Iphone 3Gs is coming!

Iphone 3Gs 1. Fastest!
Everything you do on iPhone 3G S is up to 2x faster and more responsive than iPhone 3G.

2. Video
You can shoot video, edit it, and share it

3. Megapixel Camera
Built-in autofocus and a handy new feature that lets you tap the display to focus on anything

4. Voice Control
Voice Control recognizes the names in your Contacts and knows the music on your iPod

5. Compass
Built-in digital compass, iPhone 3G S can point the way. Use the new Compass app, or watch as it automatically reorients maps to match the direction you’re facing.

6. Cut, Copy & Paste
Cut, copy, and paste words and photos, even between applications. Copy and paste images and content from the web, too.

7. Landscape Keyboard
Rotate iPhone to landscape to use a larger keyboard in Mail, Messages, Notes, and Safari.

8. Messages
Send messages with text, video, photos, audio, locations, and contact information.

9. Search
Find what you’re looking for across your iPhone, all from one convenient place.

10. Accessibility
IPhone 3G S offers accessibility features to assist users who are visually or hearing impaired.

11. Internet Tethering
Now you can share the 3G connection on your iPhone with your Mac notebook or PC laptop.

12. Voice Memos
Capture and share a thought, a memo, a meeting, or any audio recording on the go with the new Voice Memos application.

13. Nike + iPod
IPhone includes built-in Nike + iPod support. Just slip the Nike + iPod Sensor (available separately) into your Nike+ shoe and start your workout.

14. Stocks
Stocks on iPhone shows you charts, financial details, and headline news for any stock you choose.

15. YouTube
Watch YouTube videos wherever you are.

Meet the fastest, most powerful iPhone yet. iPhone 3G S features video recording, Voice Control, up to 32GB of storage, and more.

Read More

What Should You Do Before a Computer Crash

data backupDo you has the experience a computer crash or data loss? We know that once it happens there is very little we can do about it. Just can pay a data recovery company hundres or thousands of dollars to recover the data or lose the data forever.

What should you do before a computer crash?

Find all of the documents, pictures and other files that are important to you and move them to a central location on your computer. Having documents on your desktop and root folder of your C drive and all kinds of miscellaneous folders is not only a headache when you try to find something, but it will make backing up even harder and waste a lot of space.

The most important part of preparing for a computer crash is to save copies of your work on more than just your single hard drive. You can backup your data by Manual Backup, Backup Software or Backup Media.

Manual Backup.
This is the cheapest option in the short run. However, if you forget to make a regular backup yo u will loose some of your work. This option will likely also take you more time.

Backup Software
You can also choose from several pieces of software that will automate the process and make it much simpler and faster. The big advantage for this is that you can set backups to run at varying frequencies and at times while you aren’t using the computer. See the resource area for several backup solutions.

Backup Media
Regardless of how you backup your computer files, you must have a place to back up your files. You can look for online backup websites that will give you so much space to use for free or a small price. The problem with this is that it can be very slow depending on the speed of your ISP. The biggest advantage however, is that they are likely to have backup servers themselves. You’re next likely choice is to buy a second hard drive. You can buy an internal or external drive. This will give you the quickest way to backup your files on a regular basis. Finally, you can also prepare for a crash by saving your files onto CD or DVD. You will need a CD or DVD writer but these are common on most computers. Optical media like CDs or DVDs however, have a limited lifetime and can get scratched or lost. This is a good secondary backup source but shouldn’t be your own or primary source. A portable USB drive is a very good place to save files to also, but it has the same risks of an optical device. It can be lost or broken.

Regularly check your backups to make sure they will work when you use them. You can do this by opening your files and make sure they work but if you are using a program test it out, make sure you protect your files in at least one other place in case the backup software has a problem and corrupts your files.

Make a list of all the software you have installed on your computer. Find this software and make sure you have a working copy and have the serial number. This is also a good idea to make a backup of your programs.

Read More

RAID 6 — Do you really like it?

RAID 6For several years now RAID 5 has been one of the most popular RAID implementations. Just about every vendor that supplies storage to enterprise data centers offers it, and in many cases it has become — deservedly – a well-trusted tool. RAID 5 stripes parity and blocks of data across all disks in the RAID set. Even though users now must devote about 20% of their disk space to the parity stripe, and even though read performance for large blocks may be somewhat diminished and writes may be slower due to the calculations associated with the parity data, few managers have questioned RAID 5’s usefulness.

There are however, two major drawbacks associated with using RAID 5. First, while it offers good data protection because it stripes parity information across all the discs within the RAID set, it also suffers hugely from the fact that should a single disc within the RAID set fail for any reason, the entire array becomes vulnerable — lose a second disc before the first has been repaired and you lose all your data, irretrievably.

This leads directly to the second problem. Because RAID 5 offers no protection whatsoever once the first disc has died, IT managers using that technology have faced a classic Hobson’s choice when they lose a disc in their array. The choices are these. Do they take the system off-line, making the data unavailable to the processes that require it? Do they rebuild the faulty drive while the disc is still online, imposing a painful performance hit on the processes that access it? Or, do they take a chance, hold their breath, and leave the drive in production until things slow down during the third shift when they can bring the system down and rebuild it without impacting too many users?

This choice, however, is not the problem, but the problem’s symptom.

The parity calculations for RAID 5 are quite sophisticated and time consuming, and they must be completely redone when a disk is rebuilt. But it’s not the sophistication of all that math that drags out the process, but the fact that when the disk is rebuilt, parity calculations must be made for every block on the disk, whether or not those blocks actually contained data before the problem occurred. In every sense, the disk is rebuilt from scratch.

An unfortunate and very dirty fact of life about RAID 5 is that if a RAID set contains, say, a billion sectors spread over the array, the demise of even a single sector means the whole array must be rebuilt. This wasn’t much of a problem when disks were a few gigabytes in size. Obviously though, as disks get bigger more blocks must be accounted for and more calculations will be required. Unfortunately, using present technology RAID recovery speed is going to be constant irrespective of drive size, which means that rebuilds will get slower as drives get larger. Already that problem is becoming acute. With half-terabyte disks becoming increasingly common in the data center, and with the expected general availability of terabyte-sized disks this fall, the dilemma will only get worse.

The solution offered by most vendors is RAID 6.

The vendors would have you believe that RAID 6 is like RAID 5 on steroids: it eliminates RAID 5’s major drawback – the inability to survive a second disk failure – by providing a second parity stripe. Using steroids of course comes with its own set of problems.

RAID 6 gives us a second parity stripe. The purpose of doing all of the extra math to support this dual parity is that the second parity stripe operates as a “redundancy” or high availability calculation, ensuring that even if the parity data on the bad disk is lost, the second parity stripe will be there to ensure the integrity of the RAID set. There can be no question that this works. Buyers should, however, question whether or not this added safety is worth the price.

Consider three issues. RAID 6 offers significant added protection, but let’s also understand how it does what it does, and what the consequences are. RAID 6’s parity calculations are entirely separate from the ones done for the RAID 5 stripe, and go on simultaneously with the RAID 5 parity calculations. This calculation does not protect the original parity stripe, but rather, creates a new one. It does nothing to protect against first disk failure.

Because calculations for this RAID 6 parity stripe are more complicated than are those for RAID 5, the workload for the processor on the RAID controller is actually somewhat more than double. How much of a problem that turns out to be will depend on the site and performance demands of the application being supported. In some cases the performance hit will be something sites will live with, however grudgingly. In other cases, the tolerance for slower write operations will be a lot lower. Buyers must balance the increased protection against the penalty of decreased performance.

Issue two has to do with the nature of RAID 5 and RAID 6 failures.

The most frequent cause of a RAID 5 failure is that a second disk in the RAID set fails during reconstruction of a failed drive. Most typically this will be due to either media error, device error, or operator error during the reconstruction – should that happen, the entire reconstruction fails. With RAID 6, after the first device fails the device is running as a RAID 5, deferring but not removing the problems associated with RAID 5. When it is time to do the rebuild, all the RAID 5 choices and rebuild penalties remain. While RAID 6 adds protection, it does nothing to alleviate the performance penalty imposed during those rebuilds.

Need a more concrete reason not to accept RAID 6 at face value as the panacea your vendor says it is?  Try this.

When writing a second parity stripe, we of course lose about the same amount of disk space as we did when writing the first (assuming the same number of disks are in each RAID group). This means that when implementing RAID 6, we are voluntarily reducing disk storage space to about 60% of purchased capacity (as opposed to 80% with RAID 5). The result: in order to meet anticipated data growth, in a RAID 6 environment we must always buy added hardware.

This is the point at which many readers will sit back in their chairs and say to themselves, “So what?  Disks are cheap!” And so they are — which naturally is one of the reasons storage administrators like them so much. But what if my reader is not in storage administrator? What if the reader is a data center manager, or an MIS director, or a CIO, or a CFO? In other words, what if my reader is as interested in operational expenditures as in the CAPEX?

In this case, the story becomes significantly different. Nobody knows exactly what the relationship between CAPEX and OPEX is in IT, but a rule of thumb seems to be that when it comes to storage hardware the OPEX will be 4-8 times the cost of the equipment itself. As a result, everybody has an eye on the OPEX. And these days we all know that a significant part of operational expenditures derives from the line items associated with data center power and cooling.

Because of the increasing expense of electricity, such sites are on notice that they will have to make do with what they already have when it comes to power consumption. Want to add some new hardware?  Fine, but make sure it is more efficient than whatever it replaces.

When it comes to storage, I’m quite sure that we will see a new metric take hold. In addition to existing metrics for throughput and dollars-per-gigabyte, watts-per-gigabyte is something on which buyers will place increased emphasis. That figure, and not the cost of the disk, will be a repetitive expense that managers will have to live with for the life of whatever hardware they buy.

If you’re thinking of adding RAID 6 to your data protection mix, consider the down-stream costs as well as the product costs.

Does RAID 6 cure some problems? Sure, but it also creates others, and there are alternatives worth considering. One possibility is a multilevel RAID combining RAID 1 (mirroring) and RAID 0 (striped parity), usually called either RAID 10 or RAID 1+0. Another is the “non-traditional” RAID approach offered by vendors who build devices that protect data rather than disks. In such cases, RAID 5 and 6 would have no need for all those recalculations required for the unused parts of the disk during a rebuild.

Read More

The advantages and disadvantages of RAID 5EE

RAID 5EE is very similar to RAID 5E with one key difference — the hot spare’s capacity is integrated into the stripe set. In contrast, under RAID 5E, all of the empty space is housed at the end of the array. As a result of interleaving empty space throughout the array, RAID 5EE enjoys a faster rebuild time than is possible under RAID 5E.

RAID 5EE has all of the same pros as RAID 5E but enjoys a faster rebuild time than either RAID 5 or RAID 5E. On the cons side, RAID 5EE has the same cons as RAID 5E, with the main negative point being that not a lot of controllers support the RAID level yet. I suspect that this will change over time, though.

As is the case with RAID 5E, RAID 5EE requires a minimum of four drives and supports up to eight or 16 drives in an array, depending on the controller. Figure C shows a sample of a RAID 5EE array with the hot spare space interleaved throughout the array.

 

A RAID 5EE array with five drives A RAID 5EE array with five drives

When a drive fails, as shown in Figure D, the empty slots are filled up with data from the failed drive.

empty slots are filled up with data from the failed drive.

Read More

the advantages and disadvantages of RAID 5E

RAID 5E with an E that stands for Enhanced, RAID 5E is a RAID 5 array with a hot spare drive that is actively used in the array operations. In a traditional RAID 5 configuration with a hot spare, the hot spare drive sits next to the array waiting for a drive to fail, at which point the hot spare is made available and the array rebuilds the data set with the new hardware. There are some advantages to this operational method:

  • You know for a fact that the drive that would have been used as a hot spare is in working order.
  • There is an additional drive included in the array, thus further distributing the array’s I/O load. More spindles equals better performance in most cases. RAID 5E can perform better than typical RAID 5.

There are a few disadvantages associated with RAID 5E as well:

  • There is not wide controller support for RAID 5E.
  • A hot spare drive cannot be shared between arrays.
  • Rebuilds can be slow.

The capacity of a RAID 5E array is exactly the same as the capacity of a RAID 5 array that contains a hot spare. In such a scenario, you would “lose” two disks’ worth of capacity — one disk’s worth for parity and another for the hot spare. Due to this fact, RAID 5E requires that you use a minimum of four drives, and up to eight or 16 drives can be supported in a single array, depending on the controller. The main difference between RAID 5 and RAID 5E is that the drive that would have been used as a hot spare in RAID 5 cannot be shared with another RAID 5 array; so that could affect the total amount of storage overhead if you have multiple RAID 5 arrays on your system. Figure A gives you a look at a RAID 5E array consisting of five drives. Take note that the “Empty” space in this figure is shown at the end of the array.

A RAID 5E array with five drives

A RAID 5E array with five drives

When a drive in a RAID 5E array fails, the data that was on the failed drive is rebuilt into the empty space at the end of the array, as shown in Figure B. When the failed drive is replaced, the array is once again expanded to return the array to the original state.

 

Fig_B_Lowe052307

A RAID 5E array that has been rebuilt into the hot spare space

Read More

Western Digital Enters Solid State Drive Market

western digital Western Digital, a world leader in hard drive storage for computing and consumer electronics applications, announced that it has completed a $65 million cash acquisition of SiliconSystems, Inc., Aliso Viejo, Calif., a leading supplier of solid state drives for the embedded systems market.

Since its inception in 2002, SiliconSystems has sold millions of SiliconDrive® products to meet the high performance, industrial, embedded-computing, medical, military and aerospace markets. These markets accounted for approximately one third of worldwide solid-state drive revenues in 2008. SiliconSystems’ product portfolio includes solid-state drives with SATA, EIDE, PC Card, USB and CF interfaces in 2.5-inch, 1.8-inch, CF and other form factors. SiliconSystems has developed extensive intellectual property to address the stringent embedded systems market requirements to ensure data integrity, eliminate unscheduled downtime, protect application data and software and provide for data security and protection through its patented and patent-pending PowerArmor®, SiSMART®, SolidStor® and SiSecure™ technologies.

WD’s storage industry leadership, worldwide infrastructure, and technical and financial resources will enable further growth in SiliconSystems’ existing markets and customer relationships. SiliconSystems’ intellectual property and technical expertise will provide additional building blocks for future products to address emerging opportunities in WD’s existing markets.

“We are delighted to have the SiliconSystems team join WD,” said John Coyne, president and CEO of WD. “The combination will be modestly accretive to revenue and margins as a result of SiliconSystems’ existing position as a trusted supplier to the well-established $400 million market for embedded solid-state drives. SiliconSystems’ intellectual property and technical expertise will significantly accelerate WD’s solid-state drive development programs for the netbook, client and enterprise markets, providing greater choice for our customers to satisfy all their storage requirements.”

Integration into WD begins immediately, with SiliconSystems now becoming known as the WD Solid-State Storage business unit, complementing WD’s existing Branded Products, Client Storage, Consumer Storage and Enterprise Storage business units.

Read More

Backup VS Data Safety

data backup

Entry-level RAID controllers allow administrators to create secure multi-drive storage arrays to host a server’s operation system and vital data.

Many people don’t appreciate the value of backups and data safety until they experience what it means to lose data. Whether it is music, videos or photos at home or project files, customer data or other digital assets in the office, people don’t think of data safety – until it’s too late.

Imagine how you would feel if your vacation photos or videos of your wedding and daughter’s birth were destroyed? Such scenarios can lead to divorce court when your better half finds out. Or how would your boss react if his or her email and project files were lost due to a faulty hard drive? Your life might be spared, but you could still get fired.

No warranty in the world protects you from such an incident. Make no mistake about it: these things happen every day! If it’s your data, it’s your responsibility to protect it. And even if you’ve got a boss who eventually is responsible, he or she might still blame the loss of data on you. In the end, you can do no wrong by developing awareness of threats and paying attention to data safety.

Backup Vs. Data Safety

At this point we have to differentiate between a backup and basic data safety. Both mean something different and every business should rely on both regular backups and a safe data repository.

Performing a backup means copying files or complete system images from your hard drive onto another storage device, where the data is safe from hardware malfunction, viruses or accidental modification. If anything happens to your primary data, you can access the backup “snapshot” and restore whatever you need.

Any type of drive can be used for backups, but you should pay attention to data safety offered by the solution you pick. A hard drive, for example, cannot be considered a safe medium, as it uses mechanical components that may fail. A perfect backup is performed frequently, is written onto alternating media that are partially stored off-site and should be written onto media that is widely available.

When we talk about data safety, we specifically address the issue that every computer stores all key data on hard drives, and that every hard drive will eventually fail. The challenge is to create a storage subsystem that is unsusceptible to hard drive failures. This is where the five RAID storage controllers come into play.

AMCC, Areca, HighPoint, LSI Logic and Promise Technology offer PCI Express add-on cards that run up to four hard drives to create fast and secure storage array.

Read More

Top 10 worst computer viruses (Sasser & I Love You)

2. Sasser
Shaun Nichols: Just how much damage can a virus do? Well, take the Sasser worm as one example. This relatively simple little attack managed to cripple airlines, news agencies and even knocked out government systems.

Perhaps most frustrating, however, was that Sasser infection was very easy to prevent. The vulnerability which the attack exploited had been patched for months, and all users had to do was install the most recent security updates from Microsoft.
Sasser was a stark warning that has yet to be heard by many. Unpatched systems are still pervasive around the world, leaving users vulnerable to Sasser and countless other malware attacks that target patched vulnerabilities.

Iain Thomson: I remember the Sasser outbreak well, as I was on holiday and staying with friends in New York when it struck. Being the token geek I spent a good few hours fixing my friend’s computer and cursing the fool who wrote the worm that had me sitting in front of a computer screen when I could be sipping cocktails in Greenwich Village.

The worm caused havoc, not just shutting down a news agency’s systems but causing Delta to cancel some flights and leaving the British coastguard crippled for hours, putting lives at risk. If I’d been a seaman in peril I’d want serious words with the 17-year old author, Sven Jaschan. He was caught after Microsoft put a bounty on his head, something they should do more often.

Jaschan got away with a suspended sentence because he wrote the code before reaching the age of 18. He also caused a storm by accepting a job with a security company in his German homeland. This is not done in the security industry and caused the company, Securepoint, to be shunned by others in the field

1. I Love You
Shaun Nichols: They say you always hurt the ones you love. In 2000, this was taken to extremes when the ILoveYou attack racked up some $5.5bn in damages.

The concept was pretty simple: a user receives a file from a known email contact under the title ‘LoveLetter’ or ‘ILoveYou’. When the attachment is opened, the virus is launched. After infecting the host, the virus then took control of the user’s email program and sent the same ‘ILoveYou’ message to every user in the host’s address book.

Love must have been in the air, because the virus was potent enough to infect some 10 per cent of internet-connected machines at its peak. At a time when many users were still trying to learn the finer points of the internet, ILoveYou was a major wakeup call to some of the dangers on the web.

Iain Thomson: Everybody wants to be loved and ILoveYou was brilliant social engineering. It helped that the virus was spammed out in the early days of internet use and there were a lot of newbies online who had only a vague idea about viruses and how dangerous they could be.

Email was a trusted format and, because the messages came from people the recipient actually knew, the likelihood of them being opened was much higher.

Things are different today, although there are still plenty of people who get caught by social engineering attacks, but ILoveYou makes it so high in the list because it was a brilliant piece of social engineering.

Read More

Top 10 worst computer viruses (Nimda & MyDoom)

Computer Viruses4. Nimda
Iain Thomson: A week after the 11 September atrocities a new virus hit the internet in a big way. Nimda was one of the fastest propagating viruses in history, going from nowhere to become the most common virus online in 22 minutes, according to some reports.

The reason for this speed was that Nimda used every trick in the book to spread itself. It used email, open network shares, IIS vulnerabilities and even web sites to spread. It hit pretty much every version of Windows available and appeared all over the place.

In the paranoid days after the terrorist attack some speculated that this was a digital 11 September, and some security consultants got large speaking fees for suggesting just that. In fact, it was nothing of the sort and was just another attempt at large scale infection.

Shaun Nichols: In the days following the 11 September attacks, everyone was on edge and all types of threats were given plenty of attention. This, in part, helps to explain why Nimda got the attention it did.

Nimda not only played on hype; the worm was also especially virulent due to the sheer number of methods it used to propagate. In addition to spreading via email, Nimda used web site exploits to infect HTML pages and local machine exploits to spread between individual files.

The result was an extremely effective virus circulating at a time when people were more sensitive to all types of threats, both online and offline.

3. MyDoom
Shaun Nichols: Ah yes, the old ‘infect the host then resend to the entire address book’ attack method. Like many other attacks, MyDoom used the tried-and-true practice of spreading through email and address books.

But MyDoom went a step further and targeted peer-to-peer networks. The worm not only spread itself through address books but through the shared folder of users who ran the Kazaa file sharing application.

While definitely skilled programmers, MyDoom’s creators also seemed to be fans of good old-fashioned vigilante justice. One of the early tasks performed by infected users was to take part in a denial-of-service attack against SCO, the infamous software vendor that once tried to lay claim to the patents for Linux.

Iain Thomson: MyDoom was interesting because it was one of the first to use peer to peer as a transmission device, as Shaun notes.

Kazaa was at the peak of its popularity and was causing headaches for Hollywood and the security community. If I had £1 for each time a security expert ranted about the stupidity of using peer-to-peer networks I’d be a rich man. Downloading a file onto your computer from an untrusted source? Madness.

The attack on SCO was also fascinating. SCO was, and to an extent still is, the most hated IT company among users, even more than Microsoft at the time. A worm that attacked a company was something new and raised all sorts of possibilities.

Read More

Top 10 worst computer viruses (Storm & Melissa)

worst computer viruses6. Storm
Shaun Nichols: Before Conficker came around and got everyone worked into a lather, Storm was the big bad botnet on the block. First appearing in early 2007 as a fake news video on European flooding, the Storm malware menaced users for more than a year.

The huge botnet was also influential for its continued use of social engineering tactics. The malware disguised itself as everything from video files to greeting cards, and attacks were continuously refreshed to coincide with holidays and current news events.

While Storm has since been eclipsed by newer botnets, the name still brings to mind one of the most menacing attacks seen in recent years.

Iain Thomson: When extreme weather hit Europe the damage was bad enough, but the Storm code made things much worse. At a time when many were seriously concerned about the health and safety of friends and family, the last thing anyone needed was an infection.

But Storm was a classic piece of social engineering. At a time when people are concerned they don’t always  think of the consequences, be it approving torture or opening an email attachment.

This kind of social networking is nothing new, of course, but the Storm malware did it very well indeed and proved very effective as a result.

5. Melissa
Shaun Nichols: It was a classic love story. Boy meets girl, girl dances for money, boy goes home and writes computer virus for girl, computer virus gets out of hand and causes millions of dollars in damage. It’s the Romeo and Juliet of our time.

When a New Jersey hacker wrote a small bit of code named after a stripper he met in Florida, he had no idea of the chaos that would ensue. The Melissa virus, as it came to be known, got way, way out of hand.

The virus spread like wildfire throughout the net, and an unintended effect of the worm led to a glut of email traffic that overflowed servers and caused tons of damage and lost work time to corporate IT systems.

The hacker himself was later caught and sentenced to a year and half in prison. Next time he wants to impress a girl, hopefully he’ll stick to chocolates and jewelery.

Iain Thomson: Now, I’ve done some stupid things to impress girls, things that cause me to bite my fist with embarrassment nowadays and one that left me with a small amount of scar tissue, but writing a computer virus makes these pale by comparison.

The real damage of Melissa was not in the code itself, but in its spamming capabilities. The software caused a massive overload of email systems and generated enough traffic to make it highly visible. Current computer malware writers have taken note of code like Melissa and now fly much lower under the wire to attract less attention.

Read More