Thursday, October 11, 2007

Nortel Wants To Buy Something

Nortel (NYSE:NT) has disappointed investors again. Long term telcom equipment and Nortel investors must be getting used to the pain. So what does management do? Lets buy our way out of this mess. Nortel Networks is in takeover mode, CEO Mike Zafirovski has announced. Wall Street has been speculating for a while about the maker of telecommunications equipment.

Nortel who when riding high had acquired many a company using its own stock as currency. This option is not as attractive at the present time. The takeovers will need to be financed in cash. This will compete with internal organic opportunities. If too many internal projects get bumped then in house R&D will conclude "Whats the point" and Nortel will have to make acquisitions.

The sector is still staggering about not having recovered from its last boom. Many companies future's are openly questionable. If you had a neat little start up that was worthy of a lucrative buy out where would you make the deal.

I still think Motorola (NYSE:MOT) should buy out Nortel and hopefully kill two problem birds with one controversial deal.

Turn your OS X and Linux-based machine into a FON Spot


Turn your OS X and Linux-based machine into a FON Spot

Not one to dwell too heavily on the past, FON is apparently already moving beyond its newfangled partnership with Time Warner, and has now caved to giving Mac and Linux users the ability to get in on the action. The latest FON Spot software now appears in a beta form for OS X and Linux (preferably Ubuntu) users, allowing Ethernet-connected machines to share excess bandwidth with others via WiFi. Notably, it's even supposed to work if connected via 3G, but we can't imagine your carrier being all too pleased with such a scheme. Per usual, the company warns of its beta nature and insinuates that problems could arise, but if you're still not deterred, be sure to hit the read link and get your respective download on.

$500 million underwater fiber network to link Asia, America


$500 million underwater fiber network to link Asia, America

Unfortunately for most, traversing back and forth to Asia from America on a regular basis isn't exactly in the cards, but thanks to a $500 million project agreed upon by a 17-member telecommunications consortium, visiting via fiber will soon be a whole lot snappier. Telekom Malaysia, along with 16 other firms, have awarded a half billion dollar contract to Alcatel-Lucent and NEC to construct a 12,428-mile link between the west coast of America and Southeast Asia. The aptly-dubbed Asia-America Gateway will connect the western US with Malaysia, Singapore, Thailand, Brunei, Hong Kong, the Philippines, Guam, and Hawaii, while also offering "seamless interconnection" with Europe, Africa, and Australia. Moreover, the project is being designed to provide a "more secure link for traffic" across the seas, as it avoids the hazardous Pacific Ring in hopes of dodging massive internet outages due to unexpected earthquakes. Best of all, the wait time for the undersea cabling to make an impact is fairly reasonable, as users should see "faster and more reliable service" when it becomes operational in December of next year.

Netgear acquires Infrant to boost storage offerings


Netgear acquires Infrant to boost storage offerings

Hot on the heels of yet another big time acquisition between Philips and DLO comes news that Netgear will be snapping up the privately-held Infrant Technologies for a cool $60 million in cash. All 34 employees will soon be wearing Netgear badges, and Infrant's CEO will move over and become Netgear's Vice President and General Manager for storage products. Essentially, Netgear is hoping that this move will strengthen the firm's presence in the enterprise and small-business storage realm, as it can now offer up a trusted name in RAID-based NAS products for SMB, SOHO, and the home. More specifically, the ReadyNAS, RAIDiator, and X-RAID portfolios were the targets of Netgear's desire, and while details on branding and the timeframe for the merge weren't noted, it sounds like Netgear's ready to get this party started on the double.

Smoking kills Internet2



Smoking kills Internet2

Say what you want about net neutrality, at least the Internet hasn't been taken out by a hobo. Unlike the regular Internet we all use everyday, which was originally designed to distribute the AACS hex key withstand a nuclear attack, Internet2 is designed primarily for speed -- up to 9.08Gbps in most recent tests. All that juice comes at the price of redundant network links, though -- which means the whole thing got taken offline last night when a homeless man threw a cigarette onto a mattress under Boston's Longfellow Bridge, starting a blaze that eventually melted the fiber-optic link between Boston and New York. While initial estimates called for a service outage of 1-2 days, quick-thinking techs were able to get service going again in just 4 hours. Good thing, too -- if the panic that sets in around here when our DSL goes out is any indication, with the kind of bandwidth these guys were missing out on, there must've been wailing in the street.

Nokia Siemens Networks drops the axe on 9000 jobs

Nokia Siemens Networks drops the axe on 9000 jobs

While this doesn't come as a huge surprise -- this layoff was predicted last year -- it still hurts to see such massive cutbacks in an industry held so near and dear to our hearts. Apparently 2,900 jobs in Germany and 1,700 in Finland will be cut on the road to finding savings to the tune of $2 billion by 2010. The final cut will be about 9,000 employees which is roughly 15 percent of the joint venture's workforce of 60,000. The joint venture was founded to help both companies compete with the likes of Ericsson and Alcatel-Lucent with 5 major business units focusing on Radio Access, Broadband Access, Service Core and Applications, IP / Transport, and Operations Support Systems. Of course, the verdict is still out on how successful this venture will ultimately be, but Nokia's track record in the mobile space has been strong for as many years as we care to remember.

Computer threat - Network Security

Every TCP package have 'flag bit’ defining content and intention of each package.
Example:

    A package with flag bit contain "SYN or SYNCHRONIZE" will undertake to conduct initiation connection from sender to recipient. A package with flag bit contain "ACK" will undertake to inform receiver about sender information.
    While a TCP package with beet flag contain "FIN" or "FINISH" undertaking to stop connection from sender to recipient.
To build a TCP connection, need data transfer package between two host, transfer of this data recognized by the name of "TCP Three-Way Handshake" as below picture.


Computer Network Threat

Threat is very harmful to the entire system and also by application at internal and external network.

The threat as follows:

Remote Login - this matter happened when someone capable to connect to a computer and have ability to control to several things related to resource found on the host or computer.

Application Backdoors - some program have special ability to access with long distance (remote access). Some bug program, exactly contain a backdoor or hidden access providing level control the computer and program.

SMTP session hijacking - SMTP is most commonly method used to deliver E-mail. By getting E-mail mailing-list, someone can deliver undesirable E-mail to thousands of or more users. This matter is called unsolicited junk mail or spam.

Spamming conducted with joining SMTP server which not suspect, then deliver thousands of E-mail called redirecting process, so that complicate to detect who is the real sender of the Mail Spam.

Operating system bugs – In application, some operation system have conducive security gap to be exploited illegally.

E-mail bombs - is an Individual attack, someone send hundreds or thousands of E-mail to one address so the victim E-mail cannot accept E-mail anymore.

Macro - To make simple or facilitate procedure an application, many application program permit us to make command which can be run by the program (script). By exploiting ability of script or macro, attacker can cause damage of data at computer.

Virus – Most known to make trouble at computer. The growth of virus from method, way of, making, effectiveness, damage storey, and also speed of spreading is different each other.

Redirect bombs – Hacker or Cracker can use ICMP to change direction of information and attack to other router.

Source routing - At many case, a data package which work through one or some network determined by router pass to route information by the router, but sometime hacker used the package as the real sender.

Another type of computer attack are from (next posted about this) :
    Denial of Service (DoS)
    Spoofing
    Broadcast Amplification
    TCP SYN
The method to run the threat above, can be conducted variously including using virus.

Cisco Buys Into Wireless Spectrum Analysis (CSCO)

Cisco Systems (NASDAQ:CSCO) has announced a definitive agreement to acquire Germantown, MD-based Cognio, Inc., a company involved in wireless spectrum analysis and management for wireless networks.

Cognio's spectrum technology enhances performance, reliability and security of wireless networks by detecting, classifying, locating and mitigating sources of radio frequency interference. The acquisition is said to provide Cisco with complementary and differentiating technology, intellectual property and a core team to expand Cisco's leadership in unified wireless networking.

The Cognio acquisition is expected to close in the first quarter of Cisco's 2008 fiscal year, and this looks to be the company's 122nd acquisition. Upon the close of the acquisition, Cisco plans to integrate Cognio into its Wireless Networking Business Unit, under the Ethernet and Wireless Technology Group.

Financial terms were not disclosed as far as what Cisco is paying, nor ant financial backgrounder on Cognio. Cognio was venture-backed with Northbridge Venture partners, ABS Ventures, and Avansis Venture listed as backers.

Notebook Parts: Dell, IBM, COMPAQ, Notebook Batteries & Accessories

NB Components.com is your online source for Notebook Parts, Replacement Notebook Batteries, and Accessories. Need a notebook battery, ac adapter, port replicator, keyboard, or any other notebook accessories? Find the lowest price on these notebook spares here. We specialize in Dell notebook parts, IBM notebook components, as well as Acer, Toshiba, Sony, HP/COMPAQ, and Gateway notebook spares

Dell Notebooks








Bestsellers


• Dell Latitude D810 Keyboard - $49.00

• Dell 312-0326 Lithium-Ion Battery - $89.00

• DELL Latitude C840 Battery - $78.00

• Li-Ion Battery for Toshiba Satellite 200 Series - $65.00

• Dell Inspiron 5000 Port Replicator - $50.00

• HP Compaq AC Adapter 65 Watt 384019-001 - $40.00

• Li-Ion Battery for Dell Latitude L400 - $89.00

• DELL 0R334 PA-8 AC Adapter - $37.00

• HP Compaq Adapter for Presario V2700 Series - $49.00

• HP Compaq 135Watt AC Adapter - $65.00

• Dell 312-0315 Battery - $105.00

• Dell 6P890 Keyboard - $49.00

• DELL 5P171 Secondary Modular Bay Battery - $89.00

• HP Compaq Presario 2700 Series AC Adapter - $35.00

• Dell DVD C3284-A00 - $149.00

• Intel TrueMobile Wireless LAN MiniPCI Card - $49.00

• Dell Inspiron 9400 Li-ion Battery - $75.00

• HP Compaq Adapter for Presario B3800 Series - $49.00


New Products


• Sony VGP-AC16V8 AC Adapter - $82.00

• Sony VGP-AC19V10 AC Adapter - $85.00

• Dell D5561 71Whr Battery for Inspiron 700M/710M - $79.00

• 312-0416 Dell Lithium-Ion Battery - $89.00

• Dell CD-RW/DVD-ROM Drive Module - $129.00

• IBM 73P4485 72W Slim AC/DC Combo Adapter - $95.00

• Dell Latitude 120L Li-ion Battery - $89.00

• Sony VGP-AC19V15 AC Adapter - $85.00

• Dell Inspiron 1300 Li-ion Battery - $79.00

• Dell 9 Cell Y5180 Li-Ion Primary Battery - $106.00

• Dell Inspiron B130 Li-ion Battery - $79.00

• Dell Inspiron B120 Li-ion Battery - $79.00
Toplist