<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-648076231715483572</id><updated>2024-08-31T08:47:30.787-07:00</updated><title type='text'>Software news, comment and analysis</title><subtitle type='html'>Latest news updates from the library automation industry. IT industry features and analysis, including features on public sector.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default?start-index=26&amp;max-results=25'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>1270</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-1745505135624759515</id><published>2009-06-04T17:54:00.001-07:00</published><updated>2009-06-04T17:54:37.246-07:00</updated><title type='text'>Chinese Hummer deal</title><content type='html'>General Motors (GM) has named the outfit that is to acquire its Hummer brand of vehicles, along with the division&#39;s senior management and operational team.&lt;/P&gt;&lt;P&gt;Sichuan Tengzhong Heavy Industrial Machinery (Tengzhong), a major industrial machinery group, will acquire the rights to the brand and assume existing dealership network agreements.&lt;/P&gt;&lt;P&gt;It is contemplated that Tengzhong will, as part of the transaction, enter into a long-term contract assembly and key component and material supply agreement with GM. &lt;/P&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;P&gt;In an earlier statement, GM said it expects the deal, if successful, to secure more than 3,000 US jobs. &lt;/P&gt;&lt;P&gt;The final terms of the deal are subject to final negotiations.&lt;/P&gt;&lt;P&gt;Based in the Chinese province of Sichuan, Tengzhong is a privately owned company and a domestic manufacturer of road, construction and energy industry equipment. &lt;/P&gt;&lt;P&gt;&#39;We will be investing in the Hummer brand and its research and development capabilities, which will allow Hummer to better meet demand for new products such as more fuel-efficient vehicles in the US,&#39; said Yang Yi,chief executiveofficerof Tengzhong.&lt;/P&gt;&lt;P&gt;Hummer will continue to maintain its headquarters and operations in the US, and will continue to be managed by its existing leadership team. &lt;/P&gt;&lt;P&gt;The team intends to expand Hummer&#39;s dealer network worldwide, particularly into new and underserved markets such as China.&lt;/P&gt;&lt;P&gt;The transaction is expected to close in the third quarter of this year, and is subject to customary closing conditions and regulatory approvals. &lt;/P&gt;&lt;P&gt;Financial terms of the agreement were not disclosed.&lt;/P&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/1745505135624759515/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/1745505135624759515' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/1745505135624759515'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/1745505135624759515'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/06/chinese-hummer-deal.html' title='Chinese Hummer deal'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-3024566665921180483</id><published>2009-04-30T21:05:00.005-07:00</published><updated>2009-04-30T21:05:19.513-07:00</updated><title type='text'>Cloud computing: Resistance is futile</title><content type='html'>There may be a number of unresolved security issues around cloud computing  but if you try to resist the trend you are likely to be shown the door.&lt;/p&gt;&lt;p&gt;    This was the claim of Philippe Courtot, chairman of security company Qualys, speaking at the RSA Conference in San Francisco last week.  &lt;/p&gt;&lt;p&gt;  &quot;We know that it&#39;s getting harder and harder to secure the current computing infrastructure and something has to change. Fundamentally there are too many variables and too many security patches,&quot; he said.  &lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;Read more: RSA Security Conference&lt;/p&gt;&lt;p&gt;  &quot;The burden today is on the enterprise: they have to select the components, the servers, the routers and the applications, and to add insult to injury they have to secure that.&quot;  &lt;/p&gt;&lt;p&gt;  According to Courtot, the burden of security on organizations is too great, and the cloud is potentially the answer.  &lt;/p&gt;&lt;p&gt;  Proponents of cloud computing often point to the ability it gives businesses to buy services themselves, bypassing the IT organization. Courtot warned: &quot;If you resist the move to the cloud you will be replaced. Resistance is not an option.&quot;  &lt;/p&gt;&lt;p&gt;  However, he still sees a role for the internal IT security team: &quot;The security people will have a more strategic role because they will be selecting the correct partners,&quot; he said.  &lt;/p&gt;&lt;p&gt;  The complexity of combining cloud applications with traditionally sourced applications will also secure an important role for IT teams, at least in the short term.  &lt;/p&gt;&lt;p&gt;  Chief information officers, however, remain sceptical of cloud computing, and recent research by silicon.com saw it branded this year&#39;s most overhyped technology.  &lt;/p&gt;&lt;p&gt;  According to Courtot, a number of improvements are needed before cloud computing will be able to take off, including the development of more secure browsers, stronger authentication and federated ID in the cloud, secure open protocols and standards, and legal and contractual improvements.  &lt;/p&gt;&lt;p&gt;&lt;i&gt;This article was originally published on silicon.com. &lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/3024566665921180483/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/3024566665921180483' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/3024566665921180483'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/3024566665921180483'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cloud-computing-resistance-is-futile_7029.html' title='Cloud computing: Resistance is futile'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-8189986785053393050</id><published>2009-04-30T21:05:00.003-07:00</published><updated>2009-04-30T21:05:16.246-07:00</updated><title type='text'>Cloud computing: Resistance is futile</title><content type='html'>There may be a number of unresolved security issues around cloud computing  but if you try to resist the trend you are likely to be shown the door.&lt;/p&gt;&lt;p&gt;    This was the claim of Philippe Courtot, chairman of security company Qualys, speaking at the RSA Conference in San Francisco last week.  &lt;/p&gt;&lt;p&gt;  &quot;We know that it&#39;s getting harder and harder to secure the current computing infrastructure and something has to change. Fundamentally there are too many variables and too many security patches,&quot; he said.  &lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;Read more: RSA Security Conference&lt;/p&gt;&lt;p&gt;  &quot;The burden today is on the enterprise: they have to select the components, the servers, the routers and the applications, and to add insult to injury they have to secure that.&quot;  &lt;/p&gt;&lt;p&gt;  According to Courtot, the burden of security on organizations is too great, and the cloud is potentially the answer.  &lt;/p&gt;&lt;p&gt;  Proponents of cloud computing often point to the ability it gives businesses to buy services themselves, bypassing the IT organization. Courtot warned: &quot;If you resist the move to the cloud you will be replaced. Resistance is not an option.&quot;  &lt;/p&gt;&lt;p&gt;  However, he still sees a role for the internal IT security team: &quot;The security people will have a more strategic role because they will be selecting the correct partners,&quot; he said.  &lt;/p&gt;&lt;p&gt;  The complexity of combining cloud applications with traditionally sourced applications will also secure an important role for IT teams, at least in the short term.  &lt;/p&gt;&lt;p&gt;  Chief information officers, however, remain sceptical of cloud computing, and recent research by silicon.com saw it branded this year&#39;s most overhyped technology.  &lt;/p&gt;&lt;p&gt;  According to Courtot, a number of improvements are needed before cloud computing will be able to take off, including the development of more secure browsers, stronger authentication and federated ID in the cloud, secure open protocols and standards, and legal and contractual improvements.  &lt;/p&gt;&lt;p&gt;&lt;i&gt;This article was originally published on silicon.com. &lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/8189986785053393050/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/8189986785053393050' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/8189986785053393050'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/8189986785053393050'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cloud-computing-resistance-is-futile_7803.html' title='Cloud computing: Resistance is futile'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-6236734655825489500</id><published>2009-04-30T21:05:00.001-07:00</published><updated>2009-04-30T21:05:15.132-07:00</updated><title type='text'>CPV solar farm</title><content type='html'>ZenithSolar, an Israeli start-up company, has recently launched its first &#39;solar farm&#39; near Tel Aviv, based on concentrated photovoltaic (CPV) systems developed by Prof David Faiman of Ben-Gurion University of the Negev (BGU).&lt;/P&gt;&lt;P&gt;Faiman, who is chairman of the Department of Solar Energy and Environmental Physics at BGU&#39;s Jacob Blaustein Institutes for Desert Research, believes that the system will harvest more than 70 per cent of incoming solar energy (as compared to industry norms of between 10 per centand 40 per cent).&lt;/P&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;P&gt;The concept of CPV systems is to use low-cost optics to increase the light incident ontohigh-efficiency semiconductor solar cells, thus reducing overall cost of the system while increasing energy output.&lt;/P&gt;&lt;P&gt;The ZenithSolar optical dish is based on a patented design, using multiple simple flat mirrors mounted on a plastic surface. The moulded plastic surface, divided into four quadrants, is fixed onto a rigid, high-precision metal frame assembled onto an azimuth elevation solar tracking system.&lt;/P&gt;&lt;P&gt;The concentrated solar radiation is reflected from each individual mirror onto an array of solar cells. ZenithSolar uses field-proven high-efficiency multi-junction III-V solar cells for the job.&lt;/P&gt;&lt;P&gt;In conventional CPV systems, the excess heat generated in the solar cell needs to be removed to avoid damaging the cell and to maintain high efficiency of electricity conversion. &lt;/P&gt;&lt;P&gt;By contrast, ZenithSolar uses the heat generated at the solar-cell receiver to provide usable hot-water heating, improving overall solar power conversion efficiency.&lt;/P&gt;&lt;P&gt;&#39;By concentrating solar energy to a level 1,000 times more intense than natural sunlight and taking advantage of the higher efficiencies at which solar cells operate under these conditions, only minute amounts of expensive PV material are necessary to produce large amounts of power,&#39; said Faiman. &lt;/P&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/6236734655825489500/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/6236734655825489500' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6236734655825489500'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6236734655825489500'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cpv-solar-farm_4852.html' title='CPV solar farm'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-6303920702047321085</id><published>2009-04-30T14:56:00.001-07:00</published><updated>2009-04-30T14:56:29.631-07:00</updated><title type='text'>Report: Conficker in attack mode</title><content type='html'>The Conficker threat has a new twist, with the worm now reportedly installing a second mass-mailing virus that many know as Waledac.&lt;/p&gt;&lt;p&gt;    According to a report by Xinhua News Agency, Conficker-infected machines are now being turned into servers for e-mail spam. Quoting Vincent Weafer, vice president of Symantec Security Response, Xinhua reported Conficker now installs a second virus--Waledac--that sends out e-mail spam without the computer owner&#39;s knowledge.  &lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;Read also: Conficker&#39;s estimated economic cost? $9.1 billion&lt;/p&gt;&lt;p&gt;  &quot;Expect this to be long-term, slowly changing,&quot; Weafer was quoted as saying of the Conficker impact. &quot;It&#39;s not going to be fast [or] aggressive.&quot;  &lt;/p&gt;&lt;p&gt;  According to security vendor Trend Micro, the worm also installs malware that masquerades as antivirus software.  &lt;/p&gt;&lt;p&gt;  Earlier this month, Trend Micro&#39;s advanced threats researcher Paul Ferguson, said Conficker and Waledac originated from the same authors. Waledac has been referred to by some experts as a new version of Storm, a mass-mailing worm that surfaced in early 2007.&lt;/p&gt;&lt;p&gt;&lt;i&gt;This article was originally posted on ZDNet Asia.&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/6303920702047321085/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/6303920702047321085' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6303920702047321085'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6303920702047321085'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/report-conficker-in-attack-mode_4388.html' title='Report: Conficker in attack mode'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-5540676336591847246</id><published>2009-04-30T14:55:00.005-07:00</published><updated>2009-04-30T14:55:41.613-07:00</updated><title type='text'>CPV solar farm</title><content type='html'>ZenithSolar, an Israeli start-up company, has recently launched its first &#39;solar farm&#39; near Tel Aviv, based on concentrated photovoltaic (CPV) systems developed by Prof David Faiman of Ben-Gurion University of the Negev (BGU).&lt;/P&gt;&lt;P&gt;Faiman, who is chairman of the Department of Solar Energy and Environmental Physics at BGU&#39;s Jacob Blaustein Institutes for Desert Research, believes that the system will harvest more than 70 per cent of incoming solar energy (as compared to industry norms of between 10 per centand 40 per cent).&lt;/P&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;P&gt;The concept of CPV systems is to use low-cost optics to increase the light incident ontohigh-efficiency semiconductor solar cells, thus reducing overall cost of the system while increasing energy output.&lt;/P&gt;&lt;P&gt;The ZenithSolar optical dish is based on a patented design, using multiple simple flat mirrors mounted on a plastic surface. The moulded plastic surface, divided into four quadrants, is fixed onto a rigid, high-precision metal frame assembled onto an azimuth elevation solar tracking system.&lt;/P&gt;&lt;P&gt;The concentrated solar radiation is reflected from each individual mirror onto an array of solar cells. ZenithSolar uses field-proven high-efficiency multi-junction III-V solar cells for the job.&lt;/P&gt;&lt;P&gt;In conventional CPV systems, the excess heat generated in the solar cell needs to be removed to avoid damaging the cell and to maintain high efficiency of electricity conversion. &lt;/P&gt;&lt;P&gt;By contrast, ZenithSolar uses the heat generated at the solar-cell receiver to provide usable hot-water heating, improving overall solar power conversion efficiency.&lt;/P&gt;&lt;P&gt;&#39;By concentrating solar energy to a level 1,000 times more intense than natural sunlight and taking advantage of the higher efficiencies at which solar cells operate under these conditions, only minute amounts of expensive PV material are necessary to produce large amounts of power,&#39; said Faiman. &lt;/P&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/5540676336591847246/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/5540676336591847246' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/5540676336591847246'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/5540676336591847246'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cpv-solar-farm_30.html' title='CPV solar farm'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-726387144923915499</id><published>2009-04-30T14:55:00.003-07:00</published><updated>2009-04-30T14:55:38.850-07:00</updated><title type='text'>Cloud computing: Resistance is futile</title><content type='html'>There may be a number of unresolved security issues around cloud computing  but if you try to resist the trend you are likely to be shown the door.&lt;/p&gt;&lt;p&gt;    This was the claim of Philippe Courtot, chairman of security company Qualys, speaking at the RSA Conference in San Francisco last week.  &lt;/p&gt;&lt;p&gt;  &quot;We know that it&#39;s getting harder and harder to secure the current computing infrastructure and something has to change. Fundamentally there are too many variables and too many security patches,&quot; he said.  &lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;Read more: RSA Security Conference&lt;/p&gt;&lt;p&gt;  &quot;The burden today is on the enterprise: they have to select the components, the servers, the routers and the applications, and to add insult to injury they have to secure that.&quot;  &lt;/p&gt;&lt;p&gt;  According to Courtot, the burden of security on organizations is too great, and the cloud is potentially the answer.  &lt;/p&gt;&lt;p&gt;  Proponents of cloud computing often point to the ability it gives businesses to buy services themselves, bypassing the IT organization. Courtot warned: &quot;If you resist the move to the cloud you will be replaced. Resistance is not an option.&quot;  &lt;/p&gt;&lt;p&gt;  However, he still sees a role for the internal IT security team: &quot;The security people will have a more strategic role because they will be selecting the correct partners,&quot; he said.  &lt;/p&gt;&lt;p&gt;  The complexity of combining cloud applications with traditionally sourced applications will also secure an important role for IT teams, at least in the short term.  &lt;/p&gt;&lt;p&gt;  Chief information officers, however, remain sceptical of cloud computing, and recent research by silicon.com saw it branded this year&#39;s most overhyped technology.  &lt;/p&gt;&lt;p&gt;  According to Courtot, a number of improvements are needed before cloud computing will be able to take off, including the development of more secure browsers, stronger authentication and federated ID in the cloud, secure open protocols and standards, and legal and contractual improvements.  &lt;/p&gt;&lt;p&gt;&lt;i&gt;This article was originally published on silicon.com. &lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/726387144923915499/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/726387144923915499' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/726387144923915499'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/726387144923915499'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cloud-computing-resistance-is-futile_30.html' title='Cloud computing: Resistance is futile'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-1226692039940896143</id><published>2009-04-30T14:55:00.001-07:00</published><updated>2009-04-30T14:55:37.551-07:00</updated><title type='text'>Cloud computing: Resistance is futile</title><content type='html'>There may be a number of unresolved security issues around cloud computing  but if you try to resist the trend you are likely to be shown the door.&lt;/p&gt;&lt;p&gt;    This was the claim of Philippe Courtot, chairman of security company Qualys, speaking at the RSA Conference in San Francisco last week.  &lt;/p&gt;&lt;p&gt;  &quot;We know that it&#39;s getting harder and harder to secure the current computing infrastructure and something has to change. Fundamentally there are too many variables and too many security patches,&quot; he said.  &lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;Read more: RSA Security Conference&lt;/p&gt;&lt;p&gt;  &quot;The burden today is on the enterprise: they have to select the components, the servers, the routers and the applications, and to add insult to injury they have to secure that.&quot;  &lt;/p&gt;&lt;p&gt;  According to Courtot, the burden of security on organizations is too great, and the cloud is potentially the answer.  &lt;/p&gt;&lt;p&gt;  Proponents of cloud computing often point to the ability it gives businesses to buy services themselves, bypassing the IT organization. Courtot warned: &quot;If you resist the move to the cloud you will be replaced. Resistance is not an option.&quot;  &lt;/p&gt;&lt;p&gt;  However, he still sees a role for the internal IT security team: &quot;The security people will have a more strategic role because they will be selecting the correct partners,&quot; he said.  &lt;/p&gt;&lt;p&gt;  The complexity of combining cloud applications with traditionally sourced applications will also secure an important role for IT teams, at least in the short term.  &lt;/p&gt;&lt;p&gt;  Chief information officers, however, remain sceptical of cloud computing, and recent research by silicon.com saw it branded this year&#39;s most overhyped technology.  &lt;/p&gt;&lt;p&gt;  According to Courtot, a number of improvements are needed before cloud computing will be able to take off, including the development of more secure browsers, stronger authentication and federated ID in the cloud, secure open protocols and standards, and legal and contractual improvements.  &lt;/p&gt;&lt;p&gt;&lt;i&gt;This article was originally published on silicon.com. &lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/1226692039940896143/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/1226692039940896143' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/1226692039940896143'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/1226692039940896143'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cloud-computing-resistance-is-futile.html' title='Cloud computing: Resistance is futile'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-1851369311123216783</id><published>2009-04-30T12:14:00.001-07:00</published><updated>2009-04-30T12:14:19.745-07:00</updated><title type='text'>Report: Conficker in attack mode</title><content type='html'>The Conficker threat has a new twist, with the worm now reportedly installing a second mass-mailing virus that many know as Waledac.&lt;/p&gt;&lt;p&gt;    According to a report by Xinhua News Agency, Conficker-infected machines are now being turned into servers for e-mail spam. Quoting Vincent Weafer, vice president of Symantec Security Response, Xinhua reported Conficker now installs a second virus--Waledac--that sends out e-mail spam without the computer owner&#39;s knowledge.  &lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;Read also: Conficker&#39;s estimated economic cost? $9.1 billion&lt;/p&gt;&lt;p&gt;  &quot;Expect this to be long-term, slowly changing,&quot; Weafer was quoted as saying of the Conficker impact. &quot;It&#39;s not going to be fast [or] aggressive.&quot;  &lt;/p&gt;&lt;p&gt;  According to security vendor Trend Micro, the worm also installs malware that masquerades as antivirus software.  &lt;/p&gt;&lt;p&gt;  Earlier this month, Trend Micro&#39;s advanced threats researcher Paul Ferguson, said Conficker and Waledac originated from the same authors. Waledac has been referred to by some experts as a new version of Storm, a mass-mailing worm that surfaced in early 2007.&lt;/p&gt;&lt;p&gt;&lt;i&gt;This article was originally posted on ZDNet Asia.&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/1851369311123216783/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/1851369311123216783' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/1851369311123216783'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/1851369311123216783'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/report-conficker-in-attack-mode_30.html' title='Report: Conficker in attack mode'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-6641764096265978603</id><published>2009-04-30T10:31:00.003-07:00</published><updated>2009-04-30T10:31:31.272-07:00</updated><title type='text'>CPV solar farm</title><content type='html'>ZenithSolar, an Israeli start-up company, has recently launched its first &#39;solar farm&#39; near Tel Aviv, based on concentrated photovoltaic (CPV) systems developed by Prof David Faiman of Ben-Gurion University of the Negev (BGU).&lt;/P&gt;&lt;P&gt;Faiman, who is chairman of the Department of Solar Energy and Environmental Physics at BGU&#39;s Jacob Blaustein Institutes for Desert Research, believes that the system will harvest more than 70 per cent of incoming solar energy (as compared to industry norms of between 10 per centand 40 per cent).&lt;/P&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;P&gt;The concept of CPV systems is to use low-cost optics to increase the light incident ontohigh-efficiency semiconductor solar cells, thus reducing overall cost of the system while increasing energy output.&lt;/P&gt;&lt;P&gt;The ZenithSolar optical dish is based on a patented design, using multiple simple flat mirrors mounted on a plastic surface. The moulded plastic surface, divided into four quadrants, is fixed onto a rigid, high-precision metal frame assembled onto an azimuth elevation solar tracking system.&lt;/P&gt;&lt;P&gt;The concentrated solar radiation is reflected from each individual mirror onto an array of solar cells. ZenithSolar uses field-proven high-efficiency multi-junction III-V solar cells for the job.&lt;/P&gt;&lt;P&gt;In conventional CPV systems, the excess heat generated in the solar cell needs to be removed to avoid damaging the cell and to maintain high efficiency of electricity conversion. &lt;/P&gt;&lt;P&gt;By contrast, ZenithSolar uses the heat generated at the solar-cell receiver to provide usable hot-water heating, improving overall solar power conversion efficiency.&lt;/P&gt;&lt;P&gt;&#39;By concentrating solar energy to a level 1,000 times more intense than natural sunlight and taking advantage of the higher efficiencies at which solar cells operate under these conditions, only minute amounts of expensive PV material are necessary to produce large amounts of power,&#39; said Faiman. &lt;/P&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/6641764096265978603/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/6641764096265978603' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6641764096265978603'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6641764096265978603'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cpv-solar-farm.html' title='CPV solar farm'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-5886380380318223501</id><published>2009-04-30T10:31:00.001-07:00</published><updated>2009-04-30T10:31:30.712-07:00</updated><title type='text'>Report: Conficker in attack mode</title><content type='html'>The Conficker threat has a new twist, with the worm now reportedly installing a second mass-mailing virus that many know as Waledac.&lt;/p&gt;&lt;p&gt;    According to a report by Xinhua News Agency, Conficker-infected machines are now being turned into servers for e-mail spam. Quoting Vincent Weafer, vice president of Symantec Security Response, Xinhua reported Conficker now installs a second virus--Waledac--that sends out e-mail spam without the computer owner&#39;s knowledge.  &lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;Read also: Conficker&#39;s estimated economic cost? $9.1 billion&lt;/p&gt;&lt;p&gt;  &quot;Expect this to be long-term, slowly changing,&quot; Weafer was quoted as saying of the Conficker impact. &quot;It&#39;s not going to be fast [or] aggressive.&quot;  &lt;/p&gt;&lt;p&gt;  According to security vendor Trend Micro, the worm also installs malware that masquerades as antivirus software.  &lt;/p&gt;&lt;p&gt;  Earlier this month, Trend Micro&#39;s advanced threats researcher Paul Ferguson, said Conficker and Waledac originated from the same authors. Waledac has been referred to by some experts as a new version of Storm, a mass-mailing worm that surfaced in early 2007.&lt;/p&gt;&lt;p&gt;&lt;i&gt;This article was originally posted on ZDNet Asia.&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/5886380380318223501/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/5886380380318223501' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/5886380380318223501'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/5886380380318223501'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/report-conficker-in-attack-mode.html' title='Report: Conficker in attack mode'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-1078140839802198785</id><published>2009-04-23T03:51:00.009-07:00</published><updated>2009-04-23T03:51:04.832-07:00</updated><title type='text'>Cyberspies breach US fighter-jet project: Report</title><content type='html'>&lt;img src=&quot;http://tech.mate4date.com/wp-content/uploads/cyberspies-breach-us-fighterjet-project-report-0.gif&quot; alt=&quot;Cyberspies breach US fighter-jet project: Report&quot; title=&quot;Cyberspies breach US fighter-jet project: Report&quot; /&quot; alt=&quot;Cyberspies breach US fighter-jet project: Report&quot; title=&quot;Cyberspies breach US fighter-jet project: Report&quot; /&gt;Computer spies have repeatedly breached the Pentagon&#39;s costliest weapons program, the $300 billion Joint Strike Fighter project, &lt;i&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;The Wall Street Journal&lt;/i&gt; reported on Tuesday.&lt;/p&gt;&lt;p&gt;  The newspaper quoted current and former government officials familiar with the matter as saying the intruders were able to copy and siphon data related to design and electronics systems, making it potentially easier to defend against the plane.  &lt;/p&gt;&lt;p&gt;  The spies could not access the most sensitive material, which is kept on computers that are not connected to the internet, the paper added.  &lt;/p&gt;&lt;p&gt;  Citing people briefed on the matter, it said the intruders entered through vulnerabilities in the networks of two or three of the contractors involved in building the fighter jet.  &lt;/p&gt;&lt;p&gt;  Lockheed Martin is the lead contractor. Northrop Grumman and BAE Systems also have major roles in the project. Lockheed Martin and BAE declined comment and Northrop referred questions to Lockheed, the paper said.  &lt;/p&gt;&lt;p&gt;  The Journal said Pentagon officials declined to comment directly on the matter, but the paper said the US Air Force had begun an investigation.  &lt;/p&gt;&lt;p&gt;  The identity of the attackers and the amount of damage to the project could not be established, the paper said.  &lt;/p&gt;&lt;p&gt;  The Journal quoted former US officials as saying the attacks seemed to have originated in China, although it noted it was difficult to determine the origin because of the ease of hiding identities online.  &lt;/p&gt;&lt;p&gt;  The Chinese Embassy said China &quot;opposes and forbids all forms of cybercrimes&quot;, the Journal said.  &lt;/p&gt;&lt;p&gt;  The officials added there had also been breaches of the US Air Force&#39;s air-traffic control system in recent months.      &lt;p&gt;Story Copyright  2009 Reuters Limited. All rights reserved.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/1078140839802198785/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/1078140839802198785' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/1078140839802198785'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/1078140839802198785'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cyberspies-breach-us-fighter-jet_4610.html' title='Cyberspies breach US fighter-jet project: Report'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-149026929709569219</id><published>2009-04-23T03:51:00.007-07:00</published><updated>2009-04-23T03:51:03.982-07:00</updated><title type='text'>Cyberspies breach US fighter-jet project: Report</title><content type='html'>&lt;img src=&quot;http://tech.mate4date.com/wp-content/uploads/cyberspies-breach-us-fighterjet-project-report-0.gif&quot; alt=&quot;Cyberspies breach US fighter-jet project: Report&quot; title=&quot;Cyberspies breach US fighter-jet project: Report&quot; /&quot; alt=&quot;Cyberspies breach US fighter-jet project: Report&quot; title=&quot;Cyberspies breach US fighter-jet project: Report&quot; /&gt;Computer spies have repeatedly breached the Pentagon&#39;s costliest weapons program, the $300 billion Joint Strike Fighter project, &lt;i&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;The Wall Street Journal&lt;/i&gt; reported on Tuesday.&lt;/p&gt;&lt;p&gt;  The newspaper quoted current and former government officials familiar with the matter as saying the intruders were able to copy and siphon data related to design and electronics systems, making it potentially easier to defend against the plane.  &lt;/p&gt;&lt;p&gt;  The spies could not access the most sensitive material, which is kept on computers that are not connected to the internet, the paper added.  &lt;/p&gt;&lt;p&gt;  Citing people briefed on the matter, it said the intruders entered through vulnerabilities in the networks of two or three of the contractors involved in building the fighter jet.  &lt;/p&gt;&lt;p&gt;  Lockheed Martin is the lead contractor. Northrop Grumman and BAE Systems also have major roles in the project. Lockheed Martin and BAE declined comment and Northrop referred questions to Lockheed, the paper said.  &lt;/p&gt;&lt;p&gt;  The Journal said Pentagon officials declined to comment directly on the matter, but the paper said the US Air Force had begun an investigation.  &lt;/p&gt;&lt;p&gt;  The identity of the attackers and the amount of damage to the project could not be established, the paper said.  &lt;/p&gt;&lt;p&gt;  The Journal quoted former US officials as saying the attacks seemed to have originated in China, although it noted it was difficult to determine the origin because of the ease of hiding identities online.  &lt;/p&gt;&lt;p&gt;  The Chinese Embassy said China &quot;opposes and forbids all forms of cybercrimes&quot;, the Journal said.  &lt;/p&gt;&lt;p&gt;  The officials added there had also been breaches of the US Air Force&#39;s air-traffic control system in recent months.      &lt;p&gt;Story Copyright  2009 Reuters Limited. All rights reserved.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/149026929709569219/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/149026929709569219' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/149026929709569219'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/149026929709569219'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cyberspies-breach-us-fighter-jet_1841.html' title='Cyberspies breach US fighter-jet project: Report'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-8374471227007499104</id><published>2009-04-23T03:51:00.005-07:00</published><updated>2009-04-23T03:51:03.725-07:00</updated><title type='text'>Cyberspies breach US fighter-jet project: Report</title><content type='html'>&lt;img src=&quot;http://tech.mate4date.com/wp-content/uploads/cyberspies-breach-us-fighterjet-project-report-0.gif&quot; alt=&quot;Cyberspies breach US fighter-jet project: Report&quot; title=&quot;Cyberspies breach US fighter-jet project: Report&quot; /&quot; alt=&quot;Cyberspies breach US fighter-jet project: Report&quot; title=&quot;Cyberspies breach US fighter-jet project: Report&quot; /&gt;Computer spies have repeatedly breached the Pentagon&#39;s costliest weapons program, the $300 billion Joint Strike Fighter project, &lt;i&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;The Wall Street Journal&lt;/i&gt; reported on Tuesday.&lt;/p&gt;&lt;p&gt;  The newspaper quoted current and former government officials familiar with the matter as saying the intruders were able to copy and siphon data related to design and electronics systems, making it potentially easier to defend against the plane.  &lt;/p&gt;&lt;p&gt;  The spies could not access the most sensitive material, which is kept on computers that are not connected to the internet, the paper added.  &lt;/p&gt;&lt;p&gt;  Citing people briefed on the matter, it said the intruders entered through vulnerabilities in the networks of two or three of the contractors involved in building the fighter jet.  &lt;/p&gt;&lt;p&gt;  Lockheed Martin is the lead contractor. Northrop Grumman and BAE Systems also have major roles in the project. Lockheed Martin and BAE declined comment and Northrop referred questions to Lockheed, the paper said.  &lt;/p&gt;&lt;p&gt;  The Journal said Pentagon officials declined to comment directly on the matter, but the paper said the US Air Force had begun an investigation.  &lt;/p&gt;&lt;p&gt;  The identity of the attackers and the amount of damage to the project could not be established, the paper said.  &lt;/p&gt;&lt;p&gt;  The Journal quoted former US officials as saying the attacks seemed to have originated in China, although it noted it was difficult to determine the origin because of the ease of hiding identities online.  &lt;/p&gt;&lt;p&gt;  The Chinese Embassy said China &quot;opposes and forbids all forms of cybercrimes&quot;, the Journal said.  &lt;/p&gt;&lt;p&gt;  The officials added there had also been breaches of the US Air Force&#39;s air-traffic control system in recent months.      &lt;p&gt;Story Copyright  2009 Reuters Limited. All rights reserved.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/8374471227007499104/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/8374471227007499104' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/8374471227007499104'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/8374471227007499104'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cyberspies-breach-us-fighter-jet_6359.html' title='Cyberspies breach US fighter-jet project: Report'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-2625909258179865207</id><published>2009-04-23T03:51:00.003-07:00</published><updated>2009-04-23T03:51:03.462-07:00</updated><title type='text'>Cyberspies breach US fighter-jet project: Report</title><content type='html'>&lt;img src=&quot;http://tech.mate4date.com/wp-content/uploads/cyberspies-breach-us-fighterjet-project-report-0.gif&quot; alt=&quot;Cyberspies breach US fighter-jet project: Report&quot; title=&quot;Cyberspies breach US fighter-jet project: Report&quot; /&quot; alt=&quot;Cyberspies breach US fighter-jet project: Report&quot; title=&quot;Cyberspies breach US fighter-jet project: Report&quot; /&gt;Computer spies have repeatedly breached the Pentagon&#39;s costliest weapons program, the $300 billion Joint Strike Fighter project, &lt;i&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;The Wall Street Journal&lt;/i&gt; reported on Tuesday.&lt;/p&gt;&lt;p&gt;  The newspaper quoted current and former government officials familiar with the matter as saying the intruders were able to copy and siphon data related to design and electronics systems, making it potentially easier to defend against the plane.  &lt;/p&gt;&lt;p&gt;  The spies could not access the most sensitive material, which is kept on computers that are not connected to the internet, the paper added.  &lt;/p&gt;&lt;p&gt;  Citing people briefed on the matter, it said the intruders entered through vulnerabilities in the networks of two or three of the contractors involved in building the fighter jet.  &lt;/p&gt;&lt;p&gt;  Lockheed Martin is the lead contractor. Northrop Grumman and BAE Systems also have major roles in the project. Lockheed Martin and BAE declined comment and Northrop referred questions to Lockheed, the paper said.  &lt;/p&gt;&lt;p&gt;  The Journal said Pentagon officials declined to comment directly on the matter, but the paper said the US Air Force had begun an investigation.  &lt;/p&gt;&lt;p&gt;  The identity of the attackers and the amount of damage to the project could not be established, the paper said.  &lt;/p&gt;&lt;p&gt;  The Journal quoted former US officials as saying the attacks seemed to have originated in China, although it noted it was difficult to determine the origin because of the ease of hiding identities online.  &lt;/p&gt;&lt;p&gt;  The Chinese Embassy said China &quot;opposes and forbids all forms of cybercrimes&quot;, the Journal said.  &lt;/p&gt;&lt;p&gt;  The officials added there had also been breaches of the US Air Force&#39;s air-traffic control system in recent months.      &lt;p&gt;Story Copyright  2009 Reuters Limited. All rights reserved.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/2625909258179865207/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/2625909258179865207' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/2625909258179865207'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/2625909258179865207'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cyberspies-breach-us-fighter-jet_23.html' title='Cyberspies breach US fighter-jet project: Report'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-2645988015655729162</id><published>2009-04-23T03:51:00.001-07:00</published><updated>2009-04-23T03:51:01.812-07:00</updated><title type='text'>Cyberspies breach US fighter-jet project: Report</title><content type='html'>&lt;img src=&quot;http://tech.mate4date.com/wp-content/uploads/cyberspies-breach-us-fighterjet-project-report-0.gif&quot; alt=&quot;Cyberspies breach US fighter-jet project: Report&quot; title=&quot;Cyberspies breach US fighter-jet project: Report&quot; /&quot; alt=&quot;Cyberspies breach US fighter-jet project: Report&quot; title=&quot;Cyberspies breach US fighter-jet project: Report&quot; /&gt;Computer spies have repeatedly breached the Pentagon&#39;s costliest weapons program, the $300 billion Joint Strike Fighter project, &lt;i&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;The Wall Street Journal&lt;/i&gt; reported on Tuesday.&lt;/p&gt;&lt;p&gt;  The newspaper quoted current and former government officials familiar with the matter as saying the intruders were able to copy and siphon data related to design and electronics systems, making it potentially easier to defend against the plane.  &lt;/p&gt;&lt;p&gt;  The spies could not access the most sensitive material, which is kept on computers that are not connected to the internet, the paper added.  &lt;/p&gt;&lt;p&gt;  Citing people briefed on the matter, it said the intruders entered through vulnerabilities in the networks of two or three of the contractors involved in building the fighter jet.  &lt;/p&gt;&lt;p&gt;  Lockheed Martin is the lead contractor. Northrop Grumman and BAE Systems also have major roles in the project. Lockheed Martin and BAE declined comment and Northrop referred questions to Lockheed, the paper said.  &lt;/p&gt;&lt;p&gt;  The Journal said Pentagon officials declined to comment directly on the matter, but the paper said the US Air Force had begun an investigation.  &lt;/p&gt;&lt;p&gt;  The identity of the attackers and the amount of damage to the project could not be established, the paper said.  &lt;/p&gt;&lt;p&gt;  The Journal quoted former US officials as saying the attacks seemed to have originated in China, although it noted it was difficult to determine the origin because of the ease of hiding identities online.  &lt;/p&gt;&lt;p&gt;  The Chinese Embassy said China &quot;opposes and forbids all forms of cybercrimes&quot;, the Journal said.  &lt;/p&gt;&lt;p&gt;  The officials added there had also been breaches of the US Air Force&#39;s air-traffic control system in recent months.      &lt;p&gt;Story Copyright  2009 Reuters Limited. All rights reserved.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/2645988015655729162/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/2645988015655729162' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/2645988015655729162'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/2645988015655729162'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/cyberspies-breach-us-fighter-jet.html' title='Cyberspies breach US fighter-jet project: Report'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-5288427337058627807</id><published>2009-04-06T15:49:00.001-07:00</published><updated>2009-04-06T15:49:17.122-07:00</updated><title type='text'>More MOX</title><content type='html'>Areva has signed a contract to supply Mixed Oxide (MOX) fuel for Japan’s new Ohma nuclear power plant located in the Aomori prefecture and operated by the Japanese utility Electric Power Development.&lt;/P&gt;&lt;P&gt;MOX fuel is an alternative to low-enriched uranium (LEU) fuel used in the light water reactors that predominate nuclear power generation.&lt;/P&gt;&lt;P&gt;Under the terms of the contract, the fuel will be fabricated at Areva&#39;s Melox plant in southern France, using Japanese plutonium recovered from the treatment operations performed at Areva’s La Hague plant, thereby recycling it to be used in Japan as MOX fuel.&lt;/P&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;P&gt;The Ohma nuclear power plant is scheduled tostart operation in 2014.&lt;/P&gt;&lt;P&gt;The contract comes as part of Japan’s nuclear programme to recycle used fuel, and follows contracts Areva signed in 2006 and 2008 with Japanese utilities Chubu, Kyushu, Shikoku and Kansai. &lt;/P&gt;&lt;P&gt;With 1,426 tons produced to date, Melox plant is the world’s leading producer of MOX fuel.&lt;/P&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/5288427337058627807/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/5288427337058627807' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/5288427337058627807'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/5288427337058627807'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/more-mox.html' title='More MOX'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-218196089463837144</id><published>2009-04-04T15:59:00.003-07:00</published><updated>2009-04-04T15:59:31.552-07:00</updated><title type='text'>Wind fund</title><content type='html'>The British Wind Energy Association(BWEA) has built up a £3.2m industry fund thatit plans to use to develop advanced technologies designed to solve issues such as wind turbine interference with radar.&lt;/P&gt;&lt;P&gt;When rotating, wind turbine blades show up on radar displays, which is of concern to both military and civil radar operators. The so-called Aviation Investment Fund Company (AIFC) will look at how to solve the problem, having already identified a number of technologies likely to yield a solution.&lt;/P&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;P&gt;Maria McCaffery, chief executive of the BWEA, said: &#39;The aviation fund shows the wind industry&#39;s commitment to resolve aviation objections as a barrier to further wind-energy deployment. We have brought key parties to the table and have progressed negotiations from a memorandum of understanding in 2008, to the establishment of a fund management company to administer and oversee deployment of the funds raised.&#39;&lt;/P&gt;&lt;P&gt;The first companies to support the AIFC are Airtricity, Banks Developments, E.On Climate &amp; Renewables, EDF Energy Renewables, Ecotricity, Falck Renewables, Novera Energy, RES UK and Ireland, RWE Npower Renewables, ScottishPower Renewables, Vattenfall, West Coast Energy, Wind Prospect and Your Energy. &lt;/P&gt;&lt;P&gt;The BWEA hopes thatother companies with current or future potential wind farm aviation issues will also come on board in the future.&lt;/P&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/218196089463837144/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/218196089463837144' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/218196089463837144'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/218196089463837144'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/wind-fund_04.html' title='Wind fund'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-2528045619667682815</id><published>2009-04-04T15:59:00.001-07:00</published><updated>2009-04-04T15:59:29.910-07:00</updated><title type='text'>Wind fund</title><content type='html'>The British Wind Energy Association(BWEA) has built up a £3.2m industry fund thatit plans to use to develop advanced technologies designed to solve issues such as wind turbine interference with radar.&lt;/P&gt;&lt;P&gt;When rotating, wind turbine blades show up on radar displays, which is of concern to both military and civil radar operators. The so-called Aviation Investment Fund Company (AIFC) will look at how to solve the problem, having already identified a number of technologies likely to yield a solution.&lt;/P&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;P&gt;Maria McCaffery, chief executive of the BWEA, said: &#39;The aviation fund shows the wind industry&#39;s commitment to resolve aviation objections as a barrier to further wind-energy deployment. We have brought key parties to the table and have progressed negotiations from a memorandum of understanding in 2008, to the establishment of a fund management company to administer and oversee deployment of the funds raised.&#39;&lt;/P&gt;&lt;P&gt;The first companies to support the AIFC are Airtricity, Banks Developments, E.On Climate &amp; Renewables, EDF Energy Renewables, Ecotricity, Falck Renewables, Novera Energy, RES UK and Ireland, RWE Npower Renewables, ScottishPower Renewables, Vattenfall, West Coast Energy, Wind Prospect and Your Energy. &lt;/P&gt;&lt;P&gt;The BWEA hopes thatother companies with current or future potential wind farm aviation issues will also come on board in the future.&lt;/P&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/2528045619667682815/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/2528045619667682815' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/2528045619667682815'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/2528045619667682815'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/wind-fund.html' title='Wind fund'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-3865406697967103495</id><published>2009-04-03T14:59:00.021-07:00</published><updated>2009-04-03T14:59:37.632-07:00</updated><title type='text'>UK gets its own public game event &amp;#39;Game On! London&amp;#39; (Xbox 360)</title><content type='html'>&lt;p&gt;You might say that the UK is under-represented when it comes to public-access game events - shows where you can play previews of upcoming games and take part in multiplayer game tournaments. And pick up schwag.&lt;/p&gt;&lt;p&gt;The Germans get the yearly Game Convention, the Japanese Tokyo Game Show, the US the Penny Arcade Expo (regular punters still aren&#39;t allowed access to E3) but gamers in the UK - not much, except the successful, but PC-centric PC Gamer Showdown.&lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;This year that all changes with the HMV sponsored Game On! London. The event is being run by the UKeSA, a nascent organisation tasked with developing and growing professional and grass-roots competitive gaming.&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;http://static.gamesradar.com/images/mb/GamesRadar/us/Other/GameOn&quot; alt=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; title=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; /&quot; alt=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; title=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; /&gt;&lt;/p&gt;&lt;p&gt;Hosting 25,000 attendees, Game On! London will be held in the Olympia Exhibition Center between 20th and 21st June 2009 and will give gamers the chance to play early versions of unreleased games and spectate at the Dell XPS Premiership Season One Finals - comprised of UK eSport&#39;s most elite gaming teams.&lt;/p&gt;&lt;p&gt;The GamesRadar network will be representing at the show and we&#39;ll let you know as soon as tickets become available and how much it&#39;s going to cost to get in. Plus keep an eye out for ticket giveaways to our most loyal readers near the time.&lt;/p&gt;&lt;p&gt;Meanwhile, If you fancy taking part in the season two UKeSA leagues you can sign up atwww.enemydown.eu/content/ukesa2&lt;/p&gt;&lt;p&gt;Apr 2, 2009&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/3865406697967103495/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/3865406697967103495' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/3865406697967103495'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/3865406697967103495'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/uk-gets-its-own-public-game-event-on_9218.html' title='UK gets its own public game event &amp;#39;Game On! London&amp;#39; (Xbox 360)'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-8608136847441748811</id><published>2009-04-03T14:59:00.019-07:00</published><updated>2009-04-03T14:59:36.532-07:00</updated><title type='text'>UK gets its own public game event &amp;#39;Game On! London&amp;#39; (Xbox 360)</title><content type='html'>&lt;p&gt;You might say that the UK is under-represented when it comes to public-access game events - shows where you can play previews of upcoming games and take part in multiplayer game tournaments. And pick up schwag.&lt;/p&gt;&lt;p&gt;The Germans get the yearly Game Convention, the Japanese Tokyo Game Show, the US the Penny Arcade Expo (regular punters still aren&#39;t allowed access to E3) but gamers in the UK - not much, except the successful, but PC-centric PC Gamer Showdown.&lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;This year that all changes with the HMV sponsored Game On! London. The event is being run by the UKeSA, a nascent organisation tasked with developing and growing professional and grass-roots competitive gaming.&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;http://static.gamesradar.com/images/mb/GamesRadar/us/Other/GameOn&quot; alt=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; title=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; /&quot; alt=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; title=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; /&gt;&lt;/p&gt;&lt;p&gt;Hosting 25,000 attendees, Game On! London will be held in the Olympia Exhibition Center between 20th and 21st June 2009 and will give gamers the chance to play early versions of unreleased games and spectate at the Dell XPS Premiership Season One Finals - comprised of UK eSport&#39;s most elite gaming teams.&lt;/p&gt;&lt;p&gt;The GamesRadar network will be representing at the show and we&#39;ll let you know as soon as tickets become available and how much it&#39;s going to cost to get in. Plus keep an eye out for ticket giveaways to our most loyal readers near the time.&lt;/p&gt;&lt;p&gt;Meanwhile, If you fancy taking part in the season two UKeSA leagues you can sign up atwww.enemydown.eu/content/ukesa2&lt;/p&gt;&lt;p&gt;Apr 2, 2009&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/8608136847441748811/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/8608136847441748811' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/8608136847441748811'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/8608136847441748811'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/uk-gets-its-own-public-game-event-on_3734.html' title='UK gets its own public game event &amp;#39;Game On! London&amp;#39; (Xbox 360)'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-6551860705717947538</id><published>2009-04-03T14:59:00.017-07:00</published><updated>2009-04-03T14:59:35.931-07:00</updated><title type='text'>UK gets its own public game event &amp;#39;Game On! London&amp;#39; (Xbox 360)</title><content type='html'>&lt;p&gt;You might say that the UK is under-represented when it comes to public-access game events - shows where you can play previews of upcoming games and take part in multiplayer game tournaments. And pick up schwag.&lt;/p&gt;&lt;p&gt;The Germans get the yearly Game Convention, the Japanese Tokyo Game Show, the US the Penny Arcade Expo (regular punters still aren&#39;t allowed access to E3) but gamers in the UK - not much, except the successful, but PC-centric PC Gamer Showdown.&lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;This year that all changes with the HMV sponsored Game On! London. The event is being run by the UKeSA, a nascent organisation tasked with developing and growing professional and grass-roots competitive gaming.&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;http://static.gamesradar.com/images/mb/GamesRadar/us/Other/GameOn&quot; alt=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; title=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; /&quot; alt=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; title=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; /&gt;&lt;/p&gt;&lt;p&gt;Hosting 25,000 attendees, Game On! London will be held in the Olympia Exhibition Center between 20th and 21st June 2009 and will give gamers the chance to play early versions of unreleased games and spectate at the Dell XPS Premiership Season One Finals - comprised of UK eSport&#39;s most elite gaming teams.&lt;/p&gt;&lt;p&gt;The GamesRadar network will be representing at the show and we&#39;ll let you know as soon as tickets become available and how much it&#39;s going to cost to get in. Plus keep an eye out for ticket giveaways to our most loyal readers near the time.&lt;/p&gt;&lt;p&gt;Meanwhile, If you fancy taking part in the season two UKeSA leagues you can sign up atwww.enemydown.eu/content/ukesa2&lt;/p&gt;&lt;p&gt;Apr 2, 2009&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/6551860705717947538/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/6551860705717947538' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6551860705717947538'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6551860705717947538'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/uk-gets-its-own-public-game-event-on_6800.html' title='UK gets its own public game event &amp;#39;Game On! London&amp;#39; (Xbox 360)'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-6695655653837912510</id><published>2009-04-03T14:59:00.015-07:00</published><updated>2009-04-03T14:59:35.517-07:00</updated><title type='text'>Verizon promises 4G wireless for rural America</title><content type='html'>LAS VEGAS--The new 4G wireless broadband network that Verizon Wireless plans to launch in 2010 could be rural America&#39;s answer to its broadband access prayers. But extending the network to every nook and cranny in the U.S. will likely take years.  &lt;/p&gt;&lt;p&gt;   Tony Melone, senior vice president and chief technology officer for Verizon Wireless, said during an interview at the CTIA Wireless 2009 tradeshow here Wednesday that the new 4G network that the company is building will blanket the entire continental United States, including the far corners of rural America.  &lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;   &quot;The licenses we bought in the 700MHz auction cover the whole U.S.,&quot; Melone said. &quot;And we plan to roll out LTE throughout the entire country, including places where we don&#39;t offer our CDMA cell phone service today.&quot;  &lt;/p&gt;&lt;p&gt;See also:  &lt;/p&gt;&lt;p&gt;CTIA Special Report&lt;/p&gt;&lt;p&gt;  If Verizon makes good on this promise, it will be helping to bridge a widening gap between broadband haves and have-nots in this country. While Verizon Wireless&#39; parent company Verizon Communications and other broadband providers have concentrated on building wireline broadband infrastructure in densely populated areas, such as cities and sprawling suburbs, they have not done a good job of extending that infrastructure to rural America.  &lt;/p&gt;&lt;p&gt;   The problem has been that building infrastructure for land-based broadband networks is expensive. And companies, such as AT&amp;T, Verizon and Comcast say they can&#39;t make profits by offering service in sparsely populated regions because the cost to build these networks is too high and the number of potential customers is too few. And even though the federal government has provided some $1.2 billion in loans aimed at helping operators in the private sector build broadband networks in remote areas, the money hasn&#39;t been stretched to reach every community.  &lt;/p&gt;&lt;p&gt;   While broadband penetration has increased in rural areas over recent years, it&#39;s still not nearly at the same level as more densely populated regions. Only about 38 percent of rural American households have access to high-speed Internet connections, according to a study published by Pew Internet &amp; American Life Project in July. This compares with about 57 percent of city dwellers who have access to broadband and 60 percent of people living in suburbs.  &lt;/p&gt;&lt;p&gt;   The result has been small towns and communities throughout the country that still have no access to high-speed Internet services. These communities have been stuck in dial-up limbo, waiting for the 21st century technology revolution to reach them. It&#39;s made it harder for businesses to grow and compete in the increasingly connected and tech savvy market. It&#39;s meant that workers have had a harder time finding jobs. And it&#39;s left an entire population less connected to important news and information that is increasingly found online.  &lt;/p&gt;&lt;p&gt;   Melone said that the spectrum Verizon acquired in last year&#39;s Federal Communications Commission&#39;s auction is ideally suited to help solve this problem. The spectrum that is being used to build the new network is in the 700 MHz band. Up until now, it has been used to broadcast analog TV.  &lt;/p&gt;&lt;p&gt;   Because the spectrum is in a lower frequency, it can transmit signals over longer distances and penetrate through obstacles. And because the signals travel longer distances, Verizon can deploy fewer cell towers than if it used spectrum from a higher frequency band, which means it can provide coverage at a lower cost.  &lt;/p&gt;&lt;p&gt;   Even though Verizon is primarily building the 4G wireless network to provide faster service for mobile devices, Melone said the network could also be used to provide fixed broadband access to rural homes.  &lt;/p&gt;&lt;p&gt;   &quot;I can&#39;t pre-announce any products or services,&quot; he said. &quot;But I can envision offering devices that are geared toward putting wireless broadband in the home. And then people could use Wi-Fi to share the connection with multiple devices like they do today with router connected to their DSL or cable modem service.&quot;  &lt;/p&gt;&lt;p&gt;   President Obama&#39;s administration is well aware of the high-speed Internet divide that exists today, and he has vowed to do something about it. As part of the overall economic stimulus package passed by Congress, the government is allocating $7.2 billion for projects that bring broadband Internet access to rural towns and communities.  &lt;/p&gt;&lt;p&gt;   Melone said it&#39;s too early to say if Verizon will request money from the government as part of the package to fund building its network in rural communities. But he said that with or without government money, Verizon is committed to providing service in rural areas via its 4G network.  &lt;/p&gt;&lt;p&gt;   &quot;At this point we haven&#39;t made any attempt to get stimulus money for the LTE build-out,&quot; he said. &quot;But it&#39;s still early in that process and there&#39;s not enough clarity around the stimulus package. We don&#39;t know what strings will be attached to that money. Regardless, we plan to blanket the country over a period of time with 4G. We bought the licenses to cover the entire continental U.S., and we plan on building the network where ever we have a license.&quot;  &lt;/p&gt;&lt;p&gt;   Still, rural Americans may have to wait years before Verizon&#39;s 4G network comes to them. Dick Lynch, CTO for Verizon Communications, said in February during an interview that the 4G network deployment would likely follow the plan used to build Verizon&#39;s 3G network. Under that plan, Verizon started with large metropolitan areas and filled out coverage from there. Verizon has said it plans to reach 20 to 30 markets by the end of 2010. And it will continue to add more coverage steadily after that, Melone said.  &lt;/p&gt;&lt;p&gt;&lt;i&gt;This article was originally published on CNET News.com.&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/6695655653837912510/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/6695655653837912510' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6695655653837912510'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6695655653837912510'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/verizon-promises-4g-wireless-for-rural_4513.html' title='Verizon promises 4G wireless for rural America'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-6357553914806840178</id><published>2009-04-03T14:59:00.013-07:00</published><updated>2009-04-03T14:59:34.706-07:00</updated><title type='text'>UK gets its own public game event &amp;#39;Game On! London&amp;#39; (Xbox 360)</title><content type='html'>&lt;p&gt;You might say that the UK is under-represented when it comes to public-access game events - shows where you can play previews of upcoming games and take part in multiplayer game tournaments. And pick up schwag.&lt;/p&gt;&lt;p&gt;The Germans get the yearly Game Convention, the Japanese Tokyo Game Show, the US the Penny Arcade Expo (regular punters still aren&#39;t allowed access to E3) but gamers in the UK - not much, except the successful, but PC-centric PC Gamer Showdown.&lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;This year that all changes with the HMV sponsored Game On! London. The event is being run by the UKeSA, a nascent organisation tasked with developing and growing professional and grass-roots competitive gaming.&lt;/p&gt;&lt;p&gt;&lt;img src=&quot;http://static.gamesradar.com/images/mb/GamesRadar/us/Other/GameOn&quot; alt=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; title=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; /&quot; alt=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; title=&quot;UK gets its own public game event &#39;Game On! London&#39; (Xbox 360)&quot; /&gt;&lt;/p&gt;&lt;p&gt;Hosting 25,000 attendees, Game On! London will be held in the Olympia Exhibition Center between 20th and 21st June 2009 and will give gamers the chance to play early versions of unreleased games and spectate at the Dell XPS Premiership Season One Finals - comprised of UK eSport&#39;s most elite gaming teams.&lt;/p&gt;&lt;p&gt;The GamesRadar network will be representing at the show and we&#39;ll let you know as soon as tickets become available and how much it&#39;s going to cost to get in. Plus keep an eye out for ticket giveaways to our most loyal readers near the time.&lt;/p&gt;&lt;p&gt;Meanwhile, If you fancy taking part in the season two UKeSA leagues you can sign up atwww.enemydown.eu/content/ukesa2&lt;/p&gt;&lt;p&gt;Apr 2, 2009&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/6357553914806840178/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/6357553914806840178' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6357553914806840178'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/6357553914806840178'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/uk-gets-its-own-public-game-event-on_64.html' title='UK gets its own public game event &amp;#39;Game On! London&amp;#39; (Xbox 360)'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-648076231715483572.post-4437145956680520080</id><published>2009-04-03T14:59:00.011-07:00</published><updated>2009-04-03T14:59:34.560-07:00</updated><title type='text'>Verizon promises 4G wireless for rural America</title><content type='html'>LAS VEGAS--The new 4G wireless broadband network that Verizon Wireless plans to launch in 2010 could be rural America&#39;s answer to its broadband access prayers. But extending the network to every nook and cranny in the U.S. will likely take years.  &lt;/p&gt;&lt;p&gt;   Tony Melone, senior vice president and chief technology officer for Verizon Wireless, said during an interview at the CTIA Wireless 2009 tradeshow here Wednesday that the new 4G network that the company is building will blanket the entire continental United States, including the far corners of rural America.  &lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;   &quot;The licenses we bought in the 700MHz auction cover the whole U.S.,&quot; Melone said. &quot;And we plan to roll out LTE throughout the entire country, including places where we don&#39;t offer our CDMA cell phone service today.&quot;  &lt;/p&gt;&lt;p&gt;See also:  &lt;/p&gt;&lt;p&gt;CTIA Special Report&lt;/p&gt;&lt;p&gt;  If Verizon makes good on this promise, it will be helping to bridge a widening gap between broadband haves and have-nots in this country. While Verizon Wireless&#39; parent company Verizon Communications and other broadband providers have concentrated on building wireline broadband infrastructure in densely populated areas, such as cities and sprawling suburbs, they have not done a good job of extending that infrastructure to rural America.  &lt;/p&gt;&lt;p&gt;   The problem has been that building infrastructure for land-based broadband networks is expensive. And companies, such as AT&amp;T, Verizon and Comcast say they can&#39;t make profits by offering service in sparsely populated regions because the cost to build these networks is too high and the number of potential customers is too few. And even though the federal government has provided some $1.2 billion in loans aimed at helping operators in the private sector build broadband networks in remote areas, the money hasn&#39;t been stretched to reach every community.  &lt;/p&gt;&lt;p&gt;   While broadband penetration has increased in rural areas over recent years, it&#39;s still not nearly at the same level as more densely populated regions. Only about 38 percent of rural American households have access to high-speed Internet connections, according to a study published by Pew Internet &amp; American Life Project in July. This compares with about 57 percent of city dwellers who have access to broadband and 60 percent of people living in suburbs.  &lt;/p&gt;&lt;p&gt;   The result has been small towns and communities throughout the country that still have no access to high-speed Internet services. These communities have been stuck in dial-up limbo, waiting for the 21st century technology revolution to reach them. It&#39;s made it harder for businesses to grow and compete in the increasingly connected and tech savvy market. It&#39;s meant that workers have had a harder time finding jobs. And it&#39;s left an entire population less connected to important news and information that is increasingly found online.  &lt;/p&gt;&lt;p&gt;   Melone said that the spectrum Verizon acquired in last year&#39;s Federal Communications Commission&#39;s auction is ideally suited to help solve this problem. The spectrum that is being used to build the new network is in the 700 MHz band. Up until now, it has been used to broadcast analog TV.  &lt;/p&gt;&lt;p&gt;   Because the spectrum is in a lower frequency, it can transmit signals over longer distances and penetrate through obstacles. And because the signals travel longer distances, Verizon can deploy fewer cell towers than if it used spectrum from a higher frequency band, which means it can provide coverage at a lower cost.  &lt;/p&gt;&lt;p&gt;   Even though Verizon is primarily building the 4G wireless network to provide faster service for mobile devices, Melone said the network could also be used to provide fixed broadband access to rural homes.  &lt;/p&gt;&lt;p&gt;   &quot;I can&#39;t pre-announce any products or services,&quot; he said. &quot;But I can envision offering devices that are geared toward putting wireless broadband in the home. And then people could use Wi-Fi to share the connection with multiple devices like they do today with router connected to their DSL or cable modem service.&quot;  &lt;/p&gt;&lt;p&gt;   President Obama&#39;s administration is well aware of the high-speed Internet divide that exists today, and he has vowed to do something about it. As part of the overall economic stimulus package passed by Congress, the government is allocating $7.2 billion for projects that bring broadband Internet access to rural towns and communities.  &lt;/p&gt;&lt;p&gt;   Melone said it&#39;s too early to say if Verizon will request money from the government as part of the package to fund building its network in rural communities. But he said that with or without government money, Verizon is committed to providing service in rural areas via its 4G network.  &lt;/p&gt;&lt;p&gt;   &quot;At this point we haven&#39;t made any attempt to get stimulus money for the LTE build-out,&quot; he said. &quot;But it&#39;s still early in that process and there&#39;s not enough clarity around the stimulus package. We don&#39;t know what strings will be attached to that money. Regardless, we plan to blanket the country over a period of time with 4G. We bought the licenses to cover the entire continental U.S., and we plan on building the network where ever we have a license.&quot;  &lt;/p&gt;&lt;p&gt;   Still, rural Americans may have to wait years before Verizon&#39;s 4G network comes to them. Dick Lynch, CTO for Verizon Communications, said in February during an interview that the 4G network deployment would likely follow the plan used to build Verizon&#39;s 3G network. Under that plan, Verizon started with large metropolitan areas and filled out coverage from there. Verizon has said it plans to reach 20 to 30 markets by the end of 2010. And it will continue to add more coverage steadily after that, Melone said.  &lt;/p&gt;&lt;p&gt;&lt;i&gt;This article was originally published on CNET News.com.&lt;/i&gt;</content><link rel='replies' type='application/atom+xml' href='http://softroom-news.blogspot.com/feeds/4437145956680520080/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/648076231715483572/4437145956680520080' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/4437145956680520080'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/648076231715483572/posts/default/4437145956680520080'/><link rel='alternate' type='text/html' href='http://softroom-news.blogspot.com/2009/04/verizon-promises-4g-wireless-for-rural_2261.html' title='Verizon promises 4G wireless for rural America'/><author><name>Engeneer Moris</name><uri>http://www.blogger.com/profile/08845055206236768007</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaItKBUdoH6zlx9p85PS2vuaLvVlO01S3uBdjKA8ZwLeBzmTMFoY6SmcokOIf3wOQlzSUmfoSAq_jLu-OOL-GGHRzrA0iv1hLnn7Ny2kEr7e_ogwjNPVERVh8NnouAWXc/s220/images.jpeg'/></author><thr:total>0</thr:total></entry></feed>