UCI Hires Expert on Computer Software

UC Irvine announced Monday that it has hired a nationally prominent computer software specialist, Leon J. Osterweil, effective Friday.

“I feel the appointment of Dr. Osterweil places UCI at the forefront of research and development in large-scale computer software,” said John King, chair of information and computer science at UCI.

Osterweil is nationally known for his research and inventions in the computer software field. He invented “process programming,” a software development technique, and also has specialized in static analysis, software environments and software tools, according to a UCI spokeswoman Cynthia Morris.

He said he looks forward to moving to UCI because of the campus’s close work with industry.

“I think UCI, which already has one of the best software engineering programs anywhere, is in a unique position to lead the world in software development,” Osterweil said. “There’s a lot of interaction between the industrial and academic communities in Orange County, and I’d like to help foster even more joint ventures between our software engineers and those in local industry.”

Osterweil has been a faculty member in the department of computer science at the University of Colorado since 1971. He served as chair of the department from 1981 to 1986. He has also served as consultant to several high-tech firms, including TRW in Redondo Beach.

Osterweil has been affiliated with researchers at UCI since 1984 through a four-university research consortium named Arcadia. He received his bachelor’s degree in mathematics from Princeton University and his master’s and doctoral degrees in mathematics from the University of Maryland.

Password Management Software A Detailing of How They Function

Safety through the Internet is not a fully plausible option when it comes to sensitive information stored on system hard drives. Thankfully, this is the red alert of yesterdays. Technology today has reached the block where password protection can contain any kind of data while nullifying the possibilities of infringement. Standalone security widgets have brought into the market the assurance of privacy and security of public information. These applications are developed to produce a protection to all email accounts that open with an ID.

At times, it gets difficult to remember the whole bunch of passwords and IDs that unlock the host of accounts one has. These software programs extend management functions to the list of login credentials one has. The widgets also take synchronization with other devices for a joint protection. The applications contain information even when the system is formatted and all information existent on the hosting platform is deleted.

Since the systems use Internet constantly, they also ward access of malware and spyware from the Internet stream into the widget archive. For a system accessed by multiple users, the applications privately secure each of their passwords and IDs in different compartments. It appears like the programs know each of the users by their identity and allow them to access their data alone. However, the systems also have a master password that is used to protect the complete database.

The programs allow anytime anywhere access into the database as long as the system is Internet-enabled. Storage space is unlimited and hence, tons of data can be dumped into the system without the worries of running out of space. The widgets do not use the mobile storage space. Instead, they are connected with distant servers where all data put in are systemically archived for instant access and retrieval.

An average password manager is compatible to run on all major OSs. That makes their use quite universal. Almost all smart phones can host these applications, regardless of their special configurations. Passwords are easy to spot on the system’s mini search engine. It saves the users the trouble of running through the length and breadth of an extensive list of passwords. Thus search results are quick and precise in most cases.

The widgets make use of the SHA algorithm to encrypt the final password and once done, that is irreversible. Some of the applications claim to have maximum encryption compared to others. Aside securing, they also save the passwords which rule out the trouble of having to remember each of them by heart.

Efficient free Password Manager brings to the users a host of applications that secure login credentials in an anytime anywhere accessible server for ultimate protection.

The Economics of WAN Optimization’s Shift From Appliances to the Cloud

A few years ago, industry insiders began noticing and talking about the trend of cloud-based WAN optimization. Turns out, it was starting to take market share from the appliance market. Here we are heading into a new year and the factors prompting a move away from appliances and into the cloud remain relevant. Businesses continue to shift from WAN optimization appliances to cloud-based solutions, attributing much of this shift to economics (1).

For example, not only is the pricing accessible to small and mid-sized companies, cloud-based services eliminate the need for purchasing hardware. From a cost standpoint, it is far more attractive than WAN appliances. For example, you could pay as little as $500 per month for an Aryaka plan compared to $2,500 to $10,000 or more for a WAN appliance plus MPLS or some other form of transport. It’s hard to argue with those price differences.

How much do you know about the economic advantages of WAN optimization as a service? Here’s a quick true or false quiz for you:

1. It requires an appliance in order to be effective.

  • True
  • False

2. The virtual appliances are cheap.

  • True
  • False

3. You just need a one-time investment when buying the appliance.

  • True
  • False

Answers:

1. FALSE. It does NOT require an appliance. Though you may have needed an appliance ten years ago, it’s no longer the case today as numerous alternatives exist. Rather than relying on a piece of hardware and incurring a capital expense, it can now be delivered as a cloud-based service and billed as an operating expense. Not only can it deliver private MPLS-like connectivity at a much lower cost, it does not require long deployment times or expensive contracts.

2. FALSE. The virtual appliances are cheap – at first glance. Though the initial purchase price of virtual appliances may be low, cost savings are often gobbled up by management costs. Remember, it’s not just the appliance, it’s also the resources used to manage that appliance. Someone needs to configure it, manage it, and troubleshoot it. With it, the service provider handles all of the above and more as part of the service. There’s no need to hire IT personnel to manage it.

3. FALSE. The appliances RARELY require just a one-time investment. When you consider that WAN appliances usually come with a 3- to 5-year product cycle and an end-of-life/end-of-support soon thereafter, that one-time investment must be repeated every three to five years. If you need additional bandwidth, you must upgrade the WAN appliance. Not only that, the appliances come with expensive, recurring maintenance and management expenses.

Other factors beyond the cost advantages of cloud-based WAN optimization versus WAN appliances have come into play. For example, it brings both flexibility and faster deployment times to the mix. From a flexibility standpoint, it is typically offered on a month-to-month basis, allowing for greater scalability (2). The service can grow or contract as the business’s needs change. Fast deployment times bring with them their own economic advantage: The sooner the network is optimized, the sooner productivity improvements can take place.

When it comes to the costs, the clear winner is WAN Optimization as a Service. The trend away from hardware-based appliances to cloud-based WAN optimization continues, and a lot of that has to do with the cost advantages.