Open Daylight Project: A Striking Collaboration

The OpenDaylight project that was launched a couple of weeks ago has been throwing up a lot of questions from the SDN consortium and many others. A joint initiative from the Linux Foundation, the project has been endorsed by majors like IBM and Cisco Systems. People are wondering what the end customers stand to gain from this project and what value they will gain. However, it all depends on how you view the concept, though several people believe that Cisco’s involvement is to hinder start-ups rather than help them.

In case the fears of the people are not unfounded, and the result is that they do get blocked because of the OpenDaylight project, though the founding companies never wanted that to be their real intent, there could be a real problem. The main worry of the start-ups is the distribution for other than OpenDaylight base controllers and applications. The OpenDaylight project just put a stone in the works of distribution channels for controllers.

Of course, one cannot deny the fact that the OpenDaylight project will be a fitting answer to the sway VMware has over others. It is more like a preparation for a final showdown between VMware ecosystems and the others who will be backed by the OpenDaylight project and the founders Linux Foundation and the endorsement from IBM and Cisco Systems.

Today, after the launch, several other founders like Dell, Citrix, Brocade, Arista Networks, Microsoft and many more joining hands with Linux Corporation and willing to spend great sums of money to make the project a success. When the final picture emerges, there could be many more players like Nuage, Fujitsu, PLUMgrid, who will be offering virtual network interfaces and OpenStack integration to support the cause.

The code, which is to be made available sooner than expected, is to be governed by a Board that will have a specially constituted Technical Steering Committee and several Project heads. This is like most of the other open source projects one has seen earlier, with the primary founders and contributors being reserved seats on the board, and others empowered with a vote each. With so many decision making heavyweights constituting the board, the networking industry cannot simply wish this project away, or ignore it as a least likely threat.

There are several practical issues that will be faced by the large number of vendors, who will have to somehow fall in place within one broad framework. There are bound to be several twists and turns before a final picture emerges. While vendors of hardware would like to have a firm control over hardware, VMware seems to be intent on controlling networks and virtual machines. Cloud vendors are interested in having SDN move into their cloud, instead to that of any competitor’s. Cisco is perhaps keen on hybrid cloud as their sole interest is to sell their hardware to the cloud vendors, and using Cisco hardware may offer the added incentive of being able to mix private and public cloud. However, all this can happen only over a period of time, and experts believe the actual effects can be felt not less than a year from today.

Author’s Bio: Tina Reeves currently works at Cable Companies, a site that enables everyone to learn about how to save on broadband and internet cable.

SEO Tips: Courtesy of the Kardashians (Sorta)

Search Engine Optimization (SEO) is all about self-promotion. That Kardashian clan is all about....well, that would be too easy. If the love-to-be-noticed family were to offer SEO tips, we're pretty sure they'd look something like this:

Substance is Underrated

Look, everyone knows that we’re famous for being famous. We’ve never actually added anything of value to society. As much as it pains us to say this, if you want your SEO to work, make sure that your website possesses the kind of content that gives it substance. SkyHitBlog.com says that your website will be ranked higher by search engines if it’s truly worth visiting (1). You may not be on the cover of a magazine for something super important – like cutting bangs – but you will be respected. Let us know how that feels.

Party it Up – With Social Media, That Is

As mother has instilled in us, it’s all about grabbing attention. Follow our lead by using social media to drive traffic to your site. Did you know that Google factors in the number of people following you on social media when they rank your site? That’s right; marry a pro athlete or put on an itty-bitty bikini and people will flock to learn more. If you have some of that self-respect people refer to, we’ve heard that you can actually drive traffic to your site by posting useful information with quality content rather than pulling an embarrassing publicity stunt. Make sure to keep your message clear by emphasizing what’s important.

Be Everywhere

This one is, like, so obvious, but make sure your site is accessible to mobile devices. SearchEngineLand.com reports that at least 25 percent of search traffic comes from these mobile devices (2). You want to make sure that yours is easy to access. Nothing changes the fact that you need to build a fan base. Do it by giving readers what you promise (although flirting is so much fun), and by making it easy for them to find you – even if they are out on a jet ski with a Saudi oil magnate.

Represent for a Cause

Word on the street is that in order to be taken seriously we're supposed to have a favorite charity. Oh nuts, we rolled our eyes so hard after writing that last sentence that some of us actually saw our brains. Where were we?

If we were the kind of people who had a favorite charity we would get on our smartphones, download the Givelify app, and donate to something we care about until our hearts bled or our fingernails broke, whichever came first.

No we haven't helped clean up the oceans (the water in our bathtubs looks clean enough and everyone knows it comes from the ocean). We haven't worked with children in the Appalachians or created great works of art, but darn it all, we do know how to get attention. Just this one time we think your mother will forgive you for taking our advice.

The Bitcoin Revolution

Genesis

Bitcoin is a digital currency that was first proposed in Oct 2008. Curiously, the proposer had a pseudonym Satoshi Nakamoto and started dissociating himself from any of the developments related to the currency from 2010. Nobody knows who he was. The currency came into existence starting with the genesis block created by Satoshi. The operation was started on 3rd January, 2009 by starting a free source project on Source Forge. In the four years since then, the number of units in circulation has reached more than 10.5 million units. This is half the total number (21 million) of units this currency can ever have, and is hard coded into the system as designed. This is designed to be reached by the year 2040. A Bitcoin unit or BTC can be divided into 100 million units in trade operations. These smaller units are known as satoshis.

Currency Creation & Operation

All currencies are issued by some central bank or the other. Depending on the nation using the currency, it is the central bank of that particular nation. These banks control on how much money should be in circulation at any given time. Any particular currency has paper based, and metal based units of various denominations that represent different denominations of the currency. For example, in case of the US currency, you have paper based one Dollar, five dollars, twenty dollars, hundred-dollar units and coins (metal based) of 1 cent, five cents, 10 cents, 25 cents (a quarter), and sometimes a metal dollar.

Soiled, damaged paper notes and damaged coins are removed and new notes and coins are introduced into circulation by the central bank, The Federal Reserve Bank in case of the USA. The central bank controls the introduction of new money, and the total money in circulation based on economic considerations. For example, if the total money in circulation is more than the value of the gross national product, the prices rise. There is more money chasing comparatively few products otherwise known as "inflation." On the other hand, should the GDP become higher compared to the money available, money would be able to buy more things (aka "deflation"). There are various complicated economic considerations of how much new money is minted by the central banks and introduced into the system. Suffice it for this discussion, that there is a central authority who alone can mint money in the currency setup.

In case on international transactions between different currencies, banks of the two countries get involved and operate based on exchange rates between the two currencies. These rates are determined very broadly, by the trades between the two countries. Parties involved in a transaction get charged quite heavily by the banks and financial institutions. Other characteristics that will be relevant to these discussions, in this case, any currency provides several tokens to be used in transactions. All those notes and coins are such tokens. There is a major property satisfied by the tokens. When a token is handed over to the other party, in lieu of product or service provided, the token is gone from the buyer's stash. This ensures that there is no "double spending." The buyer cannot spend that set of tokens, representing the total value, again on buying something else. "Double spending" is a distinct possibility if the seller takes time to confirm having taken the money. Same situation arises if an intermediary is involved, and needs time to confirm the transfer.

One big difference with all the other currencies in the world is that there is no central bank or authority who controls the generation, circulation or transaction in this currency. The transactions are based on the public key cryptography system. This system requires that if a communication is to be sent to someone securely, the communication should be encrypted by the "public" key of the particular person. The target person decrypts the cipher text (the coded text) using his/her "private" key. The encryption system ensures that there is no way one can derive the private key by knowing the public key. Thus, the transaction, communication in this case, could be totally secure. A bitcoin transaction happens in the following manner. Bitcoins are exchanged through apps named as wallets. These can draw on local bitcoin store or get it out of a service (much in the style of drawing money from a bank). Since the currency is totally decentralized, there is no need for a bank of any but is a convenience, if available.

Digital signatures of the ECDSA type are used to authenticate these transactions. Party 1 signs a transaction using her private key. This ensures that anyone could verify that party 1 has initiated the transaction. Public key of party 2 is used for transfer. To ensure this transaction is legitimate, party 1 should have actually owned the coins intended for transfer to party 2. It also needs to be ensured that party 1 does not "double spend" or transfer same money to another party. In non-cash transactions, some intermediary such as a bank ensures the money is deducted from party 1 and given to party 2. Even when an electronic transfer (like a wire transfer) method is used, the spender loses the ownership of the money first and then the target beneficiary is credited with the amount. Without the intermediaries, a peer-to-peer distributed network implements two necessary functions to prevent double spending. First, it verifies party 1 did actually own the money obtained through some other transaction that can be traced. This traceability is created through a mechanism where majority voting of the network confirms a transaction. A record or a block is created every 10 minutes that hold the details of transactions. Ownership is confirmed by existence of one such block that includes a valid transaction of money to party 1 from a legitimate source. To facilitate tracing older transactions, all these blocks are chained to an earlier block. One could easily establish legitimate transactions right from the very first block, the genesis block.

Block Creation & Blockchain

The transaction details are sent to the neighboring nodes by the party 1 node/application. The protocol is set such that the node receiving the transaction will verify if the transaction is valid, if a block exists transferring the bitcoins to party 1. If true, the node will add the current transaction (transfer from party 1 to 2) to the block of transactions. Getting a block authorized involves an inverse hash creation problem. The node is required to add some bits (nonce) to the block such that a new hash is created that has a predefined number of zeros at the beginning. These numbers of zeros are adjusted such that the network always needs a fixed amount of time to verify a block. The current block being generated also includes the hash of the previous block. The authenticating node broadcasts the new block and "proof of work" to the network. The proof of work is the string of bits that was added to generate the hash. It is possible another authorized block may be received. The block forming part of a longer chain is taken to be the authentic one. The longest chain of blocks records all the transactions that have happened. The longer chain also establishes that it has been generated by the largest collection of compute power in the network. The rationale being that unless majority computing power is under control of a malicious power; the largest chain will be generated by the honest majority. A timestamp is included in the hash of blocks. Changing this continuing chain that includes proof of work will need doing the proof-of work all over again. The work required to generate the hash is exponentially higher as the number of leading zeroes required in the hash generated. This ensures that the winning node has actually used the maximum computational power. The longest chain will always represent the majority participation. If the voting was based on the number of computing nodes, it could be easily spoofed by creating a large number of IP addresses. The true chain will keep growing the fastest as long as a large number of network nodes are honest ones. As the chain grows, recreating history is going to become that much difficult as the proof-of work will have to be done all over again.

As the network confirms more and more transactions that follow a given one, the record of a transaction becomes more permanent. When there are six confirmed records following a transaction, it is considered a permanent part of the log maintained by the network (the peers in the network). These log records are known as a blockchain. The way it is designed, this blockchain keeps growing as records are always added to the existing chain, none is removed. The designer realized; it will become difficult to keep the entire database stored at local nodes. The Use of Merkle Trees could be used to organize the database. This organization will help prune the chains when the ownership of bitcoins has changed a few times. As all these ownership changes have been verified there will be no need to go further and to the root. The current transaction is obviously verified. Rest of the chain could be pruned out of the local database without affecting the verification process. The peer to peer network does not need to be very structured; messages are sent out all-round on the best effort. It is possible for the nodes to go out of the network or come back to it anytime. The current block carries all the history in it. Thus, as soon as a node receives the blockchain, it learns everything it needs to know.

Incentive To Participate

To make it worthwhile to participate in the compute intensive activity of verification, the winning node is awarded a fixed number of new coins. For the first four years, it was 50 coins and is 25 coins currently. This will be reduced to 12.5 in another four years by 2017. The rate will be halved every four years, and mining will be stopped entirely when total currency in circulation reaches 21 million units. Thereafter, it will only be transaction fees that will be the incentive. Since no one mints bitcoins, mining is the only way coins are created; much like mining gold from inside earth and using it for barter trade.

Popularity Of Bitcoins

Alternative currencies, particularly electronic form of currency has been proposed some thirty years back and a lot of work has been going on. No such currency took widespread root. However, even though many trials did start but failed. Bitcoin activity really started from the setting up of the genesis block. By Mar 2013, total number of bitcoins was estimated to be equivalent to USD 400 million. Today it could be used to buy products and services of a wide variety. A bitcoin exchange exists today and the standard rate of one bitcoin in Mar 2013 was traded at $40 at the Mt Gox, the bitcoin exchange. Many web services such as the Reddit, Wordpress services can be paid in bitcoins. Payments processors have come up. One such payment processor Coinbase reported in early 2013 that more than $1 million was processed by it in a month. Bitcoin works across borders and thus there is no necessity to pay a bank a hefty fee for international transactions. A BTC transaction being non-reversible is also a useful property. The transactions are also proof against credit card frauds, making it attractive in countries were such frauds are high. Conversion to many of the main currencies can be made easily. Hedge funds have come up. Products are available increasingly on payment of bitcoin. All these attest to a surprise amount of growth of the bitcoin phenomenon.

Becoming A Trusted Alternate Currency?

There are two questions that need to be looked at. First, if the scheme has any inherent weaknesses that will cause the system to break down eventually.

The second question is if the system can be hijacked and misused by anyone malicious to the detriment of all honest users. As with any public key cryptography system keeping the private key private is a problem. Initially, the wallets that hold the key in your PC used to be unencrypted. Encryption has been added. Malware attacks could steal the private key. Splitting private keys into random shares and storing the pieces in different machines would be useful. Use of super wallets or a bank like facility for storing the keys is another solution. A corresponding control like limited amount of cash dispensation (private keys) would help limit problems. Accidental loss of key has been reported. Off-site backups coupled with password protection can let you get around that problem. If the private keys are generated based on pseudo random algorithms rather than complete random generation, it would be possible to retrieve/recreate them. Hard limit on the total number of coins makes the system deflationary. GDP of the world will keep growing even after the 21 million hard limit is reached, giving rise to deflation. However, each bitcoin can be subdivided into 100 million units, and any other denomination could be introduced. The maximum number of raw units might not be enough if the entire world starts using BTC, but it would not be too difficult to increase precision in that situation. The transaction format and version number can be changed at some particular block number after a year or two, and everyone can catch up by then. Currently, the exchange rate of bitcoins is very volatile. The rates often vary by 50% in a given day. This can discourage people from using BTC in daily transactions and can slow the adoption rate.

The fluctuations are definitely due to speculative trades. It is possible that a small group is responsible for this kind of disturbance just like a stockmarket on a larger scale. As non-speculative use of bitcoins increases, this should stabilize. Since more products become available for sale with bitcoins, more buyers are likely to use bitcoins. One incentive for doing so is the low transaction fees involved. With the rise in computational power, it is conceivable that 51% computational power could be cornered by one group of people. However, the rest of the network would also advance and make achieving majority power difficult. Effort to change the history is an additional difficulty to interfere with the BTC operation. The BTC scheme introduces hard checkpoints periodically with code updates. Private checkpointing has been suggested in literature to make the revision of history even more difficult. There could be a scalability issue in the bitcoin ecosystem. As users grow, a growing number of smartphones will be used. These have comparatively limited computational power, communication bandwidth and life of battery for one charge. It is required that the bitcoin apps on installation download the complete blockchain. They also need to broadcast new transactions and blocks. Functionally the nodes on the bitcoin network are of two types. A large part would be just generating or receiving transactions and not interested in verifying or subsequent mining of bitcoins. Others are verifiers that need to look at all the broadcasts on the net. The transaction clients can get around the scalability problem by receiving only the transactions directed to their public address. Some sort of a filtering service can help choose the right transactions and forward them to the nodes. Smartphones could thus depend on a filtering service residing in the cloud and get away by paying a subscription for the service.

Bitcoin appears to offer not only a non-inflationary property but also many desirable ones of a currency system. Some of the potential vulnerabilities are not strong enough to cause the currency system to crash. Malware attacks, loss of private key, need for backup, etc. are essential parts of cyberspace today and do not pose any excessive threats.

Real Threat Against Bitcoin

It is early days yet in the life of bitcoin. As we have seen from the foregoing, all it will take to hijack the bitcoin system is to create a duplicate system of coins but more importantly an alternate history of transactions in the form of a blockchain range of transactions that support how the alternate bitcoins have evolved. As of now, there are not too many transactions as the commerce being carried out on bitcoins is not very extensive yet. There are three important aspects of this alternate currency system that can provide sufficient motivation. First of all, it goes against all the banking systems that exist today. You do not need them, and you do not need to pay the fat fees to them for transactions, particularly international transactions. In the bitcoin world, there are no geographical boundaries. It is easy to see why these financial institutions would be happy to see bitcoins go away. As the transactions are anonymous, individuals are immune from taxes by governments from specific geographic regions. Losing these taxes could mean a huge loss to the governments. On another plane, a strong currency is another tool for domination and influencing other national governments to bend to your needs. The nations with strong currencies will similarly be very happy to see bitcoins disappear.

For an individual, controlling the currency would be the ultimate control weapon to manipulate economies, nations and people. The world has seen many examples of individuals trying to control the world, motivations for banking and other financial institutions including rich nation governments are strong enough to actually try and destroy bitcoin sooner than later.

Huge computing power would be necessary to mine coins and to create the history. Growth of computing power, until now, has been governed by Moore's Law. According to this law doubling of the number of transistors (resulting in doubling of computing power, in effect) happens every 18 months. However, everybody has access to these increases. The bitcoin peer to peer network must go through a similar upgrade when the elements posing a threat acquire higher computing power. With the creation of (A.I) supercomputers like "Watson" by IBM or just interconnected supercomputers, it will be possible to amass the necessary computing power. It will still take significant time to create the alternate history but it can be started today if put into action.

Then we have quantum computing which promises a huge jump on computing power far beyond what Moore's Law delivers. It is becoming commercial, and already a corporation like Lockheed Martin bought a commercial quantum computer from a pioneering company D-WAVE to use in their commercial activities. The jump in computing power could be understood from what Lockheed-Martin thinks could be done. The quantum computer is expected to provide simulation results of a complex phenomenon very fast. For example, the effect of a solar flare on the complex software that manages the communication satellite systems could be derived very quickly. It is practically impossible to simulate as of now. D-WAVE is out of Canada and has been in existence for more than a decade. Some pointers to the speculations made here are clear from some of the investments that back the company. These include In-Q-Tel, an investment company linked to the CIA and other agencies of the US government. Goldman Sachs is an investor and so is Amazon.

Harnessing this new, high powered computing will be easy for the entities needing to subvert the bitcoin currency and make it difficult for the network supporting the currency.

Although not last and not least, the first step which could disrupt or slowdown bitcoin is a worldwide hunt on all exchange / marketmaker outlets involved in bitcoin. This can be done by international law enforcement / treaties or entities which operate outside the law.

"To Bitcoin Or Not to Bitcoin"

We all know human history and there is enough reason to keep in mind that certain powers do not easily let go what they gained. The only way for Bitcoin to succeed and secure its future is a fast worldwide (legal) adaption to combat the biggest threats to its existence.

Privacy & Liberties are our business -
 http://www.trilightzone.org/services.html - triteam -

We are a group of security specialists which have a long history together. Our ideals are processed into the services we offer, we believe in the right to have privacy and anonymity. Visit our site for the wide range of privacy services we can offer; ranging from VPN privacy services, SSH Tunneling, Secure Offshore eMail accounts, Anonymous Offshore Hosting and much more. We support freedom of speech everywhere!

 

Article Source: Rohan Beorgo

Small Businesses - How an SEO Company Can Benefit You

Businesses from virtually every industry have found that having an online presence is essential for any degree of success. For small businesses, it is even more critical to have an Internet marketing strategy in place in order to compete in any meaningful way. Thanks to search engine optimization (SEO), the playing field has been leveled to a great degree. However, in order for small businesses to leverage all that is available effectively, they need guidance on how to use Internet marketing techniques for their business promotion efforts.

Branding

SEO companies incorporate a number of techniques into cohesive plans that serve small businesses very well. For instance, SEO friendly web design methods extend any company’s reach into the global Internet marketplace. To do this, SEO experts assess the local and regional market to develop ways for building momentum by accelerating the business reputation.

Online Marketing Services

SEO companies offer a wide array of marketing services for small businesses. The more productive an online presence becomes, the better the company can reach and exceed business goals. SEO experts work both individually and in teams to design plans that incorporate:

1. Search Engine Optimization

As the hallmark of online marketing, search engine optimization deals with ways to increase a website’s visibility on the Internet. One of the ways this is accomplished is through keyword research to find the best words and terms that relate to the business. Those words, phrases and ideas are then incorporated into virtually all other aspects of an integrated online marketing plan.

2. Website Development

SEO friendly web designs are essential to raise online awareness. By building in keywords and phrases to the website, the search engines can more easily find the business online so that it is put before prospective consumers. The best websites in the world will not mean much unless consumers can easily find them. SEO company professionals, like Everspark Interactive, use keyword and market research to construct sites that are more responsive to target audience and public needs.

Also, new media strategies are developed for mobile marketing so that small businesses, just like larger firms, may access the robust local marketplace.

3. Social Media Marketing

In order to be successful online these days, businesses must have access to an integrated marketing approach. Social media is without a doubt one of the most revolutionary aspects of Internet marketing. This is why platforms like Facebook, Twitter and LinkedIn have focused on developing advertising and marketing strategies into their applications. SEO professionals understand how to use these platforms, along with other techniques, in the most effective ways possible.

To benefit from new strategies, businesses must find more effective ways to reach their target markets. For instance, cross platform methods are used to engage social media audiences.

4. Targeted Content Marketing

Expert SEO professionals understand how to integrate sophisticated marketing tools to help clients find the most relevant prospects for successful conversions. They accomplish this by using keywords and other data to create and distribute content that speaks to and draws in the target audience. The wide array of marketing tools available can include:

a. Blog Development and Integration
b. Copywriting
c. Video Production

Small businesses face unique circumstances. As the Internet landscape continues to become more digitized and diverse, it is even more important for them to use the expertise of an effective SEO company in order to survive and thrive through challenging times, both online and off.

About the Author

Lisa Coleman shares her knowledge with small business owners about SEO's and their jobs in an effort to help educate them about how they are beneficial and invaluable. If you are a small business owner or know of one looking to expand their marketing strategy, you will find explanations of the business model online at Everspark Interactive, and can see their marketing strategies and how they can help you.

The Influence Of Photoshop

The Evolution of Photo-Editing

Images cut through all our critical defenses, or so we've been told. Whereas text has to be slowly digested by our brain, images head straight for the nerve centers. This is why images are an essential tool for advertising, and why society is becoming increasingly visual as technology advances.

As the toolsqa photo of Lenin addressing soviet troops was famously altered to remove Trotsky per Wikipedia, complex techniques such as darkroom manipulation and airbrushing have been replaced by more accessible digital editing tools like Photoshop. A consequence of the prevalence of doctored images is that people no longer readily accept what their eyes tell them.

Sometimes the evidence of photo tampering is easy to detect, but, in the hands of a skilled Photoshop artist, manipulated photos can look very convincing indeed.

According to Business Insider, advertising regulators in the USA have taken steps towards banning the use of Photoshop in images promoting cosmetics due to the potential for false advertising. This will also, hopefully, avoid the barrage of Photoshop accusations that routinely greet any controversial image posted on the net.

A Tool for Photographers, Advertisers and Artists

Photoshop can make an old picture look like a new picture, or make a photo look like a painting. Its ability to combine text and graphics in creative ways is a powerful tool for advertising, and its photo-editing capabilities have created awe-inspiring works of art, as well as the mass production of countless hilarious memes.

According to Rafin O’Hara, the tools provided by Photoshop allow photographers to challenge certain limitations, such as:

  • Time: Old photos can be scanned and loaded into Photoshop, where healing brushes and patch correction can be used to remove the effects of deterioration.

  • Human error: Mistakes such as bad lighting, red eye, over-exposure, and blotches can be rectified.

  • Reality: Paintbrush techniques can be used to create fantastical imagery, effectively combining the arts of photography and painting.

So, while some worry about the effects of false advertising, others take the opportunity to unleash their creativity in ways that were never before accessible. Whether your goal is to produce high-quality photographs, create cybernetic snails or simply insert cats into ancient Greek paintings the opportunities presented by Photoshop are numerous.

 About The Author

Matthew Flax writes for Now Learning, which offers a range of Photoshop short courses in Australia.