Asus a52f Battery

Others talk of unified data protection. Fujitsu, for example, uses Simpana software in its Eternus CS turnkey backup and archiving appliances.But Lock warns that information management and archiving is still not simple. “It needs some form of data classification upfront. It needs a fresh look, which is difficult for IT to do. You need to ask, could the business get more use out of its data?” he says.“It turns what is normally a cost into business value, plus there's the possibility of actually saving money, for example if you can reduce the amount of primary storage you need to buy.”And of course that content store itself will need protection, perhaps via replication. It could even be stored on tape, which shows no sign of dying off.It remains the most cost-effective deep storage technology for the likes of media archives or static archives, especially in the form of robotic libraries such as Spectra Logic's giant Tfinity. This can scale to more than 400,000 tapes and several exabytes in capacity.

Lastly, while the need to back up and deduplicate virtual servers gets a lot of attention, much of the most valuable and at-risk data in any organisation is out at the edge. So when re-thinking enterprise backup, we also need to approach it from the opposite direction.Backup has traditionally tended to take a system-oriented approach, albeit with the ability to retrieve individual files, perhaps via a self-service mechanism for end-users. This will still be required in the data centre, but in the wider enterprise the key point is increasingly the profile of the user and the files associated with that user.This Dropbox-like approach treats users as the key element, using the metadata in the content store to track what they require to do their job.Whatever platform you use, whether it be a laptop, a smartphone or some web-based service running in the cloud, the files and resources you need are the same. You do not need a dead PC completely restored as it was, you simply need access to your files plus the applications to open them with.

HP got on the phone with The Register on Wednesday to shed light on how it plans to roll out PCs with Windows 10 preinstalled. The IT giant said you can expect at least some of its hardware to be available with the new OS on the day that it launches – July 29.There's been some confusion on the matter. Earlier this week, HP issued a press release that indicated it didn't expect its existing offerings to start shipping with the new OS preinstalled until "mid-August into October."On Wednesday, Mike Nash, product strategy veep for HP Personal Systems, explained that this delay would only apply to HP's offerings for businesses, and that there's really no mystery behind it."It's more the way that channel works," Nash said. "With the retail channel, you just walk into a store. It's just not the same way that enterprise PCs get bought."Mind you, you still won't be able to walk into a retail store on July 29 and pick up an HP laptop with Windows 10, but Nash said you should give it just a couple of days. Select retailers should have the hardware in-store beginning on August 2, he said.

If you can't wait that long, he added, the answer is to preorder devices from HP's website. According to Nash, any Windows 10 PC that you preorder direct from HP today will be on your doorstep on July 29 – at least in the US – and HP will even pick up the cost of shipping.Orders shipped to other markets might take longer to arrive, but not by much, Nash said.Naturally, this initial push only applies to select HP products. The Palo Alto firm is currently only offering HP15, Envy x360, and Spectre x360 laptops in four different Windows 10 configurations, and HP Pavilion 550 and HP All-in-One desktops in three different configurations. More models will come later.But the point Nash most wanted to stress was that it shouldn't really matter whether you can buy a Windows 10 PC on the day the OS ships or a few days later."No one should go crazy over three days," he said. "People buy PCs for years. We want to make sure we get them the right PC."When asked whether Microsoft's release schedule for Windows 10 wasn't cutting it a little close for OEMs like HP, however, Nash agreed that HP had to do things a bit differently this time.

"There is no question, this is the fastest we've ever had," Nash told El Reg. "In some sense, having an embargo date this early has changed the overall approach. What made it possible, honestly, is the great communication and the great co-engineering [with Microsoft] that got us bits constantly throughout the spring."‪Hacking Team RCS spyware came pre-loaded with an UEFI (‬Unified Extensible Firmware Interface) ‪BIOS rootkit to hide itself on infected systems, it has emerged following the recent hacking of the controversial surveillance firm.‬The stealth infection tactic, which has been revealed through leaked emails arising from last week's hack, meant that the Remote Control System (RCS) agent stayed on compromised machines even if users formatted their drives - or even swapped disks. Although designed primarily for the Insyde BIOS (a popular laptop BIOS) it might also work on AMI BIOS as well, according to security firm Trend Micro.A PowerPoint from the leaked Hacking Team emails implies that initial infection seems to require physical access to targeted systems. Other techniques may be possible, according to Trend Micro, based on a preliminary analysis of the leaked presentation as well as an examination of a help tool for the users of ‪Hacking Team‬'s BIOS rootkit and other leaked data.

"A Hacking Team slideshow presentation claims that successful infection requires physical access to the target system; however, we can’t rule out the possibility of remote installation," writes Philippe Lin, a senior engineer at Trend Micro. "An example attack scenario would be: The intruder gets access to the target computer, reboots into UEFI shell, dumps the BIOS, installs the BIOS rootkit, re-flashes the BIOS, and then reboots the target system."Various precautions to guard against this sort of attack are possible including enabling UEFI SecureFlash, updating the BIOS whenever there is a security patch and setting up a BIOS or UEFI password, As Trend Micro explains.PC and server motherboard firmware is a particularly attractive target for hackers of various stripes because low-level p0wnage gives both persistence and stealth, as evidenced by the particulars of Hacking Team's offensive surveillance software planting tactics.Security researchers at Trend and elsewhere have taken a particular interest in UEFI attacks over recent months. For example last month Trend spotlighted work by independent researcher Pedro Vilaca on how UEFI attacks against Mac systems might be possible. Windows systems have long been known to be potentially vulnerable to UEFI-based attacks.Separately, security researchers Xeno Kovah and Corey Kallenberg recently warned that the poor state of low-level software security is among the easiest ways for hackers to deeply infiltrate organisations.

On-Call Jim Thompson got in touch with The Register about the mother of all On-Call stories, recalling the time he received a message asking him to come back to New Orleans because a storm called “Hurricane Katrina” was on its way and looked bad.It's nearly 10 years since Katrina raged, so Jim kindly retrieved his jottings on the storm from his now-defunct LiveJournal blog. It's a long piece, but a richly rewarding read. You'll learn about extreme disaster recovery, what sex is like during a disaster, what not to take with you in an evacuation ... and much, much more.On Friday, 26 August 2005, I boarded a flight from New Orleans to Boise, Idaho. I had a job interview the following day. Hurricane Katrina was supposed to hit the Florida pan-handle sometime over the weekend.On Saturday morning I was getting ready for my interview when I received a phone call from one of the officers of the company I worked for at the time. He asked me if I'd seen the weather channel recently and suggested that I “do whatever it is you do in this situation”.

After 30 seconds of watching the weather channel I turned on my laptop and VPN'd into the office. I executed a single shell script and logged off.I was the only sysadmin working for this company and that was one of the reasons I was going to quit.I tried calling the only other technical person that lived near the office, an officer of the company, let's call him Henry, with a sharp technical mind. No answer.I called the airline to arrange a flight back to New Orleans. $1,700 later I had a one-way first class ticket to New Orleans with two layovers. If everything went according to plan I'd be home around 20:00 Central time.I called my contact for the interview and told him I needed to cancel as I had some DR work to do back home. He offered to drive me to the airport and we did the interview on the drive over. He offered me the job on the spot. I told him I'd be in touch on Monday.

In 2004 Hurricane Ivan scared the hell out of me professionally. I evacuated for Ivan and spent my whole time in Memphis terrified because I had no DR.After I came back I spent quite a bit of time trying to get a DR plan together and funded. It didn't work out. I did manage to work out a deal with a buddy of mine in Arizona where I got the company to pay for a DSL line at his house and let me send him a couple of servers.I never gave this the attention it deserved, all I had running out of the remote location were secondary DNS and mail services. I also had some scripts to push what I thought were critical data on a daily/weekly basis. I'd never really thought it all the way through but it was better than what we had for Ivan.I land in New Orleans at 19:30 on Saturday, 27 August. Still no word from Henry and when I try to call there's no answer. Our office was in the Central Business District, about a mile from Bourbon Street. Traffic was usually a nightmare from the airport into the CBD on Saturday nights.On this night, the streets were deserted, which was just as well since the highway into New Orleans had already been switched to contraflow in anticipation of the evacuation.

When I got to the office I swapped tapes and started another backup, checked the rsync to my remote location and started looking at what I was not pushing to the remote location.I finally left the office at 22:30 with a stack of tapes and headed home. It took me an hour to pack up and get out of my apartment. I took clothes, guns, computers, my paper files, and, oddly, my bedding.My friends tell the story of me evacuating with my bedding to this day. I don't know why, but I couldn't tolerate the thought of my duvet cover being defiled by looters.Sunday, 28 August: Me, lots of Feds and my guns I had reservations at a Marriott hotel in Memphis. What was normally a six-hour drive took all night. I arrived at 10:30 on Sunday morning. My room was not available since the hotel was full of Federal Emergency Management Agency (FEMA) workers staging for the hurricane.I spent three hours sitting in the lobby with a luggage cart full of guns and computers. I was still in the south so I figured no one would care about the guns, but with all the Feds around I was just a little paranoid.By the time I got checked into my room I had been up for twenty-seven hours. An hour later and I had my computers set up and I was still poking around the computers at the office finding new important files to transfer to my remote site.

I was in communication with the CEO but still hadn't heard from Henry. With nothing more to do I went to sleep at 17:00 Sunday.By the time I woke up on Monday morning my VPN connection to the office was gone. I poked around the remote site and mail had been queuing there for a couple of hours. My rsync had not completed but I had what I thought were the important pieces of data. But still, I wasn't sure. That would continue to gnaw at me.I spent all of Monday watching the news and answering the same questions from the CEO ('No, I hadn't heard from Henry. Yes, I have backups. I have no idea when you'll be able to check mail again').At 17:00 Monday evening I told the CEO that we needed to start planning to shift data centre operations to Texas. He told me to sit tight in Memphis and that he was sure I'd be able to head back to New Orleans in a day or two.I bought a new cellphone since mine was not accepting inbound calls. I had the 800 number shifted over to the CEO's cellphone at his request.I started looking for a mail provider with webmail so our people could start working again.