Topic: Off the Wall Speculation
And resistance is futile.
... oh darn I forgot the url. How borg am I? I need a tuneup on the nanocircuits and I think I'm going to get one of those eye doohickeys. No eye-boogers with those things I bet...
http://www.programmersheaven.com/c/MsgBoard/read.asp?Board=810&MsgID=357099&Setting=A9999F0001
Re: mountains and movement By: Portuno_Diamo on April 03, 2007 at 9:46:04 AM Read 1 times (Updated daily). |
Reply Edit Delete message Bookmark Thread |
This message was edited by Portuno_Diamo at 2007-4-3 9:46:4 : This message was edited by willowstump at 2007-4-3 8:30:11 : : : : : : http://www.whitehouse.gov/omb/memoranda/fy2007/m07-11.pdf : : : : : : : : : : : : "... IA is a client application that resides with the Microsoft operating system ..." : : : : : http://www.vcsy.com/press/releases.php?year=2007&month=03&day=14&num=00 : : : : : : : : : : What do we make of that?---a few ideas come to mind...$$$$ : : : : : _____________________________________________ : : : : : : : : : : Press blurb on the above. : : : : : http://news.com.com/The+feds+weigh+in+on+Windows+security/2100-7348_3-6172158.html?tag=nefd.lede : : : : : ____________________________________ : : : : : : : : : : : : : : : : : : : : : : : : : : : : ----- oh could they be talking about are our baseline : : : : GENO200 : : : : : : ______________ : : : : : :we have had a number of discussions regarding delay and the security products-- and the idea of signing up prospective end users---as stated in the press . Wouldnt it be a hoot if the delay we've been trying to get a hold of was none other than the repeated delays of the Vista operating system??--you gotta admit--thats worth a smile. Alot may have been connected in this regard--Vista--the Networx contracts--Saas rollout and acceptance---all with delays since the beginning of announcements this time last year of the security suite.---- : : : : : : From one of the press releases..."...VCSY may register prospective customers..."---- : : : they started projecting instead of selling from the very beginning--we just dont know on what they were waiting. : : : ------------------------------------------- : : : : Anybody have thoughts about this. Microsoft and fog (or dog) may have described something similar for a few years but the company is what it is. No way does a major security rollout occur without Vista inclusion. : : : : "...The NSA's impact may be felt widely. Windows commands more than 90 percent of the worldwide market share in desktop operating systems, and Vista, which is set to be released to consumers Jan. 30, is expected to be used by more than 600 million computer users by 2010, according to Al Gillen, an analyst at market research firm International Data..." : : http://www.washingtonpost.com/wp-dyn/content/article/2007/01/08/AR2007010801352.html : : : : ____________________________________ : : Thinking of the past 12 months wait being related to Vista debut is---well enough has been said.---It makes some sense---what is now available addresses the requirements like a girdle. : : http://blog.tmcnet.com/regulations/security/nist-omb-tout-major-windows-policy-fixes-for-federal-agencies.asp : : Port---whats an 'image' : : "....April 20th, 2007 – OMB and the Department of Homeland Security (DHS) will make available XP and Vista images that hardware and software vendors can use for testing..." : ___________________________ w - an 'image' in a general sense is a way of describing a copy of a single body of data loaded into memory for computer operation. For the most part, the file can be any body of data for any purpose but it would get pretty confusing to refer to various different purposed files as an 'image' so you will find image generally refers to an Operating System unit. Short story: You can either load 1000 OS configurations one at a time by hand or you can load 1 OS configuration on a machine and then copy the image of that installation on to the 999 other same machines. Big job done quick. If you have something able to tell what machines are the same configuration sand which machines are of a different configuration class you can target just the right machines and do management of the machine/software base at a higher abstraction. VCSY technology provides a base for other vendors to provide knowledge and capabilities. This is the beginning of machine managed machines on a large scale. Prognosis: The operation was a success. The patient will die before long. Or we can just pull the plug. +++++++++++++++++++++ Long story: Copies of the image stored on a hard drive can be loaded into random access memory for use provided you know the image is going to be residing on hardware that is compliant with all the configured settings in that particular image. Copies of that image, for instance, will have all the setup and alignment capabilities necessary for operation already loaded in the image. So it is theoretically possible to open the OS software box, load the OS on a server (jump thru all the hoops that you as an installer are required to do) then copy that single image to all the remaining servers in your facility. If any server becomes corrupted it can be reloaded with a fresh image of that OS and on it without harm to the data. This is only possible in situations where all the computers in the entire system are of the same configuration as the first OS installed computer (even on little setup wizard check box difference or 'delta'). I believe the President's directive on standard configuration computers is intended to do a number of things of which standardized images are a critical goal. However... consider a world (especially a government world) where EVERY computer out there was the same configuration because some catnap in the acquisition branch doesn't want to have to be confused. Maybe in Stalin's world but not in the real one, honey. However. If you had a system wide watcher that would recognize an authorized valid 'standard' installation and the subsequently distributed images. This system would allow only the same types of configurations for that particular user group. The authorized user hierarchy would decide who gets what kind of machine in each department/group/coffee-clatch. Once decided and configured so, current state XML documents would provide human governance over the machines in an automated fashion. Thus the system would decide which user group an image was to go to, check the current status of those machines and verify all standard and current configurations, squirt the image on to the hardware memory (RAM or drive as needed - consider if you will being able to do this using web-based memory like Amazon S3 ( http://aws.amazon.com/s3 )) and off you would go with another computer installation ready for the user to use. This is the only scenario I can think of that would make sense for the government to use the words 'standard configuration' beyond a small departmental strategery. p- NOTE: Info on memory. Considering the concept is being stretched by new devices and schemes this is only the beginning of what 'memory' can mean to a computer and a human. We are waiting for analog memory for true 'intelligence' to aggregate. (RAM - random access http://en.wikipedia.org/wiki/Random_access_memory - or the processing chips in the computer intended to store data for use by the processing units. The 'hard drive memory' http://en.wikipedia.org/wiki/Hard_disk and 'hybrid drive' http://en.wikipedia.org/wiki/Hybrid_drive items are for long term storage.) Some wiki info on software images: http://en.wikipedia.org/wiki/Single-system_image The subject and the theoretical boundaries are so vast (especially when you talk about distributed schemes) so you should take your time and think through what the nice people are telling you here to begin with. And before you slap the keys with delight to ask the question 'This sounds like StatePointPlus' yes it does but with other things attached to it as is the wont with VCSY's technology. StatePointPlus + Empath + Enabler + SiteFlash could easily cobble together just such a system which becomes a template driven hardware configuration and software installation system gated for governance and validation by other automated features. See how easy it is to build a brand new business platform by connecting stuff together? Another note: 'image' generally refers to an Operating System. The word 'instance' is usually used to refer to an application or a document image. Image refers to the body of data contained in a slug of memory. Thus the transfer from drive to ram and ready to go operation in an instant is the prime attraction to image and instance management. There is no reason, given the nature of tools IBM has in their arsenal from the Rational acquisition in speculated conjunction with such a system, IBM would not be able build systems capable of configuring departments (not just their hardware and operating systems but their applications and documents - in hours or minutes rather than days and weeks.) by push button from the administrators desk. By ONE pushbutton that is... This kind of problem solving on large scale demonstrates the power of arbitrary referencing and true virtualized performance. Those qualities empowered by enablement, interconnection and interoperation and massive affiliation provide a very scalable and manageable platform for building extremely large interoperative installations with minimal human care and oversight. Connect the code words with their realities and VIOLA! Gimme a beer! you have organic computational evolutions. Yes, Virginia. The machines will eat your mommy. Sleep tight. |