If you are new to information and data management , you may ask what is Oracle ? Oracle is a database management system developed by Oracle Corporation. Oracle is a relational database object database that enables a connection between relational databases and object-oriented databases. Management system Oracle database is widely used in many large companies around the world to treat and manage business information and data .



Oracle 11g is one of the latest versions of Oracle offers . Oracle 11g allows potential users in four different editions depending on the technical requirements of the user. The Enterprise Edition provides solutions that are at par with industry. It also provides security , reliability and the option to use the server or group based on the size of your business. The Enterprise Edition is ideal for medium and large companies that process large numbers of transactions each day.

Oracle Database 11g Standard Edition is affordable for small and medium enterprises and has an extensive database depending on your server. This edition allows businesses to buy what they need , and make the appropriate modules as your business grows . Standard Edition One is a simplified version of the standard edition and two implementations of socket (instead of four for the standard edition ) .

If you own a small or medium size and want to try Oracle Database 11g Express Edition is a free version of the database that allows you to develop and use in your business. The Express edition is suitable for training and education, but also to lay the groundwork for the development of an Oracle database system more complex . When you think it is time that you update the system , Oracle Database 11g can be easily migrated to more advanced problems without extensive data migration .

Oracle is the market leader in database management systems and have a variety of functions and applications to improve efficiency and effectiveness of data management and security of private and confidential company information . As data protection and security systems, Oracle database 11g come with proxy authentication , data encryption tools , backup, recovery plans and precautions to fail among other applications. Scalability, the software is still able to operate at peak levels means increased workload with integrated and automated management of workload clusterware . As for management , the application of business management and automatic storage management allows staff to easily organize and store the data in the system.

Compared to other management systems databases, Oracle 11g Client software is relatively easy to administer and easy to use . Oracle Database 11g also works on different operating systems. Before making any thepurchase database management system , it would be recommended that you get a computer consultant to review the type and size of your business operations and offer the right solutions for you . This is to ensure that reduce costs and maximize efficiency in the use of management software based on reliable and appropriate data.

Oracle offers the industry-leading security , scalability , reliability and performance . Oracle Database 11g provides the sample characteristics to easily manage Oracle Database, Oracle easily manage transaction processing , applications, content management and business intelligence.

Trick to Install Oracle Express Edition 11g on Windows 7 64 bit



Oracle 11g And How it Can Help Your Business

In this third and last part of the article, we will explore Policy Tips, test these policies and look at all the information that DLP logs.


So far in this article series we have seen what the purpose of the new Data Loss Prevention feature of Exchange 2013 Preview is, how it works and how to create DLP Policies using both the Exchange Administration Center and the Exchange Management Shell Exchange. ....

Policy Tips

In the first part of this article, we saw that we can notify a sender if he/she is about the send information that violates a DLP Policy. But how is the sender notified? By including a Policy Tip notification message!
These Policy Tips are similar to the MailTips introduced in Exchange 2010 as they display a notification message to Outlook users when they are composing an e-mail. Obviously they only show up if Exchange detects something in the e-mail that violates a DLP Policy currently in place and if this policy has a rule to notify the sender.
A great thing about Data Loss Prevention [DLP] and Policy Tips is that Exchange will automatically look into a message’s subject, body and even attachments when evaluating conditions within policies. This means that if a user is writing an e-mail with a perfectly normal body text but attaches an Excel document with credit card details, then a Policy Tip notification that you create will be shown to the sender in Outlook reminding him/her of the policy against such action.
The benefit of Policy Tips is that if a user writing an e-mail is made aware in real-time that he/she might be violating a corporate policy, then he/she is less likely to violate it.
Now let’s test a few DLP Policies and look how these Policy Tips look like.

Testing DLP Policies

Let’s send a couple of e-mails to test these policies - remember that at this time both policies are set to Enforcementmode as we recreated the first policy (which was in Audit mode) in PowerShell and set it to this Enforce.
Let’s start by writing an e-mail with a credit card number attached:

Figure 3.1: Writing E-mail with Confidential Data
Note that while I am writing the e-mail a Policy Tip came up stating that the e-mail contains sensitive content! Even though the body of the e-mail doesn’t contain anything confidential, the attached file contains a credit card number which Outlook highlights straight away!
The interesting part is that these rules are smart enough to detect “valid” credit card numbers. If you simply type a random 16 digit number it will not flag it as being a credit card number! Also, no matter if you put spaces or not in-between each 4-digit set of numbers, Exchange will still detect it.
Because this e-mail only contains 1 credit card number, the existing policy will allow the e-mail to go through. Instead of including more credit card numbers in the e-mail (more than 9 as we saw in the first part of the article) I simply updated the High Count rule of this policy to match 1 or more credit card numbers and send the e-mail again. As expected, it gets blocked:

Figure 3.2:
 Blocked E-mail - Message Tracking Logs
Note the FAIL EventID, a report being sent to the DLP mailbox and the RecipientStatus saying why the message was rejected.
As I mentioned in the first part of this article, DLP information also gets written into the Message Tracking Logs (more than what I showed in Figure 3.2 above). These logs contain data from the Agents involved in processing mail flow content. For DLP, the Transport Rule Agent [TRA] is used to scan message content and apply the policies defined as part of the Exchange Transport Rules [ETRs]. The existing AgentInfo Event is used to add DLP related entries in the Message Tracking Log. If we look deeper into the logs of Figure 3.2, we can see this data:

Figure 3.3:
 Incident Data Logging
In the above screenshot, by the number of ruleId fields in EventData we can see the agent processed the e-mail against 2 rules. These fields are as follows:
  • The TRA (Transport Rule Agent) is ETRP (Exchange Transport Rule Performance)
  • The ruleId is 26eb1f73-da84-4cef-8d35-cc75805f2876 – you can check what rule this is by running the cmdletGet-TransportRules | ? {$_.GUID –eq “26eb1f73-da84-4cef-8d35-cc75805f2876” which in this case is theBlock Passport Numbers rule we created and which didn’t match anything
  • The execW (Execute Wall Clock) is 252ms
  • The exec (Execute CPU Clock) is 0ms
  • The TRA (Transport Rule Agent) is ETRP (Exchange Transport Rule Performance)
  • The ruleId is 2bdbddc1-7000-49b8-b941-b6fcca58699d – in this case is the Financial Data (U.S.): Monitor Data Sent To Outside High Count rule as we expected
  • The execW (Execute Wall Clock) is 199ms
  • The exec (Execute CPU Clock) is 15ms
  • The TRA (Transport Rule Agent) is DC (Data Classification)
  • The dcid (ID of the Data Classification) is 50842eb7-edc8-4019-85dd-5a5c1f2bb085
  • The count (Count of the Data Classification) is 1 as only one credit card number was found
  • The conf (Confidence level of the Data Classification) is 85%
Looking into the DLP Incident mailbox, we can see the report for this e-mail, including the text of the attached file! This report also includes similar information as the one seen in AgentInfo previously:

Figure 3.4:
 Incident Report
Note that the severity was set to High; it wasn’t an override; a Credit Card Number was detected with a count of 1 and a confidence level of 85%; the triggered rule was Financial Data (U.S.): Monitor Data Sent To Outside High Count; theReport ID Match shows the credit card number found and in Context we have the entire content of the text file.
Also, me as the sender received the following Non-Delivery Report [NDR] message:

Figure 3.5:
 Non-Delivery Report Message sent to Sender
However, nor the Policy Tip nor this NDR say how to override the policy as they should... It seems that this part is not 100% finished yet or perhaps I missed something...
Finally, let’s test an override. This time, let’s send the same e-mail message but with the word “override” in the subject (as this is the default override method, which obviously can be changed). As expected, the e-mail is allowed to go through but a report is still sent to the DLP Incident mailbox as configured in the Allow Override rule:

Figure 3.6:
 Allowed E-mail - Message Tracking Logs
Looking at the header of the received e-mail, we can see that the X-Ms-Exchange-Organization-Dlp-SenderOverrideJustification field was set to TransportRule override even though the same Financial Data (U.S.): Monitor Data Sent To Outside High Count rule was triggered:

Figure 3.7:
 Message Headers

Exchange 2013 Data Loss Prevention (Part 3)


Wireless security cameras are a popular choice for many users because of their simple and rapid deployment. These cameras offer convenience when the placement of wires or cables for connection to camera equipment would be difficult or even impossible. Some wireless security cameras use batteries, allowing them to remain totally independent of power outlet cables as well. They are also portable and a good option for temporary use since they can be moved from location to location very easily.
Even though wireless security cameras are typically easy to install, they are available in several different choices for connectivity - which can make a huge difference in installation, image quality and overall performance. The classic wireless camera system broadcasts the radio signal over the air to a receiver, which is tuned to the same frequency as the cameras, just like in old analogue broadcast TV. The main downside of this type of signal transmission is that it's prone to interference problems, which often cause the video to become distorted or break up completely. The signal can also be intercepted by anyone with a baby monitor or wireless scanner, making it vulnerable to prying eyes. In addition, it can be quite difficult to install multiple wireless cameras within this system as they usually experience cross-talk with each other.
While "analogue wireless" cameras are still being utilized in surveillance systems found in many households and businesses today, more advanced, digitally-paired wireless systems that address the above-mentioned issues have been developed. These systems modulate the video signal into a digital bit stream, which is then transmitted as data between the cameras and the receiver, the same way modern digital broadcast TV works. This produces a secured connection between the wireless cameras and the base station, making it virtually impossible to eavesdrop. The buffered, digital signal also prevents signal loss, which causes distortion or noise, and greatly improves image quality. Wireless IP cameras are the latest development in CCTV surveillance. In an IP-based wireless system, each camera outputs a data stream, rather than a video signal. The cameras use Wifi to connect to the wireless network and software to manage the cameras. Wireless IP cameras provide the highest quality video performance.
Installing Wireless Security Cameras
Wireless camera systems are typically uncomplicated, so you can install the equipment on your own. While the camera installation process may vary slightly according to the model, the basic installation procedure for wireless cameras is the same.
Steps
1) Decide which part of the house to install your wireless video camera in. Most wireless security cameras can be installed indoors or outdoors. But outdoor wireless cameras are specifically designed with a wider viewing angle to help monitor large outdoor areas. They also come with night vision and a tough, weather-resistant protective housing.
Mount your cameras near entryways so you can record anyone entering the house or exiting. It's also recommended that you install cameras directly above your valuables so you can monitor them at all times. Other ideal locations include: around the perimeter of your property and areas where they can be seen by anyone inside the property to deter potential intruders. Make sure there's no obstruction between the camera and the receiver if you're installing an analogue wireless system.
2) Identify the most appropriate angle for the cameras. Ensure the camera allows you to keep watch over the largest area possible.
3) Bolt the camera mounting plane onto the wall. This will typically require you to get a power drill, bolts, screw, and mounting brackets. Most surveillance cameras come with the required hardware. Check the manual for specific manufacturer instructions regarding the installation of your particular model.
Hold the camera's mounting bracket into place using one hand, and then use the other to mark the screw holes with a pencil. If the screws need to be in a stud, get a stud finder from a local store so you can find an appropriate place for mounting. But if the camera doesn't have to be screwed into a stud, you can hold the camera's mounting bracket into place using a drywall anchor bolt.
4) Place the wireless video camera on the mounting plane.
5) Plug the video camera into the power outlet or insert the batteries.
6) Follow manufacturer instructions to synchronize the video camera to your receiver.
For more information on wireless security cameras visit http://www.security-cameras-one.com/ where you can discover, review and even contribute on wireless security cameras and security systems.

How to Install Wireless Security Cameras



IT Managers are often faced with the task of deciding who to interview when trying to fill their open positions. Interview skills will get you far but you still have to get face-to-face first to use these skills. Your resume needs to shine... you need to shine.
Assuming a candidate has the right amount of experience for the position, education is assessed. Education, and particularly certifications, show a desire and capacity to learn and is one of the best ways to shine and give yourself an additional edge.
Certifications can generally be completed in a fairly short period of time and require minimal financial investment when using a self-study approach. Many entry-level certifications can be studied for in just a few weeks and require passing a single test. Higher end certifications, may take months to prepare for a single large test or consist of multiple tests taken over a period of time.
Now to answer the question "What certifications are IT managers looking for?" Much of the answer depends on the position, but there are many industry certifications that a candidate can use to set themselves apart.
  • Comptia A+ - The Computing Technology Industry Association's A+ Certification is an entry-level credential for those who are interested in an IT support position. It tests the skills and knowledge used for the job of installing, maintaining, securing and troubleshooting IT systems. To get the A+ certification you need to pass two exams.
  • ITIL v3 Foundations - The Information Technology Infrastructure Library (ITILv3) is a process that focuses on IT Service Management. The ITIL Foundations is first level certification which tests a candidate on the use of documented and proven processes that cover the entire ITIL defined Service Lifecycle. To get the ITILv3 Foundations certification you need to pass one exam.
  • Microsoft Certified Solutions Associate (MCSA) - Microsoft's MCSA certification tests expertise and knowledge in a specific platform. A certification can be earned on a Windows Server, desktop, or SQL Server platforms. To get a MCSA Certification you will need to pass 3 exams.
  • Microsoft Certified Solutions Expert (MCSE) - Microsoft's MCSE certification is a revamp of their previously retired Systems Engineer certification. This certification tests an advanced knowledge of Microsoft Technologies. A MSCE can be earned on Server Infrastructure, Desktop Infrastructure, Private Cloud, Messaging, Communication, and SharePoint. To get a MCSE certification you will need to pass five tests, a candidate can often earn the MCSA certification after the first three tests.
  • Project Management Professional (PMP) - The Project Management Institute's PMP credential is recognized as the gold standard certification for project managers worldwide. A Project Management Professional certification shows that you have not only the experience but also the education to successfully lead and direct projects. With a formal education and experience requirement, the PMP does have the most rigorous qualifications in this list. Once the experience and education requirements are met, it can be earned by passing a single test. This certification does have continuing education requirements to maintain the credential.
Depending on the equipment used, other vendor specific certifications may have value for a potential employer. These can include Cisco, VMware, EMC, or any other vendor that has a certification program. These certifications come into view as you gain experience and you establish a certification path for your career.
Jeff Story is the Document Services IT Manager for a banking services company and holds multiple industry certifications including the CISSP and PMP. He is also a proponent for technology, leadership, and company culture.
For more information from an IT Managers perspective visit http://www.iderware.com

A Hiring IT Managers View on Industry Certifications


The concerns about NAS storage systems failures may not be difficult to overlook. Most of the NAS devices and most of the inexpensive models are not efficient enough to provide early warning systems regarding the failures that may occur. The RAID reporting types for most types of NAS models are typically unavailable. Therefore, it may be difficult for you to check out the current condition of your system hard drives.
Implications of System Failures
This is the reason that most of the NAS storage systems failures suddenly happen. In case your NAS equipment breaks down in the middle of an operation, you may end up having no way to extract your data. This can also help you truly avoid the temptation of rebuilding files. A notable downside is the fact that the function can mess up the remaining file components. Thus, this can provide you with a functional but empty storage system.
Data Recovery
If you want to reverse the effects of NAS storage systems failures, you may resort to data recovery from a failed NAS storage using SoftAmbulance. You have to isolate the concern by taking in the hard drives from the enclosure and connecting them to your personal computer directly. You can do this through the recommended cable. For this task, you will need the power cable and a SATA connector. This especially works for the enclosures for the single hard disks.
Counteracting the System Failure
On the other hand, if you want to recover the RAID arrays from the original portion of the RAID controller, you should obtain a highly specialized tool that can help you counteract the NAS storage systems failures. As for the mirrored storage system, you can pull out the hard disk from the main system and execute a type of data recovery tool so you can recover the rest of the files. Interestingly, the networks that produced the systems have offered external storage means as an additional service to fix the problems in case everything gets out of control.
These are just some of the things that you can do so you can readily counteract the effects of failures through NAS data recovery. You are advised to seek assistance from the experts in the field in case you properly followed through all of the steps to perform the operations and still end up with negative results for your entire hard disk system. They can help you make the most out of your NAS recovery software.

NAS Storage Systems Failures


There's no way round it: you have to store your data. What's more, you have to do so securely and in a way you can retrieve it easily. And you need to do this for as reasonable a price as possible.
If you use traditional methods of data storage, you'll know the problems:
  • High running costs
  • A lot of time spent on management and admin
  • Significant expense when you require extra storage capacity
Traditional data storage isn't cheap or easy
Operating your own storage hardware isn't cheap or easy. You have to budget well in advance for potential capital expenditure.
You also have to predict the growth of your data. This can be tricky. If your expansion is greater than you forecast, you have to spend time organising additional storage hardware at short notice. What you should be doing instead, of course, is focusing on your new customers.
Metered storage is the answer
NetApp metered storage resolves these problems. Rather than struggle with in-house hardware, you can use a data storage service based on a pay per GB (gigabyte) meter. You lease storage as and when you need it.
When you choose a NetApp data storage solution, you benefit from:
· A price per GB of data
· Monthly billing for the storage you use above your committed amount
· Extra storage when you want it
· Built-in upgrades
Metered storage set-up
Set-up is simple. Because you lease your data storage, you don't have the headache of buying and installing hardware. Support, software subscriptions and installation are included in your monthly bill.
The switch to NetApp metered storage is straightforward. Once you make the move, you have a flexible leasing solution ready to adapt to increased demand. You no longer have to plan your data storage needs in advance. You don't have to invest capital in storage hardware.
With NetApp data storage, you eliminate risk
NetApp data storage is secure. Thanks to NetApp Snapshot, you can have instant backup copies. This service has a negligible effect on storage costs and performance.
NetApp also gives you peace of mind with SnapMirror. You can protect against disaster with rapid, simple data recovery for systems in multiple locations.
NetApp metered storage cuts costs
NetApp metered data storage cuts costs by allowing you to pay for what you use and no more. It reduces your redundant data with a 50% deduplication guarantee for VMWare. This reduces storage costs even further. And it offers complete security.
NetApp is well worth your consideration. In the meantime, you could be wasting time and money...
Steve Denby is Sales Director at LETN Ltd. Based in Reading, Berkshire, UK, LETN design and implement cost efficient infrastructure solutions using Leading Edge Technology.
Steve Denby passionately believes that the path to true business efficiency and competitive edge lies in the adoption of Leading Edge Technology.

NetApp and Metered Storage - How to Cut Storage Costs by Only Paying for What You Use


Now let's take a look on how you can go ahead and reinstall Windows 7 on your computer  ( or )  how to install Windows 7 on your computer.
First  ensure that you back up all your data before beginning the reinstallation.
Reason being simple  when we are going to install Windows, Windows will erase all the data on the computer and reinstall a fresh copy.
First  insert the Windows disk that you have got into the computer.
Now restart your computer and then tap f12 on the keyboard to get to the boot menu there choose boot device to cd/dvd or cd rom or dvd rom and then tap enter continuously until you see an option which says Windows is loading files.
By any chance if you are not able to go to the boot menu then tap f2 when the machine turns on.
It will take you to the bios there go to the boot section and then change the boot order prioriy to cd/dvd rom and then restart your system then it will attempt to boot from the disk.
Now  once the machine is booting from the disk as I told you you will see a message stating that Windows is loading files.
Wait until Windows loads all the files.
Once it loads all the files you will get a Window where it will ask you to select the language choose the language in which you want to install Windows.
Below that you will also see an another option which says choose the keyboard lay out choose the keyboard layout and after that click on next.
Now you should see a message stating click on install now. Click on install now.
Now  you will get an another screen which says accept the license terms and conditions.
Please accept the license terms and conditions  and then click on next.
Once when you click  on next it will take you to a page where it will give you 2 options upgrade or custom advanced.
Click on custom advanced.
Now you should see the list of partitions available on your computer.
Select the partition where you want to install Windows and then format the partition by choosing drive options and then clicking on format.
When you click on format you will get a warning message stating that what ever data that you got every thing will be erased.
Click on ok.
Note: when you click on format what ever data that you have got on the machine every thing will be erased.
Once the format is completed you will come back to the same screen displaying the partitions.
Now since the partition is formatted select the partition and then click on next.
Windows will start the installation.
And while the installation is going on it will ask you choose the settings like the time zone, computer name, and  user accounts. Go ahead and choose them installation will be completed after that you will be back to your desk top.
That's it Windows is installed on the computer.
Once Windows is installed go ahead and install the drivers that needs to be installed on your computer.

How to Install Windows 7


SQL 2012 and Oracle are relational database management systems (RDBMS) designed to store, organize, and present large amounts of data in tables. Users should consider their organization's needs, existing software infrastructure, and technical knowledge when weighing the two platforms. Except for their handling of "Big Data," SQL 2012 and Oracle offer comparable features, though the preponderance of Microsoft's Business Intelligence software may make it a more attractive choice for many users.
Oracle's trump over past SQL incarnations was usually rooted in the former's ability to analyze and store Big Data. Microsoft's response was to integrate Hadoop into SQL 2012, thus giving SQL the ability to examine and coherently present overwhelming amounts of unrelated datasets. It should be noted, however, that Hadoop will not be available for SQL 2012 until mid-2012. It remains to be seen whether this integration will meet user expectations for Big Data analysis. Until such time, Oracle has already released their Big Data Appliance featuring Hadoop and Cloudera; users with the immediate need to analyze unstructured massive datasets throughout thousands of networked computers might not want to wait for Hadoop's integration into SQL 2012.
One simple point to consider is the question of the user's operating system. SQL 2012 runs only on PCs running Server 2008, Windows 7, or Vista. Oracle's supported systems are more versatile; these include Linux, Windows, Unix, OS/390, Mac OSX, and OpenVMS. This broad approach, while flexible, also potentially presents a more convoluted installation process than the narrowly-focused SQL 2012.
Microsoft's hegemony gives SQL 2012 users their entire Business Intelligence (BI) suite. SQL integrates with SharePoint, PowerPivot, Excel, Analysis Services, Integration Services, Master Data Services, and others. The widespread use of these tools makes finding online support relatively simple, as does the singularity of their operating system. Oracle Enterprise Edition (Oracle XE) offers comparable functionality, though if a company or user has already licensed much of Microsoft's BI software, they may balk at the cost of acquiring another license.
Along with cost, users must consider the type and scope of probable use when choosing between the two platforms. SQL 2012 requires licensing fees on a "per-core" basis. Oracle offers a free version of Oracle XE with some caveats. These limitations include a 4 GB limitation on stored data, a 1 GB cap on Random Access Memory usage, and the free edition will not use more than on Central Processing Unit, even if the host machine contains more. The licensed version of Oracle XE also bases its cost on the "per-core" structure.
Users should consider their operating system, budget, existing BI infrastructure, and Big Data needs before committing to either SQL 2012 or Oracle. From a functionality standpoint, most users will find either to be adequate for their Business Intelligence needs if Microsoft successfully integrates Hadoop into SQL 2012.
For more information about SQL 2012 development, visit Magenic who have been one of the leading software development companies providing innovative custom software development to meet unique business challenges for some of the most recognized companies and organizations in the nation.

Microsoft SQL Server 2012 Vs Oracle




I recently upgraded my Linux installation to the latest OpenSuSe 11.2 release and then decided to install also the free version of the Oracle database (Oracle-XE or Oracle Express)..
The installation of Oracle consists of the following main steps:
a) Download Oracle from the Oracle site
The site contains different download files for Windows and some versions of Linux. Since the package management in OpenSuSe Linux is based on rpm, I downloaded an rpm file.
b) Log in on your system as a root user
c) install the rpm file with the command
rpm -ivh oracle-xe-univ-10.2.0.1-1.0.i386.rpm
d) execute the initial configuration of the database by running the command:
/etc/init.d/oracle-xe configure
The command will ask you to choose the HTTP port, the listener port, the Sys and System password and I suggest to keep the suggested default values (i.e HTTP port=8080 and listener port= 1521), The system will also ask if you want to start the database automatically at boot time (I choose the yes answer).
e) After the configuration the system automatically starts the Net Listener and the Oracle database 10G Express. It prints a completion message that the Installation completed successfully and then suggests to access the database Home page by entering on your browser the command
127.0.0.1:8080/apex
f) I did as instructed, but the command was refused because it could not be executed on the server. At the point I started panicking and I thought that I must have made some errors. I decided to uninstall Oracle by running the command
rpm -e oracle-xe-univ
Then I re-installed from scratch. Unfortunately the results were exactly the same.
g) Finally I wondered if the problem might be connected to the Web server. I decided to install Apache (not installed by default) and to to re-install Oracle again. This time everything worked perfectly.
I found on various Linux Forums that many people seem to have this problem and I suggest them to try an installation of Apache before installing Oracle.
Mario Pesce is a Computer consultant and Software developer who has worked in many European countries (especially UK, Germany and Italy). He is especially interested in IBM iSeries (AS/400) and Linux systems. He has also developed a few websites and blogs such ashttp://mariopesceuk.blogspot.com/ and http://websites.datamission.co.uk.
IT News Daily
December 05, 2013
Share this email

Microsoft to encrypt services, notify customers of gov't data requests

Microsoft moved to reassure business and government customers worldwide that it is committed to informing them of legal orders related to their data, and will fight in court any 'gag order' that prevents it from sharing such information with customers.
READ MORE
 

Issue highlights

 

Acer new 21.5-inch all-in-one PC has an integrated battery

Acer wanted to make the Aspire Z3-600 all-in-one PC easy to move around, so it integrated a battery into the computer. READ MORE

NSA is said to collect cellphone location data across the world

The U.S. is collecting nearly 5 billion records a day on the location of cellphones around the world to feed a large database of the location of "at least hundreds of millions of devices," according to a newspaper report. READ MORE

HP regains server lead but Taiwan vendors see big growth

Hewlett-Packard took back its server crown from IBM last quarter as the overall market contracted and Taiwanese vendors made big gains selling directly to Internet giants like Google and Facebook, IDC reported Wednesday. READ MORE
RESOURCE COMPLIMENTS OF: IDG TV

IDG.tv is now live!

Watch all the latest videos from IDG's global network of technology experts, all teed up in searchable channels with a fun, fresh look. Click to continue

Fatal PS4 robbery attempt highlights dangers of selling online

A man was shot and killed in San Francisco this week after he tried to sell his PlayStation 4 on Craigslist, highlighting the potential dangers of selling goods to strangers online. READ MORE

Will this robot make America safer?

A Silicon Valley startup has developed a surveillance robot that it says can cut crime by half, but its appearance on streets would be sure to prompt more debate about technology and privacy. READ MORE

Logins stolen from Facebook, Google, ADP payroll processor

Two million logins and passwords from services such as Facebook, Google and Twitter have been found on a Netherlands-based server, part of a large botnet using controller software nicknamed "Pony." READ MORE
WHITE PAPER: Red Hat

How Red Hat Enterprise Linux shrinks TCO compared to Windows

IT organizations face the challenge of delivering application services while keeping IT expenses in line with budget constraints. IT managers can potentially free up dollars by decreasing the total cost of ownership for infrastructure systems. The challenge lies in figuring out how to reduce TCO by increasing IT efficiency and driving down costs. Learn more

Follow IT News

Share this email
You are currently subscribed to itnews_daily as aznidi@gmail.com.
If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com
To contact IT News, please send an e-mail to online@itworld.com
Copyright (C) 2013 IT News, 492 Old Connecticut Path, Framingham, MA 01701
** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

How to Install Oracle on OpenSuSe Linux


by John Ribeiro
Microsoft moved to reassure business and government customers worldwide that it is committed to informing them of legal orders related to their data, and will fight in court any 'gag order' that prevents it from sharing such information with customers.
The company also plans to encrypt customers' information moving between its data centers, with plans to complete the project by the end of 2014.
The Redmond, Washington, software and Internet services company is responding to concerns in the U.S. and other countries about government surveillance, particularly after revelations by former U.S. National Security Agency contractor, Edward Snowden, that the agency is engaged in dragnet surveillance of email, phone records, and mobile location data of people in the U.S and abroad.
The NSA also taps into communications links between Google and Yahoo's data centers worldwide, according to a report. Both Google and Yahoo have announced that they are strengthening encryption on their services. Yahoo said last month it will encrypt all information that moves between its data centers by the end of the first quarter of next year. It announced earlier that it would roll out SSL (Secure Sockets Layer) encryption with a 2048-bit key across its network by Jan. 8.
In a blog post late Wednesday, Brad Smith, Microsoft's general counsel and executive vice president of legal and corporate affairs, wrote that the company shared customers' concerns about government surveillance of the Internet. "That's why we are taking steps to ensure governments use legal process rather than technological brute force to access customer data," he added.
Microsoft plans to take new steps to reinforce legal protections for its customers' data, including committing to notifying business and government customers if it receives legal orders related to their data.
"Where a gag order attempts to prohibit us from doing this, we will challenge it in court," Smith wrote. "We've done this successfully in the past, and we will continue to do so in the future to preserve our ability to alert customers when governments seek to obtain their data."
Microsoft said that except in the most limited circumstances, government agencies could approach business and government customers directly for information or data about one of their employees, just as they did before customers moved to the cloud. "And when those limited circumstances arise, courts should have the opportunity to review the question and issue a decision," it added.
- See more at: http://www.itnews.com/internet-based-applications-and-services/71845/microsoft-encrypt-services-notify-customers-govt-data?page=0,0&source=ITNEWSNLE_nlt_itndaily_2013-12-05#sthash.4WXZbmSL.dpuf
The company said it would use best-in-class cryptography, including Perfect Forward Secrecy and 2048-bit key lengths, to encrypt by default customer content moving between Microsoft and customers. "All of our key platform, productivity and communications services will encrypt customer content as it moves between our data centers," Smith wrote. Microsoft is also in talks with other service providers to ensure that data, like email, traveling between service providers is protected. Perfect Forward Secrecy makes it difficult to decrypt data at a later date, even if the secret key is available.
Office 365 and Outlook.com customer content is already encrypted when traveling between customers and Microsoft, and most Office 365 workloads as well as Windows Azure storage are now encrypted in transit between Microsoft's data centers, Smith said. "In other areas we're accelerating plans to provide encryption," he added.
John Ribeiro covers outsourcing and general technology breaking news from India for The IDG News Service. Follow John on Twitter at @Johnribeiro. John's e-mail address is john_ribeiro@idg.com

Microsoft to encrypt services, notify customers of gov't data requests