'IT'에 해당되는 글 215건

  1. 2008.10.03 Apple frees iPhone software makers from secrecy pledge by CEOinIRVINE
  2. 2008.10.02 Review: Apple's new Nano is its best yet by CEOinIRVINE
  3. 2008.10.02 Google to enter clean-energy business by CEOinIRVINE
  4. 2008.10.02 mocoNews.net - T-Mobile Expects To Sell Up To 500,000 Google Phones In Q4, Insiders Say by CEOinIRVINE
  5. 2008.10.02 CPU Structure 80x86 by CEOinIRVINE
  6. 2008.10.02 Linux Memory/CPU administration by CEOinIRVINE
  7. 2008.09.30 Risk, Threat, Vulnerability by CEOinIRVINE
  8. 2008.09.30 Android’s threat to the iPhone by CEOinIRVINE
  9. 2008.09.26 AT& T, Verizon to Refrain From Tracking Users Online by CEOinIRVINE
  10. 2008.09.25 Got an idea to help the world? Here's $10 million by CEOinIRVINE
SEATTLE, Washington (AP) -- Apple Inc. will no longer force iPhone software developers to sign a nondisclosure agreement that many had said was hampering their ability to work.


Apple Inc. will no longer prohibit iPhone software developers from sharing information about their work.

Apple Inc. will no longer prohibit iPhone software developers from sharing information about their work.

The switch, announced Wednesday, comes a week after the introduction of the first phone loaded with Google Inc.'s Android software, an open-source operating system that lets developers make and sell programs without restriction.

In contrast, Apple had required every person who downloaded the iPhone software developer kit to pledge not to speak about its contents, even to fellow developers.

Recently, the Cupertino, California-based company also barred programmers whose applications it rejected from iTunes -- the only legitimate place to sell iPhone "apps" -- from posting the reasons for rejection on the Web. The move fueled a new wave of critiques about Apple's approval process, already seen by many developers as secretive and capricious.

Apple said the iPhone nondisclosure agreement, or NDA, was meant to protect Apple's innovations, "so that others don't steal our work. It has happened before."

However, programmers complained the NDA prohibited them from sharing tips or comparing solutions to common problems. Sharing information could help them produce programs faster and with fewer bugs, they said.

In response, Apple acknowledged that the NDA created a burden on the developer community, and so it will no longer apply to iPhone software that has already been released. Programmers who are working with unreleased test versions of new iPhone software will still be bound by an NDA.

That's in line with the sort of agreements Apple makes with Macintosh computer software programmers, and with practices of other companies, including Microsoft Corp.


Posted by CEOinIRVINE
l

Review: Apple's new Nano is its best yet

Apple's fourth-generation iPod Nano returns to the original long, light, and slender formula that put the series on the map.



ffered in an attractive range of nine colors for both the 8GB iPod Nano ($149) and 16GB iPod Nano ($199) models, Apple has yet again raised the MP3 player bar.

Design: The Nano 4G feels impossibly light and thin, with a seamless metal construction that prevents it from snapping like a twig. A slightly curved design gives the Nano 4G the essence of an airplane wing, repeating the rounded design themes of Apple's iPhone 3G and second-generation iPod Touch.

Compared with the short, squarish design of last year's Nano, the long, tapered body of the fourth-generation Nano is more comfortable to grasp.

Curved glass now covers the iPod Nano's screen, giving it better resilience against scratches--in theory. The curve of the glass screen lies flush with the slight curve of the Nano's body, and although the glass is inherently glossy and reflective, we didn't notice a diminished viewing quality compared with last year's Nano.

The shape may have softened, but the dimensions of the fourth-generation Nano are nearly identical to the second-generation version, measuring 3.5 inches tall by 1.6 inches wide by 0.25 inch thick at its center--the thinnest iPod yet. The Nano's 2-inch screen size remains unchanged from the previous model, as well as its 1-inch wide scroll wheel control.

Headphone and dock connections are located on the bottom of the 4G Nano, and a sliding hold switch makes a reappearance on top of the player (another throwback to the second-generation design).


ecause Apple has flipped the Nano's screen on its side, menus and user interface get a dramatic overhaul from last year's model. Menu text size has increased slightly and album cover art takes up less real estate on the main menu.

In a bid to increase the accessibility of the Nano for people with impaired vision, Apple has included a font size setting on the fourth-generation Nano that makes its menus more legible--a nice feature even if you have 20/20 vision.

The Nano's music playback screen now presents full-screen album art by default, and Cover Flow view is zippier than before, offering alphabetization letters below the covers when you quickly flip through your collection.

Features: All of the features from last year's Nano have migrated to the fourth-generation model, including music, video, and podcast playback, as well as extras such as photos, calendar, games, alarms, stopwatch, contacts, notes, and clocks. Apple also added a few features that make the 4G Nano more compelling than its predecessors.

A new Genius feature lets you create an instant 25-song playlists based around the musical characteristics of a single song. The Genius feature is easy to use, and the results are fun, provided your music collection holds enough songs to make interesting connections.

To create a Genius playlist, find a song you like and hold the Nano's center button until you see a Start Genius menu option. You can save Genius playlists directly onto your Nano, and with automatic syncing enabled in iTunes you can also transfer them back to your computer. Oddly, the Nano's Genius feature won't work if haven't enabled Genius on your computer's iTunes software.

If you find iTunes' Genius feature too demanding on your computer's resources or too invasive of your privacy (the feature reports your listening habits to Apple), then you'll need to live without the feature on your iPod as well.

The fourth-generation iPod Nano also adds the same tilt-sensor found in the iPhone and iPod Touch, which allows for some interesting control tricks. Giving the iPod Nano a vigorous shake, for instance, puts the music player into shuffle mode. Causal shaking caused by running or exercising isn't enough to trigger the Nano's shuffle mode, and you can always deactivate the shake-to-shuffle feature under the iPod's setting menu or by engaging the hold switch.

The Nano's new tilt-sensor is also useful for activating the iPod's Cover Flow music view when turning the device on its side (a feature cribbed from the iPhone). The iPod Nano also flips the orientation of video playback depending on which direction you prefer to turn the screen. Lefties rejoice!

Unfortunately, we found it a little confusing to use the iPod's scroll wheel controls while holding the player sideways for video playback. You get accustomed to it, but it seems like an inelegant design solution coming from a interface-savvy company like Apple.

Apple makes it easier to make voice recordings on the fourth-generation iPod Nano by allowing microphone input through its headphone jack. You'll have to shell out for an Apple-approved headset, however, because our tests so far show that even iPhone-compatible headsets (Monster Beats, Etymotic HF2) won't work in this manner, while Apple's bundled iPhone headset worked like a charm.

The earbuds bundled with the fourth-generation iPod Nano are unchanged from previous models and do not include an inline microphone, either. Apple plans to begin sell compatible $29 and $79 headphones with in-line controls and voice recording microphones in October of this year.

An unprecedented feature found only on the fourth-generation Nano is the capability for vision-impaired users to hear menu, selection, and playback information read to them in a synthesized voice. You can enable this feature through iTunes, which generates the synthesized voice information and transfers it to your iPod Nano.

Performance: The fourth-generation iPod Nano's speed and usability is better than ever, but its sound quality and rated battery life haven't budged. Apple rates the battery of the fourth-generation iPod Nano at 24 hours of audio playback and 4 hours of video. Our CNET Labs team achieved an average of 23 hours of audio playback and 5.7 hours of video from the fourth-generation iPod Nano.

The test results aren't bad, but the numbers are down slightly from the 29 hours of audio and 6.7 hours of video our same tests pulled from the third-generation iPod Nano.

Apple doesn't seem motivated to meddle with the sound quality of the iPod or introduce any new sound-enhancement settings beyond its traditional slew of EQ presets. While the iPod Nano doesn't offer the sonic richness and advanced EQ settings of a Sony or Cowon MP3 player, it does sound balanced and should please most listeners.

Like all iPods, the fourth-generation Nano supports playback for MP3, AAC (including protected files), Audible, WAV, AIFF, and Apple Lossless. The Nano still doesn't support WMA music files, but you can always convert your WMA tracks to MP3 within Apple's iTunes software.

Video playback on the fourth-generation iPod Nano looks about as good as it gets on a relatively small 2-inch screen, although holding your iPod sideways takes some mental adjustment. A maximum resolution of 320x240 packed into a crisp 204ppi display makes taking in a full-length movie on your iPod Nano a legitimate (but silly) possibility.

Compared with the flat screen of the third-generation iPod Nano, the fourth-generation's rounded glass screen makes it difficult to eliminate glare, but images still look remarkably bright and clear.

Like most portable video players, the iPod has specific file requirements for video playback, so you may have to spend some time converting video on your computer before transferring it. Fortunately, the iPod Nano's video formats are widely known by purveyors of Internet video, which often arrives preformatted for the iPod.

Movies, TV shows, and video podcasts downloaded directly from Apple's iTunes store will always cooperate with your fourth-generation iPod Nano as well as videos formatted as H.264 or MPEG4 video in either MOV, MP4, or M4V file formats with a maximum resolution of 640x480.

The iTunes factor: Before you run off to buy a Nano for everyone on your holiday wish list, consider this caveat: whoever uses the Nano (or any iPod) will be required to install and use iTunes. No other piece of software has equaled iTunes in both praise and scorn from CNET's users. Some argue that iTunes is a top-notch media library tool and online music store, while others become infuriated by the software's insatiable demand for system resources and frequent updates.

Whatever side of the iTunes debate you take, know that iTunes 8 is a mandatory install for the fourth-generation iPod Nano. If you haven't used iTunes before or haven't upgraded the software in a while, we strongly recommend giving the new software a spin before committing to a new iPod.

Is it worth upgrading? If you passed on last year's iPod Nano and are still holding on to a first- or second-generation Nano (or possibly an iPod Mini), there's no better time to bite the bullet and get an upgrade. Given its competitive price, attractive range of colors, and improved user interface, Apple's fourth-generation of the iPod Nano is its best yet.

If you own one of last year's iPod Nanos, however, there's little reason to make the jump to the fourth generation. The iPod Nano 4G's Genius playlists, shake-to-shuffle, and improved voice recording compatibility are fun features to have, but they're not worth $150-$200.

That said, if you've filled up your 4GB third-generation Nano and want some extra room or if you need the additional accessibility features such as enlarged screen font and text-to-speech, the fourth-generation iPod Nano is an ideal choice. 



Posted by CEOinIRVINE
l

Search giant Google on Tuesday pledged to spend hundreds of millions of dollars to make renewable energy cheaper than coal.

The effort, dubbed RE<C (shorthand for "renewable energy less than coal"), calls for Google to invest in companies developing clean-energy technologies and for Google itself to next year invest tens of millions in research and development in renewable energy.

Technologies created by Google will likely be used by Google, whose data centers are voracious consumers of electricity. The company envisions either selling electricity from renewable sources or licensing technology on terms that would promote broad adoption, according to company founders Larry Page and Sergey Brin.

Its overarching goal is to produce 1 gigawatt of electricity from renewable sources--enough to power the city of San Francisco--faster than the current pace of green-technology development.

"The main crux of this is that we believe that you can do it cheaper than coal...and we want to make it happen now," said Page, Google's president of products. "Most people who are doing this now are trying to do it less expensive than people before, but they are not trying for that goal which will have a significant effect on the world."

Investments in other companies will be funded by Google's philanthropic arm, Google.org, which has about $2 billion worth of Google stock available to it.

In particular, Google will be investing in solar-thermal technology, wind power, and geothermal systems. Its target is to fall below the price of coal power generation, which can be as low as 2.5 cents per kilowatt-hour, said Bill Weihl, Google's green-energy czar.

Google said it's already working with eSolar, a solar-thermal company building systems for utilities to generate electricity from heat. It has invested in Makani Power, which is pursuing electricity generation by harnessing wind at high altitudes.

As part of the effort, Google will be hiring experts in the energy field. It expects to hire 20 to 30 people into its clean-energy division in the next year. More substantial investments will come as energy projects come online, Weihl said.

Although an ambitious plan, Google's impact on the clean-tech market segment in the near term is likely to be more psychological than financial, said Paul Clegg, a senior equity analyst who follows clean tech at Jefferies.

"Tens of millions of dollars is not a small number, obviously, but you're spreading that over things that a lot of other companies are attacking on an individual basis with more money going at it," Clegg said. "I think they'd have to invest a lot more money to get the next Manhattan Project going."

However, Google's initiative is significant in that it could indicate how corporations will start addressing their energy needs and climate change going forward, he said.

A strategic move
The push to mitigate the effects of climate change through clean energy falls squarely into Google.org's missions to improve human health and alleviate poverty, said Larry Brilliant, the executive director of Google.org.

Its foray into the energy business is part of Google's corporate charter to expand into new business areas that are "strategic," according to Brin.

As a large consumer, Google can benefit from cheaper sources of electricity and technologies it successfully develops could generate revenue, he said. In addition, those technologies could potentially bring cheaper sources of electricity to areas of the world that don't have it.

"For economic development to be possible in these areas and for new industries to be spurred along, we want to develop cheap alternatives that are widely available," Brin said. "This isn't just about solving a problem. It also creates a gigantic opportunity."


Posted by CEOinIRVINE
l

T-Mobile plans to sell 400,000 to 500,000 Android Google ( NSDQ: GOOG) phones in the fourth quarter, and will order up to 2 million devices from handset-maker HTC in the near future, reports a Taiwanese news site CENS. Quoting industry insiders, the site says at those volumes, it could lead to a $7 billion jump in revenue for HTC in Q4, and up to $18 billion in revenues next year. The T-Mobile G1, which is expected to launch Oct. 22 for $179 in the U.S., is being positioned against the iPhone. But as Silicon Alley Insider points out, selling up to 500,000 phones in 71 days would be about half the rate at which Apple ( NSDQ: AAPL) sold its first 2G iPhone last summer, although still a big accomplishment. It's worth pointing out that Google won't make a dime from these sales, and instead will rely on advertising to make money. In that case, mass adoption is key.

'IT' 카테고리의 다른 글

Review: Apple's new Nano is its best yet  (0) 2008.10.02
Google to enter clean-energy business  (0) 2008.10.02
CPU Structure 80x86  (0) 2008.10.02
Linux Memory/CPU administration  (0) 2008.10.02
Risk, Threat, Vulnerability  (0) 2008.09.30
Posted by CEOinIRVINE
l

CPU Structure 80x86

IT 2008. 10. 2. 03:07

An Introduction to the Intel 80x86 CPU Family

Thus far, you've seen a couple of HLA programs that will actually compile and run. However, all the statements appearing in programs to this point have been either data declarations or calls to HLA Standard Library routines. There hasn't been any real assembly language. Before we can progress any further and learn some real assembly language, a detour is necessary; for unless you understand the basic structure of the Intel 80x86 CPU family, the machine instructions will make little sense.

The Intel CPU family is generally classified as a Von Neumann Architecture Machine. Von Neumann computer systems contain three main building blocks: the central processing unit (CPU), memory, and input/output devices (I/O). These three components are connected together using the system bus (consisting of the address, data, and control busses). The block diagram in Figure 1-4 shows this relationship.

Image from book
Figure 1-4: Von Neumann Computer System Block Diagram. Click to collapse

The CPU communicates with memory and I/O devices by placing a numeric value on the address bus to select one of the memory locations or I/O device port locations, each of which has a unique binary numeric address. Then the CPU, I/O, and memory device pass data between themselves by placing the data on the data bus. The control bus contains signals that determine the direction of the data transfer (to/from memory, and to/from an I/O device).

Within the CPU the registers is the most prominent feature. The 80x86 CPU registers can be broken down into four categories: general purpose registers, special-purpose application accessible registers, segment registers, and specialpurpose kernel mode registers. This text will not consider the last two sets of registers. The segment registers are not used much in modern 32-bit operating systems (e.g., Windows, BeOS, and Linux); because this text is geared around programs written for 32-bit operating systems, there is little need to discuss the segment registers. The special-purpose kernel mode registers are intended for writing operating systems, debuggers, and other system level tools. Such software construction is well beyond the scope of this text, so once again there is little need to discuss the special purpose kernel mode registers.

The 80x86 (Intel family) CPUs provide several general purpose registers for application use. These include eight 32-bit registers that have the following:

EAX, EBX, ECX, EDX, ESI, EDI, EBP, and ESP

The "E" prefix on each name stands for extended. This prefix differentiates the 32-bit registers from the eight 16-bit registers that have the following names:

AX, BX, CX, DX, SI, DI, BP, and SP

Finally, the 80x86 CPUs provide eight 8-bit registers that have the following names:

AL, AH, BL, BH, CL, CH, DL, and DH

Unfortunately, these are not all separate registers. That is, the 80x86 does not provide 24 independent registers. Instead, the 80x86 overlays the 32-bit registers with the 16-bit registers, and it overlays the 16-bit registers with the 8-bit registers. Figure 1-5 on the next page shows this relationship.

Image from book
Figure 1-5: 80x86 (Intel CPU) General Purpose Registers. Click to collapse

The most important thing to note about the general purpose registers is that they are not independent. Modifying one register may modify as many as three other registers. For example, modification of the EAX register may very well modify the AL, AH, and AX registers. This fact cannot be overemphasized here. A very common mistake in programs written by beginning assembly language programmers is register value corruption because the programmer did not fully understand the ramifications of Figure 1-5.

The EFLAGS register is a 32-bit register that encapsulates several single-bit boolean (true/false) values. Most of the bits in the EFLAGS register are either reserved for kernel mode (operating system) functions or are of little interest to the application programmer. Eight of these bits (or flags) are of interest to application programmers writing assembly language programs. These are the overflow, direction, interrupt disable[4], sign, zero, auxiliary carry, parity, and carry flags. Figure 1-6 shows the layout of the flags within the lower 16 bits of the EFLAGS register.

Image from book
Figure 1-6: Layout of the Flags Register (Lower 16 Bits of EFLAGS). Click to collapse

Of the eight flags that are usable by application programmers, four flags in particular are extremely valuable: the overflow, carry, sign, and zero flags. Collectively, we will call these four flags the condition codes.[5] The state of these flags lets you test the result of previous computations. For example, after comparing two values, the condition code flags will tell you if one value is less than, equal to, or greater than a second value.

One important fact that comes as a surprise to those just learning assembly language is that almost all calculations on the 80x86 CPU involve a register. For example, to add two variables together, storing the sum into a third variable, you must load one of the variables into a register, add the second operand to the value in the register, and then store the register away in the destination variable. Registers are a middleman in nearly every calculation. Therefore, registers are very important in 80x86 assembly language programs.

Another thing you should be aware of is that although some registers are referred to as "general purpose" you should not infer that you can use any register for any purpose. The SP/ESP register pair for example, has a very special purpose that effectively prevents you from using it for any other purpose (it's the stack pointer). Likewise, the BP/EBP register has a special purpose that limits its usefulness as a general purpose register. All the 80x86 registers have their own special purposes that limit their use in certain contexts. For the time being, you should simply avoid the use of the ESP and EBP registers for generic calculations; also keep in mind that the remaining registers are not completely interchangeable in your programs.

1.7.1 The Memory Subsystem

A typical 80x86 processor running a modern 32-bit OS can access a maximum of 232 different memory locations, or just over four billion bytes. A few years ago, four gigabytes of memory would have seemed like infinity; modern machines, however, are pushing this limit. Nevertheless, because the 80x86 architecture supports a maximum four-gigabyte address space when using a 32-bit operating system like Windows or Linux, the following discussion will assume the fourgigabyte limit.

Of course, the first question you should ask is, "What exactly is a memory location?" The 80x86 supports byte addressable memory. Therefore, the basic memory unit is a byte, which is sufficient to hold a single character or a (very) small integer value (we'll talk more about that in the next chapter).

Think of memory as a linear array of bytes. The address of the first byte is zero, and the address of the last byte is 232-1. For a Pentium processor, the following pseudo-Pascal array declaration is a good approximation of memory:

Memory: array [0..4294967295] of byte;

C/C++ and Java users might prefer the following syntax:

byte Memory[4294967296];

To execute the equivalent of the Pascal statement "Memory [125] := 0;" the CPU places the value zero on the data bus, the address 125 on the address bus, and asserts the write line (this generally involves setting that line to zero), as shown in Figure 1-7.

Image from book
Figure 1-7: Memory Write Operation. Click to collapse

To execute the equivalent of "CPU := Memory [125];" the CPU places the address 125 on the address bus, asserts the read line (because the CPU is reading data from memory), and then reads the resulting data from the data bus (see Figure 1-8).

Image from book
Figure 1-8: Memory Read Operation.

This discussion applies only when accessing a single byte in memory. So what happens when the processor accesses a word or a double word? Because memory consists of an array of bytes, how can we possibly deal with values larger than a single byte? Easy, to store larger values the 80x86 uses a sequence of consecutive memory locations. Figure 1-9 shows how the 80x86 stores bytes, words (two bytes), and double words (four bytes) in memory. The memory address of each of these objects is the address of the first byte of each object (i.e., the lowest address).

Image from book
Figure 1-9: Byte, Word, and Double Word Storage in Memory. Click to collapse

Modern 80x86 processors don't actually connect directly to memory. Instead, there is a special memory buffer on the CPU known as the cache (pronounced "cash") that acts as a high-speed intermediary between the CPU and main memory. Although the cache handles the details automatically for you, one fact you should know is that accessing data objects in memory is sometimes more efficient if the address of the object is an even multiple of the object's size. Therefore, it's a good idea to align four-byte objects (double words) on addresses that are an even multiple of four. Likewise, it's most efficient to align two-byte objects on even addresses. You can efficiently access single-byte objects at any address. You'll see how to set the alignment of memory objects in a later chapter.

Before leaving this discussion of memory objects, it's important to understand the correspondence between memory and HLA variables. One of the nice things about using an assembler/compiler like HLA is that you don't have to worry about numeric memory addresses. All you need to do is declare a variable in HLA and HLA takes care of associating that variable with some unique set of memory addresses. For example, if you have the following declaration section:

static
     i8    :int8;
     i16   :int16;
     i32   :int32;

HLA will find some unused eight-bit byte in memory and associate it with the i8 variable; it will find a pair of consecutive unused bytes and associate i16 with them; finally, HLA will find four consecutive unused bytes and associate the value of i32 with those four bytes (32 bits). You'll always refer to these variables by their names, you generally don't have to concern yourself with their numeric address. Still, you should be aware that HLA is doing this for you behind your back.

[4]Applications programs cannot modify the interrupt flag, but we'll look at this flag later in this text, hence the discussion of this flag here.

[5]Technically the parity flag is also a condition code, but we will not use that flag in this text.

Posted by CEOinIRVINE
l

Linux Memory/CPU administration

IT 2008. 10. 2. 03:02

 

Red Hat Linux comes with a variety of resource monitoring tools. While there are more than those listed here, these tools are representative in terms of functionality. The tools are:

  • free

  • top (and GNOME System Monitor, a more graphically oriented version of top)

  • vmstat

  • The Sysstat suite of resource monitoring tools

Let us look at each one in more detail.

1. free

The free command displays system memory utilization. Here is an example of its output:

             total       used       free     shared    buffers     cached
Mem:        255508     240268      15240          0       7592      86188
-/+ buffers/cache:     146488     109020
Swap:       530136      26268     503868

The Mem: row displays physical memory utilization, while the Swap: row displays the utilization of the system swap space, and the -/+ buffers/cache: row displays the amount of physical memory currently devoted to system buffers.

Since free by default only displays memory utilization information once, it is only useful for very short-term monitoring, or quickly determining if a memory-related problem is currently in progress. Although free has the ability to repetitively display memory utilization figures via its -s option, the output scrolls, making it difficult to easily see changes in memory utilization.

Tip Tip
 

A better solution than using free -s would be to run free using the watch command. For example, to display memory utilization every two seconds (the default display interval), use this command:

watch free

The watch command issues the free command every two seconds, after first clearing the screen. This makes it much easier to see how memory utilization changes over time, as it is not necessary to scan continually scrolling output. You can control the delay between updates by using the -n option, and can cause any changes between updates to be highlighted by using the -d option, as in the following command:

watch -n 1 -d free

For more information, refer to the watch man page.

The watch command runs until interrupted with [Ctrl]-[C]. The watch command is something to keep in mind; it can come in handy in many situations.

2. top

While free displays only memory-related information, the top command does a little bit of everything. CPU utilization, process statistics, memory utilization — top does it all. In addition, unlike the free command, top's default behavior is to run continuously; there is no need to use the watch command. Here is a sample display:

11:13am  up 1 day, 31 min,  5 users,  load average: 0.00, 0.05, 0.07
89 processes: 85 sleeping, 3 running, 1 zombie, 0 stopped
CPU states:  0.5% user,  0.7% system,  0.0% nice, 98.6% idle
Mem:  255508K av, 241204K used,  14304K free,    0K shrd,   16604K buff
Swap: 530136K av,  56964K used, 473172K free                64724K cached

  PID USER   PRI  NI  SIZE  RSS SHARE STAT %CPU %MEM   TIME COMMAND
 8532 ed      16   0  1156 1156   912 R     0.5  0.4   0:11 top
 1520 ed      15   0  4084 3524  2752 S     0.3  1.3   0:00 gnome-terminal
 1481 ed      15   0  3716 3280  2736 R     0.1  1.2   0:01 gnome-terminal
 1560 ed      15   0 11216  10M  4256 S     0.1  4.2   0:18 emacs
    1 root    15   0   472  432   416 S     0.0  0.1   0:04 init
    2 root    15   0     0    0     0 SW    0.0  0.0   0:00 keventd
    3 root    15   0     0    0     0 SW    0.0  0.0   0:00 kapmd
    4 root    34  19     0    0     0 SWN   0.0  0.0   0:00 ksoftirqd_CPU0
    5 root    15   0     0    0     0 SW    0.0  0.0   0:00 kswapd
    6 root    25   0     0    0     0 SW    0.0  0.0   0:00 bdflush
    7 root    15   0     0    0     0 SW    0.0  0.0   0:00 kupdated
    8 root    25   0     0    0     0 SW    0.0  0.0   0:00 mdrecoveryd
   12 root    15   0     0    0     0 SW    0.0  0.0   0:00 kjournald
   91 root    16   0     0    0     0 SW    0.0  0.0   0:00 khubd
  185 root    15   0     0    0     0 SW    0.0  0.0   0:00 kjournald
  186 root    15   0     0    0     0 SW    0.0  0.0   0:00 kjournald
  576 root    15   0   712  632   612 S     0.0  0.2   0:00 dhcpcd

The display is divided into two sections. The top section contains information related to overall system status — uptime, load average, process counts, CPU status, and utilization statistics for both memory and swap space. The lower section displays process-level statistics, the exact nature of which can be controlled while top is running.

Warning Warning
 

Although top looks like a simple display-only program, this is not the case. top uses single character commands to perform various operations; if you are logged in as root, it is possible to change the priority and even kill any process on your system. Therefore, until you have reviewed top's help screen (type [?] to display it), it is safest to only type [q] (which exits top).

2.1. The GNOME System Monitor — A Graphical top

If you are more comfortable with graphical user interfaces, the GNOME System Monitor may be more to your liking. Like top, the GNOME System Monitor displays information related to overall system status, process counts, memory and swap utilization, and process-level statistics.

However, the GNOME System Monitor goes a step further by also including graphical representations of CPU, memory, and swap utilization, along with a tabular disk space utilization listing. Here is an example of the GNOME System Monitor's Process Listing display:

Figure 2-1. The GNOME System Monitor Process Listing Display

Additional information can be displayed for a specific process by first clicking on the desired process and then clicking on the More Info button.

To view the CPU, memory, and disk usage statistics, click on the System Monitor tab.

3. vmstat

For a more concise view of system performance, try vmstat. Using this resource monitor, it is possible to get an overview of process, memory, swap, I/O, system, and CPU activity in one line of numbers:

   procs                      memory    swap          io     system         cpu
 r  b  w   swpd   free   buff  cache  si  so    bi    bo   in    cs  us  sy  id
 1  0  0      0 524684 155252 338068   0   0     1     6  111   114  10   3  87
        

The process-related fields are:

  • r — The number of runnable processes waiting for access to the CPU

  • b — The number of processes in an uninterruptible sleep state

  • w — The number of processes swapped out, but runnable

The memory-related fields are:

  • swpd — The amount of virtual memory used

  • free — The amount of free memory

  • buff — The amount of memory used for buffers

  • cache — The amount of memory used as page cache

The swap-related fields are:

  • si — The amount of memory swapped in from disk

  • so — The amount of memory swapped out to disk

The I/O-related fields are:

  • bi — Blocks sent to a block device

  • bo— Blocks received from a block device

The system-related fields are:

  • in — The number of interrupts per second

  • cs — The number of context switches per second

The CPU-related fields are:

  • us — The percentage of the time the CPU ran user-level code

  • sy — The percentage of the time the CPU ran system-level code

  • id — The percentage of the time the CPU was idle

When vmstat is run without any options, only one line is displayed. This line contains averages, calculated from the time the system was last booted.

However, most system administrators do not rely on the data in this line, as the time over which it was collected varies. Instead, most administrators take advantage of vmstat's ability to repetitively display resource utilization data at set intervals. For example, the command vmstat 1 displays one new line of utilization data every second, while the command vmstat 1 10 displays one new line per second, but only for the next ten seconds.

In the hands of an experienced administrator, vmstat can be used to quickly determine resource utilization and performance issues. But to gain more insight into those issues, a different kind of tool is required — a tool capable of more in-depth data collection and analysis.

4. The Sysstat Suite of Resource Monitoring Tools

While the previous tools may be helpful for gaining more insight into system performance over very short time frames, they are of little use beyond providing a snapshot of system resource utilization. In addition, there are aspects of system performance that cannot be easily monitored using such simplistic tools.

Therefore, a more sophisticated tool is necessary. Sysstat is such a tool.

Sysstat contains the following tools related to collecting I/O and CPU statistics:

iostat

Displays an overview of CPU utilization, along with I/O statistics for one or more disk drives.

mpstat

Displays more in-depth CPU statistics.

Sysstat also contains tools that collect system resource utilization data and create daily reports based on that data. These tools are:

sadc

Known as the system activity data collector, sadc collects system resource utilization information and writes it to a file.

sar

Producing reports from the files created by sadc, sar reports can be generated interactively or written to a file for more intensive analysis.

The following sections explore each of these tools in more detail.

4.1. The iostat command

The iostat command at its most basic provides an overview of CPU and disk I/O statistics:

Linux 2.4.18-18.8.0 (pigdog.example.com)     12/11/2002

avg-cpu:  %user   %nice    %sys   %idle
           6.11    2.56    2.15   89.18

Device:            tps   Blk_read/s   Blk_wrtn/s   Blk_read   Blk_wrtn
dev3-0            1.68        15.69        22.42   31175836   44543290
          

Below the first line (which displays the system's kernel version and hostname, along with the current date), iostat displays an overview of the system's average CPU utilization since the last reboot. The CPU utilization report includes the following percentages:

  • Percentage of time spent in user mode (running applications, etc.)

  • Percentage of time spent in user mode (for processes that have altered their scheduling priority using nice(2))

  • Percentage of time spent in kernel mode

  • Percentage of time spent idle

Below the CPU utilization report is the device utilization report. This report contains one line for each active disk device on the system and includes the following information:

  • The device specification, displayed as dev<major-number>-sequence-number, where <major-number> is the device's major number[1], and <sequence-number> is a sequence number starting at zero.

  • The number of transfers (or I/O operations) per second.

  • The number of 512-byte blocks read per second.

  • The number of 512-byte blocks written per second.

  • The total number of 512-byte blocks read.

  • The total number of 512-byte block written.

This is just a sample of the information that can be obtained using iostat. For more information, see the iostat(1) man page.

4.2. The mpstat command

The mpstat command at first appears no different from the CPU utilization report produced by iostat:

Linux 2.4.18-14smp (pigdog.example.com)      12/11/2002

07:09:26 PM  CPU   %user   %nice %system   %idle    intr/s
07:09:26 PM  all    6.40    5.84    3.29   84.47    542.47
          

With the exception of an additional column showing the interrupts per second being handled by the CPU, there is no real difference. However, the situation changes if mpstat's -P ALL option is used:

Linux 2.4.18-14smp (pigdog.example.com)      12/11/2002

07:13:03 PM  CPU   %user   %nice %system   %idle    intr/s
07:13:03 PM  all    6.40    5.84    3.29   84.47    542.47
07:13:03 PM    0    6.36    5.80    3.29   84.54    542.47
07:13:03 PM    1    6.43    5.87    3.29   84.40    542.47
          

On multiprocessor systems, mpstat allows the utilization for each CPU to be viewed individually, making it possible to determine how effectively each CPU is being used.

4.3. The sadc command

As stated earlier, the sadc command collects system utilization data and writes it to a file for later analysis. By default, the data is written to files in the /var/log/sa/ directory. The files are named sa<dd>, where <dd> is the current day's two-digit date.

sadc is normally run by the sa1 script. This script is periodically invoked by cron via the file sysstat, which is located in /etc/crond.d. The sa1 script invokes sadc for a single one-second measuring interval. By default, cron runs sa1 every 10 minutes, adding the data collected during each interval to the current /var/log/sa/sa<dd> file.

4.4. The sar command

The sar command produces system utilization reports based on the data collected by sadc. As configured in Red Hat Linux, sar is automatically run to process the files automatically collected by sadc. The report files are written to /var/log/sa/ and are named sar<dd>, where <dd> is the two-digit representations of the previous day's two-digit date.

sar is normally run by the sa2 script. This script is periodically invoked by cron via the file sysstat, which is located in /etc/crond.d. By default, cron runs sa2 once a day at 23:53, allowing it to produce a report for the entire day's data.

4.4.1. Reading sar Reports

The format of a sar report produced by the default Red Hat Linux configuration consists of multiple sections, with each section containing a specific type of data, ordered by the time of day that the data was collected. Since sadc is configured to perform a one-second measurement interval every ten minutes, the default sar reports contain data in ten-minute increments, from 00:00 to 23:50[2].

Each section of the report starts with a heading that illustrates the data contained in the section. The heading is repeated at regular intervals throughout the section, making it easier to interpret the data while paging through the report. Each section ends with a line containing the average of the data reported in that section.

Here is a sample section sar report, with the data from 00:30 through 23:40 removed to save space:

00:00:01          CPU     %user     %nice   %system     %idle
00:10:00          all      6.39      1.96      0.66     90.98
00:20:01          all      1.61      3.16      1.09     94.14
…
23:50:01          all     44.07      0.02      0.77     55.14
Average:          all      5.80      4.99      2.87     86.34
            

In this section, CPU utilization information is displayed. This is very similar to the data displayed by iostat.

Other sections may have more than one line's worth of data per time, as shown by this section generated from CPU utilization data collected on a dual-processor system:

00:00:01          CPU     %user     %nice   %system     %idle
00:10:00            0      4.19      1.75      0.70     93.37
00:10:00            1      8.59      2.18      0.63     88.60
00:20:01            0      1.87      3.21      1.14     93.78
00:20:01            1      1.35      3.12      1.04     94.49
…
23:50:01            0     42.84      0.03      0.80     56.33
23:50:01            1     45.29      0.01      0.74     53.95
Average:            0      6.00      5.01      2.74     86.25
Average:            1      5.61      4.97      2.99     86.43
            

There are a total of seventeen different sections present in reports generated by the default Red Hat Linux sar configuration; many are discussing in upcoming chapters. For more information about the data contained in each section, see the sar(1) man page.

Notes

[1]

Device major numbers can be found by using ls -l to display the desired device file in /dev/. Here is sample output from ls -l /dev/hda:

brw-rw----    1 root     disk       3,   0 Aug 30 19:31 /dev/hda
                  

The major number in this example is 3, and appears between the file's group and its minor number.

[2]

Due to changing system loads, the actual time that the data was collected may vary by a second or two.

Posted by CEOinIRVINE
l

Risk, Threat, Vulnerability

IT 2008. 9. 30. 03:32
Let's start with NIST publication SP 800-30: Risk Management Guide for Information Technology Systems. In the text we read:

"Risk is a function of the likelihood of a given threat-source's exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization. To determine the likelihood of a future adverse event, threats to an IT system must be analyzed in conjunction with the potential vulnerabilities and the controls in place for the IT system."

The document outlines common threats:

  • Natural Threats: Floods, earthquakes, tornadoes, landslides, avalanches, electrical storms, and other such events.
  • Human Threats Events that are either enabled by or caused by human beings, such as unintentional acts (inadvertent data entry) or deliberate actions (network based attacks, malicious software upload, unauthorized access to confidential information).
  • Environmental Threats: Long-term power failure, pollution, chemicals, liquid leakage.

I see no mention of software weaknesses or coding problems there. So how does NIST define a vulnerability?

"Vulnerability: A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy."

The NIST pub's threat-vulnerability pairings table makes the difference between the two terms very clear:



SP 800-30 talks about how to perform a risk assessment. Part of the process is threat identification and vulnerability identification. Sources of threat data include "history of system attack, data from intelligence agencies, NIPC, OIG, FedCIRC, and mass media," while sources of vulnerability data are "reports from prior risk assessments, any audit comments, security requirements, and security test results."

The end of SP 800-30 provides a glossary:


  • Threat: The potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.
  • Threat-source: Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability.
  • Threat Analysis: The examination of threat-sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment.
  • Vulnerability: A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system's security policy.

For those of you Microsoft-only shops, consider their take on the problem in the The Security Risk Management Guide. Chapter 1 offers these definitions:

  • Risk: The combination of the probability of an event and its consequence. (ISO Guide 73)
  • Risk management: The process of determining an acceptable level of risk, assessing the current level of risk, taking steps to reduce risk to the acceptable level, and maintaining that level of risk.
  • Threat: A potential cause of an unwanted impact to a system or organization. (ISO 13335-1)
  • Vulnerability: Any weakness, administrative process, or act or physical exposure that makes an information asset susceptible to exploit by a threat.

Microsoft then offers separate appendices with common threats and vulnerabilities. Their threats include catastrophic incidents, mechanical failures, malicious persons, and non-malicious persons, all with examples. Microsoft's vulnerabilities include physical, natural, hardware, software, media, communications, and human. Microsoft clearly delineates between threats and vulnerabilities by breaking out these two concepts.

I'd like to add that the comment on my earlier posting said I should look up "threat" at dictionary.com. I'd rather not think that "security professionals" use a dictionary as the source of their "professional" understanding of their terms. Still, I'll debate on those grounds. The poster wrote that dictionary.com delivers "something that is a source of danger" as its definition. Here is what that site actually says:

  1. An expression of an intention to inflict pain, injury, evil, or punishment.
  2. An indication of impending danger or harm.
  3. One that is regarded as a possible danger; a menace.

Remember what we are debating here. I am concerned that so-called "security professionals" are mixing and matching the terms "threat" and "vulnerability" and "risk" to suit their fancy.

Here's vulnerability, or actually "vulnerable":

  1. Susceptible to physical or emotional injury.
  2. Susceptible to attack: “We are vulnerable both by water and land, without either fleet or army” (Alexander Hamilton).
  3. Open to censure or criticism; assailable.
  4. Liable to succumb, as to persuasion or temptation.

You'll see both words are nouns. But -- a threat is a party, an actor, and a vulnerability is a condition, a weakness. Threats exploit vulnerabilities.

Finally, risk:

  1. The possibility of suffering harm or loss; danger.

Risk is also a noun, but it is a measure of possibility. These are three distinct terms. It is not my problem that I define them properly, in accordance with others who think clearly! I am not inventing any new terms. I'm using them correctly.

I'd like to thank Gunnar Peterson for reminding me of the NIST and Microsoft docs.

'IT' 카테고리의 다른 글

CPU Structure 80x86  (0) 2008.10.02
Linux Memory/CPU administration  (0) 2008.10.02
Android’s threat to the iPhone  (0) 2008.09.30
AT& T, Verizon to Refrain From Tracking Users Online  (0) 2008.09.26
Got an idea to help the world? Here's $10 million  (0) 2008.09.25
Posted by CEOinIRVINE
l

Android’s threat to the iPhone

The first phone to use Google’s Android operating system will be available on October 22.

If Google plays its cards right, its unveiling of the first Android-powered phone on Tuesday will prove to be more than a distraction from iPhone-mania – it will be the moment the search giant capitalizes on Apple’s control issues.

First, the lowdown on Google’s (GOOG) Android mobile operating system. The first phone to use it, the $179 G1 from HTC, will be available around October 22 and will use T-Mobile’s wireless network. Data plans will start at $25 per month, and cost $35 per month for unlimited access. (Voice plan is separate.) It comes with nifty programs like Gmail, YouTube, contacts, calendar, IM, and Google Maps with Street View, which shows pictures of locations on a map.

Think of Android as an attempt to do for phones what Windows does for the PC, or OS X does for the Mac. But unlike Microsoft (MSFT) and Apple (AAPL), Google isn’t looking to make money off of phone software or hardware; instead, it’s giving Android away for free to any phonemaker and wireless carrier who will bake it into a handset. Why? If people use their phones to get online, the more they’ll do Google searches, click Google ads, and in the process, make Google money.

That clears up why Google needs Android. But do the rest of us? After all, there’s no shortage of smartphones out there already; if you don’t want RIM’s (RIMM) BlackBerry, you can get Apple’s iPhone, Nokia’s (NOK) N95; or a Windows Mobile phone from Palm (PALM), Motorola (MOT) or Samsung.

Google’s answer for why we need another: to save us from folks like Apple and Microsoft. “No one party will control this platform,” Rich Miner, Google’s group manager for mobile, said at the Mobilize conference in Silicon Valley last week. In theory, such a hands-off approach makes it easier for bright entrepreneurs to set up shop and make money without answering to one powerful company. Jason Bremner, senior director of Qualcomm’s (QCOM) cellular products group, vouches for that. “It helps innovation,” he said. “And it drives costs down.”

It’s a timely argument, because Apple has been a bit heavy-handed with its popular gadget lately. We already knew about the iPhone’s basic restrictions: AT&T (T) is the exclusive U.S. carrier, Apple is the only company allowed to make iPhones, and Apple itself decides which programs you can legitimately download and install through its App Store. But in recent weeks, Apple’s inner control freak has grown especially active.

It began in August, when Apple’s App Store police rejected programs including “I Am Rich,” which was little more than a very expensive picture for $999; NetShare, which turned the iPhone into a modem; and Murderdrome, a violent digital comic book.

But a real backlash began a few days ago, when Apple nixed Podcaster, a program that lets people directly download shows without going through Apple’s iTunes. The app didn’t seem to violate any of Apple’s published rules – so why was it tossed?

Creator Alex Sokirynsky, a 27-year-old web developer who writes software in his spare time, blogged his rejection letter: “Since Podcaster assists in the distribution of podcasts,” Apple wrote, “it duplicates the functionality of the Podcast section of iTunes.” The implicit message: Don’t try to improve on our way of doing things. The move even angered some Apple fans. Longtime Mac developer Paul Kafasis blogged that Apple had “gone too far;” online publishing pioneer Dave Winer called it a dealbreaker for developers. (Apple did not respond to a request for comment.)

Actually, Apple has always had control issues. When CEO Steve Jobs returned to save the company a decade ago, one of his first acts was to cancel agreements that allowed other companies to make Macs. Executives almost decided not to release a Windows-compatible version of the iPod partly because it would mean dealing with Brand X operating system.

And of course there are those strained relationships with Hollywood studios, because Apple insists on dictating the pricing for most songs and videos in the iTunes store. To be fair, Apple’s meticulous streak has its benefits, of course – if the company wasn’t so particular, do you think it could build iTunes into the top-selling U.S. music retailer, invent the iPod, and win all those design awards? Yeah, probably not.

But in this case, there’s reason to believe Apple’s hands-on approach could eventually lose out to Google’s more open model. Assuming Google can build and maintain a reliable operating system on its first try (and that’s a big assumption), it’s reasonable to expect major players like Motorola, Samsung and Sony Ericsson to build phones around the free software. And since the wireless carriers are hungry for Internet-friendly phones to compete with AT&T’s lock on the iPhone, Android phones could prove popular. It’s conceivable that in a year, Google-backed phones could be available from all four major U.S. carriers next to Apple’s one, with a wide-open distribution model next to Apple’s curated App Store.

Still, even in Google’s dream scenario, Android won’t gain ground overnight. The first model out the gate is from HTC (hardly a household name), running on T-Mobile’s second-tier network. Adding to the uncertainty around the launch, a number of software developers are taking a wait-and-see stance toward Google’s debut effort.

Andrew Stein, director of mobile business development for Popcap Games, said that while the maker of titles like Bejeweled and Zuma jumped at the chance to be first on the iPod and iPhone, it’s not so excited about Android. “Apple’s been doing operating systems for a very long time, but this is really Google’s first,” Stein said. “I don’t think the first couple of devices are going to be multimillion-unit phones.”

But Google’s got at least one developer eager to take a chance. Sokirynsky, whose rejected iPhone app became a cause for bloggers, said he’s now turned his attention to building a version of Podcaster for Android. “I only developed Podcaster for the iPhone because that was the phone I used and the app I wanted,” he said. “I plan to keep developing for other platforms that are more open.”

Posted by CEOinIRVINE
l

At a hearing, Byron Dorgan cited findings that 72 percent of Americans worry their online activities are being tracked by companies.
At a hearing, Byron Dorgan cited findings that 72 percent of Americans worry their online activities are being tracked by companies. (By Mark Wilson -- Getty Images)

  Washington Post Staff Writer
Friday, September 26, 2008; Page D02

AT&T and Verizon, two of the nation's leading Internet service providers, pledged yesterday to refrain from tracking customer Web behavior unless they receive explicit permission to do so.

The announcement, made at a Senate committee hearing, represents a challenge to the rest of the Web world, where advertising is commonly delivered by companies that record a consumer's visits across multiple Web sites. The practice, known as "behavioral targeting," is largely invisible to customers and generally done without their consent.

"Verizon believes that before a company captures certain Internet-usage data . . . it should obtain meaningful, affirmative consent from consumers," said Thomas J. Tauke, Verizon executive vice president.

AT&T's chief privacy officer Dorothy Attwood made a similar pledge to legislators, and then, taking aim at Google she noted that AT&T's promise to get consumer consent is an advance over others in the industry.

"Google's practices exemplify the already-extensive use of online behavioral targeting," she said, citing for example its use of tracking cookies through DoubleClick, its display advertising arm. "We encourage all companies that engage in online behavioral advertising . . . likewise to adopt this affirmative advance consent paradigm."

Google issued a brief statement citing its membership in an industry group, the Network Advertising Initiative, that has guidelines for protecting consumer privacy. Those guidelines do not include such a broad requirement for consumer consent, however. Google also sought to distinguish between the tracking techniques that it and other Web companies employ from the arguably more invasive methods some Internet service providers have used.

Microsoft issued a statement saying they were "reviewing" the proposal.

Time Warner Cable, another major Internet service provider, said it supported requiring customer consent but emphasized that it should apply to "all companies involved in targeted online advertising."

Exactly how much information Internet service providers and Web sites ought to be able to gather about consumers has become a growing concern on Capitol Hill, Silicon Valley and elsewhere.

Companies have built an array of techniques to record the actions of users as they move across the Internet -- namely tracking "cookies," "beacons" and "deep packet inspection," which essentially looks at every packet of information delivered on an Internet line. Those tactics allow companies to record what Web sites customers visit, what products they purchase, even what newspaper articles they read. Advertisers use this information to determine what ads to deliver to that person's computer.

The crux of the current dispute is whether consumers should have to "opt in" -- or affirmatively consent -- to be tracked or whether they should merely be given the opportunity to "opt out" of tracking if they don't like the idea.

Google, Microsoft and many other Web companies have espoused the "opt out" model.

They say this is enough to give consumers "control" over whether their activities are tracked.

Moreover, these Web companies minimize the privacy threat posed by the information collection, noting that the data is not linked to a person's name, but to a number or Internet address.

Finally, they argue that forcing users to "opt in" could wreck the Internet economy because so much of what is presented on the Web is supported by advertising. If given a choice and clear notice, most people probably would not "opt in" to tracking -- and advertising would suffer, industry officials said.

"If Congress required 'opt in' today, Congress would be back in tomorrow writing an Internet bailout bill," said Mike Zaneis, vice president of public policy for the Interactive Advertising Bureau, a trade group. "Every advertising platform and business model would be put at risk."

Today, as a matter of practice, only a small percentage of users avail themselves of the "opt out" choice they are commonly given.

A Consumer Reports National Research Center poll released yesterday found Americans are concerned and confused about their Internet privacy rights.

The poll, which Sen. Byron L. Dorgan (D-N.D.) cited during the hearing, showed that 72 percent of Americans are worried that their online behavior is being tracked and profiled by companies. Many also overestimate the extent to which the law protects their privacy.

According to the poll, 43 percent of Americans "incorrectly believe a court order is required to monitor activities online." Another 48 percent "incorrectly believe their consent is required for companies to use the personal information they collect from online activities."

House and Senate members have been holding hearings with an eye toward legislation regarding consumer privacy.

Some critics viewed yesterday's announcements skeptically, suggesting that even the stricter "opt in" scheme could pose problems. Mildly worded warnings could lull many people to "opt in" despite the risks, they said.

"What they should be saying is, 'We are going to be collecting every move of your mouse on every Web site on a second-by-second basis.' But that would scare too many people away," said Jeff Chester, of the Center for Digital Democracy. "They're going to craft some kind of proposal that claims to be informed consent but simply gives them political cover while they engage in full frontal behavioral targeting."





'IT' 카테고리의 다른 글

Risk, Threat, Vulnerability  (0) 2008.09.30
Android’s threat to the iPhone  (0) 2008.09.30
Got an idea to help the world? Here's $10 million  (0) 2008.09.25
Users protest, defend Facebook face-lift  (0) 2008.09.24
Google Phone may disappoint.  (1) 2008.09.18
Posted by CEOinIRVINE
l

Google Inc. will award $10 million to solicit ideas it believes could benefit the world.

Google Inc. will award $10 million to solicit ideas it believes could benefit the world.

Got an idea that could change the world, or at least help a lot of people? Google wants to hear from you -- and they'll pay as much as $10 million to make your idea a reality.

To help celebrate its 10th birthday, the ambitious Internet giant is launching an initiative to solicit, and bankroll, fresh ideas it believes could have broad and beneficial impact on people's lives.

Called Project 10^100 (pronounced "10 to the 100th"), Google's initiative will seek input from the public and a panel of judges in choosing up to five winning ideas, to be announced in February.

Google announced the project live on CNN on Wednesday morning.

"These ideas can be big or small, technology-driven or brilliantly simple -- but they need to have impact," said Google in a press release. "We know there are countless brilliant ideas that need funding and support to come to fruition."

Ideas such as the Hippo Water Roller, which Google cited as the kind of concept the company would be interested in rewarding. Developed in Africa, where it is most used, the Hippo Water Roller is a barrel-shaped container, attached to a handle, that holds 24 gallons of water and can be rolled with little effort, like a wheelbarrow, making it easier for villagers on foot to transport critically needed fresh water to their homes.

People are encouraged to submit their ideas, in any of 25 languages, on http://www.project10tothe100.com/index.html through October 20. Entrants must briefly describe their idea and answer six questions, including, "If your idea were to become a reality, who would benefit the most and how?"

Google employees, with the help of an advisory board, will narrow the submissions to 100 semifinalists by January 27. Between January 27 and February 2, the public will vote online for their favorite ideas. A panel of as-yet-unnamed judges will then review the top 20 ideas and announce up to five winners in mid-February.

Funding, from a pool of $10 million, will be awarded in May. If the judges decide to reward five winning ideas, each will receive $2 million. If only two ideas are chosen, each will receive $5 million, and so on.

A Google spokeswoman was reluctant to set parameters for the submissions, although the project's Web site suggests that successful ideas should address such issues as providing food and shelter, building communities, improving health, granting more access to education, sustaining the global ecosystem and promoting clean energy.

"We don't want to limit it at all. We want a wide range of ideas," said Bethany Poole, product marketing manager at Google, who announced the project live Wednesday morning on CNN along with Andy Berndt, managing director of Google's Creative Lab. "We think great ideas come from anywhere."

To cite Google's own example, Google News began after the September 11, 2001, terrorist attacks, when an engineer became frustrated that he couldn't aggregate news sources from around the world in one place.

By opening the project to anyone -- not just laboratories or universities -- Google is embracing "crowdsourcing," the Internet-age notion that the collective wisdom of mass audiences can be leveraged to find solutions to design tasks.

Project 10^100 is not unlike the Google-sponsored Lunar X PRIZE, a $30 million international competition to safely land a robot on the surface of the moon, travel 500 meters over the lunar surface, and send images and data back to Earth. The first team to land on the moon and complete the mission objectives will be awarded $20 million. At least 16 teams are competing.

Those who submit winning Project 10^100 ideas will not be required to have the technical expertise to implement them, Poole said. Google has not yet determined how winning projects will be sustained financially after the initial prize money runs out, she said.

People may submit more than one idea. Through its online submissions, Google also hopes to connect people with good ideas to charitable organizations who could help implement them, Poole said.

'IT' 카테고리의 다른 글

Android’s threat to the iPhone  (0) 2008.09.30
AT& T, Verizon to Refrain From Tracking Users Online  (0) 2008.09.26
Users protest, defend Facebook face-lift  (0) 2008.09.24
Google Phone may disappoint.  (1) 2008.09.18
How to disable secure linux  (0) 2008.09.17
Posted by CEOinIRVINE
l