Saturday, October 31, 2015

Mexicans use free software in cell – El Siglo de Torreon

The coordinator of Learning Technologies University Center for Economic and Administrative Sciences (CUCEA), Alejandro Lopez Rodriguez, said that more than 50 percent of Mexicans use free software, and most of them have on their cell phones.

He expressed that operating system level, the use of free software is not yet widespread, and today the Windows operating system is still used more.

“In countries like Mexico people, whether legal or illegal manner by incurring ‘piracy’, is still married to proprietary systems, Mexicans struggle to change programs and acquire new knowledge,” he said.

He said that Mozilla Firefox or Moodle learning platform is the most widely used throughout the UdeG systems; OS Linux is a better alternative to the Windows operating system, because the latter is very expensive to maintain legally in computers. “

He stated that LibreOffice, an alternative to Microsoft Office and Android system for mobile are some examples of free software.

He said that there is a proprietary software, generated by companies at very high cost, which can not be changed according to user needs.

said that in contrast, free software, developed by communities of people interested in contributing their knowledge to solve technological problems, can be modified, copied and shared by users and implemented economically and most such software has cost.

He mentioned that a person can have his computer equipped with this software without spending money last.

She pointed out that free software is very safe and the threats to it, as viruses are almost nil and easy to spot.

LikeTweet

Friday, October 30, 2015

50% of Mexican free software used in cell – CronicaJalisco


 Technology as a means of communication, far from being a luxury has become a necessity for modern society, the proof is that 50 percent of Mexicans use free software through their cell, said Dr. Alejandro Lopez Rodriguez, coordinator of Learning Technologies University Center for Economic and Administrative Sciences (CUCEA), announcing the details of the Festival of Free Software Vallarta 2015.

He stressed the coordinator of the festival, even though in Mexico cell dependence is obvious, the use of free software is still limited, as most of Mexican society still uses the Windows operating system. “In countries like Mexico, the people-and whether legally or illegally by piracy-incurring, is still married to proprietary systems. The Mexicans struggle to change programs and acquire new knowledge. “


 


 Learning platforms

 


 Mozilla Firefox or Moodle learning platform, are best used in all schools of the University of Guadalajara (University of Guadalajara) systems added the scholar CUCEA, while noting that among the most efficient options to the Windows operating system, Linux is, “even though the latter is very expensive to maintain illegally in computers.” LibreOffice is an alternative to Microsoft Office and the Android system for mobile, are some examples of free software, said Lopez Rodriguez.

As for the benefits of use of free software, the expert explained that the program is proprietary (commonly generated by companies), is expensive and can not be changed according to user needs, whereas the free system (developed by communities of people interested in contributing their knowledge to solve technological problems) It can be modified, shared, copied by users and implemented economically and many times free. He added that free software is very safe and the threats to it (such as viruses), are easy to spot.

The theme of the festival this year is “Communities” which will discuss how interested in solving problems and software technology work through communities to create solutions. Those interested can obtain more information on the http://fsl.mx/2015/contact page.


 


 Meeting techie

 


 The Festival of Free Software is the meeting point for the fans and interested in issues of open and collaborative technologies, the seat is the Crown Paradise Club Puerto Vallarta hotel. Approximately 500 participants are expected. Note that there will be 32 speakers addressing about 40 academic events, during the first two days in five simultaneous spaces also will be keynote presentations and international visitors as Jon “Maddog” a promoter of free software and the executive director of Linux International.

mac

LikeTweet

32 countries, including Venezuela, FinFisher software used to … – Whack

30-10-15.- few days ago, CitizenLab submitted its third report on the use of FinFisher spy software, which reveals that 32 countries in the world would be using FinFisher to spy on its people, including some who had not appeared in previous reports, including Spain, Paraguay and Venezuela.

What is FinFisher?

FinFisher is a suite of spyware, created and marketed by the company Gamma International, whose sole client is the government. FinFisher is marketed as software for intelligence and national security. The program is inadvertently installed on computers, cell phones and other devices of the victims, through software that poses as another-for example, a browser extension.

Although the software presents itself as a tool for fighting crime, there is ample evidence that is used primarily to investigate and attack dissidents. For example, the government of Bahrain FinFisher used to monitor some of the law, activists, journalists and leaders of the leading opposition. In Mexico, investigations revealed that it has been used by the Ministry of Public Security, the Attorney General’s Office, the Center for Investigation and National Security and the Presidential General Staff.

If you feel like you’re in a movie Hollywood, hold the keyboard: the software has the ability to capture screen images of the devices, turn on cameras and microphones, store keystrokes and record phone calls and Skype. You can also download photos, contacts, files, emails and text messages.

How it works

When a government buys FinFisher receive a server control called FinSpy Master, which is installed at the headquarters of the entity. After that, they can set anonymizer proxies (known as “FinSpy Relays”) in order to hide the location of the server control. Infected computers communicate with the anonymizer proxies, which are usually located in a Virtual Private Server in another country, which then forwards the communication between devices of the victim and the control server.

Researchers of CitizenLab, through a systematic series of consultations servers anonymity, they found that they could reveal the location of the master server when the pages returned by these applications contain location data (for example, some pages of Google, including forecasts geographically localized weather).

In 2013, Gamma was designated as one of the “enemies of the Internet” report in the newspaper Reporters Without Borders. The same year, Firefox Gamma alleged that its software was posing for Mozilla product to avoid detection, described as abusive tactics.

FinFisher

Map networks FinFisher proxy for CitizenLab.

Despite the hacking suffered in 2014, CitizenLab report found that there are currently more FinFisher servers in more countries than any previous round investigation. In addition to this growth, they found new clients, that did not appear above or reports CitizenLab or any of the revelations of Wikileaks: Angola, Egypt, Gabon, Jordan, Kazakhstan, Kenya, Lebanon, Morocco, Oman, Paraguay, Saudi Arabia, Slovenia, Taiwan, Turkey and Venezuela.

Venezuela Intercept traffic via Lithuania

A significant number of servers CitizenLab FinFisher that could detect, they used www.Yahoo.com as Pagna decoy. While CitizenLab could not find way to detect the exact IP address FinFisher servers falsifying traffic www.Yahoo.com , it was able to retrieve the personalized information that Yahoo sent to your browser depending on your geographic location, browse the contents of the object “userLocation” in the data that comes from there. Yahoo uses the user’s location to show personalized content such as local weather information and news.

Based on this, CitizenLab was determined that the “userLocation” object sent from the address 185.8.106.xxx (enn Lithuania ) is:

“userLocation”

{“woeid”: 395 269

“zip”, “Caracas”

“city”, “Caracas”

“state”: “Federal District”,

“country”: “Venezuela”

“countryCode”: “VE”

…}

So a server located in Lithuania, served as an “intermediary” or “proxy” for a master server located in Venezuela. This means that connections to Yahoo.com users in Venezuela, could be forwarded to Lithuania, before you go to Yahoo servers, thus, the data (including passwords) may be intercepted and analyzed without the user’s knowledge it.

While CitizenLab notes that are probably not detecting all existing facilities FinFisher, a new report has improved its ability to detect facilities and attributed some of the servers to specific institutions of certain governments. This should make it easier for activists working in the area of ​​public policies in these countries, demand responsibility and accountability from their institutions, submit requests for information and investigate what agencies are using this software, how much money was spent on it and how purposes.

FinFisher is undetectable by traditional antivirus. If you think you may be being traced, there is a tool called DETECT which, although not infallible, can help determine if there is spyware on your computer as developed by Gamma or Hacking Team. Anyway, if you’re in one of the countries that appear on the list CitizenLab, it is wise to take additional security measures, such as using PGP encryption in your communications.

LikeTweet

Mexicans prefer free software – Sipse.com

This is because it can be modified and shared with users easily and economically.



Agencies
GUADALAJARA, JALISCO coordinator Technology for Learning University Center for Economic and Administrative Sciences (CUCEA), Alejandro Lopez Rodriguez noted that more than 50 percent of the Mexican use free software, and most of them have in your cell phone .

He expressed that operating system level, the use of free software is still not widespread, and today the Windows operating system is still used more.

“In countries like Mexico people as either legally or illegally for engaging in ‘piracy’, is still married to proprietary systems, Mexicans struggle to change programs and acquire new knowledge, “he said.

He said that Mozilla Firefox or the Moodle learning platform is the most widely used throughout the UdeG systems; OS Linux is a better alternative to the Windows operating system, because the latter is very expensive to maintain legally in computers. “

He stated that LibreOffice, an alternative to Microsoft Office and Android system for mobile are some examples of free software, published Notimex.

He said that there is a proprietary software, generated by companies at very high cost, which can not be changed according to user needs.

He claimed that in contrast, free software, developed by communities of people interested in contributing their knowledge to solve technological problems, can be modified, copied and shared by users and implemented economically and most This software is free.

He mentioned that a person can have his computer equipped with this software without spending money last.

She pointed out that free software is very safe and threats to it, like viruses, are almost nil and easy to spot.

  • Your definition is associated with the birth of the free software movement, led by Richard Stallman and the consequent establishment in 1985 of the Free Software Foundation that puts the computer user freedom as a fundamental ethical purpose.
  • It comes from the English term free software, presenting ambiguity between the ‘free’ meaning and ‘free’ associated with the word free. Why it is usually regarded as free software rather than as software that can be modified without licensing restrictions.
  • In this sense we must emphasize that freedom has to do with the use and not gratuity.

LikeTweet

More than 50% of Mexican free software used in cell – Milenio.com

The coordinator of Learning Technologies University Center for Economic and Administrative Sciences (CUCEA), Alejandro Lopez Rodriguez, said that more than 50 percent of Mexicans use free software, and most people have in their cell phones.

He expressed that operating system level, the use of free software is not yet widespread, and today the Windows operating system is still used more.

“In countries like Mexico people, whether legal or illegal manner by incurring ‘piracy’, is still married to proprietary systems, Mexicans struggle to change programs and acquire new knowledge” said

He said that Mozilla Firefox or Moodle learning platform is the most widely used throughout the UdeG systems.; OS Linux is a better alternative to the Windows operating system, because the latter is very expensive to maintain legally in computers. “

He stated that LibreOffice, an alternative to Microsoft Office and Android system for mobile are some examples of free software.

He said that there is a proprietary software, generated by companies at very high cost, which can not be changed according to user needs.

said that in contrast, free software, developed by communities of people interested in contributing their knowledge to solve technological problems, can be modified, copied and shared by users and implemented economically and most such software has cost.

He mentioned that a person can have his computer equipped with this software without spending money last.

She pointed out that free software is very safe and the threats to it, as viruses are almost nil and easy to spot.

LikeTweet

Thursday, October 29, 2015

Students create software to streamline migration flows – The Imparcial.com

Students of the Higher Institute Tecnológico Jesus Carranza (ITSJC) in Veracruz, informático developed a program that is easier and faster registration of migration flows, since it uses biometrÃa facial and fingerprint.

This technology allows greater accuracy of the data for each immigrant, as well as the security and protection thereof, say its creators Víctor Hugo Rivera Evangelista, Lilia Lopez Juarez Reyes and Denis Vida, student of engineers in business Gestión and computer systems.

“With Implementing the fingerprint and photograph, data They will be more secure and avoid the use of false identities,” Juarez Reyes commented in an interview with the News Agency of Conacyt.

‘It podrá check when the resea ± as a person delivering HATH, are legÃtimas “± adió year.

Meanwhile, Lopez Vidal aseguró the reduction of time data capture demonstrates that lower penalties by organizations that defend human rights.

“If an immigrant is retained more than 24 hours is being incurring a crime of deprivation of liberty, coupled with this, note that the process is more agile, since his deportation is quickest and no violations are committed on their rights, “asserted the student.

The young creators added that the Register of Records for Immigration Control (REDI) is a useful tool for minimization of time capture of records made in the modules of the National Institute of Migración (INM).

For unlike what happens with ofimáticas tools used by the INM, which made a record in more than 45 minutes, the REDI implementación reduces time so captures only 10 minutes, optimizing service transit migration.

According to students, the new software has a friendly interface that facilitates the capture of information from records in different seasons migration throughout the country, which achieved a comprehensive administration and homogà © line.

Young people commented that because one of their teachers has a close relationship with the INM, decided to make the project under implementó more than six months ago stations in Veracruz, Oaxaca Acayucan and with a good result.

“What we want is to unify a national technology platform for data immigrants are shared and are registered únicamente through their fingerprint, making the search more simple, “Evangelista Rivera puntualizó.

The system creó a year ± or previous store Back a thorough investigation as básicas to estándares needs and to optimize the quality of service that the INM provided.

It is now expected that the REDI software, presented at the 22 Week of Science and Technology of Veracruz, is implemented in each of the INM agencies throughout the country to benefit not only dependence but also © na foreigners.
 

LikeTweet

Wednesday, October 28, 2015

Students create software to streamline migration flows – Informador.com.mx

>

It has to implement fingerprint and photograph, so that data will be safer. The reporter / FILE

  • Students create application for users of Google Glass
  • Mexican students create system to use appliances with eyes
  • >


    • The project has already been implemented in the states of Veracruz and Oaxaca
    • The students developed a program that allows for greater accuracy in data

    MEXICO CITY (28 / JUL / 2015) .- students Superior Technological Institute of Jesus Carranza (ITSJC) in Veracruz, developed a computer program that is quick and easy registration flows migration because it uses facial and fingerprint biometrics.
    This technology allows greater accuracy of the data for each immigrant, as well as security and protection thereof, ensure Victor Hugo Rivera creators Evangelista, Lilia Lopez Juarez Reyes and Denis Vida, student of engineers in business management and computer systems.
    “With the implementation of the fingerprint and photograph, the data will be safer and avoid the use of false identities,” said Juarez Reyes in an interview with the News Agency of CONACYT.
    >
    “may be checked at the time that the reviews that a person being delivered, are legitimate,” he added.
    Meanwhile, Lopez Vidal said reducing capture time I data show that lower penalties by organizations that defend human rights.
    “If an immigrant is retained over 24 hours is committing a crime of imprisonment, coupled this, note that the process is more flexible, as deportation is faster and no rights violations committed, “said the student.
    young creators added that the Register of Records for Immigration Control (REDI) is a useful tool to minimize the time of capture of records produced in modules INM (INM).
    For unlike what happens with office tools used by the INM, which made a record in more than 45 minutes, the implementation of REDI reduce the capture time only 10 minutes, optimizing transit of the migration service.
    According to students, the new software has a friendly interface that facilitates the capture of information from records in different detention centers throughout the country, which achieved a comprehensive and consistent administration .
    Young commented that because one of his teachers have a close relationship with the INM, decided to implement the project which was implemented over six months at the stations of Veracruz and Oaxaca Acayucan a good result.
    “What we aim is to unify a national technology platform for data to be shared and immigrants are registered only through their fingerprint, making it easy to search,” he said Evangelista Rivera.
    system a year ago before a thorough investigation as to the basic needs and standards are created to optimize the quality of service that the INM provided.
    now it expected that the REDI software, presented at the 22 Week of Science and Technology of Veracruz, is implemented in each of the INM agencies throughout the country to benefit not only the dependence but also to foreigners.

    LikeTweet

    Students create software for immigration control – Conacyt News Agency (press release) (Registration)

    Barojas Lizbeth Vazquez

    Veracruz, Veracruz. October 27, 2015 (News Agency Conacyt) .- Students of Higher Technological Institute of Jesus Carranza (ITSJC) in the state of Veracruz have developed a software has provided the records migration, through automation of administrative efforts of the National Migration Institute (INM), improving the quality of service it offers.

     banner software migracion02

    The team of students of business management Engineer Victor Hugo Rivera Evangelista and Lilia Reyes Juárez, in collaboration with Denis Lopez Vidal, student of Engineering in computer systems, they were given the task of developing a tool that would be useful to minimize time capture of records made in the migration modules.

    Developing the Registration and Records for Immigration Control (REDI), which is a software that works with biometric technology and a friendly interface that facilitates the capture of information Records in different detention centers throughout the country, achieving a comprehensive and uniform administration.

    Members of the team explained that currently the National Institute of Migration work with office tools, with which the development of a single record can take more than 45 minutes, making a long and tiresome process. However, the implementation of REDI software has reduced the time of capture in just 10 minutes, optimizing service transit migration.



    Biometric technology

    /conacytprensa.mx/images/tecnologia/tics/huella-digital.jpg" alt = "fingerprint" width = "173" height = "244" /> The software span>, which was presented by the students of the seventh semester of their careers, in the 22nd Week of Science and Technology of Veracruz in Xalapa, has tools of facial biometrics and fingerprint, which may have more accuracy in the data for each immigrant, as well as safety and protection of the same.

    “With the implementation of the fingerprint and photograph, the data will be safer and avoid the use of identities False. You can check the reviews at the time that a person is providing, are legitimate, “said Juarez Reyes.

    Meanwhile, Lopez Vidal said that the reduction of time data capture has contributed with decreasing sanctions by organizations that defend human rights, “If an immigrant is holding you back more than 24 hours, is committing a crime of deprivation of liberty, coupled with this, note that the process It is more agile, and their removal is quicker and no violations are committed to their rights. “

    Welcome to Mexico

    The idea of ​​creating a to accelerate migration flows from Mexico I came because one of the teachers of these three students has a close relationship with the National Migration Institute, being the source encourages young people to undertake this project, with which they want to unify technological platforms in one standard, facilitating its maintenance and operation.

    “What we want is to unify a national technology platform, so that data are shared and immigrants are registered only through its fingerprint, making it easy to search, “said Evangelista Rivera.

    software Registration Records Control Immigrants was created a year ago, after an exhaustive investigation as to basic needs and standards required at the National Migration Institute, to optimize the quality of service provided. The prototype was implemented over six months at the stations of Veracruz Acayucan and Oaxaca, time that has worked well.

    It is expected to implement the software REDI each one of the offices of the National Migration Institute throughout the country, benefiting not only this unit but also foreigners who live or intend to live in Mexico. Note that this tool work could also be adapted to various institutions or private companies that want to automate their procedures regarding data collection.

     Creative Commons License
    This work authored Conacyt Information Agency is under license Attribution 4.0 Creative Commons International.



    Informative Agency Conacyt

    LikeTweet

    Tuesday, October 27, 2015

    Experts tested the vulnerability of wireless networks with an … – Telam

    “We put ourselves in the place of the attacker, it is what we do in any assessment using drones and use the offensive security to prove how efficient are the defense mechanisms of an organization” expressed computer experts in an interview with Telam, before to provide exposure at the international conference on cybersecurity Ekoparty, which culminates today in the city of Buenos Aires.

    Crozono is the name of the program six months ago Sheila a self-taught 20 years dedicated to programming from the 12 and

    Paul, an electrical engineer, began thinking after having known teaching at the Da Vinci Multimedia School.

    “We started with this idea because we both work in security, have drones and we like the technology, and we complement each other very well because I work more on the part of the hardware and electronics, and Sheila as offensive specialist programming and security, “said Paul.

    As a example and for purposes of research, “if one wants to make an attack on a 20th floor office in what is usually thought to be putting a car outside the building with a giant satellite dish, but the issue is that very little goes unnoticed. So we came to try the drones, “said Sheila, who at age 15 was hired by a publisher to write a book about” web hacking “.

    So, they put on drones and a robot made recyclable material with the software, which has two main features: incorporates the tools used by security specialists and has the

     “Intelligence” to solve problems

    “In the framework (the software) tried to make the decisions that I would then solve the problem do not need (human) interaction. Can fly up up through drone and run alone, “remarked the young programmer.

    Experts use a Phantom 3 quadricopter and a tablet can set the points where the drone should go, and so make the team go stopping and capturing information

    “The mission is purely academic, it did to investigate But in the hands, perhaps, of an attacker seriously the truth is dangerous.. in fact aim and objective public -that say , who could use the good- basically the police side, since when does a raid and have to physically go to a truck to study the area and attack the wireless network to see whether data is pedophilia, does not go unnoticed ” , told the engineer.

    For that reason, they stressed that the program developed may be more advantageous for the police which now has drones just to create images, and now have the ability to “place a Raspberry ( a small low-cost computer) and send Crozono townhouse from the office. “

    Romans and Berta explained that what they do” not break the information “but an assessment to determine safe levels computer, and distinguished themselves in that “hacking is knowledge that anyone can use it right and someone wrong, and that’s the concept that sometimes is not understood because it is usually associated to the hacker as a criminal.”

    “There are hackers who use the knowledge to steal and make money, and others who use it to protect; and we will associate him as a person with much curiosity, interest and time to investigate, which is the way in which one is interested in finding out how things work, “he stressed.

    ” In fact before the hacking was not even associated with the computer, for example we say that René Favaloro was a hacker, because he did something different and managed to make an improvement, “the expert stressed.

    LikeTweet

    Bill Gates meets 60 for the software industry to philanthropy – La Prensa Grafica

    The foundation of Bill Gates and his wife Melinda was also noted to have close ties with the seed company Monsanto. With several investments the foundation supports this company, accused of keeping Africa in poverty and to control agriculture in much of the world with its plants and patented seeds.

    Although he always had a quiet personality and never wanted to be in the foreground or appear too publicly, Bill Gates is the member of the founding generation of the computer industry that has most influenced the industry. Tomorrow, Gates turns 60 in a new phase of his life, the philanthropist.

    The US magazine “Forbes” is placing William “Bill” Henry Gates III in the position of richest man in the world, which should the success of Microsoft.

    With the founding of the company in the 70s paved the way to the computer age. Along with his friend Paul Allen, Gates discovered the potential of the software. In fact, not only created Microsoft, but really the whole software industry.

    Unlike the charismatic Steve Jobs, founder of Apple, Gates has always been considered a “freak” of the somewhat aloof computers. But at least in developed countries his vision became reality: almost every household has a PC, which 40 years ago seemed like science fiction

    In the revolution of mobile devices and Gates instead. the company left behind its competitor Apple, even though Gates had in the program Windows laptops and smartphones before Jobs.

    Today, Gates’s life no longer revolves around the computers, smartphones or software, but seven years is devoted almost exclusively to charitable work.

    He and his wife Melinda are among those most donations make in the world. The two gave last year 1,300 million for charitable purposes, according to “Forbes” and stood in second place behind the American investor Warren Buffett. An estimated Gates’ fortune is 79,200 million.

    He and his wife grew up in families where great value to voluntary work and personal commitment was given, it is noted on the website of its foundation. “When life is good one, use this gift so well and wisely as possible,” adds

    Among its first projects. In the 90s equipping public libraries counted in United States with Internet access through the Gates Library Foundation. In his company Microsoft, Gates learned the importance of access to the network for education, explained.

    Soon their interests diversified into other areas worldwide, such as combating diseases such as malaria, AIDS and polio and combating climate change. In 2010 Bill and Melinda Gates put 10,000 billion available over the next decade for research and distribution of vaccines for the poorest countries.

    However, its foundation is not free of criticism. For example, in March the British newspaper “Guardian” stressed that the administration of his estate contradicts its objectives of combating climate change. An analysis of data from fiscal year 2013 showed that the foundation has invested 1,400 million dollars in companies extracting oil, gas or coal, which are responsible for some of the biggest environmental disasters of recent years, such as the British BP or Exxon. The foundation apparently has a fortune of 30,000 million dollars.

    it is the also points to have close ties with the seed company Monsanto. With the foundation supports several investments this company, accused of keeping Africa in poverty and control agriculture in much of the world with their patented seeds and plants.

    Bill Gates was born in 1955 near Seattle in the state of Washington. He met at school Paul Allen, who was somewhat older than him and who began to spend every free minute with computers. In 1975 he abandoned his studies to focus more on his small company Micro-Soft and enlarge. The date of foundation of the company is the April 4, 1975.

    His meteoric career began with a commission from IBM to produce an operating system for their computers. Gates assumed the job for about $ 50,000 and bought the rights to QDOS (Quick and Dirty OS) program, developed further and called MS-DOS (Microsoft Disc Operating System). Thus began the era of personal computers.

    Microsoft became a global company with the Windows operating system. During the time that he faced Netscape in the “browser wars” Gates was criticized for his actions, but ultimately prevailed.

    On the crest of the wave, he announced earlier 2000 retreating. He gave his first CEO position to his friend Steve Ballmer. Officially he dismissed in September 2007 and in June 2008 almost completely separated from the company and, with only 53 years. Since then only influences his role as chairman of the supervisory board.

    He lives with his wife and three children in a high-tech equipped property near Seattle, but despite the huge wealth, their children do not inherit a fortune, as most will be distributed to society,

    Melinda Gates said in an interview.

    LikeTweet

    Rethinking network monitoring software for the experience … – TechTarget ES

    The user experience is always a priority for Cross Country Healthcare, a recruitment firm Health based in Boca Raton, Florida. But as more applications move to the cloud-and as more users accessing them remotely from devices Moviles and monitor the status of the network to optimize the user experience has become a challenge for professionals IT as Forrest Schroth.

    But the traditional software and network monitoring tools can only do a little, according to Schroth, director of network engineering services in Cross Country Healthcare.

    “You can tell if there is sufficient bandwidth for errors flood or how they are handling calls from IP to IP direction. But none says about end-user performance,” he said.

    Schroth is frustrated with this dilemma, especially as the company seeks more and more applications software as a service (SaaS). The company email is moved to the cloud-based service for Microsoft Office 365 and several business units are using SaaS-based ERP systems. No signs that the momentum to lose steam cloud, Schroth is looking for a single tool to help monitor and troubleshoot end-user experience for all applications.

    “In this time, the networking group are running your toolkit and the application pool are running your toolkit and if an event occurs, we gathered in a room and combine data to find the problem, “he says.

    Even with this collaboration, locate problems with network monitoring software can be more difficult because SaaS providers usually do not allow you to see inside your environment.

    “They tend to push you and say, ‘Our database is fine,’ when one has already traced the transaction was well until his network, “says

    To avoid the potential impact on. users, IT managers and Schroth rely on solutions that simulate the user experience for cloud-based applications or act as a watchdog for events that hinder the performance of applications and network. For example, some IT teams are deploying sensors and agents across the network to mimic and monitor what users face in terms of response times of applications. Other escrudiñan existing, such as firewalls , to get a deeper insight into the events that could block or slow traffic equipment.

    The lack of transparency in the cloud can hinder delay or troubleshooting for network equipment. But SaaS providers have no incentive to allow control the performance of their internal systems, says John Burke, CIO and chief research analyst at Nemertes Research.

    “It will always be the place where visibility ends network administrators, “he says.

    There are only three ways to address this obstacle, says Burke. One option is the use of probes of performance management applications (APM), either online or off a span port ( span port ), to monitor traffic and ensure that requests and answers work well. Another alternative is to use an optimizer or proxy-and either a device or service-that can provide performance data. The third possibility is to place agents on devices and desktop computers to control transaction times.

    “However, if you need response times for both solid and predictable network transactions, using SaaS on public internet should automatically be suspicious strategy, “notes Burke.

    Out of the Shadows

    The level of frustration that network administrators as Schroth have with SaaS providers is not unusual, according to Shamus McGillicuddy, senior analyst for network management at Enterprise Management Associates.

    “Our research shows that a lot of networking professionals do not take awareness and adoption of SaaS IT in the shade until they are asked to support something that is wrong, “he says. “So networking equipment have no control, but are at fault.”

    In addition to relying on traditional sources for performance data, such as records of firewalls or traffic data of the switches , network administrators can deploy monitoring tools to better understand synthetic user experience with cloud-based services. Monitoring tools synthetic probes used in various parts of the network to perform ping tests to check the response time of the application. They also conduct tests to see how long it takes to load a presentation based on the Web in a browser window, for example, among other tasks.

    But McGillicuddy does not believe that SaaS vendors must provide a complete visibility into their networks. But that does not leave out the question, if your software and network monitoring tools detect a problem at the end of the vendor who violates the service-level agreement (SLA).

    “You are paying for not by one service infrastructure, “he says. “If you properly monitor your network and ensure that it is running at a high level-and can prove that a problem specific to the user experience is attributable to SaaS- provider can then make sure that the SaaS provider aware and correct the problem promptly. “

    Loading sensors

    The Stevenson University in Baltimore complements its monitoring tools network which includes SNMP monitoring traffic monitoring system and monitoring of services-Windows “more elaborate tools,” says Robert Hutter, managing director of networks and systems business college.

    Stevenson, which has 4,000 full-time students, nearly 1,500 faculty and staff and three campus ensures that the user experience is optimal sensors using PRTG Network Monitor Paessler common scenarios to simulate the creation of records, or logs, and downloading files from the Internet.

    “This test shows the manual aspect,” says Hutter.

    The sensors help identify and solve other problems as well. For example, if the sensors indicate that users can not log in from several campuses, then Hutter know that the chances are that it is a problem with one of the hosted services or applications that use the university.

    “It helps us gain some influence in the implementation of our SLA” he says.

    The ability to make historical analysis is another benefit of sensors based tools. These data are aggregated and analyzed by the PRTG platform, and in some cases are filed up to one year.

    “We can, for example, review the use of the resources of a specific server during a year or track how our Internet usage has changed during peak periods, “Hutter says. “Without long-term historical data or constant vigilance, could stay scratching their heads. If you have sensors, can deepen the problem and reach a quick resolution.”

    Hutter recommended to be transparent with customers availability and performance of the network. The university publishes a web page that lists the currently scheduled blackouts, past and scheduled for later.

    “Users have learned to check the website,” he says. . The result: a user experience better and more reliable, even when performance is temporarily lost

    Strengthening the firewall

    In the City College of San Francisco, Tim Ryan, technical director of operations of the university, has had to adapt the strategy to support your IT team to accommodate changes in traffic patterns more than 60,000 students and 2,000 staff in eight locations in the city.

    “We used to be able to ensure that everyone had the same experience through standardization of network interface cards and ports switches “he says. “Wireless connections such variation generated every user experience is different.”

    Instead of investing even more in network monitoring software and other tools, Ryan has a current fleet of firewalls Check Point and Palo Alto Networks, which assume a greater role in monitoring the user experience whether in the cloud or locally. In addition to checking the permissions, the firewalls now determine if the latency increases beyond a certain threshold, or if the lost packets reached an unacceptable level.

    “They both have an effect evident in the user experience, “says Ryan.

    firewalls , which generate more than 50 million log entries per day, also show the threats and vulnerabilities-providing information Further when a virus or malware could be affecting the network or application performance for a group of users.

    As more applications such as email are moved to the cloud Ryan believes that depend increasingly on those records intelligence.

    “If our applications cloud-based show slow performance, there will be useful information available,” he says.

    Schroth Cross Country Healthcare, the user experience nirvana happen when you find a comprehensive tool that offers the same visibility of end-to-end SaaS-based applications with applications that have local mail. His dream. Conjuncts network monitoring measurements of network performance with transaction times in the application layer

    “We just have not found it yet,” says Schroth

    <. /> section>

    LikeTweet

    Monday, October 26, 2015

    Authorities seize pirate software for more than S /. 5400000 – Management Journal

    This is the fourth year intervention, demonstrating the firm intention of the authorities to combat crimes against copyright.

    A group of 15 stands gallery Compuplaza, located in downtown Lima, were seized by the authorities and software from illegal sources seized in 15,000 CD roughly equivalent to S /. 5.4 million.

    The operation was conducted jointly by the Department of Intellectual Crime of Tax Police of Peru and the Second Special Prosecutor for Intellectual Property Matters.

    S /. Thus totaling 5.4 million, which added to the more than 10 million soles seized so far this year, exceeding the figure of 15 million in pirated software seized by the authorities.

    Overall, more 150 troops participated in the operation that lasted nearly an hour.

    Among the products sold illegally included, among others, operating systems, programs, productivity and games that put the security and privacy of information users who install them in danger their teams, leaving them defenseless and exposed to information theft, potential thefts in their bank accounts and even becoming a victim of identity theft to commit a crime

    According to the latest report from the BSA (The Business Software Alliance), 65% of software is illegal in Peru, reflecting the lack of awareness about the harm that this may lead to electronic devices.

    According to the report, one in four software “pirates” is infected by virus, giving all our information at serious risk of theft or loss.

    The Law of Copyright, Legislative Decree 822, punishes the illegal use of software with fines of up to 180 ITU (S /. 693 000), subject to payment of the charges for the time that is It incurred in practice. The Penal Code punishes anyone who incurs this crime with deprivation of liberty for up to eight years.

    LikeTweet

    Sunday, October 25, 2015

    VW offer discounts to car owners with illegal software … – The Financial

    FRANKFURT. – Volkswagen could offer owners of its vehicles in Germany to acquire new car discounts if they deliver certain models affected by the emissions scandal that rocked Europe’s biggest carmaker, agency German DPA news reported Sunday.

    Volkswagen is involved in most business crisis in its 78-year history after admitting last month that installed software on diesel vehicles deceive US regulators about the true level of their toxic emissions.

    The company said it will call review about 8.5 million cars in Europe with this software. Special offers would be available only in Germany, where about 2.4 million of these vehicles were sold.

    The incentives for VW owners buy new vehicles could help ensure that sales remain stable after the scandal and subtract some pressure on dealers to implement arrangements quickly.

    Every German dealer will need to review an average of 100 thousand cars, each of which will require at least an hour and a half of work, DPA said. This could result in a long wait for customers.

    The offer of discounts for new buyers could focus on the owners of vehicles with 1.6-liter diesel engines, said sources at Volkswagen and its dealers, according to DPA. These models also require changes in the hardware, a more expensive improvement that alterations in the software required by other affected cars.

    has not yet taken a decision, DPA said citing a person familiar with the situation.

    LikeTweet

    Volkswagen could make discounts to owners of cars with … – Reuters Spain

    FRANKFURT (Reuters) – Volkswagen could offer owners of its vehicles in Germany to acquire new discounts if they deliver certain models affected by the scandal that rocked the emissions largest manufacturer of cars in Europe, reported German news agency DPA on Sunday.

    Volkswagen is undergoing its biggest crisis in their business 78-year history after admitting last month that software installed on diesel vehicles to deceive US regulators about the true level of their toxic emissions.

    The company said it will call for revision 8.5 million cars in Europe with this software. Special offers would be available only in Germany, where about 2.4 million of these vehicles were sold.

    The incentives for VW owners buy new vehicles could help ensure that sales remain stable after the scandal and subtract some pressure on dealers to implement arrangements quickly.

    Every German dealer will need to review an average of 1,100 cars, each of which require at least an hour and a half of work, DPA said. This could cause a long wait for customers.

    The offer of discounts for new buyers could focus on the owners of vehicles with 1.6-liter diesel engines, said sources at Volkswagen and its dealers, according to DPA. These models also require changes in the hardware, a more expensive improvement that alterations in the software required by other vehicles involved.

    has not yet taken a decision, DPA said citing a person familiar with the situation.

    © Thomson Reuters 2015 All rights reserved.

    LikeTweet

    Volkswagen could offer discounts to owners of cars … – AméricaEconomía.com

    Volkswagen is involved in its largest business crisis in its 78-year history after admitting last month that software installed on diesel vehicles to deceive US regulators about the true level of their toxic emissions.

    Fráncford . Volkswagen could offer owners of its vehicles in Germany to acquire new car discounts if they deliver certain models affected by the emissions scandal that rocked Europe’s biggest carmaker, German news agency DPA reported on Sunday.

    Volkswagen is involved in its largest business crisis in its 78-year history after admitting last month that software installed on diesel vehicles to deceive US regulators about the true level of their toxic emissions

    .

    The company said it will call review about 8.5 million cars in Europe with this software. Special offers would be available only in Germany, where about 2.4 million of these vehicles were sold.

    The incentives for VW owners buy new vehicles could help ensure that sales remain stable after scandal and subtract some pressure on dealers to implement arrangements quickly.

    Every German dealer will need to review an average of 1,100 cars, each of which will require at least an hour and a half of work , DPA said. This could result in a long wait for customers.

    The offer of discounts for new buyers could focus on the owners of vehicles with 1.6-liter diesel engines, sources said Volkswagen and its dealers, according DPA. These models also require changes in the hardware, a more expensive improvement that alterations in the software required by other affected cars.

    has not yet taken a decision, DPA said citing a person familiar with the situation.

    LikeTweet