|People encountering Ubuntu for the first time will find it very similar to Windows. The operating system has a slick graphical interface, familiar menus and all the common desktop software: a Web browser, an e-mail program, instant-messaging software and a free suite of programs for creating documents, spreadsheets and presentations.
Ashlee Vance, A Software Populist Who Doesn’t Do Windows
There’s a big blogswarm right now about about whether or not Ubuntu is easy to use.
It all started when a college student in Madison Wisconsin bought a Dell laptop for a distance learning class and the computer arrived with Unbuntu Linux as the operating system. She was not a happy customer because she wanted Windows — so she went to the local TV station to get some help. The story got picked up by Digg and by Slashdot and Linux bloggers everywhere and the poor girl was bombarded with hate comments.
I’m just not getting it.
Is this an Ubuntu story? Or is it a dissatisfied customer story? It’s certainly NOT a story about how girls are stupid idiots and should not be allowed near a laptop running Linux. But that’s what you might think from reading some of the trash floating around the blogosphere.
Sure, Ubuntu might look like Windows — but hey guys, does it work exactly like Windows? That is, can you really expect the average college kid who’s grown up using Windows to open a laptop running Ubuntu without a hitch? Apparently someone at Dell tech support thought so. That is until he started getting blaimstormed in the media for ending this Wisconsin student’s college career.
The whole thing is kind of silly. It’s not the girl’s fault, it’s not the tech support guy’s fault and it has nothing to do with Ubuntu.
You’d have the same problem if you asked a Windows’ user who’s never used a Mac to start work tomorrow using OS X . There are going to be some moments of confusion and getting lost. It would be silly to presume otherwise. Yeah, the basics are still the same, but things are put in different places and tools are called by different names. It’s just OS culture shock. You have a panic attack and you get over it. That’s all that happened to that poor girl in Wisconsin.
The real story here is “What is Dell doing shipping laptops with Ubuntu as the default OS?”
Aha! Now THAT’S an interesting story. You see, Mark Shuttleworth — who describes himself as a billionaire, bachelor and ex-cosmonaut — has teamed up with Dell to make Ubuntu the operating system of choice for low-end laptops. And he’s not doing it for the money. He’s doing it because he likes the challenge. (And what’s more challenging than selling something the customer can get for free?)
His company’s name is Canonical. According to New York Times it’s worth $30 million right now. Keep an eye out for Mark Shuttleworth. Like Bill Gates, he’s an intriguing mix of businessman-humanitarian. Mark Shuttleworth is going to be a very interesting personality to follow as the world’s economy recovers from the Crash of ’08.
Tonight I’ve been reading about MAID and how it can help cut energy costs in the data center by limiting the number of spinning disks. This week’s buzzword (besides Obama) seems to have been “intelligent power management.”
Ironically, according to a CDW Corp. report titled “Energy Efficient Information Technology,” 94 percent of IT executives with purchasing responsibility said they cared about energy efficiency but had no idea how much energy their IT operations used — even though they realized that that knowledge is critical to energy reduction efforts. CDW should have sent them all this list of low-hanging-fruit energy savers from SearchSMBStorage.com
|Security vendors from across the spectrum have warned that a stingy worm has been successfully exploiting a hole in Microsoft Windows server service. Known as Confliker or Downadup, the worm spreads by exploiting a remote procedure call (RPC) vulnerability.
Robert Westerfelt, Confliker, Downadup worm hype? Get the facts
There’s a new variant of the Conficker worm. It’s known as ‘Downadup.’ Microsoft issued a patch for the worm last October but it’s still spreading and mutating.
The worm, which some authorities say has been able to build the largest botnet on record, works by exploiting a vulnerability in remote procedure calls that allows remote code to be executed once a vulnerable machine receives a specially crafted RPC request. In plain English, this means that if an end user views a specially crafted Web page using Internet Explorer, his computer will request malicious code to be executed. Like many of its malicious predecessors, this worm denies infected machines Internet access to security vendor websites.
Microsoft added routines to clean up Conficker infections to the January edition of its Malicious Software Removal Tool. Customers in the U.S. and Canada can receive technical support from Microsoft Product Support Services at 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates. The National Cyber Alert System recommends that to prevent further infections by infected USB devices, users should disable the Windows auto-play feature.
It’s quite a day here!
|Despite the popularity of SSL VPNs, they are not intended to replace Internet Protocol Security VPNs. The two VPN technologies are complementary and address separate network architectures and business needs.
William Jackson, quoting from Special Publication 800-113
I started to add to a short definition we have for FIPS – Federal Information Processing Standard – to promote our newest site, SearchCompliance.com and somehow I got turned around and started reading about SSL VPNs. (Somewhere in my reading I discovered that Federal agencies deploying SSL VPNs have to configure them to only allow FIPS-compliant cryptography and SSL.)
What got my attention was a blog post by someone named Shakya about how SSL VPNs are vulnerable to man-in-the-middle attacks. The reason? Because many SSL VPNs weren’t built with wireless in mind. Shakya does a really good job explaining the vulnerability in simple terms. His blog is not for the faint of heart, but it reinforces this warning — never check your bank account balance at Starbucks!
Circling round again to SSL VPNs, the Department of Commerce put out a Guide to SSL VPNs last summer. It’s really well written. If you are making a business case for implementing an SSL VPN or you’re an admin who needs help with documentation for the business side, I suggest you take a look. As the report from points out, an SSL VPN is not a magic security bullet. There are still many instances when a VPN application installed on the end-user’s computer is the way to go. Not everything will be done in the cloud.
JEMS is available from Red Hat through subscriptions that include certified software, support, updates and patches, documentation and multi-year maintenance policies.
Note: I’m starting to hear “cloud services” being called “middleware” again. Cloud computing = middleware as a service (MaaS)? I don’t think it’ll stick. The acronym is pronounced Mass and will just remind the user that when his stuff is in the cloud and he’s given up all that control, he’d better pray.
|DLP, once seen as a quick-fix solution for reducing data breaches, is rapidly being recast as a core strategy for discovering sensitive information in the enterprise and controlling access to it. As that evolution occurs, DLP is increasingly becoming the spark that restarts previously stagnant data encryption projects.
Tim Wilson, Encryption: DLP’s Newest Ingredient
DLP stand for data leak or data loss protection. It’s a more popular product name with vendors than the old name they tried in 2007, extrusion protection. (What an awful name!) As DLP products have evolved and been integrated with other security tools like desktop and mobile device management, DLP vendors have tried out other names including the very silly name, anti-employee theft prevention (who would want to steal an employee?).
But seriously, the goal of any DLP product is to plug leaks by monitoring and documenting data as it leaves an organization.
In the past, you’d only find a DLP product at a network gateway in a large corporation. Services industries, healthcare and insurance quickly jumped on the DLP bandwagon, motivated by compliance regulations — but increasingly vendors are targeting the mid-market. Forrester predicts that 20% of all small and mid-sized businesses (SMBs) will be shopping for a DLP solution in the next 12 months and 25% have already adopted email encryption, network storage encryption and data leak prevention.
In ten minutes, you’ll learn what IPv6 is, how and when it will replace IPv4, why we skipped IPv5 and why IPv6 adoption has been slower in the United States than in Asia or Europe.
|Most industry watchers agree that organizations must support connections to and from IPv6 networks by 2011, at least at the gateway. This also is the year that IPv4 addresses are expected to run out. But adoption is likely to be slow going until then.
Adam Ely, IPv6 Makes Slow Progress
Obstacles include the continued widespread use of IPv4, because upgrading to IPv6 means replacing operating systems and software that isn’t IPv6-aware.
|The promise of TV delivered via IP is gaining momentum globally the more the Internet merges with consumer electronics, especially televisions. But plenty of challenges remain, not the least of which is the pending depletion of the IPv4 address space.
Sean Michael Kerner, IPv6: The Future of IPTV?
The move to IPv6 has been slow around the globe, with a few exceptions. One of them is in Japan, where deployment of IPv6 by telco NTT could provide a blueprint for carriers preparing for the rise of IPTV.