JasmineCorp Blogs Cannot open jcsearch.dbCannot open jcsearch_time.db
Updated Blogs
Akku HP ProBook 6570b
Benefits of Anger Management Therapy
Midlands Wedding Photographer Captures Those Wedding Moments
PROMO Autel MaxiSys Elite – 2018 Diagnostic Tool
More .....

JCBid.com online auction 5-yards-of-satin-fabric-royal-60-w-just-379-yard
5 yards of satin fabric royal 60" w just
JCBid.com online auction 1-yards-of-satin-fabric-60-w-white-just-399-yard
1 yards of satin fabric 60" w white just
JCBid.com online auction 10-yards-of-satin-fabric-60-royal-just-349-yard
10 yards of satin fabric 60" royal just
JCBid.com online auction Long-flathead-screwdriver-display-case-of-72-pieces
Long flathead screwdriver display case o
JCBid.com online auction Stick-on-reflectors-set-display-case-of-96-pieces
Stick-on reflectors set display case of
Blog by JasmineCorp | Create your own Blog

Bookmark and Share RSS Feed | Login           



Apple 661-2927 Battery

By Zdziarski at 2017-10-20 11:16:37

NCC's work shows that even cars whose systems are not connected to mobile networks might be vulnerable. The hack was demonstrated to BBC Radio 4's PM programme.Andy Davis, NCC's research director, explained that an attack rig could be put together using cheap components connected to a laptop. The infotainment system of a targeted car, once compromised, could be used as a stepping stone to attack more critical systems, including steering and braking. Depending on power, a DAB broadcast could be used to attack multiple cars.“If you had a vulnerability within a certain infotainment system in a certain manufacturer's vehicle, by sending one stream of data you could attack many cars simultaneously," he told the BBC, adding that attack data could be steganographically implanted within an audio or music stream. "[An attacker] would probably choose a common radio station to broadcast over the top of to make sure they reached the maximum number of target vehicles."The approach has only been attempted in the lab. Davis has previously hacked into a real vehicle's automatic braking system through manipulating its infotainment system. A similar approach could be replicated through a DAB broadcast, he suggested.

NCC is not saying what infotainment system it hacked or giving details of its attack, which it plans to outline at greater length at the upcoming Black Hat conference in Las Vegas next month. Valasek and Miller also plan to outline their work at Black Hat in a presentation billed as Remote Exploitation of an Unaltered Passenger Vehicle, which is likely to be the hottest ticket in Vegas in a couple of weeks' time.Jeremiah Grossman, founder and CTO of WhiteHat Security, said that both hacks underlined the point that cars were becoming computers on wheels, which need better protection than we currently offer PCs.“We protect our PCs and servers from being hacked using special configuration settings, security software, and ‘best-practice' behaviours,” Grossman explained. “The overall effectiveness of all this ’security’ is, at best, so-so... but fortunately no-one dies when a system gets hacked.”

"With car hacking, and cars being little more than rolling computers nowadays, are we expected to install security software, etc there too? Or, are manufacturers responsible for protecting their car's occupants against a digital adversary? An interesting fork in the digital road. In the future, all cars are equidistant to the attacker, as will be the electricity meter on your home,” he added. As we all know, the world of backup is changing, and not just in obvious ways such as the move to disk and cloud-based backup, the adoption of deduplication, the need to copy, back up and restore virtual machines, and so on.First, flash memory and the wider availability of snapshots and replication means that other elements of the storage infrastructure are taking on more of the responsibility for data protection. Features such as replicated snapshots are now faster and better, albeit more expensive, ways to recover a failed system than traditional backup.Then there are equally fundamental changes under way in the nature of the data that needs protection, where it needs to be fetched from, the level of protection it needs and what you can do with it once it is backed up.

In particular, the possibility of reusing backed up data offers opportunities to mitigate the rising cost of data protection, and potentially even turn it into an asset.Innovations such as disk-based backup allowed you to retain existing processes, which usually mean scheduled backups, and to finish the job faster – or, in this world of spiralling data growth, to back up more data in the same amount of time.These changes, however, require new processes, new thinking, and probably new hardware and software too.Data growth has long since pushed us past the point where we can afford to treat all data equally.“The first thing to do is to take a step back and find all the data you have,” says Freeform Dynamics analyst Tony Lock.“Don't start by thinking about data protection. People have tended to protect all their data the same way. What you really need to ask is what are the protection requirements and what are the recovery requirements?”The recovery time and recovery point objectives (RTO and RPO) are the two key measures of whether your backup has any practical value. They measure your effective ability to recover your systems from backups.RPO is the length of time between backups (or protection events) and reflects how much recent data might be lost if a failure occurs. RTO is how long it takes to get the data back in place and ready to resume work, a process that can take longer using traditional backup technologies.

Different data has different requirements, so just as you might have multiple tiers for production data depending on the performance needed, backups can be tiered too.At one extreme, relying on weekly backups destroys the RPO for hot data, while at the other feeding everything into a continuous data protection (CDP) appliance risks wasting an expensive resource on cold data.The chances are that you will need a combination of approaches, tailoring them to the needs of each class of data.“You want to keep the classification a simple as possible. Some things you need to back up only once a month, others you need to back up every week or every day, and there are some that might need CDP or a similar real-time approach,” says Lock.None of this is any good, however, if you don't protect all your applications and data, and recent seismic shifts make it difficult for IT professionals to know where all of their organisation's data is.Instead of simply being in the data centre, it could be in the cloud, on a departmental server or appliance or, perhaps worse of all, on a multitude of mobile devices wirelessly connected over a variety of public and private networks.

The cloud and mobile aspect is massively changing the backup business, argues Wynn White, chief marketing office at Druva, which develops endpoint backup software.“Backup can still be disruptive when there's no good solution in place,” he says.“Current technology assumes you are behind a firewall and that you have a fixed PC, so there's a whole new generation of technology growing up in the cloud that is solving the same problem differently.”Backup developers are adapting to a hybrid world. Symantec, for example, has adapted Backup Exec to target Amazon AWS or Microsoft Azure storage via a gateway.
As Erica Antony, Symantec's senior director product management, points out, increasingly complex and dynamic IT infrastructures require increasingly sophisticated information management tools.Recycle and use
Similarly, backup technology for mobile users needs to work across unreliable networks. It must allow the backup to start and stop when a laptop suspends or a mobile device goes out of coverage, and it should be location-aware.

It must also not be disruptive; people will no longer tolerate the sort of thing that happened a decade or two ago, when your PC locked up every Friday afternoon as its weekly backup job kicked off.More importantly, says White, people are realising that there is a lot more you could do with your backed-up data than simply restoring a crashed system or a deleted file. Centralised and properly indexed, that data could be useful in a range of other ways.You don’t want your users treating a set of backups as an archive – the two are different applications with different requirements and expectations – but the right data store can serve multiple purposes if it is properly designed.Plus, that centralisation can simplify your operations and allow you to apply space-saving data reduction techniques such as deduplication and compression.After all, if you have 50 users all storing a copy of the same file, or 50 virtual machines all running the same operating system, you do not want 50 backups of that; you want all the backups to point to one master copy.

As much as 85 per cent of storage spend is dedicated to managing copies
Some, such as HP, refer to this as federated deduplication because they use it to logically fuse multiple peer backup systems to work together. Others, like ExaGrid, talk of adaptive deduplication, with backup devices cooperating in a grid, all deduplicating their incoming data in parallel.Either way, IDC research suggests that as much as 85 per cent of storage spend is dedicated to managing copies. Some are generated by users and others by backup processes, requiring you to keep multiple daily, weekly and monthly backups, most of which are substantially identical. Clearly, you can make considerable savings here.There are caveats of course. One is that the backup must be reassembled – or rehydrated, as some call it – from the content store before recovery. Another is that anyone in a regulated industry needs to check if data reduction is acceptable to regulators.

“There are still one or two regulatory authorities refusing to recognise deduplicated or compressed data as a genuine archive. Those people are hard to convert,” warns Lock.With or without data reduction, a content store can still be used to restore a system – its metadata tracks which files need to be restored – but can also be accessed directly.In endpoint and mobile backup, the collation of data that was formerly accessible only on that specific device is now a big opportunity to wring value from what was once a cost sink.“The value to customers is less and less the backup, it is that the data gets centralised and made available to the administrators,” says White.“Once you have all your data in a single repository with metadata, you can add other workloads to that. For example, we can add discovery enablement, governance, audit compliance, and also secure file system shares.

“It is becoming converged data protection. We are crossing the boundary between endpoint backup and the likes of tiering and governance.”Lock agrees. “Data protection inevitably collects metadata and that can be turned into a content store, with appropriate governance layered on to control who can see what,” he says.He notes that several other multi-role products exist, such as CommVault's Simpana, which uses a single repository to support a range of services, including backup/restore, archiving and enterprise search. But he adds that even with the trend to converge backup and archiving, it is important to remember that those two main activities still have independent roles to play.“Data protection should be evolving toward generalised information management, but for most organisations backup is still an insurance policy,” he says.“I would argue there is still a role for traditional backup – for example, once you are making decisions on big data, you may be legally required to keep a copy of what went into that data pool.

“Archiving will grow and grow in importance, though. There's so much data on a live system that is not accessed frequently, but you don't know if you can afford to get rid of it."A collateral benefit of archiving that data off can be simpler and quicker backups, because you have shrunk your primary data.”The complexity involved in building such data protection systems is also leading more users towards an appliance approach. This is a prime area for startups and established storage vendors alike, as they compete to build the most effective and attractive combination of features into a single, easy-to-manage platform.For example Infrascale combines local backup for hot data with WAN acceleration and a cloud gateway for disaster recovery and archiving; and Rubrik claims its converged data management box can offload all those backup, versioning and data reduction tasks, again with cloud at the back end.

Permalink | Comments (0)


To add a comment please login by clicking here

JC Store | JasmineCorp | JCBid |Software Development | Domain Registration | Hosting | Web Designing | Buy Books | Advertise with JCSearch | Whois | IP Locator | Add Search | Shopping | Store | Free Blogs | Free GuestBook | Free E-Cards | Free Games | Free Tutorials | Set as Home | Add to Favorite | Suggest a Site | Directory Our Portfolio | Terms of service | Free quote | Tell a Friend | Special Offer | Job Opportunities | games | Usenet Groups  
Register a Domain Name:
.com .us .info
.org .in .name
.net .biz .asia