Feeds

IDF Roundup – P2P, Serial ATA and fast boots

Satan Clara over and out

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Serial ATA swapshop

Prototype Serial ATA PCs were on show, demonstrating hot pluggable hard disks. But only for Linux users. The Windows drivers doesn't have the functionality at the moment. Right now the Linux demo makes the physical connection, creates a mount point, mounts the file system, and drops a new icon onto the desktop transparently. You still have to press a release button on the drive to undock the unit, although we're sure someone will find a way to do this by dragging it to the wastebasket.

Peer To Peer Update

Intel talked about Trutella, a Gnutella-based client with some trust metrics thrown in. As we reckoned at the time of the Groove launch, , trust was a core issue that could make or break the P2P business. Although MojoNation has focused on these values, and Advogato and Kuro5hin have trust models for specific applications, this science is in its infancy.

At this stage Trutella gives a binary answer: yes, this guy's OK, no not; but it's clear that the team knows that far more sophistication is required for the technology to be usable. In another talk, David Grawrock from Chipzilla described the involvement of the TCPA organization. (IBM, Compaq, HP and Microsoft were founders). Grawrock said the trust model sees to it that identity credential doesn't have any unique information to ensure anonymity. So a challenger doesn't know the identity of the client.

Andrew Chien, CTO of Entropia also described how the grid harnesses 140,000 (and rising) distributed PCs for doing parallel computation work. Entropia's been working on this for four years, and has twigged something many of the arrivals have missed - geographic presence. Why hop around the world for something when it might be round the corner?

Speedy Boots

This isn't news, but it may be worth knowing. Intel's push to reduce boot times involves Rapid BIOS. POST times these days are much better than they what they were, but that leaves lengthy load times for Windows users. Officially recommended remedies in the Rapid BIOS session included enabling DMA, and disabling the junk that insists on loading itself in the Windows system tray. Good advice. ®

Internet Security Threat Report 2014

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.