Tuesday, October 11, 2011

Jelastic brings Java apps without adjustment in the Cloud

Jelastic brings Java apps without adjustment in the Cloud

Hivext Technologies has released its cloud platform Jelastic in a first beta version. Jelastic to allow the deployment of Java applications in the cloud - without obligation to continue to be adjusted.

The technology behind Jelastic will be provided end users do not have Hivext Technologies itself, but only via a hosted service provider. The company promises that the Java applications, this should not be adjusted - with this would be the complete cloud platform compatibility and their distribution between different vendors, different from the proprietary Jelastic cloud services Amazon or Google.

Jelastic be installed without major effort quickly. Providers choose a suitable software stack - to choose NGINX stand as a load balancer, the JDK 6 or 7 as the software platform, Jetty 6 and Tomcat 6 or 7 or GlassFish 3 as an application server and the MongoDB and CouchDB as NoSQL database and / or MariaDB the SQL databases, MySQL or PostgreSQL. Jelastic itself would install and configure the connection itself.

Hivext Technologies for North America has been able to win ServInt as hosting partner in Europe could be addressed via Jelastic Host Europe. In the long term will attract more partners Hivext Technologies for its platform.


Twitter gets rights to the word "Tweet"

Twitter gets rights to the word "Tweet"

The name "Tweet" for a message at the micro-blogging service Twitter has become the norm in everyday life - but the company was able to secure only the rights to the word now. The company was registered in the U.S. Twittad "Tweet" as a brand and has been sued by Twitter. Now the dispute has been settled: get the Twitter "tweet" rights and let fall the lawsuit, said CEO James Eliason Twittad the Wall Street Journal. Whether money has gone, he would not say. Twitter a spokeswoman confirmed the sheet only, that there is an agreement.

In Twittad Twitter users can earn some money so that they disseminate marketing messages. Twitter had closed the account of the company in dispute with the short message service. Twitter argued that the word "Tweet" was already popular before it was protected as a trademark of Twittad. The service already tried since 2009 to get the trademark. It's about Twitter claims to avert confusion for users or potential damage to their image.

If you read digital texts differently?

If you read digital texts differently?
Horst Mueller of Neuro Linguist predicts the end of the reading culture, but he gets tangled up in some inconsistencies
To the book fair can already celebrate the disappearance of book culture, even if no one knows how the development will continue. In 500 years, the neuro-linguist said Horst Mueller of the University of Bielefeld pretty carefully over the radio would be read Germany, only a few people who could most everyday and work without it, write something and read it. Instead, we'll talk to machines, if they give instructions that show in pictures, would like what to do: "The digital media," he predicted, "will disappear from the Scriptures." They would be replaced by more complex techniques.
The culture - and the market - the printed book is admittedly not much older than 500 years. The disappearance of the book would be perhaps even a return before the invention of printing, but on a whole new technological level, because communication has become even without printed text is no longer local, but global. During that time, however, the oral culture was superseded by the written culture, will now replace the electronic media, the print culture with their cognitive achievements. However, remember, so you have to, there was always the criticism that the literary culture of the people duly disciplined and forced new physical and mental skills have what is sometimes viewed not only as sublimation, but also as alienation.
Just being drudgery of writing and learning to read is torture, which does not take place solely at the cognitive level, as every child must learn early in his school career: starting from the correct holding a pen to the severity of fine motor skills to a legible, the standard meets produce writing, to the silent and solitary reading of long texts of letters columns merged, with which people withdraw from society. If the shapes of letters with the pen and maybe even a sporty aesthetic component, so looking at the letters desert looks like a sensory deprivation, which stimulates a hallucinatory compensation, like fantasy called.
Deserts in the text of literacy
Mueller also confirmed as that reading only once before the hearing is an abstract activity: When reading is lost among other things, the emphasis during the debate, the facial expression of the speaker and his gestures. These are all clues as to how a sentence is to understand the needs become apparent upon reading of letter strings only. However, speaking and listening is already quite a task multitasking while writing and reading is a much more monotonous work already. Is therefore possible by the members of literacy in the media multitasking environment so frightening?
The conversation with the neuro-linguist was all about how the digital reading differs from print reading, even if the interviewer and interviewee here often talked past each other. For Müller, the difference for older brains is like his insignificant if done for a long reading life. Then you could say undamaged "highly efficient media," So turn to digital. It was different at a young age but when you read books not only digital, but "even directly in the Web-based deals with texts". So if we were reading texts on paper, so the information is "impoverished," the text was a "barren desert lead." Since it had to be "open" until "it takes to read a book." But if they did so, then one could dedicate themselves to the whole: "Everything is colorful, which means action and dynamism, the brain develops," says neuro-linguist describes the advantages of abstract desert. On the other hand, was the site Colorful and Turbulent already exists. This would distracting information, such as the battery level or incoming emails. The exhausted then obviously the imagination, so the lack of perception, be compensated by self-generated images must.
The joy of haptics and the distraction of the colorful and dynamic
Asked whether the concentration would be an eBook is not just possible, says Mueller, ideally this should go, but it lacked the tactile information, the sound of the paper, what do you do with your fingers, etc. Then the reading experience is different. But this distinction between digital and printed text but is a little clever thing, because you can keep the eBook and operate entirely in the hands has, sounds can be customized according to preference. Actually was just a matter of habit, but then also a "multi-modal connectivity," which makes it more "fun", but also serves to save what they read better. However, even the sound of the leaves would be quite a change, one wonders, what distinguishes this from other distractions?
It is interesting that although Mueller speaks to the website with the colorful and dynamic, but one wonders what with picture books or illustrated books, is indeed already leaving the desert like the pure text and provide some distraction related?
As Muller points out, in experiments rather stark contrasts are constructed, which then of course the differences between digital and printed text over the top. Sun brain scans were made by people who read on a screen as a text in a book, and of those who read a text in an "animated web environment." As can be had from the outset, no difference between digital and printed texts read out, the it as such, at least for one eBook that hardly exist anymore. Texts do not even have websites with animated graphics surrounded, while books can be well not only text but also pictures and just, it is also very important to have that layout the pages. For in-depth reading not invite any organization.
Highly distributed brain activity
Mueller says, could determine when such test arrangements are that savvy Webleser had a "highly distributed brain activity", which shows that they combine many activities. It could be overcome so many tasks that would not be necessary to ensure the information conveyed by Scripture alone to take. Therefore, the resources could deduct from the reading process. However, readers must not only illustrated in books, but also in newspapers and magazines with a deliberate thwarting of the concentrated attention of readers expect if they ever even advertising is inserted.
Would also like reading the screen when socialized and trained more, but find instead a reduction of reading, the neuro-linguist eventually. Would no longer about manuals for printers or for complicated military equipment offered as texts but as a kind of comic. Of the younger man was "no longer able to read longer, more coherent texts - or want to read it." This might be an exaggeration, especially since so many people never go not only to universities, where they pass the reading and writing, but also just write on the Internet and read
However, the language has been simplified even before the Internet, which is called the radio audibility and what practicing mirror and Co. for a long time: If possible, no subordinate clauses more, and certainly not the complex and convoluted sentence structures as input during the Enlightenment or were commonplace. What an intellectual adventure it can be to track almost page-long, meandering sentences of Kant and Hegel and in the end to find the reference back to the beginning. And just as exciting as it may lead one to think about different aspects of time to a conclusion without obsessive need to reduce the complexity. It's quite possible that this desire will die out in the text, the desire for textual adventure writing and life.

Copyright: Court upholds Intranet clause for teachers

Copyright: Court upholds Intranet clause for teachers
The regional court in Stuttgart decided in dispute the so-called intranet clause in the Copyright Act, educational institutions that students up to 10 percent of a protected work may be made available online. This is consistent with the concerns of the legislature in Section 52  Copyright Act, under which teachers and scholars "small parts" to make works a "certain limited range of teaching students" to the public, may the words of a recently published opinion of the 17th Civil Chamber of the end of September (Az: 17 O 671/10). The possibility of a download as a PDF file is to prevent it though.
The normal exploitation of the object is affected by the intranet clause does not in itself, violates the legitimate interests of the owner is not improperly, the judge explained. Insofar as the Clause with international copyright agreements and the EU Copyright Directive was incompatible. An undue interference with the property rights of the recycler is not available. A training center should select for the online publication but a file format with "functioning protection mechanisms", which makes the storage of the scanned parts work on the computers the students impossible. Further details of such a format are not apparent from the decision.
In support, the Court, that the legislator's aim was merely to allow a use that is in the analog space comparable. A download to a computer but put a "simpler and higher quality reproduction", since the stored extracts could be something like "transferred directly into your own word processor." Printing of the materials provided, however, is permitted. This corresponds to the way the plant parts after sending to copy traditional.
In the case of Alfred Kröner Verlag had sued the University of Hagen due to an extensive publication of a copyrighted work sold by him in the higher education system. The Stuttgart complained that the university students 91 of its 476 pages of text from the text book "Milestones in psychology" without charge on its intranet available electronically presented. They wanted to assert that the university could offer only three pages from the factory.
This very strict interpretation of the clause Intranet rejected the district court. According to him, allowed 48 pages in electronic form (without the possibility of recording), and three pages to download are made publicly available to students. The university said in the chamber to spread beyond the plant parts. Moreover, they condemned the university to pay an even closer quantified damages and reimbursement for a three-quarter of the cost of litigation and other extrajudicial costs for failure to sign a cease and desist from publishing required.
The plaintiff intends, according to the Association of German Book Trade to assist him in the fall, to go against the decision in the appeal. The reason given is that the prohibition by the court was not extensive enough. Karl-Peter Winters, president of the Publishers and Booksellers Association in the Committee showed Although generally pleased that the court "the excesses of the University of Hagen has put a stop". Only one free replacement phasing out of Section 52a of the copyright law but could "secure the education of German students with the latest and best teaching materials". One reason for the plea, the publisher was that the payment was actually foreseen failed factory-related payments to the refusal of the federal and state universities to understand the uses taking place.

Contaminated Air Force computer

Contaminated Air Force computer
U.S. drone arm fighting with viruses

An embarrassing mishap, it is in any case, but how big is the risk? At
the U.S. air force base Creech apparently several computers are infected
by a virus that logs all keystrokes, among other things. With these
computers, U.S. drones are remotely controlled.

Washington - "Nobody is panicking - yet." With these words, quoting the
magazine "Wired" an unnamed source from the U.S. Air Force. In the
"Wired" Danger Room blog is about the reason for the concern reported: A
computer virus had infected the computers are controlled from which U.S.
combat drones. The remote-controlled light aircraft is currently the
preferred weapon in the fight against insurgents in Iraq, Afghanistan
and Yemen. Even the al-Qaida terrorist Anwar al-Awlaki was probably
killed in Yemen by a drone attack.

Controlled many of the drones, named "Predator" and "Reaper" from the
Creech Air Force Base in Nevada. There has obviously now a virus
implanted that logs all keystrokes on the respective computers. The
"Wired" report, Creech currently being sought in vain to get rid of the
intruder again. "We delete it again and again, and he always comes
back," the magazine quotes an unnamed source. They assume that the virus
is "benign", but ". We just do not know exactly"

Even compared to the Reuters news agency confirmed the existence of
another unnamed source of the virus on Air Force computers: "There is
something going on, but this has on missions overseas no influence," the
agency quoted its source.

Targeted attack or accidental infection?

"Wired" was, according to the now more precisely described in Creech
virus two weeks ago by the security system of the U.S. military
discovered that the remote pilot would not be deterred from carrying out
further missions. Still seems unclear whether it was a targeted attack
or an accidental infection is one of the numerous viruses that are
constantly on the road network.

Actually military used computers should be generally immune from such
attacks: they are usually not connected to the Internet, which is
considered as the only way to protect themselves against such attacks
and secure from hacker attacks. The computers allow in Creech However,
unlike many other military computers, "Wired" According to the
connection of external drives. For example, drones recorded video and
card data from one computer to another would be transported. If such a
drive previously depended on a Internet-connected computer, the virus
could have arrived on this path in the "entnetzten" military machine.
The use of external drives is now worldwide on all Air Force bases have
been banned, "reports Wired."

In a similar way, for example, damaged the Stuxnet virus, the Iranian
nuclear program. He was probably introduced via a contaminated USB stick
into the computer systems actually disconnected from the power of Iran's
Natanz nuclear facility. Even U.S. military computers have been
previously carried on external hard drives, introduced viruses have been
compromised.

Every keystroke logging

The virus surfaced now transported apparently called a keylogger. Such a
malicious program logs every keystroke on the infected machine and sends
this information to the more-or those who have brought the program into
circulation. However, this should be impossible to separate from the
network computers.

The remote-controlled combat planes are not affected for the first time
of a security problem. In December 2009 it was announced that Iraqi
insurgents with commercially available, much cheaper technology
intercepted the video feeds from drones. The "Wall Street Journal"
reported on laptops seized during arrests were U.S. soldiers discovered
"hours and hours" of material from drone cameras. Many of the aircraft
to send their video conferences over unencrypted to their ground stations.

A military spokesman declined to comment on the report about the virus
"wired" to non-official. Give generally to security vulnerabilities or
attacks on its own systems from any comments. It will, however, invested
heavily "in order to protect our systems to monitor and to counter
threats and to ensure safety." This included also "a comprehensive
response to viruses, worms and other malware that we discover."

Even the CIA uses "Reaper" - and "Predator" drone, according to Reuters
in Yemen, Afghanistan and Libya. The "Washington Post" reports U.S.
drones have killed over since the year 2001 2000 insurgents and civilians.

U.S. government workers in the next sighting Wikileaks

U.S. government workers in the next sighting Wikileaks

The Inter-American provider Sonic.net and search engine provider Google
have a newspaper report that information through the e-mail account of
the Wikileaks Helper Jacob Appelbaum issue to the U.S. government must.
The company had done so held under a court order sealing series, the
Wall Street Journal reported on Monday. The government had demanded
among other things, details about the e-mail addresses that have
corresponded with those of Appelbaum, but not the content itself via e-mail

Appelbaum is a security expert, hackers, and one of the masterminds
behind the anonymous Tor project. He has been advised repeatedly to the
attention of U.S. authorities. In January 2011 the government had forced
the short message service Twitter , data on some users to publish, which
stood in connection with Wikileaks - including, besides Appelbaum, the
Icelandic parliament deputy Birgitta Jónsdóttir and the Dutch hacker Rop
Gonggrijp. Against them by a judge in an expedited procedure -sanctioned
investigation is the appeal.

Against the 28-year-old U.S. citizen Appelbaum has been collected, the
report says no charges. In secret court orders, the company also can not
inform the customers concerned about the activities. Compared to CNET
News said Sonic CEO Dane Jasper, at least that the secrecy was lifted at
the request of his company and he could Appelbaum informed about the
activities.

Basis of action by the U.S. government is a federal law on safeguards
for electronic communications from 1986 to advantage. Unlike a regular
search warrant, the authorities of the arrangement in question does not
present concrete evidence, but demonstrate only probable cause.
Investigators is possible on the basis of the law to access information
from server-based e-mail accounts or cell phone tracking data without
requiring them to obtain a search warrant.

The age of the Internet before the law came into force (Electronic
Communications Privacy Act, ECPA) is not without controversy in the
United States. The scheme should allow the citizens of that time
emerging electronic communication the same protection from arbitrary
access by authorities as telephone calls or correspondence. The
technical development has progressed considerably, however. According to
the Wall Street Journal, there are judgments to consider the
constitutionality of the provision in question. A group of well-known IT
companies - including Google, Microsoft, Apple, Amazon and eBay -
advertises in Washington for a reform of the ECPA.

Disorders in Blackberry services

Disorders in Blackberry services

Several online services from Research In Motion (RIM) had not been
reached for several hours, reported the Daily Telegraph. By late
afternoon, the breakdown was not yet resolved accordingly. RIM is
expressed at the request of the news agency dpa initially not on the
report. Meanwhile, the company gives in to Twitter, where "some users in
EMEA" (Europe, Middle East, Africa), there were problems. A mobile phone
provider in Egypt and one in Bahrain on, the RIM server as a cause of
the disorder.

According to the British newspaper next to the e-mail service also fell
from the Internet usage and the BlackBerry Messenger (BBM), the user can
send short messages. Companies were not affected by its own Blackberry
server (BES).