Cloud Storage — should I use it?

Cloud Backups, should I use it? What is cloud storage? From a users’ point of view, it’s simply an endless amount of disk space that resides “in the Internet” and is available for you to store your files (including music and photos). This space is secure, cheap and highly available for all your backup/restore needs. Remember, Cloud is a metaphor for the Internet. Technically, it’s networked online storage accessed through the internet (or WAN) connection. Its several servers or nodes clustered together forming large storage pools. The architecture is scalable, economical and manageable. But, you don’t really need to be concerned with this part – this is what the hosting company does.

There are several products available that provide this service. I recommend searching the Internet for products, features and pricing. One starting point is to get an idea of what your storage requirements are and what features you would like. Pricing varies based on the initial amount of storage you are going to use.

Advantages of using Cloud backup software:
• A copy of your data is stored offsite (outside of your house). Storing data on an external hard drive is still vulnerable for hardware issues and house related issues (such as floods and fires).

• Many services monitor your file changes and will back up the files as they change without your intervention (you don’t have to worry about scheduling backups). There is a small product that gets installed locally on your computer.

• Files can be accessed from anywhere with an Internet connection and the proper account information

• Scalable, you can increase storage limits as needed.

Concerns using Cloud backup software:
• Security (see below for more information)

• Performance is slower than local hard drives because you are going through a network connection.

• Point of vulnerability is your Internet connection

• There can still be hardware issues with the solutions provider, cloud computing is not infallible.

Security – deserves a paragraph on its own. Whether it’s your business or personal data, everyone is nervous about moving their data to an external provider. Are you willing to give control of your data to someone else? Most providers will encrypt the data in transit as well as when it’s at rest. Double encryption equals harder to crack. And, each customer should have their own encryption key.

Large providers, such as Amazon and Verizon vs. smaller startup type providers. Obviously, you should have more stability with the larger providers. Although, I have had a few issues with cloud instances being unavailable for several hours (but, that’s a different issue). There are so many small vendors that you have to question whether they will all be around in a few years. So, I wouldn’t put anything critical on the smaller providers sites. How would you feel if, the vendor suddenly went away and you no longer had access to your data?

There are also different types of software that use cloud storage. One is strictly for backup purposes and the other is for file sharing. You should consider your needs and make the decision accordingly. Pricing is comparable – it’s just a matter of what functionality you need.

There is another cool option for safely storing your data. There are now external hard drives that are both fire and water proof. They hold large amounts of data for about $150-$200. If you really don’t want to store data in the cloud and don’t have a need to share files with people outside your house – this may be the best option.

I’m sure I’ll be posting more about the “Cloud”

Advertisements

Was Windows NT actually “New Technology”?

First, what is Windows NT? It’s the first fully 32-bit Windows operating system. It’s the predecessor of Windows 2000, XP, Vista, Windows Server 200x – you get the idea. NT was released in July 1993. The name “NT” was actually named after the codename of the Intel i860 processor, “N-Ten”. But, for marketing purposes, Microsoft expanded the letters to “New Technology”. The original concept was to have common code running on top of a custom Hardware Abstraction Layer (HAL). The scope was scaled back when they dropped support for MIPS and Alpha.

The chief architect of Windows NT was David Cutler. Before NT, he developed the 32-bit OS for Digital’s PDP-11 (RSX-11M). He was currently in the process of developing the OS for the RISC Machines. Many of the concepts in these Operating Systems were used in the NT Operating System. In 1988 Cutler and his team were let go, they were working on the new OS that was going to lead Digital into the 90’s. Microsoft scooped him and some team members up quickly. Five years later, Microsoft NT 3.1 was released in 1993.

Just because I think this is somewhat entertaining, check out the minimum hardware requirements:

NT 3.1, CPU – 386, 25 MHz , RAM – 12 MB and free disk space 90 MB: released July 1993

Windows 7 – CPU-Pentium III, 1GHz, RAM – 1 GB and free disk space 1 GB: released October 2009

Much of the terminology in NT came from the VMS environments. The Windows NT Kernel and Executive subsystems are based on the VMS system. The Executive subsystems include the process manager, the scheduler, memory manager and IO managers. The two OS’s are so similar that some people have said you can read parts of a book on VMS internals and data structures and it holds true for the NT OS as well. There are way too many similarities to go into. If you are interested, there are several articles about this topic.

There is a big difference in the process manager. NT’s schedule gives CPU time to a thread, not a process. Funny, Digital released this functionality in VMS OS Version 7 released in 1995, after NT was released. NT was released with event wide logging and a configuration database (Registry), guess what, VMS 7.2 was released in early 1999 and it included both of these functionalities. Also interesting with the OS structure being so similar, Digital came out with clustering in 1984 but Microsoft didn’t release this functionality until late in 1997. So, you can see how closely these two operating systems track.

If you’re interested, you can read more details about the similarities and differences here: http://www.krsaborio.net/research/1990s/98/12_b.htm

My professional career started as a VMS system administrator and then I transitioned to Windows NT. You can see by some of the history that I’ve outlined, that this was a natural and easy transition to make since many of the concepts that I all ready understood carried over to the Windows world.

Search engines can do so much more!

I’m a Google user but most of the information listed below will work in most other search engines as well.

How do you use Google?

Ok, so you need to search for something on the Internet. You go to Google.com, start typing some words to search on and then you start looking through the sites that came back from that search. Did you know there are many tips to help refine your search? We’ll get to some of these in a minute. But, did you also know that you can use Google as a calculator or a world clock? There are many tricks to discover I’ll list some of them out for you.

Lets first go through some techniques for searching:

The most basic way of refining your search is to include many words in the search field. By default, Google will only return the websites that contain all the words in your search. As a quick aside: You can use the word “Or” in the search field to expand your search. But, let’s try to get a little more sophisticated with our searches:

You can search for a term and all related terms by putting a ~ in front of the search. Ex: ~nutrition will also return information about health and food.

What if the item you are searching for has a couple of different meanings –such as Mars – that can be candy, a planet, a store or Roman God. Try using the exclude function: mars –candy –store. This search will return the sites that have the word Mars in them and don’t have the words candy or store.

Want to search for a particular phrase? Simple, put that phrase in quotes. Or, you can string together your words with a phrase connector (hyphens, slashes, periods). An example: mother-in-law or men-are-from-mars

Ok, nothing to exciting there. But, check this out. Want your search to be focused on only 1 site. Enter mars site:space.com . this will return all the matches for Mars specifically on the site space.com.

Or try this: allintitle:mars (return all sites that have Mars in the html title) or allintitle:mars planet (this will return sites with both mars and planet in the html title). You can also use the operands allinurl and allintext to return searches that contain the words in the url or the body of the website.

You can search with a number range. Example: mars 1960..1970 will return information about mars between 1960 and 1970. Want to narrow it down further, put some of these operands together. Try this: mars 1960..1970 site:space.com now you will receive information about Mars between 1960 and 1970 from only the site Space.com

Would you like to see images of your search? Try this: go to Google.com/images and now enter mars in the search field. Or, go to Google.com, enter your search and then click the images link along the top row. Try some other image searches such as New Jersey or Microsoft.

There are other ways you can use Google.com:

As a calculator: Simply type in your math problem in the search field (ex: 100*(150/5)).

As a spell checker: start typing your word and Google will suggest spellings for you.

Want a definition: just enter the word define first: ex: define:mars

As a world clock: want to know what time it is in Venice, Italy –type: time venice

As a currency, metric and bytes convertor calculator: want to know how much $100 is in euros, simply type 100 dollars in euros.

As an area code lookup: simply type in the area code in the search field.

Get the status of an airline flight: simply enter the flight number in the search field and the up to date status will be displayed

Get the current weather conditions for any location: enter the location:weather (ex: venice:weather)

Get up to date stock quotes: enter stocks:symbol ex: stocks:ge

See, there are some cool things you can do besides a plain text search. Have fun and let me know if you have any other Google tips.

CES 2010- Cool Stuff

I think someday I’m going to the Consumer Electronics Show, that is as soon as I figure out how to get invited. Its invitation only and you need to be working in the consumer electronics field. In any case, there were some really cool gadgets displayed there.

First of all TV’s will be changing. Some models will be controlled by hand gestures, no more losing the remote control. Example, a flick of the wrist (like turning a dial) will change the channel, while an upward flick will increase the volume. And to be released later this year is the 3D televisions. Actually the best of show product was Panasonic VT25 Series, a 3D capable, HD TV. The 3D portion is achieved by wearing glasses and using stereoscopic 3D effects. Basically the special shutter glasses alternately shut off the left eye and the right eye. At the same time, the TV is alternating images that are intended for either the left eye or the right eye. The viewers’ brain puts together the different images it sees to form the 3D image. And, for the regular view not wearing glasses – the refresh rates is so high that the alternating images are seamless.

In the Gaming world: Microsofts Project Natal – Gesture sensitive gaming (no more remotes). Play Dodge ball where people actually jump to move their characters. Microsoft’s attempt at competing with Nintendo and Wii. It’s an add on peripheral to the Xbox 360. The full body 3D range of motion is detected using an RGB camera, depth sensor and multi-array microphone. All I will say is it looks really cool. Go do a search on youtube.com for Project Natal. Let me know what you think, oh and be sure to meet Milo (he can recognize people, voices, emotions and movements).

Here are some other interesting products (Best of CES Awards):
Eye-Fi pro X2 — 8 GB SDHC, holds pictures and uploads to any folder on your computer or on the internet thru wifi.

Motorola BackFlip – google Android cell phone, keypad and display both face out and it flips all the way back so that they both face each other (like a mini laptop)

Lenovo IdeaPad U1 Hybrid notebook – when closed it looks like a slick laptop running windows 7 then you discover that it’s also a tablet. The display comes off and it’s a touchscreen tablet similar to the Skylight smartbook.

Green category: Tenrehte Tech Picowatt Wifi Smart Plug – Green technology for the home. It’s a Wifi enabled device that you plug some of your appliances into (such as: heater, dishwasher and air conditioner). Now you can control those devices through your computer or a smart phone. You can also connect your home network into this device. The intent is to save money on your utility bill since you can control the appliances being on or off.

Sorry this blog wasn’t posted earlier. There are several very interesting products that were introduced in CES this year. Check them out!

Here comes Windows Live Mail!

Windows Live Mail is the latest email client from Microsoft. It is intended to replace Outlook Express and Windows Mail (the e-mail client that came with Vista). All window users can download the program from Live.com or use the version that comes with Windows 7. It has more features and has better security than its predecessors.

The first version was released in November of 2007. It’s part of a larger suite called “Live”. Windows Live is a set of services and software from Microsoft. Most of the tools are web based (accessible through a browser, however there are some that require local installations. Some examples of web based are: calendar service, online photo gallery, online contacts list, online file storage (called skydrive). Some examples of software requiring installation are: Windows Live TV, Windows Live Mail and Windows Live Messenger.

OK, back to Windows Live Mail.

Live Mails’ foundation is Outlook Express although the interface and features are superior. The first big change is the interface. It is more flexible and allows the user to configure it to his liking. You can now setup multiple email accounts including gmail, hotmail and yahoo accounts. So, you can collect all your emails in one location. And, each account will get its own set of default folders (inbox, drafts, sent items, junk e-mails and deleted items).

Another cool feature is when you send photos over e-mail. The recipient will receive a thumbnail first. You also have control on how the thumbnail will look such as: size, frames, borders and text. The thumbnail is sent to the recipient and the larger picture is stored at a private web location. The picture will be downloaded when the recipient clicks on thumbnail. Thus, there inbox is not clogged up waiting for a large picture to be downloaded. Cool…

The search tools are faster and better, RSS feeds can now be brought into your mailbox and blogging is directly accessible to your Windows Live Space location.

So go ahead, start using Windows Live Mail. Of course I prefer the full Outlook version, but most home users will find everything they need in Windows Live mail.

Migrating from Outlook Express into Windows Live Mail is straight forward. If you have a new computer running Windows Live Mail, then you will need to copy the dbx files over from the old computer. Open Windows Live Mail and import the data. I won’t go into each step here, there are numerous instructions on the web for this. Do a google search…

Internet Security: What do you need? Free version or spend the $$$

Internet Security: What do you need? free version or spend the $$$

Remember when virus security meant not opening an e-mail attachment from someone you didn’t know. Well, the game has certainly changed from those days. Now you need to be concerned about viruses, spyware, malware, adware, worms, bots, Trojans, Internet attacks. Well, some of these terms overlap – but you get the idea. So what software do you need: Anti virus software, Anti-Malware, Internet Security software, an appliance firewall? Here is where you need to have an understanding of exactly what you are looking at.

Definitions:

Virus: A program that is copied onto your computer , boot sector or document. It can be transmitted through attachments, downloaded files or reside on a CD.

Malware: “Malicious Software” – a program that installs itself on your computer without your permission. It comes in many forms such as viruses, worms, Trojans, adware and spyware.

Spyware: a dangerous form of Malware. It can steal private information stored on your computer.

Worm: A virus that replicates itself by resending itself as an e-mail attachment or as part of a network file.

Firewall: will monitor all the network traffic (transmitting behind the scenes). It’ll block unknown and unsolicited traffic from entering your computer, thus protecting you from hackers, worms and viruses. A Firewall provides the first line of defense.

Most Internet Security Suites will cover all the bases for you- that is: they come with anti-virus, anti-spyware, firewall and usually parental controls. Most of the free software only covers 1 or 2 of these topics. So, when choosing this route you will probably need to download each component separately. You also need to verify that the programs are compatible with each other. You may run into a scenario where a firewall from one vendor is not compatible with the anti-virus program from another.

You still have more work to do: you should get an anti-virus program that has real time protection, on demand scanner, auto updater, Heuristic analysis, Email protection and automatic online upgrading.

Make sure your malware program has real-time protection, heuristic scanning, on-demand scanning, quarantine controls and online upgrading.

And, don’t forget about the firewall.

Why a firewall? Well there are worms that spread through ports from other computers on the network (or Internet) without the help of any program. They transmit behind the scenes. The firewall will block this unsolicited traffic. This is why anti-virus software is simply not enough to protect your computer on the Internet.

The most basic firewall will detect and prevent intrusion to your computer from unsolicited network traffic. It can also make your computer invisible to others on the Internet, makes it harder for other computers to find you. There are many other features that come with firewalls that cost you some money. These include 2-way firewall, anti-phishing, identity protection and parental controls.

Is Windows firewall good enough, do I really need added software? One key question is: do you want to put your security in the hands of Microsoft. There are some studies that have shown some data leakage through the windows firewall. I’m a believer in using multiple vendors to help cover all the bases. So, my vote is to go out and get a firewall from a vendor that specializes in security.

And just one note about MAC’s: Just because you are running on a MAC, doesn’t mean that you are not vulnerable to viruses. One theory for why you haven’t heard about viruses on the MAC’s is because the hackers were going after the pc world since pc’s hold an overwhelming market share over the MAC. It’s no fun to attack a small crowd. But, as the MAC increases its market share –the viruses are starting to become more prevalent. Nothing to panic about, but it is something to be aware of. Funny, some experts tell MAC users not to open E-mail from someone you don’t know, don’t launch any program that looks suspicious and use password protection. Isn’t this where security for a pc started?

And, of course, make sure that the software you are planning on using is not Malware itself!

Why not spend $50 for full suite protection (anti virus, anti-malware, 2-way firewall, identity protection, parental controls and anti-phishing). Seems to me, spending $50/year to help ensure that your computer and identity data are safe is money well spent. Don’t get me wrong, there are some very good, free products on the market. You need to do your homework to make sure you are completely covered, that all components are up-to-date and working properly. It is your responsibility to make sure your signature files (key data files) are up to date.

And, when I say up-to-date – I mean daily!

Anti-Virus going to the Clouds

Cloud computing is a type of computing where the resources are provided as a service over the Internet. One example that I’m sure you’ve used is mapquest or Google maps. There are services that offer Office type products over the Internet. So, how will cloud computing be used for security and anti-virus. Many of the lead vendors have anti-virus products using the Cloud on the market now.

Currently security products run locally on your PC. They consume resources and are not always as up-to-date as they should be. Even the vendors have a difficult time staying on top of all the latest potential threats. Anti-virus programs developed in the SaaS (Software-as-a-service) model take the burden off of home users and small to mid size companies. These companies probably aren’t paying for a high end security solution and don’t have the resources to dedicate to data security.

Most lead vendors have released or are developing the next generation of security using the cloud-client content security infrastructure. The client is a light weight client, beneficial for your local pc’s. Trend micro has a product called “Smart protection network”. They use several statistics to help determine the condition of the files. Some of there tests use web reputation scores, email reputation and file reputation scores. The file will be blocked in the cloud if the reputation scores are at a high level. Ex. Incoming email can be tested based on the senders IP address, if they are on the suspect list then your email will be blocked in the cloud. This is determined through behavioral activity software running in the cloud.

CloudAV, developed at the University of Michigan during 2008 uses the concept of running multiple search and behavioral engines. Each engine is run on a virtual system, thus resolving the issue of multiple antivirus engines running on the same system.
CloudAV also uses cache analysis. This can increase processing and access time because once a file has been scanned it won’t need to be scanned again. The history of each file scan is saved and as new viruses are discovered, a retro scan is run. So, a file may have a virus that the anti virus vendors haven’t discovered yet. In this case, it will be caught when the vendor discovers the file and a retro scan is run.

Some of the benefits for cloud antivirus protection are: The signature files will be as up to date as possible, use of multiple search engines and less local resources used.

The disadvantages of using a model like this are: you need a strong Internet connection, there may be a lot of data transferred and do you want your files moved to the Cloud? While the engines will use a hashing mechanism(won’t have to transfer the whole file) for scanning, the fall back when there is a detection will probably be to transfer the whole file.

I think the biggest question is do you want your files out on the cloud? Fundamental question that you need to answer for yourself or your business.