Andy Ebbern demonstrates how Autodesk Navisworks users can now interact with 3D models on a SMART Board interactive flat panel display. For further information about the idsDesignTOUCH plug-in for Navisworks Manage, please visit http://www.idsDesignTOUCH.com
Android vs iPhone: Android is the clear winner for us! #androidapplicationdevelopment – http://pinterest.com/pin/316026098826576566/?s=3&m=wordpress
We know they are secure, but are they tough? Time for the car test!
No software or drivers required. datAshur is a secure alternative to the cloud, the usb flash drive encrypts in real time using military grade AES 256-bit hardware encryption. The datAshur has been awarded FIPS 140-2 Level 3 certificate (certificate number: 1873)
The iStorage datAshur® is the world’s most secure, easy to use and affordable USB flash drive, employing PIN code access with military grade AES 256-bit hardware encryption. The datAshur incorporates a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board keypad before connecting the drive to the USB port.
– FIPS Security 140-2 Level 3 Certified (Certificate No. 1873)
– CESG CPA certification (in process)
– Common Criteria certification (in process)
– Winner of Security Innovation on the year award 2013
– Capacities of 4GB, 8GB, 16GB & 32GB *
– Military grade Full-disk AES 256-bit CBC Hardware Encryption
– Crypto-parameters protected with SHA-256 hashing
– Tamper evident and resistant
– Auto-lock on removal
– OS and platform independent – compatible with Windows, Mac, Linux and embedded systems
– Guaranteed with 3 year warranty
– Brute Force Hack Defence Mechanism
– Works with Smartphones, tablets, Google Chromebooks, thin clients, printers, scanners, CCTV cameras – any device with a USB or USB OTG port
– PIN activated 7-15 digits – Alphanumeric keypad use a memorable number or word for your PIN
– Compatibility with any OS – Windows, MAC, Linux
– Dust and water resistant durable aluminium housing. Certified to IP57 rating – certificate no. LVD-D120789COC.
– Supports Admin and User independent PINs
– Drive reset destroys data and recovers use of drive
– No software or drivers required
– Works with any USB/USB On-The-Go devices
– Customisation service available – contact iStorage for further information
What is datAshur?
The iStorage datAshur is the world’s most secure, easy to use and affordable USB flash drive, employing PIN code access with military grade AES 256-bit hardware encryption. The datAshur incorporates a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board keypad before connecting the drive to the USB port.
All data transferred to the datAshur is encrypted in real-time with the built in hardware encryption engine and is protected from unauthorised access or if your datAshur is lost or stolen. The datAshur automatically locks when unplugged from the host computer or power to the USB port is turned off.
The datAshur operates straight out of the box, does not require any software or drivers to be installed and is compatible with PCs, MACs, Linux and embedded systems. The datAshur delivers drag and drop encryption, plug and play simplicity and can be used with any off the shelf backup software.
The datAshur can be configured with independent User and Admin PINs, making it perfect for corporate and government deployment. If the User forgets their PIN, the drive can be unlocked using the Admin PIN which will then clear the old User PIN and allow the User to set a new PIN. The datAshur also incorporates a drive reset feature which clears both User and Admin PINs, destroys the data, creates a new randomly generated encryption key and allows the drive to be reused. The datAshur is capable of generating an infinite number of randomly generated encryption keys, allowing the user to reset the drive as and when required.
As the iStorage datAshur is unlocked via the on-board keypad and not via a keyboard, it is not vulnerable to software/hardware based key-loggers or brute force attacks. The datAshur protects your data with a “Brute Force Hack Defence Mechanism”, which deletes the encryption key and destroys all stored data if the incorrect PIN is entered a total of 10 consecutive times.
The datAshur is an investment that will last for years. Its rugged, extruded aluminium, water proof casing is tamper evident and protects it against physical damage. The internal drive components are also sealed with a tamper proof coating.
This video was created and is owned by iStorage Ltd and full credit goes to them for it. Why not take a moment to check out their YouTube Channel below:
Although you haven’t any plan to implement yet this technology, but this article still give you useful information about important points you should consider if you have a plan to use cloud storage in the future. It is not an easy way to pick the right cloud based data storage provider because it really comes down to individual organizational needs. Enjoy read this article.
Comparing of the cloud storage Titans: Amazon S3 versus Microsoft Azure
But the advent of cloud computing, in conjunction with cloud storage, has rung the bell for on-premise storage facilities. Not only are these new cloud based services clean, competent and effective, they have also been able to open new avenues as to what an enterprise could do with the data being stored and managed online. They have reached the level of integration with applications and services that it is becoming increasing hard to distinguish between online and onsite storage alternatives. As such, many organizations are realizing that it is time to be competing in this field, with two of the most popular data storage services being Microsoft Azure and Amazon Simple Storage Service (S3). Together they dominate the market, leaving Google and its cloud storage solution in the dust. For the time being, Microsoft and Amazon are dueling it out for dominance, which is why we want to contrast and compare these two competing offerings.
Microsoft launched its cloud based storage and compute services in 2010, and given Microsoft’s reputation of being the latecomer that demolishes the competition, they seem to have done themselves proud. A recent Nasuni report claimed to have concluded in its research that Microsoft is winning the cloud wars, dethroning the old guard of Amazon S3. Microsoft seems to be doing well when we consider the fact that they have been able to lure 53% of the Fortune 500 companies into using Azure. Thanks to a decent ecosystem, that dominance seems destined to continue unless the obvious competitor comes up with a drastic upgrade over Azure. But for the time being, they are winning.
There appears to be a feeling of wholesomeness when one looks at what Microsoft Azure has to offer its prospective users. The modern interface, helped by wizards, only makes it easy to use and choose, but any decisions must be taken after a good analysis of both Azure and the competing Amazon S3, which in itself has been quite successful.
Here are some of the key points of interest that is helping Azure win over the hearts and minds of enterprise customers:
A free 90-day trial/preview, all with 35 GB of storage, 750 compute hours cloud computing usage every month for three months, 1 DU of SQL Database and 20 GB of outbound data transfer without any cap on incoming data transfer per month.
A rich interface, with easy to configure wizards
Security, with 512 bit keys being implemented to ensure security of vital data.
Tight integration with other native Microsoft Windows applications such as SharePoint, SQL Server, and Visual Studio among others.
A complete set of features for cloud computing and analysis of data with equipment like Marketplace, SQL Reporting, Azure Machine Learning, Hadoop, Access Control, Rights Management, Media and Mobile Services. Besides, the cloud services in themselves can be configured and programmed with the help of official SDKs for Java, Python as well as .NET and others.
Data centers across the globe. Data centers are located everywhere from Japan, Ireland, Netherlands, China, Singapore, Brazil, and of course, the USA. This vast number of locations ensures that failures at a couple of places won’t be enough to cause any damage to that much valued data.
Amazon Simple Storage Service (S3):
Cleverly named, Amazon’s S3 has been quite successful, garnering substantial market share ever since its launch in 2006. Much like Azure, Amazon S3 owes much of its success to the cloud computing features that helped enterprises work with their online data in the cloud. Prior to Azure’s recent rise to the top, Amazon had been the clear leader, and its APIs continue to be the de-facto standards in the industry. Here is what Amazon S3 has to offer.
Integration with Amazon’s EC2 platform, which helps in Analyzing the data stored in the cloud, large amount of data can easily be tested and analyzed, giving researchers and developers some free time to focus on more important matters.
Although Dynamic website hosting is not possible specifically with S3, Amazon S3 can help you get a static website up and running and that too with your own custom URL.
Amazon S3 is a cost effective service, bar for that one feature which counts usage in real life hours instead of Compute hours, nonetheless S3 makes up for it with its inexpensive pricing structure.
It’s as reliable, secure and scalable as any of its competitors, however, its sole fault lies in the fact that not many data centers are located outside of USA, and that can be a matter of concern to some people. Nevertheless, no data can be lost on Amazon S3.
A Hybrid model is also available that stores data locally as well while backing it up in the cloud for any feasible purposes.
Verdict: Azure or S3?
Both Azure and S3 are complete products in their own right, and choosing between the two can be quite difficult. The fact is, both platforms provide a robust and reliable data storage system in the cloud, and as it currently stands, the two services are quite similar in the functionalities they provide. Choosing the right cloud based data storage provider really comes down to individual organizational needs, and figuring out which product aligns best with the organizations needs.
25 Aug 2014
Change is the difficult thing to do by almost of us. But, infact change is needed. This video will show you how the change can be done, even only transform from conventional to a new one tools. Let’s enjoy and make fun your day.
A Google researcher has disclosed an unpatched vulnerability in Windows 8.1 after Microsoft didn’t fix the problem within a 90-day window Google gave its competitor.
The disclosure of the bug on Google’s security research website early this week stirred up a debate about whether outing the vulnerability was appropriate.
The bug allows low-level Windows users to become administrators in some cases, but some posters on the Google site said the company should have kept its mouth shut. Google said it was unclear if versions of the Windows OS earlier than 8.1 were affected by the bug.
“Automatically disclosing this vulnerability when a deadline is reached with absolutely zero context strikes me as incredibly irresponsible and I’d have expected a greater degree of care and maturity from a company like Google,” one poster at the Google site wrote.
The vulnerability is “your average” local privilege escalation vulnerability, the same poster wrote. “That’s bad and unfortunate, but it’s also a fairly typical class of vulnerability, and not in the same class as those that keep people like me up at night patching servers,” the poster said. “The sad reality is that these sort of vulnerabilities are a dime a dozen on Windows.”
Another poster, in what may be a slight overstatement, suggested the versions of Windows affected are run by “billions” of computer users. “Exposing vulnerabilities like this has far reaching consequences,” the poster wrote. “People could get hurt by this and it doesn’t bring anyone closer to a solution. When an organization is as big and powerful as [Google], people working there need to think of themselves as stewards of a great power and work to be fair and regulate the harm that can come of misusing this great power when possible.”
Was it a secret worth telling?
Other posters praised Google for sticking to a deadline it’s had in place since it launched its Project Zero bug-tracking team last July. “No one is done any good by keeping it secret,” one poster wrote. “By exposing the [vulnerability] they allow those billions who may be running vulnerable systems to be aware of the threat to their own security and take countermeasures. A patch isn’t the only way to mitigate the issue. Given the nature of this vulnerability, there are other steps administrators can take to start protecting their vulnerable systems while they await a patch.”
Microsoft said in a statement it is working to release a security update to the reported vulnerability. “It is important to note that for a would-be attacker to potentially exploit a system, they would first need to have valid logon credentials and be able to log on locally to a targeted machine,” a spokesman said by email. “We encourage customers to keep their anti-virus software up to date, install all available security updates and enable the firewall on their computer.”
Google, in a statement published on Engadget, defended the release of the vulnerability information.
Google’s 90-day deadline for fixing bug is “the result of many years of careful consideration and industry-wide discussions about vulnerability remediation,” the company said. “Security researchers have been using roughly the same disclosure principles for the past 13 years … and we think that our disclosure principles need to evolve with the changing infosec ecosystem. In other words, as threats change, so should our disclosure policy.”
Google will monitor the effects of its policy closely, the company added. “We want our decisions here to be data driven, and we’re constantly seeking improvements that will benefit user security,” the company added. “We’re happy to say that initial results have shown that the majority of the bugs that we have reported under the disclosure deadline get fixed under deadline, which is a testament to the hard work of the vendors.”
If you still don’t know which laptop size you want ? Here is short guide for helping you choose a laptop which match and fit to your needs. Good luck.
10 to 12 inches: The thinnest and lightest notebooks around have 10 to 12-inch screens. However, you may sacrifice keyboard size for portability. Many laptops in this class double as tablets.
13 to 14 inches: Provides the best balance of portability and usability. Laptops with 13- or 14-inch screens usually weigh between 3 and 4.5 pounds.
15 inches: The most popular size, 15-inch laptops are the least expensive and provide plenty of desktop real estate. While most 15-inchers are easy to take from room to room, some are on the bulky side.
17 to 18 inches: If your laptop stays on your desk all day, a 17- or 18-inch system will likely provide everything you need for work and play. Many gaming notebooks are in this size category.