Oracle CEO Larry Ellison Views on Issues

Oracle CEO Larry Ellison Views on Issues (http://www.cbsnews.com)

Technology News (from CBS News)

Larry Ellison, America’s third richest man and the CEO of tech giant Oracle, took aim at Google in a wide-ranging interview with Charlie Rose, calling out Google CEO Larry Page “specifically” for overseeing Google’s decision to “take our Oracle’s stuff.”

Oracle produces a widely-used database that operates web systems from online banking platforms to airline reservation systems. The company is currently locked in a legal battle with Google, and Ellison maintains that the online search giant used Oracle programming language without permission.

“We don’t compete with Google. We don’t do anything Google does. We just think they took our stuff and that was wrong. That’s a completely separate issue … I think what they did was — was– absolutely evil,” Ellison told Rose.

(Continue reading at http://www.cbsnews.com)

My Two Cents: I would have to agree with Larry Ellison, Evil are people that copy code and claim they wrote it themselves. We write the coding systems that creates code. Our customers demand systems that do not exist, so we have to create coding systems to code what they request. If someone was to steal that, they should go to jail, and to hell. It seems these days in the news a lot of people want to copy, or take the easy way out and cheat, while we the engineers create and protect our IP from these types of people, corporations and governments.

The Dangers of Allowing an Adversary Access to a Network

The Dangers of Allowing an Adversary Access to a Network (http://bits.blogs.nytimes.com)

03/14/2013 – Cyber Security

Schoolchildren learn the tale of the Trojan Horse, the giant gift in which Odysseus and a platoon of 30 Greek soldiers hid to gain access to the heavily defended city.

Thousands of years later, it remains a thoroughly modern concept that is increasingly found at the heart of cyberwarfare strategies. Modern Trojan horses are computer code or vulnerabilities hidden in software or hardware that would allow a spy or an attacker to gain access to an adversary’s computers and networks. Find a way to be invited into the computers of your enemy’s weapons and military systems and you can render them useless in the face of an attack.

For more than a decade, Pentagon officials have been anxious about the growing reliance by the United States electronics industry on Chinese manufacturers. As the Internet has become the nation’s critical infrastructure weaving together commerce and power systems and even military command and control, it has become increasingly unthinkable to have a foreign presence in the network. Their fear is that those building and maintaining the network could build in a Trojan horse.

(Continue reading at http://bits.blogs.nytimes.com)

My Two Cents: This is a very informative article on Modern Trojan horses! Spy systems are very bad, and my fear is even when you purchase a new firewall or any other network device, it has already been compromised before it was placed in the box and shipped to you!

USGS Helps Debut New Technology to Improve Access and Use of Earth Science Data

USGS Helps Debut New Technology to Improve Access and Use of Earth Science Data (http://www.usgs.gov)

Researchers investigating global issues now have an easy method for finding and using earth science data through a new technology developed by the Data Observation Network for Earth, or DataONE.
Understanding broad and complex environmental issues, for example climate change, increasingly relies on the discovery and analysis of massive datasets. But the amount of collected data — from historical field notes to real-time satellite data —means that researchers are now faced with an onslaught of options to locate and integrate information relevant to the issue at hand.

DataONE, a ten-institution team with several hundred Investigators, including researchers from the United States Geological Survey (USGS), is addressing this data dilemma with a number of cyberinfrastructure and educational tools to allow long-term access and usage of earth science data and information. The recently released ONESearch tool queries data centers located around the world for relevant earth science information and provides integrated access to science metadata and corresponding datasets. (Continue reading at http://www.usgs.gov)

My Two Cents: This Technology..DataONE will ensure the preservation, access, use and reuse of multi-scale, multi-discipline, and multi-national science data via three principle cyberinfrastucture elements and a broad education and outreach program. Now we are talking!

Technology and Energy Sectors Continue to Lead

Technology and Energy Sectors Continue to Lead U.S. Commercial Real Estate Market Says Jones Lang LaSalle (www.marketwatch.com)

The West Coast technology and energy firms continued to lead the U.S. office recovery in the second quarter of 2012. In addition, while net absorption inventory levels entered into the ninth consecutive quarter of occupancy growth, they are still behind 2011 levels, according to Jones Lang LaSalle’s Second-Quarter 2012 Office Highlights Report.

“Outside of the technology and energy markets, we’re not seeing many segments demonstrating growth”
(Continue reading at www.marketwatch.com)

My Two Cents: I would have to agree with this story. We here at Adept Technologies Inc. have experienced a good managed growth rate over the last 10 years. This year 2012 we are expected to have a 19 – 22% growth rate by the 4th quarter, thus the reason we have expanded the New York City Office and data centers. Our Energy Corporations are expanding too.

Google knows too much about you

Google knows too much about you (www.cnn.com)

If you use Google, It has every e-mail you ever sent or received on Gmail. It has every search you ever made, the contents of every chat you ever had over Google Talk. Google holds a record of every telephone conversation you had using Google Voice, it knows every Google Alert you’ve set up. It has your Google Calendar with all content going back as far as you’ve used it, including everything you’ve done every day since then. It knows your contact list with all the information you may have included about yourself and the people you know. It has your pictures, your news page configuration, indicating what topics you’re most interested in. And so on.
If you ever used Google while logged in to your account to search for a person, a symptom, a medical side effect, a political idea; if you ever gossiped using one of Google’s services, all of this is on Google’s servers. And thanks to the magic of Google’s algorithms, it is easy to sift through the information because Google search works like a charm. Google can even track searches on your computer when you’re not logged in for up to six months. (Continue reading at www.cnn.com)

My Two Cents: Yes, Google tracks you and stores your information. People tend to forget that Google is not a personal private service that for free allows you all these services. The masses have value in search trends and information, Google leverages this value. You have the option NOT to use their services, or if you don’t care about your privacy use their services. I personally use these services as public domain, if I don’t want the world to know what color of underwear I have on, I will not use google services or facebook about this personal information. I am sure Google knows what the most common and uncommon underwear color is used along with other personal data that really should not be known. So remember Google is Public, Facebook is Public!!