Mac Viruses Come Out Of The Woodwork

It’s quite interesting that despite the years and years of talk about Malware and Viruses being almost completely missing from the Mac Universe, ooh, here we go. There used to be a joke that if you want to lose money as a Mac Developer, get into the antivirus realm, and that’s been true for some time.

But, as we should have expected, as the Mac user base continues to grow, the real danger grows. These virus hackers aren’t exactly lazy when it comes to releasing these beasts into the wild, so perhaps we need to be sharper as a Mac user in 2017. Hilariously, the most dangerous payload that seems to be out there right now for Mac users was born in the classic way – as a Word document macro:

On Windows systems, malware-loaded macros hidden in documents of one sort or another have long been a way of infecting careless users who are happy to open suspicious looking attachments they get emailed, but this is the first real-world attack to infect Mac computers, as Ars Technica observes.

This

Sun’s Strategies Were Compelling, But Sadly Ineffective

sunsSun has been riding the Java wave, but will it come crashing down on its hardware business?

Java has been a blessing for Sun Microsystems Inc. But for Sun’s revenue-driving hardware business, could Java turn out to be a curse?

More than any other company, Sun is tying its future–in the form of its successful RISC-based hardware business–to Java. While other RISC vendors are hedging their bets by embracing Windows NT and pledging support for Intel Corp.’s IA-64 architecture, Sun remains steadfast in its opposition to the Wintel camp.

With Java still unproven in the enterprise, that’s a risky bet. But it’s one that Sun is willing to make, to the level that they have even taken up sponsoring coding camps like The Open Community Camp.

“The whole strategy behind Java is to create a level playing field; the master plan is to have a chance to compete,” said John Loiacono, director of strategy and branding at Sun Microsystems Computer Co., in Mountain View, Calif.

Such competition creates a double-edged sword for Sun. If Java does take hold …

Raid 5 Recovery Can Hurt Without Preparation

What is a RAID 5? RAID stands for “redundant array of independent disks.” A RAID 5 array is the most commonly used RAID configuration method. Data is divided into blocks and written onto multiple storage devices to protect it from loss. But what happens if it fails?

raid-5-recovery-tipsRaid 5 failures can include:

  • Controller Failure
  • Failure During RAID 5 Rebuild
  • Multiple Hard Drive Failures Past Point of Redundancy
  • Electronic Damage
  • Accidental File Deletion
  • Parity loss or damage
  • Accidental Formatting or Re-initialization

You can also experience RAID File corruption as a result of:

  • Virus Damage
  • Physical Media Failures
  • Controller Issues
  • Sudden Power Outages and Electrical Events
  • Software Errors and Malfunctions

If your RAID 5 array fails, or you suspect you have a problem, turn it off immediately. This will ensure the best chances that it can and will be recovered. If you operate it after a failure, you are putting it at risk for accidental overwrites, parity loss or other problematic issues. Contact a RAID recovery company as soon as possible to recover and fix your RAID 5.

RAID recovery services …

Encountering A Problem With Your Drobo Disk

dbdThere are some people who encounter a problem with their Drobo disk array. Although this latest generation of RAID storage technology tends to work really well, some problems are always going to occur mainly because this is still a mechanical device. When handling a problem with a Drobo disk, it is important to check the manufacturer’s guidelines first before you do anything rash. You have to make sure that you are following the right measures when this particular storage device is not functioning well.

When everything else fails and you are having a hard time fixing your Drobo disk, it is always going to be in your best interest to contact a clicking hard drive recovery specialist. You can find these either by calling the Drobo company direct, or by doing a simple web search. If you don’t choose the right data recovery company, especially if you are hearing a hard drive clicking noise, the risks are greater that you may lose all of the data on the device before you have a chance to recover it.

It is …

Cleaning Up That Data

ddtaIn survey after survey, you rate poor data quality as a top concern for data warehouses. Yet when it comes time to open your wallet, there are suddenly more pressing issues. Do you honestly think ignoring the problem will make it go away? Get real. It’s time to put on the old hip boots and wade into the muck. Either that or end up with mud on your face when your $10 million warehouse grinds to a halt because no one trusts the data.…

Sunhawk – Great Idea, But Perhaps Too Far Ahead Of Its Time

sunhkBrent Mills calls Sunhawk Corp., the company he co-founded, “the second wave of the Internet.” That’s because Sunhawk’s products, development process and marketing are all completely digital. Using innovative software, Sunhawk produces and markets multimedia sheet music that can be downloaded, read, rearranged and even played over the Internet. The foundation of the virtual organization: an intranet that is the glue between software programmers in Canada, music editors in Russia and Sunhawk’s official “headquarters” in a Seattle house.

After people log on to Sunhawk’s Web site and download special software, they can buy sheet music that goes far beyond anything available in music stores. Users can see the individual notes on the score light up as they listen to the music. They can change the instrumentation and pick up the tempo. Musicians can even turn off part of a song so they can play or sing along.…

SNA Server Set Future Net Protocols For Windows

mssnasvrSNA Server 4.0 extends the product’s already broad reach even further, pairing important new protocol gateway features with innovative data and transaction integration features. In particular, SNA’s new ability to provide seamless access to mainframe transaction code will provide Windows developers with the best of both worlds. For straight terminal access, organizations that don’t want to run IP directly on their host will find SNA Server the most complete option around.

Pros: Rich 3270 and 5250 emulation services; failover and load balancing; allows host…

Push Technology Changed It All

pushtIn the nearly two years since the first push systems landed on desktops, vendors have sold the technology to almost everyone–everyone, that is, but corporate IT.

To be sure, the concept of pushing data or applications to desktops has caught the eye of users and analysts alike. Startups such as PointCast Inc., BackWeb Technologies Inc., Acurest and Marimba Inc. are still enjoying excellent mind share and cash flow from venture capitalists.

But so far, many large companies don’t have push at the top of their to-do lists. For these sites, there are many more immediate concerns: year 2000 compliance, enterprise application deployment and even rolling out intranets. Heck, there is even Web 2.0 generators to think about.

LDAP: Functional, But Never Ready For Prime Time

LDAPThe LDAP tidal wave forced vendors to adopt the standard whether they wanted to or not, galvanizing product development efforts.

Lightweight Directory Access Protocol quickly gained that power because the directory market is small and immature. No single vendor or technology had grabbed the market share and the momentum to drive the market when LDAP came along, so the standard took center stage.

In the messaging market, things are different. Yes, we have Internet standards that have a…