Devices love Linux

Developers in the open source community often begin tinkering with technology as soon as it\s released. The code they produce ...


Developers in the open source community often begin tinkering with technology
as soon as its released. The code they produce may be raw, but it appears
quickly, which in turn allows them to produce prototypes faster, get to market
sooner, and gain first-mover advantage over their competitors.
Linux also makes it easier to build complex embedded applications. Traditional
RTOS (real-time operating systems) for embedded devices are single-purpose
platforms designed for running one task in a single processor thread. Embedded
Linux resembles its heavyweight cousin, in that its a general purpose OS
designed to run multiple applications. This versatility helps developers to
serve an increasingly sophisticated customer base.
Atmosphere of "competitive collaboration" among vendors leaves other companies
free to build upon the Linux base with additional tools. For example, Trolltech
offers Qtopia, a complete environment for rapid development of embedded Linux
applications and user interfaces. The core Qtopia technologies are available
under the Gnu GPL (General Public License), giving developers the same
visibility into Qtopia code as they enjoy with the Linux kernel itself. These
toolkits offer an additional advantage to developers: familiarity. Qtopia, for
instance is based on Trolltechs well-established Qt toolkit for desktop Linux
systems. The result is that application developers can use their existing
skills to build software for embedded Linux, unlike proprietary OSes.
These advantages add up to an ever-increasing range of devices powered by
Linux. From Sharp PDAs to TiVo set-top boxes, Linksys wireless routers to
Motorola mobile phones, more companies are betting on Linux as their
springboard to success.Phishers get fancy with Lamborghini
By Cara Garretson, Network World (US)
As I was shopping online last night for a gift for my husband, I received an
e-mail from "bidconfirm@ebay.com" asking me to confirm or cancel my bid for a
2006 Lamborghini Roadster. My bid, according to the e-mail, was for $339,950.
I was pretty sure I hadnt placed that bid. Granted, I do a lot of online
shopping, but something tells me Id remember this one and since many of my
colleagues received the same e-mail message its safe to assume this was a
phishing expedition.
At first blush this trick seems pretty stupid; who would actually hit the
"confirm bid" button? Phishers usually send e-mail messages designed to lure
unsuspecting recipients to a bogus Web site that is purported to be run by a
source they trust so theyll enter sensitive or financial information. Who
would fall for this obvious scam?
But I think the phisher in this case is actually quite smart. Since the e-mail
contains options to confirm or cancel the bid, I bet there are plenty of e-mail
users out there who are afraid that eBay some how got them mixed up with the
real bidder and they will be responsible for paying $339,000 if they dont
immediately click on the button to cancel the bid.
I didnt try it, but Id wager my Toyota that clicking on either links in the
Lamborghini e-mail would direct me to a bogus eBay Web site where a keylogging
program waits in the background for me to enter my personal information.
While such phishing attempts may be obvious scams to some of us, there are
people out there falling for them. The Anti-Phishing Working Groups latest
report says there were 28,571 unique reports of phishing in June alone. These
scams must be working to some degree; otherwise, the phishers wouldnt bother.
Its scary to think of how dangerous phishing can be, particularly as phishers
come up with more complicated, intricate scams that infiltrate not only our
e-mail inboxes, but also VoIP systems, IM communications, and even SMS text
messages. Hopefully, a combination of better security technology, more
stringent laws with significant penalties, and heightened consumer awareness
will reduce the number of identity theft victims who are hooked by phishers.
Shark Tank
By Sharky, Computerworld (US)
The saviour
After troubleshooting a workstations graphics problem without success, this IT
pilot fish calls vendor support. "OK, lets reinstall Windows," vendor tech
says. Ive already done that, fish says. "Why dont you do it again with me on
the phone?" says tech. I certainly know how to install Windows, fish tells him.
"Well, lets try it anyway." Um, no whats next? "Huh?" Lets pretend we just
reinstalled Windows and it still doesnt work, says fish. Whats the next step?
"But reinstalling Windows is the last resort!"
Maintenance problem
Consultant pilot fish gets a call from a frantic customer. His network is down,
and his boss wants to know why, pronto. Fish confirms that the routers and
switches have been up for weeks. What exactly does "network down" mean? he
asks. "We cant open Web sites," customer tells him. "Do you think it could be
my ISP? Because I got an e-mail from them, something about scheduled
maintenance today."
Critical vacation
Junior programmer pilot fish isnt afraid to try new things which makes fishs
boss very nervous. "So for two years in a row, just before shed leave on
vacation, shed emphatically tell me to not submit any changes while she was
gone," says fish. "Both years, she submitted changes before she left that hit
production Sunday night. Untested. Both years, she returned to find that Id
fixed her errors. When she announced her vacation the third year, I found
another job."
Internet backup
Corporate internal auditor is auditing this IT shops disaster recovery plan,
reports a pilot fish helping him out. "I show him our policies and procedures
on the matter," says fish. "He looks everything over and then looks me in the
eye and asks why I am not backing up the Internet."
Devices love Linux
mainstay hlavní država, základ
tinker vrtat se do
raw surový
resemble připomínat
versatility všestrannost toolkit soubor (sada) nástrojů
springboard odrazový můstek, odraziště
Phishers get fancy with Lamborghini
at first blush na první pohled lure lákat unsuspecting nic netušící bogus
falešný, podvodný
scam podvod
to some degree do určité míry
stringent přísný Shark Tank
pretend předstírat
last resort poslední instance
frantic zoufalý
scheduled naplánovaný
corporate internal auditor interní auditor společnosti
Zveřejněné zprávy v původním znění prošly redakční úpravou a byly vybrány z
celosvětových informačních zdrojů vydavatelství IDG. Texty jsou určeny všem
zájemcům o zdokonalování se v odborné angličtině. Sestavil: pat(pat) 6 1311









Komentáře
K tomuto článku není připojena žádná diskuze, nebo byla zakázána.