Sunday, June 3, 2012

US: tech war battleship

The US has been, is, and will continue to be a Pacific power. That was the fundamental message the US Defense Secretary Leon Panetta brought to this year's Asian security summit in Singapore.
Mr Panetta then headed off to Vietnam and India - two stops that highlight, in their different ways, two aspects of Washington's new security relationships in the Asia-Pacific region.
The Obama Administration having announced the so-called "pivot" back to Asia at the start of the year, it was left to Mr Panetta to fill in some of the blanks and to try to convince Washington's friends and allies that at a time of severe financial austerity the US has the means to fund its Asia-Pacific ambitions.
The rhetoric was flowing. "The US", said Mr Panetta, was "at a strategic turning point after a decade of war".
And he went on to detail some of the "re-balancing" in America's defence posture - the new term now preferred to "pivot" - that the new strategy requires.
He said that by 2020 some 60% of the US Navy would be deployed in the Pacific as opposed to about 50% today. This will include six aircraft carriers and the majority of the US Navy's cruisers, destroyers, Littoral Combat Ships and submarines.
He spoke of energising alliances and partnerships, noting the rotational deployment of US Marines and aircraft to Australia.
A host of bilateral meetings in the margins of the summit also produced results. Singapore, for example, agreed to the forward-basing of four of the US Navy's new Littoral Combat Ships - small, high-tech vessels suited to maintaining a presence in the region.
But among many participants there were still concerns about the US administration's ability to fund its resurgent Asia-Pacific ambitions. Words like agile, leaner, and so on essentially translate to fewer but more capable warships.
Leon Panetta delivers speech "US Rebalance Towards the Asia-Pacific" The US is at a 'strategic turning point', Mr Panetta said
The veteran Republican Senator John McCain, while welcoming Mr Panetta's comments, told me he was seriously worried by the spectre of draconian cuts in the US defence budget.
Ship numbers matter, he said, and the decline in the size of the US fleet, he argued, might mean that it was not able to carry out all of the missions set out by the defence secretary.
The view from Beijing For all the talk of maritime free passage, the importance of vital sea lanes for prosperity and so on, the ghost at the feast was China.
While Mr Panetta and many other speakers stressed that the US presence and the modernisation of local defence capabilities should not be seen as directed against or intended to constrain China, it is far from clear that this is the way things are viewed in Beijing.
China was at the summit - a small clutch of uniformed officers listened intently to Mr Panetta's speech. Chinese attendance at the Shangri-La Dialogue, as the annual summit is also called, has developed to the point that last year Chinese Defence Minister Liang Guanglie represented his country.
This year, though, it was a lower-ranking officer who headed the Chinese delegation.
China-watchers here say that political uncertainties in Beijing and the ramifications of a scandal involving former top leader Bo Xilai have constrained key individuals from travelling. I understand from the conference organisers that the Chinese have assured them that next year it will be business as usual, and that no snub was intended.
China's future remains the central strategic question. Mr Panetta urged Beijing to back a rules-based system to decide competing territorial claims in the South China Sea.
But how far is Beijing prepared to go down this path, given the expansive scope of its claims and its clear determination to develop the naval muscle to back them up?
Arms race?
The Asia-Pacific region is clearly big enough for two major strategic players - the US and China. But as each appears to develop forces to counter the other, at what point does this strategic competition turn into a self-fulfilling prophecy of open competition?
Unease at China's military rise, as well as local problems like piracy and terrorism, are fuelling an arms race of sorts in the region which again, potentially could have its dangers. One of the most interesting sessions at the conference dealt with the proliferation of submarines.
US Navy submarine USS North Carolina arrives in Subic Bay in the Philippines, May 2012 An increasing number of submarines are stalking the Pacific
As Christian Le Miere of London's International Institute for Strategic Studies told me, Singapore and Malaysia have taken delivery of new submarines in recent years, and Vietnam and Indonesia have new boats on order. One senior officer said that there would be up to 170 submarines in the Pacific region by 2025.
Submarines are attractive given their stealthy characteristics, their ability to operate unseen and unsupported, at least in uncontested areas. They can be used for a variety of missions including maritime patrols, reconnaissance gathering, the landing of special forces and so on.
The spread of submarines inevitably prompts the purchase of more; another submarine is the best anti-submarine weapon. But more capable anti-submarine surface vessels and maritime patrol aircraft are also being bought.
It is perhaps too early to speak of an arms race in the region but this competitive modernisation raises some concerns.
Many conference participants called for greater transparency in the use and operation of submarines (something of a contradiction, surely, given their stealthy characteristics.) This would help to reduce the chances of submarines becoming a destabilising force.
On a visit to the main Singapore Navy command centre at Changi, I saw one small first step in this process - a multinational submarine rescue course was underway. But clearly this is an issue that will require a lot more attention in the future.
Prosperity, a rising China, the importance of trade routes and maritime tensions are all driving the process of modernisation. But improved military capabilities can be a two-edged sword, a threat as much as a defence.
This is a region where the security architecture is beginning to develop to try to meet these threats both through informal events like the Shangri-La Dialogue - one of the key drivers of multilateral defence contacts - and increasingly through more formal mechanisms like Asean Plus, that brings together the defence ministers of the Association of South East Asian Nations along with key partner countries. Retweet this story

The Whole World Has upgrade Internet address system


The switch occurs at 0001 GMT Wednesday
People use their laptop computers in Washington, DC. The Internet is set for a major upgrade in the coming week, but if all goes well, users won't even know it's happening.
The Internet is set for a major upgrade in the coming week, but if all goes well, users won't even know it's happening.
The switch occurs at 0001 GMT Wednesday, when the Internet system shifts to a new standard that allows for trillions of "IP" numbers or addresses, up from the current four billion.
Known as the World IPv6 launch to geeks, the move will see Web operators and others switch permanently to the new system from the existing standard, IPv4. A test of the system was held last year.
The new standard was needed because the number of IP addresses under the old system has been exhausted.
The full transition will take several years, and old IPv4 devices and networks should continue to function as before.
"Most users shouldn't notice anything," said Leo Vegoda, a "numbers resources" manager for the Internet Corporation for Assigned Names and Numbers, which manages the Internet address system.
"If ordinary Internet users need to know stuff, then the technology isn't right."
But Vegoda said there may be some "irritations" for users, as those using equipment on the old standard connect to computers and networks on the new standard.
Each piece of hardware -- including home computers, tablets and mobile devices -- has a unique IP address to connect to the Web.

Known as the World IPv6 launch to geeks, the move will see a switch from the existing IPv4 standard
A man uses his smartphone in a metro station in Washington, DC. The Internet is set for a major upgrade in the coming week, but if all goes well, users won't even know it's happening
With about seven billion people on the planet, the IPv4 protocol doesn't allow for everyone to have a gadget with its own online address.
The situation has been equated to not having enough telephone numbers for every user.
Cisco is projecting that by 2016, there will be nearly 18.9 billion network connections, or nearly 2.5 connections for each person on earth, compared with 10.3 billion in 2011.
If there are not enough addresses, neighbors will have to start sharing IP addresses, which can slow things down.
But with the IPv4 and IPv6 systems coexisting, the connections need to find a compatible "path," which sometimes may be longer than usual, said Vegoda.
If there are not enough paths available, someone connecting to a Web page from the United States might have to be routed across the Atlantic and then back again, a phenomenon known as "tromboning."
This can slow down connections in some cases, but Vegoda said he expected "relatively light" problems.
Johannes Ullrich of the SANS Technology Institute said that in some cases, "you may see some degradation in speed and reliability" by remaining on IPv4. But he said that over time, the move will mean a smoother-running Internet.
"Don't consider IPv6 a threat. Use it as an opportunity," he said in a blog post. "There are a lot of neat things you can do in IPv6 to secure your network better. But get on it and learn about it now."
Over time, home users may have to get new modems or routers to be compatible with the new standards, but major Internet providers are prepared for the switchover.
"We maintain our commitment to the goal of a seamless transition to IPv6," said Jason Livingood, a vice president for Internet systems at Comcast, one of the largest US providers.
"That means customer Internet access will continue to be direct and fast. And because middlebox solutions are not used, customers avoid the risk that certain applications slow down, fail to work or experience other annoying errors."
Big Web firms like Google and Facebook and hardware makers like Cisco are encouraging businesses and individuals to make the transition, saying it will be easier for different devices and networks to speak to each other.
"Your current network running IPv4-based devices won't be obsolete for some time," said Cisco's Sampa Choudhuri.
"However, if you haven't already started making plans for the transition to IPv6, you should. The first step you should take is determining how and when to transition to the new Internet protocol based on your business needs."
He suggested that people doing business with partners on an IPv6 network shoud migrate "sooner rather than later." Retweet this story

Britain:Cyber strikes a 'civilised' option







Nick Harvey\'s comment comes amid reports that the US had launched cyber attacks to cripple Iran\'s nuclear programme

Britain's Armed Forces Minister Nick Harvey at the Shangri-La Dialogue security summit in Singapore on June 3. Pre-emptive cyber strikes against perceived national security threats are a "civilised option" to neutralise potential attacks, Harvey said.
Pre-emptive cyber strikes against perceived national security threats are a "civilised option" to neutralise potential attacks, Britain's armed forces minister said Sunday.
Nick Harvey made the comment at the Shangri-La Dialogue security summit in Singapore in relation to reports that the US had launched cyber attacks to cripple Iran's nuclear programme.
"I don't know about the specifics and I'm not going to comment on them," Harvey said at the two-day meeting ending Sunday.
"But what I would say is that if a government has arrived at the conclusion that it needs, out of its sense of national interest or national security, to deliver an effect against an adversary... arguably this is quite a civilised option."
A Russian computer firm said last week it had discovered a new computer virus with unprecedented destructive potential that chiefly targets Iran and could be used as a cyberweapon by the West and Israel.
Kaspersky Lab said its experts discovered the virus -- known as Flame -- during an investigation prompted by the International Telecommunication Union.
Iran appears to have been the main target of the attack and the announcement came just a month after the Islamic Republic said it halted the spread of a data-deleting virus targeting computer servers in its oil sector.
The New York Times reported Friday that Obama accelerated cyberattacks on Iran's nuclear programme using the Stuxnet virus, and expanded the assault even after the virus accidentally made its way onto the Internet in 2010.
Britain's stance was supported by Canadian Defence Minister Peter Gordon MacKay, who likened a pre-emptive cyber strike to an "insurance policy", warning of the need to be prepared.
Malaysian Defence Minister Ahmad Zahid Hamidi said a cyber arms race was already under way.
He urged members of the Association of Southeast Asian Nations (ASEAN) to pool their resources to tackle increasingly complex cyber attacks which could paralyse a country's IT systems.
"What remains disturbing is that cyber warfare need not to be waged by state-run organisations but could be conducted by non-state entities or even individuals with intent to cause disruptions to the affairs of the state," he added. Retweet this story

Saturday, June 2, 2012

Here’s How to Download Windows 8 Release Preview Right Now


Want to get the latest version of Windows 8 right now? This one is called the Release Preview, and it’s available for download right now. There’s a lot of little bugs resolved, the multi-monitor support has improved, and you should download it now.
You can grab the regular installer, or you can get the ISO image and use it in a virtual machine.
Download Windows 8 Release Preview in ISO format
Download the Windows 8 Release Preview
If you want a quick way to install it without messing up your partitions, you can read our guide on seamlessly dual-booting Windows 7 and Windows 8 the easy way, which uses the VHD boot feature to install with a virtual hard drive. Retweet this story

How To Seamlessly Dual-Boot Windows 7 and Windows 8 (The Easy Way)

image
Keen to try out Windows 8, but aren’t quite ready to give up on Windows 7 just yet? Follow this fun easy guide to get the best of both worlds.

Creating The VHD

To create the VHD, go to a run prompt by pressing Win+R, and type diskmgmt.msc.

An MMC console will appear, and will have the Disk Management snap-in pre-loaded.

To create a new VHD, click on the action button in the menu  bar, and select Create VHD.

Now you need to choose a location for the VHD file and set the size, which should be no less than 20 GB. You should probably choose a fixed size for best performance.

Windows will then create the VHD, the progress of this can be viewed in the Status Bar of the MMC snap-in.

Once the disk is created it will be in the list of partitions in the Disk Management console. You’ll want to initialize the disk by clicking on it and selecting initialize.

Leave the partition style at MBR(Master Boot Record) and click ok.

Once the disk has been given a partition style, we now need to create an actual volume on the partition. To do this right click on the black space and select “New Simple Volume”.

A wizard will open, you can just accept all the defaults until you get to this screen. Here change the Volume label to “Windows 8”, then click next and finish.

Now you have a new VHD file that is acting like a real hard drive.

Installing Windows 8 On The VHD

The first thing you need to do is open PowerShell as an administrator by opening Start Menu->All Programs->Accessories->Windows Powershell, right-clicking on the Windows PowerShell shortcut, and choosing Run as Administrator.

When PowerShell launches you will need to change the execution policy to allow you to run scripts. To do this, you need to type “Set-ExecutionPolicy RemoteSigned”. You will be given a security notice just type “Y” and press enter to accept. Once you have done this, leave the PowerShell window open as we will be using it again just now.

Next you need to download this script from MSDN, and then move it to the root of the C: Drive. Note that you could move it somewhere else if you want, but just change the rest of the instructions to use the alternate path.

Right-click on the file and select properties.  Click the unblock button in the bottom right hand corner.

Now you will need to mount the the .ISO file that you downloaded from the Windows Developer website.  Once you have mounted the .ISO image switch back to the PowerShell  window. Now type “CD C:\” to switch to the root of the drive.

Now type  the following command into the shell window:
.\Install-WindowsImage.ps1 –WIM D:\Sources\Install.wim –Apply –Index 1 –Destination I:\
You should substitute the drive letter that comes after the –WIM for the drive of the mounted DVD image, and substitute the destination drive letter, in our case this is E:\ for the VHD that you created in the first section of this article. Then press enter.

Once it has completed you will be notified.

Now open an elevated command prompt, and type bcdboot.exe I:\Windows (assuming that I:\ is the drive with Windows 8 on it).

Now when you boot Windows you will be greeted with the new OS Choosing Screen.

Seamless File Sharing

The last thing you will want to do is make your files available to both operating systems. To do this boot into your new Windows 8 installation and navigate to:
C:\Users\[Your User Name]
Now right click on the Contacts folder and select Properties from the context menu. Switch over to the location tab and click on the move button.

Now navigate to the Contacts folder on your Windows 7 drive, this can be found at the same path, however your user name might be different to the one you used in Windows 8.

Click on the ok button and your good to go, repeat this for the following folders:
  • Desktop
  • Downloads
  • Favorites
  • Links
  • My Documents
  • My Music
  • My Pictures
  • My Videos
That’s all there is to it. Retweet this story

Netflix tops Apple in booming US online movies

Netflix envelopes sit in a bin with other mail
The US online movie business more than doubled in 2011 to rake in $992 million and will almost double again this year, a research report showed Friday.
The biggest surge came from Netflix, which shifted its focus to subscription video on demand and snagged 44 percent of the market, overtaking Apple's iTunes service, said the report from IHS iSuppli.
"2011 marked a sea change in the online movies business that saw the balance of consumer spending shift from a DVD-like transactional model to more TV-like subscription approach," said Dan Cryan, research director for digital media at IHS.
Netflix, which accounted for less than one percent of this market in 2010 to 60 percent for Apple, turned the tables last year. Apple's share of total revenue declined to 32.3 percent, despite enjoying strong revenue growth.
The report said Americans are showing less interest in owning copies of movies, and opt instead to rent for a single time or have a subscription for viewing on demand.
"We are in the midst of a significant change in the way people pay to consume movies online," Cryan said, adding that all of the significant revenue growth came from rental business models.
"Rental delivers unlimited consumption with a low monthly fee for older titles as well as cheap rentals of new releases, providing the kind of value that online consumers want."
The IHS report said Netflix and Apple are leading by focusing on the hardware side of the business. Netflix is available on a very wide range of connected devices, while iTunes use a variety of Apple devices.
"Effectively the market has split," Cryan said. "Netflix and Apple are competing for some of the same consumer time and money. However, the core value proposition of the two services is actually very different."
Netflix rules the subscription market, with its closest competitor, Hulu, less than 10 percent of its size.
Apple's iTunes continues to dominate the rental segment, accounting for 63.0 percent of revenue in this area, while Walmart's Vudu captured 8.2 percent. Retweet this story

Friday, June 1, 2012

Google victory in Oracle copyright fight

Oracle\'s challenge of Google in court over copyrights was an unusual tactic
A federal judge on Thursday put a stake in the heart of Oracle's big-money lawsuit against Google by ruling that the application programming interfaces (APIs) at issue can't be copyrighted.
The decision by US District Court Judge William Alsup came a week after a trial that ended with jurors clearing Google of patent and copyright abuse charges leveled by the California business software titan.
Jurors ruled that Google violated copyrights owned by Oracle Corp. for the Android mobile platform but failed to agree on whether damages should be awarded in the high-profile trial.
In a partial verdict, jurors were unable to decide on a key point of whether Google's use of copyrighted Java software was "fair use" that made it acceptable.
Alsup had told the jurors to assume, for the sake of deliberations, that APIs could be copyrighted but reserved for himself the right to make the legal decision in that regard.
Oracle's challenge of Google in court over copyrights was an unusual tactic being watched intently in Silicon Valley.
In the fast-paced land of Internet innovation, it has been common for software writers to put their own spins on APIs that mini-programs use to "talk" to one another.
Oracle argued, to a degree, that it held copyrights to how the APIs worked even if different strings of code were used to orchestrate the tasks.
"When there is only one way to express an idea or function, then everyone is free to do so and no one can monopolize that expression," Alsup said in his ruling.
"So long as the specific code used to implement a method is different, anyone is free under the Copyright Act to write his or her own code to carry out exactly the same function or specification of any methods used in the Java API."
Oracle accused Google of infringing on Java computer programming language patents and copyrights Oracle obtained when it bought Java inventor Sun Microsystems in a $7.4 billion deal in 2009.
Google denied the claims and said it believes mobile phone makers and other users of its open-source Android operating system are entitled to use the Java technology in dispute.
Google unveiled the free Android operating system two years before Oracle bought Sun.
Jurors, and now the judge, have sided with Google in the case.
"The court's decision upholds the principle that open and interoperable computer languages form an essential basis for software development," Google said in an email response to an AFP inquiry.
"It's a good day for collaboration and innovation." Retweet this story