Discus Systems PLC - IT Support Company in Birmingham West midlands
0800 880 3360
 


Posted by Damien Biddulph on Fri 11th Sep 2009

Turing Bombe machines cracked 3,000 messages a day and are said to have shortened the war by two years thanks to the military secrets they uncovered

However, he was not rewarded with honours by the state, or public adulation. Instead he was persecuted because of his homosexuality, opting for chemical castration rather than imprisonment after conviction for gross indecency.

Two years later, in 1954, he took his own life. 

 Now, after thousands signed a petition calling for the government to apologise, Britain's prime minister, Gordon Brown has done so.

  He said he was deeply sorry that Mr Turing had been treated inhumanely under the homophobic laws of the time.

 | More

 
corner spacer corner
 


Posted by Damien Biddulph on Thu 3rd Sep 2009

This is an example of a WordPress page, you could edit this to put information about yourself or your site so readers know where you are coming from. You can create as many pages like this one or sub-pages as you like and manage all of your content inside of WordPress.

 
corner spacer corner
 


Posted by Damien Biddulph on Fri 31st Jul 2009

You can’t even switch on your computer without it asking for some sort of password, that is before you’ve even entered the wonderful world of the passwords on the internet. So I suggest you all take a look at the “500 worst passwords of all time.” As I can probably guarantee you unless you’re pretty strict with your passwords yours will not be difficult to guess and could even be on the list!

A good password should have two ground rules, firstly it is difficult to guess by a someone who doesn’t know it and also easily recalled by its owner.

Not surprisingly the most popular passwords are “123456 & “password” however some of the list are quite intriguing the number of obscene words, cars, and even Batman just misses out of on the top 30.

The list comes from the rather outdated book which was published in 2005 “Perfect Password: Selecttion, Protection, Authentication” however its quiet unique so is stil a valid area of resource.

One out of nine passwords used is on the list and about 50% of passwords are “based on names of a family member, spouse, partner, or a pet,” according to the book’s teaser on Amazon. Just ask Sarah Palin Whose Email was hacked last September by someone who reset her password using her zipcode, birthdate and where she met her spouse. When asked where she went to high school, the hacker entered  “Wasilla High” and was right. Such is the price of celebrity and people knowing a lot about you.

Passwords are a challenge. Like you, I often want quick access to a site and view the password as an obstacle deserving little attention. However, I  am shamed to admit.. even I have been caught napping with part of one of my passwords on the list.  

In a recent discussion with fellow bloggers, one said he keeps passwords only in his head. He never writes them down ANYWHERE. I have far too many for that and lack the photographic mind he must have. He also avoids passwords hints such as a boyhood dog or mother’s maiden name given what happened to Palin.

A colleague of mine swears by password manager Roboform which can be downloaded for about $35. I personally prefer a different method.. which obviously I cannot reveal! But I feel my system is as secure as the best so therefore no need to change.

There’s plenty of advice on how to create a good password such as Microsoft’s six-steps to creating "a strong, memorable password" Some of the advice is obvious, but worth repeating.

– Use a mix of symbols, characters and numbers. Use spaces if allowed.
– If you can’t use symbols, double the number of characters.
– Think of a memorable sentence and take the first letter of each word and combine into a password.
– Use a password checker to test its strength.

| More

 
corner spacer corner
 


Posted by Damien Biddulph on Tue 28th Jul 2009

Last week, while working at home my electricity went off for almost 3 hours. This meant that I had no phone, internet, and no computer. I had little battery left in my mobile but this didn’t last long as I was scheduled to have a Web Chat meeting with a couple of our customers regarding developing their websites and improving SEO(Search Engine Optimization).

I still managed to have the meeting by phone so all was not lost but it was during that meeting I realized something which we should all consider. I was completely focused on the task at hand, the meeting, I didn’t have the opportunity to answer any emails, respond to any instant messages or even tweet about Discus. It was probably my most present and productive meeting I’ve had for some time.

I’ve had meetings in the past where often you’ll sit in on a meeting and for one reason or another an “important” message comes through on his or her BlackBerry which they must respond to.. you see the attendee’s slowly sneak their phone from off their desk and start tapping away, not only is that just plain rude it is just plain counterproductive!! – but as it pains me to say it.. it is all too common. Come on, admit it. Deny it. You can’t.

So my question to you all – when was the last time you were focused, completely focused on one thing?

I have been asking a few of our customers, friends and colleagues and it would appear that as we’re grooming a society full of people who have attention-deficit disorder, to me  it seems’ we are making it a requirement when you leave school to become successful in today’s corporate world.

So, I have a challenge for all those who wish for a smarter planet, a smarter business. Ban all mobile phones and mobile gadgets from your organizations most important meetings and conversations?

Of course, it is not lost on me that i wouldn’t be writing this news letter at all if it weren’t for my mobile, which allowed me to participate in a meeting by conference call.. probably linking 5 different locations when I had no other means of conducting the meeting. However part of being smart about technology is knowing when to set side in favor of good old human to human interaction, discourse that is interrupted by mutual consent not be some annoying beep or flashing light.

Damien Biddulph
Discus Systems plc

| More

 
corner spacer corner
 


Posted by Damien Biddulph on Fri 24th Jul 2009

FremantleMedia Australia, Australia’s leading TV production, licensing and distribution company, has slashed its data backup window from 15 hours to 2-3 hours, and down to 90 minutes in some instances, by using ShadowProtect from StorageCraft.

Previously the company used ARCserve Backup.

FremantleMedia has production operations in 25 countries and programs are produced for more than 40 territories. Titles include Neighbours, So You Think You Can Dance, Australian Idol, and The Biggest Loser. The company’s Sydney office runs file and print servers under Windows 2003 across three locations. Most of the data comprises scripts and production details for shows, though there are also four Lotus Notes/Domino mail servers and a BlackBerry enterprise server.

IT Manager Alan Fear’s quest for a more comprehensive disaster recovery (DR) solution, plus reliable backup, ended when he evaluated ShadowProtect, which he describes as a simple and comprehensive solution for backup, recovery and disaster recovery.

The various databases are backed up Hewlett-Packard DL380 network-attached storage (NAS) devices running under Windows 2003 64-bit Storage Server. Each Image Repository stores up to 500GB of data.

“Using ShadowProtect Server we are able to achieve on-the-fly images for incremental backups, allowing us to restore files very quickly and efficiently,” said Alan Fear. “Previously we were backing up servers to tape using ARCserve Backup. It would take about 15 hours. Now we are doing disk-to-disk using ShadowProtect, our backup window has shrunk to between two and three hours. Some servers take only 90 minutes to back up.”

Optimum speeds hit 50-70 Mbit/second. StorageCraft’s support people helped to achieve these speeds by advising Alan to split images into smaller chunks, using ShadowProtect’s split-image file feature. This solved the problems Windows has in transferring large files over a LAN.

Alan said: “With help from StorageCraft we obtained maximum throughout to the NAS. They came up with a solution and we implemented it. We find their support people very helpful.”

FremantleMedia uses NetVault to push each backup to tape overnight for off-site archival of the backup images. The final phase of the company’s disaster recovery plan entails using ShadowProtect to restore images into a parallel environment for fast recovery. Tests show that this can be achieved in 15-20 minutes, sufficient speed to bring servers back online very quickly.

About StorageCraft

StorageCraft Technology Corporation provides innovative disk-based backup, disaster recovery, system migration, data protection and security solutions for servers, desktops and laptops. StorageCraft delivers software products that reduce downtime, improve security and stability for systems and data and lower the total cost of ownership for servers, desktops and laptops. www.storagecraft.com

Please call Discus if you're interested in StorageCraft on 0800 880 3360 

Source: Backup review

| More

 
corner spacer corner
 


Posted by Damien Biddulph on Sun 19th Jul 2009

It is hard to appreciate the technical challenges involved in putting a man on the moon, but 1960s computer technology played a fundamental role.

By today's standards, the IT Nasa used in the Apollo manned lunar programme is pretty basic. But while they were no more powerful than a pocket calculator, these ingenious computer systems were able to guide astronauts across 356,000 km of space from the Earth to the Moon and return them safely.

The lunar programme led to the development of safety-critical systems and the practice of software engineering to program those systems. Much of this knowledge gleaned from the Apollo programme forms the basis of modern computing.

Apollo Guidance Computer

The lunar mission used a command module computer designed at MIT and built by Raytheon, which paved the way to "fly by wire" aircraft.

The so-called Apollo Guidance Computer (AGC) used a real time operating system, which enabled astronauts to enter simple commands by typing in pairs of nouns and verbs, to control the spacecraft. It was more basic than the electronics in modern toasters that have computer controlled stop/start/defrost buttons. It had approximately 64Kbyte of memory and operated at 0.043MHz.

The instruction manual for the AGC shows the computer had a small set of machine code instructions, which were used to program the hardware to run various tasks the astronauts needed.

The AGC program, called Luminary, was coded in a language called Mac, (MIT Algebraic Compiler), which was then converted by hand into assembler language that the computer could understand. The assembler code was fed into the AGC using punch cards.

Amazingly, the code listing for the AGC program can be downloaded as a PDF file. There is also an equivalent program for the lunar lander.

The AGC was designed to be fault-tolerant and was able to run several sub programs in priority order. Each of these sub programs was given a time slot to use the computer's sparse resources. During the mission the AGC became overloaded and issued a "1202" alarm code.

Neil Armstrong asked Mission Control for clarification on the 1202 error. Jack Garman, a computer engineer at Nasa (pictured below, left), who worked on the Apollo Guidance Program Section, told mission control that the error could be ignored in this instance, which meant the mission could continue. Apollo 11 landed a few seconds later.

Experts cite the AGC as fundamental to the evolution of the integrated circuit. It is regarded as the first embedded computer.

The importance of this computer was highlighted in a lecture by astronaut David Scott who said: "If you have a basket ball and a baseball 14 feet apart, where the baseball represents the moon and the basketball represents the Earth, and you take a piece of paper sideways, the thinness of the paper would be the corridor you have to hit when you come back."

While the astronauts would probably have preferred to fly the spacecraft manually, only the AGC could provide the accuracy in navigation and control required to send them to the Moon and return them safely home again, independent of any Earth-based navigation system.

IBM computers on Apollo 11

Along with the APG, mainframes were also heavily used in the Apollo programme. Over 3,500 IBM employees were involved, (pictured below). The Goddard Space Flight Center used IBM System/360 Model 75s for communications across Nasa and the spacecraft. IBM Huntsville designed and programmed the Saturn rocket instrument unit, while the Saturn launch computer at the Kennedy Space Center was operated by IBM.

An IBM System/360 Model 75 was also used at Nasa's Manned Spacecraft Center in Houston. This computer was used by Neil Armstrong and Buzz Aldrin to calculate lift-off data required to launch the Lunar Module off the Moon's surface and enable it to rendezvous with Command Module pilot Michael Collins for the flight back to Earth.

At the time, IBM described the 6Mbyte programs it developed, to monitor the spacecrafts' environmental and astronauts' biomedical data, as the most complex software ever written.

Even the simplest software today would far exceed the technical constraints the Apollo team worked under. The Apollo programme was pre-Moores's Law: in 1965 Intel co-founder Gordon Moore wrote his vision of how the performance of computer hardware would double every 18 months for the same price.

That a USB memory stick today is more powerful than the computers that put man on the moon is testimony to the relentless pace of technological development encompassed in Moore's Law. However, the Apollo programme proved that computers could be entrusted with human lives. Man and machine worked in unison to achieve something that 40 years on, has yet to be surpassed.

Source: Computerweekly
All Images courtesy of NASA

 
corner spacer corner
 


Posted by Damien Biddulph on Wed 15th Jul 2009
Power sockets can be used to eavesdrop on what people type on a computer.

Security researchers found that poor shielding on some keyboard cables means useful data can be leaked about each character typed.

By analysing the information leaking onto power circuits, the researchers could see what a target was typing.

The attack has been demonstrated to work at a distance of up to 15m, but refinement may mean it could work over much longer distances.

Hotel attack

"Our goal is to show that information leaks in the most unexpected ways and can be retrieved," wrote Andrea Barisani and Daniele Bianco, of security firm Inverse Path, in a paper describing their work.

The research focused on the cables used to connect PS/2 keyboards to desktop PCs.

Usefully, said the pair, the six wires inside a PS/2 cable are typically "close to each other and poorly shielded". This means that information travelling along the data wire, when a key is pressed, leaks onto the earth (ground in the US) wire in the same cable.

The earth wire, via the PC's power unit, ultimately connects to the plug in the power socket, and from there information leaks out onto the circuit supplying electricity to a room.

Even better, said the researchers, data travels along PS/2 cables one bit at a time and uses a clock speed far lower than any other PC component. Both these qualities make it easy to pick out voltage changes caused by key presses.

A digital oscilloscope was used to gather data about voltage changes on a power line and filters were used to remove those caused by anything other than the keyboard.

"The PS/2 signal square wave is preserved with good quality... and can be decoded back to the original keystroke information," wrote the pair in a paper describing their work.

They demonstrated it working over distances of 1, 5, 10 and 15m from a target, far enough to suggest it could work in a hotel or office.

"The test performed in the laboratory represent a worst case scenario for this type of measurement, which along with acceptable results emphasizes the feasibility of the attack on normal conditions," they added.

The pair said their research was "work in progress" and expect the equipment to get more sensitive as it is refined.

The attack is due to be demonstrated at the Black Hat conference that takes place in Las Vegas from 25-30 July.

Source: BBC

 Windows 7 Goes on Pre-Sale in UK

So we're off...

Today at 12.01am Microsoft's next generation operating system, Windows 7, goes on sale in the UK at discount prices. In the company's own words however: "you'll have to be quick as prices are low, stocks are limited and it is first come first served!"

Microsoft hasn't quantified "stocks are limited" at this stage but, stock allowing, the offer will run from 15 July to 9 August and given you'll now find Windows 7 Home Premium and Windows 7 Professional available for £49.99 and £99.99 expect there to be a great deal of interest. At this stage there remains no sign of the triple licence Windows 7 Family Pack option recently outted in the US so bear in mind these editions cover a single computer only.

Also worth remembering is Microsoft's ongoing battle with the European Union has seen it strip Internet Explorer 8 from all EU versions, cancel upgrade editions and disable the ability for full versions to upgrade from any previous flavour of Windows (2000, XP, Vista, 7 Beta or 7 RC). Instead all users will need to perform fresh installs. All EU versions will be tagged with the letter 'E' to signal this, ie: Windows 7 E Home Premium, Windows 7 E Professional, etc.

Microsoft has also named participating stores during the discount period as Amazon.co.uk, Argos, Comet, Currys, Dixons, Ebuyer.com, John Lewis, Littlewoods, Micro Anvika, PC World, Play.com, Staples and Tesco. Many of which are expected to offer a secondary CD wi

 
corner spacer corner
 


Posted by Damien Biddulph on Wed 1st Jul 2009
The internet suffered a number of slowdowns as people the world over rushed to verify accounts of Michael Jackson's death. - BBC.co.uk

Search giant Google confirmed that when the news first broke it Discus Hosted Email Solutionfeared it as under attack.

Millions of people who searched for the star's name on Google News were greeted with an error page.

It warned users "your query looks similar to automated requests from a computer virus or spyware application".
"It's true that between approximately 2.40PM Pacific and 3.15PM Pacific, some Google News users experienced difficulty accessing search results for queries related to Michael Jackson and saw the error page," said Google spokesman Gabriel Stricker.

It was around this time that the singer was officially pronounced dead.
Google's trends page showed that searches for Michael Jackson had reached such a volume that in its so called "hotness" gauge the topic was rated "volcanic".

Fail
Google was not the only company overwhelmed by the public's clamour for information.
The micro blogging service Twitter crashed with the sheer volume of people using the service.

Queries about the star soon rocketed to the top of its updates and searches. But the amount of traffic meant it suffered one of its well-known outages.

Before the company's servers crashed, TweetVolume noted that "Michael Jackson" appeared in more than 66,500 Twitter updates. Discus IT Support

According to initial data from Trendrr, a Web service that tracks activity on social media sites, the number of Twitter posts Thursday afternoon containing "Michael Jackson" totalled more than 100,000 per hour.

That put news of Jackson's death at least on par with the Iran protests, as Twitter posts about Iran topped 100,000 per hour on June 16 and eventually climbed to 220,000 per hour.

TMZ, the popular celebrity gossip site that broke the story following a tip-off that a paramedic had visited the singers home also crashed.

There was a domino effect as users then fled to other sites. With Hollywood gossip writer Perez Hilton's site was among those to flame out and also problems for the web sites of AOL, CBS, CNN, MSNBC and Yahoo.

Discus New Website

After 5 years of the same old website, Discus have now developed and designed their new site.Thank you for visiting your new site, we hope you like it! - let us know if you do.. simply email u2us@discus.co.uk

It will eventually become an essential tool for all customers with offers, competitions, customer login and other useful IT related tools.

Getting to know us...

Name: Andrew Guy
Married: No
Children: NoAndrew Guy joined Discus Systems in 2007 as Field Service Engineer. He is a keen supporter of Liverpool FC and is Captain of the Discus 5 a side football team.

He is to take part in the Great North Run in aid of the Stroke Assocation with Damien in September this year, if you wish to sponsor them go to www.justgiving.com/andyanddamien

If you wish contact Andrew then you can call him any time on 0800 880 3360 and email him at andrew@discus.co.uk

Football

Up to this point in the history of Discus Systems FC there has been one problem with the team.. That is.. Winning! however after a 20 game losing streak this season, finally, Discus have got their elusive win!Discus played Dynamo Chicken Kiev last Sunday (28/06/2009) which was the last game of the season and pulled off a history win for the team.

Discus took the early lead and doubled their advantage before half time.Dynamo came back strong to make it 2-1 but it was no match for Discus, as we then finished the game with another goal to make it 3-2.

Congratulations to Andrew & the team

 
corner spacer corner
 


Posted by Damien Biddulph on Fri 19th Jun 2009

Your home or business PC could be being used and reused by multiple criminal elements behind your back, security specialists have warned.

 Cybercriminals are trading the digital assets of thousands of PCs online without users' knowledge, said Finjan. The security supplier has discovered a trading platform where criminals are buying and selling digital assets that have been stolen by cyber criminals.

The Golden Cash network is a trading platform that matches buyers and sellers. Finjan revealed this in the second issue of its Cybercrime Intelligence Report 2009.

On the buyer side there are cybercriminals that buy access to the PC that has been infected. Once a hacker infects a PC it can then be sold on the trading platform to the criminals.

Prices vary greatly. Finjan said in Australia 1,000 infections have been sold for $100, while the same number can be picked up for as little as $5 in other countries, but mainly in the Far East.

"These batches of 1,000 infected PCs will be resold in the market by the buyer," said Finjan.

"An infected machine is no longer a one-time asset for an individual criminal. It has evolved into a digital asset that the cybercriminal can trade online - over and over again," added Finjan.

The Golden Cash platform also offers information about how to send Malware and creating a botnet.

 
corner spacer corner
 


Posted by Damien Biddulph on Mon 15th Jun 2009
Power sockets can be used to eavesdrop on what people type on a computer.

Security researchers found that poor shielding on some keyboard cables means useful data can be leaked about each character typed.

By analysing the information leaking onto power circuits, the researchers could see what a target was typing.

The attack has been demonstrated to work at a distance of up to 15m, but refinement may mean it could work over much longer distances.

Hotel attack

"Our goal is to show that information leaks in the most unexpected ways and can be retrieved," wrote Andrea Barisani and Daniele Bianco, of security firm Inverse Path, in a paper describing their work.

The research focused on the cables used to connect PS/2 keyboards to desktop PCs.

Usefully, said the pair, the six wires inside a PS/2 cable are typically "close to each other and poorly shielded". This means that information travelling along the data wire, when a key is pressed, leaks onto the earth (ground in the US) wire in the same cable.

The earth wire, via the PC's power unit, ultimately connects to the plug in the power socket, and from there information leaks out onto the circuit supplying electricity to a room.

Even better, said the researchers, data travels along PS/2 cables one bit at a time and uses a clock speed far lower than any other PC component. Both these qualities make it easy to pick out voltage changes caused by key presses.

A digital oscilloscope was used to gather data about voltage changes on a power line and filters were used to remove those caused by anything other than the keyboard.

"The PS/2 signal square wave is preserved with good quality... and can be decoded back to the original keystroke information," wrote the pair in a paper describing their work.

They demonstrated it working over distances of 1, 5, 10 and 15m from a target, far enough to suggest it could work in a hotel or office.

"The test performed in the laboratory represent a worst case scenario for this type of measurement, which along with acceptable results emphasizes the feasibility of the attack on normal conditions," they added.

The pair said their research was "work in progress" and expect the equipment to get more sensitive as it is refined.

The attack is due to be demonstrated at the Black Hat conference that takes place in Las Vegas from 25-30 July.

Source: BBC

Windows 7 Goes on Pre-Sale in UK

So we're off...

Today at 12.01am Microsoft's next generation operating system, Windows 7, goes on sale in the UK at discount prices. In the company's own words however: "you'll have to be quick as prices are low, stocks are limited and it is first come first served!"

Microsoft hasn't quantified "stocks are limited" at this stage but, stock allowing, the offer will run from 15 July to 9 August and given you'll now find Windows 7 Home Premium and Windows 7 Professional available for £49.99 and £99.99 expect there to be a great deal of interest. At this stage there remains no sign of the triple licence Windows 7 Family Pack option recently outted in the US so bear in mind these editions cover a single computer only.

Also worth remembering is Microsoft's ongoing battle with the European Union has seen it strip Internet Explorer 8 from all EU versions, cancel upgrade editions and disable the ability for full versions to upgrade from any previous flavour of Windows (2000, XP, Vista, 7 Beta or 7 RC). Instead all users will need to perform fresh installs. All EU versions will be tagged with the letter 'E' to signal this, ie: Windows 7 E Home Premium, Windows 7 E Professional, etc.

Microsoft has also named participating stores during the discount period as Amazon.co.uk, Argos, Comet, Currys, Dixons, Ebuyer.com, John Lewis, Littlewoods, Micro Anvika, PC World, Play.com, Staples and Tesco. Many of which are expected to offer a secondary CD with either IE8 or a rival

 
corner spacer corner

Veeam Specialist Microsoft Small Business Specialists Birmingham Microsoft Gold Certified Partner Birmingham Siemens Solution 1 Reseller Birmingham Sonicwall Specialists Birmingham Business Link Approved Birmingham Fujitsu Primergy Certified Partner Birmingham Facebook Follow us on Twitter ESET NOD32 VMWare
IT Support
IT Services
IT Solutions
Get Support Now
Sitemap
© 2018 Discus Systems plc. All rights reserved. Content Management by Verve Digital