Networking & Internet

European Union Funds Start-Up Search Engine Company to the Tune of $165M

Theseus Logo

The news stories all contend that the THESEUS research project is aimed at competing with Google in the search engine space, but the THESEUS website says otherwise:

“THESEUS is a research program with the goal of developing a new Internet-based infrastructure in order to better use and utilize the knowledge available on the Internet. Using the standards and basic technologies (“semantic toolbox”) developed by THESEUS on the Internet, the users will also be able to produce and edit contents, rules, and structures themselves, as well as edit, collect, and link multimedia contents intelligently. Connecting today’s Web 2.0 with its open, interactive, and social network philosophy with semantic methods will turn the Web into the Internet of the next generation (Web 3.0 = Web 2.0 + semantics).”

Sounds a bit more than just a ‘search engine’ to me. If you read some of the news stories, blog entries and in particular, the comments, you will see what sounds like contempt that anyone could dare to compete with Google, or perhaps fear that they might succeed. C’mon folks, competition helps to drive technology to newer and greater heights. And if it’s done with a little help from a government entity – in this case, the EU/Germany – so what? Governments have (and still do) funded way worse things, but that’s another topic for another day.

via TechCrunch.

Netgear ships Gigabit-speed Storage Central Turbo

Gigabit-speed Storage Central Turbo (SC101T) NETGEAR today announced worldwide availability of its Gigabit-speed Storage Central Turbo (SC101T), the next-generation of its bestselling storage area networking (SAN) product line.

Storage Central Turbo is the industry’s most versatile and affordable networked storage solution for simultaneously sharing and protecting digital assets such as music, photos, videos, HD movies, and data files. It enhances the end-user experience via faster SATA disk drives, greater flexibility and secure mirrored data protection. It functions much like a locally attached USB disk drive, but remains accessible from several Windows PCs on the network.

Learn more about the product on Netgear.

New HTML Spec: v5 ?

Ugh. The W3C has launched a new working group to look into a new version of HTML, v5. According to this well-written article, lobbying for an HTML 5 spec was pushed by Apple, Mozilla & Opera among others. I can’t say that this thrills me. We’re now at the point where XHTML (and CSS) has taken a nice hold on the Web and browsers are supporting those standards pretty well. It seems like we’re approaching a pretty decent uniformity in that department after years of having to code differently for multiple browsers. HTML 5 is looking to introduce tags like section, article, and footer among others. As one commenter pointed out, and I agree, this seems to be a return to specific meta tags that blurs content and presentation.

Granted there are some interesting and possibly useful new features like form validation, but why do we need to go back to HTML for that? What do you think?

Eve: Real Time 3D Network Surveillance Tool

EveOne of our readers wrote in to tell us about a cool new piece of software that looks like a video game, but instead it gives you a real-time 3D dynamic representation of your network traffic. It’s called Eve, and while it’s now in an ‘intro’ phase, there are some interesting possibilities for it in the future, including being able to disconnect network connections. So perfect for the network admin/systems admin. Definitely take a look at the short videos on the Eve site for an immediate understanding of what Eve does.

This is reminiscent of a hack that some folks put together back in at least ’95/’96 to allow you to use Doom to kill UNIX processes. I loved that thing – made my sys admin job so much more enjoyable!

Sling Media Announces Two New SlingLink Powerline Ethernet Adapters

Turbo Sling Link

Who knew that Sling Media won an Emmy?! Not I. Yup, they did, for the Slingbox. Anyway, nevermind that. We’re here to tell you about Sling’s latest products – their 2 new powerline Ethernet adapters. These little devices allow you to hook your Slingbox(es) into your network without needing to run actual cable to the device or have a network drop nearby. All you need near your Slingbox is a power outlet. The SlingLink TURBO 1 Port ($99.99 MSRP) and the SlingLink TURBO 4 port ($149.99 MSRP) come in pairs. One plugs in near your Slingbox and the other near your home network router/switch, and voila – connectivity.

The SlingLink products stay true to the traditional understated Sling shape and look. Naturally, you could get some other powerline based networking products, but at least if you get these from Sling, you can be pretty confident that it’ll work with your Slingbox.

Yoggie Gatekeeper Pro

Yoggie Gatekeeper Pro

Are you happy to see me or is that a firewall in your pocket?

The Intertubes are ripe with evil. You can smell it. Crouching there, in the dark recesses of zeroes and ones, waiting for a fresh unpatched computer to poke its nubile head out into the word. Bang! Another poor netizen gets ‘sploited, turning it into a zombie, or worse – his data is entirely compromised, and somebody’s buying a new TV with your credit card… bad… To protect yourself, you download the latest updates, install anti-virus software and even have software firewalls installed. Even then, software is, by design, soft and once an exploit is found, it can be modified and worked around, and you’re vulnerable again. It’s almost impossible to keep up.

Your best protection is a hardware firewall, but it’s impractical to carry around a router with your laptop. Those bulky things usually require a wall outlet and extra cabling – what a pain in the patootie that can be! But software firewalls, while portable, lack the hardened security you need.

Yoggie is a tiny hardware firewall that fits in your hand, requires no wall outlet, and provides enterprise-level firewall protection for your computer. It has two operating modes – one draws power from the built-in USB cable, connects to your ethernet port, and the ethernet wall socket, and the second just uses the USB port and performs packet-packet filtering for your computer’s own WiFi adapter through the use of a virtual bridge. If you don’t know what that means, don’t worry – it’s all seamless and transparent!

Spam King Seized in Seattle

Some estimates of Internet mail traffic put spam around 80% of all emails being sent. My personal knowledge for several very large corporations show that number to be low as I’ve seen numbers anywhere from just above 80% to as much as 97% of incoming mail being marked or dropped due to spam.

It will be interesting to continue checking spam logs as Robert Alan Soloway, a 27 year old spam king, was arrested this past Wednesday and has been accused of sending billions upon billions of spam emails using technology known as botnets. Botnets have become popular with spammers over the past few years and are software robots that are relayed commands by a Bot server to send spam. The largest known botnet had 1.5 million nodes. These nodes are made up of compromised computers usually of home owners with high speed Internet.

A Microsoft lawyer said Robert Soloway is one of Internet’s top ten spammers. Unfortunately, businesses would contract Robert to drive more traffic to their web sites. While this is a legitimate business in itself, the spam king would spam his collected addresses unbeknowst to the client.

How can the average home Internet consumer protect themselves? First you need to understand how the spammers gain your information. Spammers get email addresses by buying your name from a list, opt-in lists, email extractors which scour the web, brute force attacks called MX server extractors, viruses, spyware and malicous code. To protect your primary email address, use a separate email address from Yahoo! or Google for posting to sites or in forums. Never post anything on the Internet with an email address you don’t want spammed. Opt-in to lists sparely and to sources you trust like Yahoo!, Amazon and Gizmos for Geeks. Finally, protect your machine with antivirus utilities and spyware utilities. Your machine will run slower and you’ll have to pay for yearly service, but that is the cost of playing on the Internet. You can protect your machine by not loading software downloaded off the Internet or sent to you in email unless you are positively sure the downloaded application or game is valid and spyware free.

Read more on Realtechnews

China Penalizes Online Gamers Who Stay Online Too Long

In a move to combat what they see as a growing problem with teenage addiction to online gaming, China is dictating that Internet gaming companies and ISPs install ‘anti-addiction’ software. This software would dictate how many virtual points they get in their games based on how long they’ve been online. After 3 hours, gamers will receive only half the points that they would normally get. After 5 hours, they get no points. These new rules which will go into effect April 15 only apply to gamers under the age of 18.

Apple TV – Yet Another First Look

Michael Czyz at Techlore takes a look at the Apple TV: “I had planned to wait and get reports from my friends before I went and purchased one, but my Macbook Pro was in for a repair and when I picked it up on Friday, I made an impulse buy. They place the things right near the registers like a candy aisle, so who am I to resist?”
Source: TechLore

AuraGrid Home Network Extension Kit

AuraGrid Home Network Extension Kit

Does your wireless network cut off in certain spots in your house? These dead spots always seem to occur in the worst places like on your bed or in your favorite recliney-type chair (my favorite reclining chair is called “DRM” because I’d like to sit on it).

AuraGrid Home Network Extension Kit will allow you to extend your wireless to cover these dead spots by distributing the signals over standard coaxial cables. Setup takes mere minutes so you’ll be able to sit on “DRM” in no time with faster file transfers by eliminating interference.

Scroll to Top