, Davis wrote that his “only goal is to cause absolute chaos.” In response, Cleary said that they should “go after the cunts that are going after me and you” and take out the UK’s Serious Organized Crime Agency (SOCA) website in a DDoS attack.
In addition to using this botnet to perform DDoS attacks at Lulzsec-chosen targets, Cleary also provided access to compromised servers that were used for hosting IRC services, storage, and hosting for data purloined from Lulzsec’s various victims.
Davis described Cleary in logs as being “trigger happy.” Cleary, for his part, acknowledged that “sure, [hacking] is a crime, obviously, but it’s not like it’s fucking serious.”
Cleary’s outsider status was reinforced in early June, 2011 when chat logs from IRC channel #pure-elite were leaked to Pastebin. Ackroyd initially blamed Cleary for this transgression.
Patel said that the Lulzsec crew, seeing themselves as “latter-day pirates,” was primarily motivated by “anarchic self-amusement.” However, they were not blind to the repercussions that publishing sensitive personal information could have. To preclude any mitigating claims that the hackers were interested only in embarrassing the victims, Patel pointed out that on numerous occasions, other hackers were encouraged to download the considerable amounts of personal information that Lulzsec published—including 74,000 users who’d registered at fox.com to find out about X Factor auditions and 20 million users of Sony’s PlayStation Network. Lulzsec used this information for phishing and other attacks. As he put it, the four were “not naive to the risk that confidential data might be misused” for fraud.
The prosecution also gave brief details of the four men’s arrests. Cleary was picked up first, arrested in his bedroom on the evening of June 20, 2011. At the time of his arrest his PC (using Windows) was up and running with no encryption and only a password for security. He immediately cooperated with officers, disclosing passwords and the necessary commands to tell the botnet to stop the DDoS attack on SOCA that was ongoing at the time.
It was during forensic examination of Cleary’s PC that the police found and subsequently recovered a number of deleted images of child pornography. Cleary was re-arrested on October 4 and admitted to having downloaded the images from a member-only child porn site. In total 58 images were classified as level four (“penetrative sexual activity involving a child or children, or both children and adults”), 44 were level three (“non-penetrative sexual activity between adults and children”), 10 level two (“non-penetrative sexual activities between children, or solo masturbation by a child”), and 60 level one (“images of erotic posing, with no sexual activity”).
Mustafa al-Bassam was second to be taken into custody. He was arrested on the afternoon of July 9, 2011—again in his bedroom. He provided police with passwords to his PC. During the search of his property a hand-written note was found in his anorak. This note contained extensive information about past Lulzsec activity and it also named Ackroyd and Monsegur as the key hackers.
Next to fall was Jake Davis. The police arrested him on the afternoon of July 27. His computer was running at the time and he provided encryption keys and passwords necessary to access information on it. After being cautioned he told police about Lulzsec’s organization and responsibilities: Ryan Cleary was responsible for DDoS attacks, including the one on SOCA, and that Ryan Ackroyd and Hector Monsegur were responsible for the HBGary hacks.
Police found copies of many of the Lulzsec data dumps on Davis’ computer along with credit card numbers, passwords, and other information. Davis used Truecrypt to protect this information.
Ackroyd was the last to be brought in. He was arrested on September 1, 2011. His computer was turned on and opened to his Twitter account. Unlike the other three however Ackroyd was consistently uncooperative. He claimed that he knew nothing about computers and that it was his brother who was the computer expert and that Kayla was his sister. He said he had never heard of Lulzsec and had no knowledge of what IRC was. He even claimed that the Twitter account he had open at the time of his arrest was not his own. Ackroyd also took measures to protect his security, using software to delete incriminating log files each time his computer was booted.
While the other three entered guilty pleas at the earliest opportunity, in June 2012, Ackroyd insisted that he was not guilty right up until the day his trial was due to start. On April 9, 2013 he pled guilty to the hacking charge (but not the DDoS charge).
In mitigation Cleary’s lawyer John Cooper told the court that his client had a difficult childhood and retreated to the online world. Cleary has been diagnosed with Asperger’s syndrome and due to this affliction tended to become obsessed and compulsive. He had difficulty socializing but found an outlet in the online world. Cooper insisted his downloading of child pornography was not the work of a “career sexual pervert.” Rather, according to Cleary’s lawyer, it was a result of his obsession with his computer and “what he could find on his computer.”
Cooper also emphasized that DDoS attacks were highly unsophisticated and that although Cleary made his botnet available to Lulzsec and Anonymous, he did not direct its usage except in the case of the SOCA attack. As a Lulzsec outsider he was also not involved in core decision-making. Her Honor Judge Taylor did not appear immediately impressed by the claims of a lack of sophistication, remarking that a botnet of 100,000 PCs was “not unsophisticated.”
Davis too had childhood difficulties according to his lawyer, Simon Mayo. He preferred reading to sports, found it difficult to socialize, and was bullied at school. The trauma of the death of his stepfather when he was 12 led to diagnoses of depression. The 2010 suicide of his biological father, who had sought to make contact with him after several years in which he did not contact his family, led Davis to himself attempt suicide.
As with Ryan Cleary Mayo described how Davis found a refuge of sorts online. He found “companionship in cyberspace” but was subsequently “sucked into a chain of events” that ultimately led to his arrest.
A similar tale was less convincingly described for Mustafa al-Bassam. An Iraqi immigrant who came to the UK at age six, al-Bassam was described by defense lawyer Anthony Orchard as a shy kid who found it difficult to make friends, leading him to the online world. He felt isolated and had a need to belong and this is what the Internet provided. The judge questioned some aspects of this description, however, as statements from his school tutors appeared to contradict the claims of social isolation.
Ryan Ackroyd was unusual. He demonstrated no great aptitude for computers when young—he achieved only a D grade in the IT GCSE exam—but taught himself to program in his late teens after becoming interested in online gaming. After a five-year stint in the UK Army, during which he served in Iraq, he became aware of Anonymous after its “Operation Payback” activity opposed anti-piracy organizations. He learned that he could acquire status and reputation with his knowledge of hacking and from there things “spiraled out of control.”
TradingScreen is currently seeking a UNIX/LINUX Infrastructure Engineer for our New York office. This is an exciting and challenging postition with exposure to a broad spectrum of technology. The Infrastructure group is responsible for managing and engineering the company’s global solutions for servers and storage. The ideal candidate will have experience with the UNIX operating system and be able to perform basic network troubleshooting.
Excellent communication skills are required since the group interfaces with clients and all levels of the business up to and including the CEO. Additionally, the role requires excellent troubleshooting skills, the ability to work under pressure and the skillset to innovate whilst being sympathetic to change management processes that govern the management of production resources.
Since the group is global and provides services using a “follow the sun” model, the successful candidate must be an excellent team player able to both pass on and assume responsibility for task that require follow up activity across the time zones.
2 years+ experience as System Administrator (preferably Solaris) UNIX/LINUX Administration (Solaris/Redhat) Knowledge of volume management. Understands operations and concepts associated with mirrors, stripes, concats and RAID principles in general Knowledge of filesystem concepts including new fs, grow fs, fsck and filesystem logging Thorough understanding of virtual memory, understands the concepts and operation of paging, swap devices, memory based filesystems and virtual addressing Experience with performance troubleshooting, ability to identify and isolate issues associated with CPU, I/O, or memory Experience with datacenter work (racking/cabling hardware) Familiarity with SAN (preferably Netapp) Solid understanding of TCP/IP and can perform basic network troubleshooting Knowledge of support Java applications in production an advantage Understands connection TCP establishment and teardown Understands NAT
Recruiter Contact Details
firstname.lastname@example.org noting “Infraeng” in the subject line
A fascinating little point made in a much longer piece about the smartphone wars. One that makes me wonder whether Unix can now be considered to be the most successful operating system of all time. Which is certainly a change from when I first entered the computing industry when Unix boxes were vast behemoths and the Windows based PC was what was used by the masses.
Within that, roughly 1.1bn had ‘smartphones’ at the end of 2012, of which around 900m ran either the iOS or Android versions of Unix. (As an aside, it is pretty striking that almost a fifth of the earth’s adult population has a Unix box in their pocket.)
Yes, it is true that both Apple Apple‘s iOS (and OSX come to think of it) and Google Google‘s Android are variations of the basic Unix operating system. And 900 million concurrent users might indeed be the largest number of people using an operating system yet.
The only viable contender is of course Windows. DOS was never a large enough marketplace before Windows took over from that. And I agree that Windows sales numbers are, over time, much higher than of these Unix variants. Windows 7 for example sold 450 million copies all told. Windows 8 so far 100 million. So I’m willing to agree that Microsoft Microsoft has, over all the generations of Windows, sold more licenses than the current usage of the two Unix variants, Android and iOS.
But I’m really not sure whether the installed base of Windows has ever been 900 million units. Not all operating at the same time. And we are indeed saying that the current, today’s installed base of Unix is that 900 million. Even if that were shown to be wrong, that there are, or have at some time been, more than 900 million operating PCs running Windows, I don’t think that Windows would keep the crown for very much longer. For the growth rates are wildly divergent.
Almost all tablets and smartphones now run some variant of Unix (yes, I know, Windows Phone and Surface but really, volumes here are pretty small) and those markets are still growing by leaps and bounds. And the PC market is actually shrinking. So even if Windows might, just, still be the world’s leading OS I don’t think that that will last for very much longer.
But my gut feel for this is that Unix is indeed the world’s most successful operating system ever. 900 million concurrent users? I don’t think even Windows has managed that.
Cloud backup and disaster recovery delivers fast deployment, rapid recovery, ease of use, and cost savings
What is my desired RTO and RPO? What are my business issues and pains as they relate to my current data protection and disaster recovery plan? How long can my business function without access to data and systems?
These are just a few of the challenging questions facing businesses today.
To protect against natural disasters or other catastrophic events, most companies reply on tape-based backup or high availability. Companies looking to manage this challenging issue find cost effective solutions with IBM i Solution Edition for VAULT400 cloud backup and disaster recovery.
VAULT400 and IBM deliver business continuity for the mid-market
United Computer Group, Inc.’s VAULT400 is a premier managed risk mitigation and business continuity planning service that “fills the gap” between tape backup and high availability. VAULT400 backs up an entire organization’s business-critical data to secure data centers, ensuring financial, HIPAA, and legal compliance for their clients. Safe and off-site, the encrypted data is available online at all times for immediate, user-initiated recovery. VAULT400 works seamlessly within an organization’s existing infrastructure.
IBM i Solution Edition for VAULT400 offers fast deployment, rapid recovery, ease of use and cost savings.
The IBM i Solution Edition is available as an offering when a client selects both new hardware and software or services from United Computer Group, Inc.
“As an IBM Advanced Business Partner, United Computer Group has partnered with IBM for more than 26 years and ensures tight integration of our solutions,” says James Kandrac, President of UCG. “That collaboration has extended to UCG’s participation in the IBM i Series Advisory Council and includes product design/development to testing and go-to-market strategies.”
The IBM i Solution Edition for VAULT400 is available for both the IBM Power7+ 720 Express and IBM Power7+ 740 Express. Both Power Systems feature the latest IBM processors, which represent a true leap forward to more intelligent systems that reduce complexity, decrease energy consumption, minimize downtime and drive down operational costs.
Highlights · Select a platform that delivers the lowest cost of acquisition through specialty pricing and lowest total cost of ownership through reduced maintenance and ongoing support costs · Leverage a platform that utilizes the full power of the IBM i, with industry-leading scalability, performance and energy efficiency · Benefit from superior service and support with highly coordinated service teams · Experience fast deployment, rapid recovery, ease of use and cost savings · Deploy a complete cloud backup and disaster recovery solution that delivers rapid ROI
The bottom line
Together, IBM and United Computer Group, Inc. provide solutions that combine the power of IBM Power Systems™ and IBM i with the strengths of business applications, along with superior services and support. You can benefit from:
· Increased insight for more assured decision making · Improved productivity, efficiency and responsiveness · Reduced costs through increased flexibility · Adaptability to business change · Higher productivity · Competitive Total Cost of Acquisition (TCA) and proven Total Cost of Ownership (TCO)
“By selecting the IBM i Solution Edition for VAULT400, organizations gain significant IBM i pricing benefits, and an easy-to-manage cloud backup and disaster recovery solution that deliver a low total cost of ownership.”
– Michael Powall, Vice President, UCG
For more information
The IBM i Solution Edition is available as an offering when a client selects both new IBM hardware and software or services from United Computer Group, Inc. For details please call 800-211-8798 or visit www.ucgrp.com and www.vault400.
For a complimentary risk assessment
Click here or call UCG at 800.211.8798 today!
La Compañía Nacional de Danza (CND), dirigida per José Carlos Martínez, presentarà este divendres i el dissabte 4 de maig al teatre Principal de València el seu nou projecte, ‘La CND en PUNTAs’, en què la prestigiosa agrupació unix “creativitat, originalitat i passió” amb un programa eclèctic.
L’actuació, que s’emmarca dins de la Temporada de Dansa de CulturArts 2013, permetrà als aficionats gaudir del “nou rumb” que ha pres al companyia, “que s’endinsa cap als terrenys de la dansa clàssica sense perdre el repertori contemporani que ha fet d’esta companyia una de les més prestigioses del món en este camp”, destaca la Conselleria de Cultura.
Sota esta premissa, el conjunt crea un nou projecte que denomina ‘CND Clàssica’ i que, després de fer la seua posada de llarg oficial al Teatro Real de Madrid, arriba hora arriba al Principal de València.
La CND es presenta a la sala de la capital del Túria amb un programa eclèctic que reunix peces d’estils i orígens molt diferents, on la creativitat, l’originalitat i la passió en la interpretació de la Compañía Nacional de Danza queden demostrades una vegada més.
Així, la Temporada de Dansa de CulturArts 2013 brinda una oferta que combina “tant les propostes més innovadores i contemporànies, amb altres més clàssiques de la dansa més tradicional però totes elles amb un nivell d’excel·lència sense cap dubte i que és avalada per l’afluència de públic, que ha registrat plens en cadascuna de les funcions”, subratllen.
Després de la Hubbard Street Dance Chicago i el Het Nationale Ballet, d’Holanda, arriba als teatres de la Generalitat la Compañía Nacional de Danza amb esta proposta innovadora i amb un programa compost per quatre peces: ‘Holberg Suite’, coreografiada per Tony Fabre i Edvard Grieg; ‘Tres Preludios’, de Ben Stevenson i Serguei Rachmaninov; ‘Who Cares?’ de George Balanchine i George Gershwin i ‘Sonatas’ coreografiada per José Carlos Martínez, Domenico Scarlatti i Pare Soler.
TROBADA AMB EL PÚBLIC
Alhora, amb motiu de la seua visita a València, la Compañía Nacional de Danza i CulturArts Generalitat organitzen la trobada amb el públic ‘Una VESPRADA amb la CND’, al teatre Principal.
El dissabte 4 de maig s’oferix l’oportunitat de participar d’una part de la jornada diària de la companyia. En primer lloc, s’oferirà al públic assistir a una classe, on els ballarins, dirigits pel mestre de ballet, executen variats exercicis acompanyats per un pianista.
A continuació tindrà lloc una xerrada amb el director de la companyia, José Carlos Martínez i més tard, s’oferirà un petit assaig obert de l’espectacle de la CND. [FIN]