Tue, Jan 27, 2015, 1:00 AM EST - U.S. Markets open in 8 hrs 30 mins


% | $
Quotes you view appear here for quick access.

Vertical Computer Systems Inc. Message Board

you are viewing a single comment's thread.

view the rest of the posts
  • neoware03 neoware03 Nov 19, 2008 4:54 PM Flag

    If Microsoft's online security management system...

    so they come out with the generic one and then var it for their 2010 release? how many prospective users we talking about? add in the new online xbox'es and smartphones...

    SortNewest  |  Oldest  |  Most Replied Expand all replies
    • You don't want to be running distributed interoperable systems without distributed integral security.

      Interoperation code insertion between unsecured functions ("viral" interoperation, in other words) is one of the cloud computing skeptics' biggest vulnerability complaint.

      You either have a solution to make that viral code insertion foolproof or you shouldn't be selling distributed systems.

      So, how many users? All of them. This isn't a desktop security world anymore. We're talking all servers the client talks to and all other clients the client talks to will require an integrated community security system enveloping the integrated community interoperable function platform.

      The system will have to be an identified affiliate method that allows only known community affiliates to be functional and disables anything that even sets up to function (trying to stop it after it's started is inferior - the threat must be identified and disabled before the code is executed by any function) to be effective.

      Then, that threat profile will have to be disseminated to all affiliates so they can determine any and all internal profiles that match and disable that sort of thing all the way back to the infection point.

      Securing a single point and hoping everybody else keeps their points updated no longer cuts it. The viral infection has to be identified, patterned and the community immunized within a functional cycle.

      That can only be done if your integrated interoperation is deterministic (nobody executes another function across the community unless the states of all interconnected functions is known and verified).

      Thus, any threat seed is immediately dealt with and the entire community is made immune from that threat before any functional threat gets a chance to execute.

      What's that sound like?

0.0249+0.0074(+42.29%)Jan 26 3:59 PMEST

Trending Tickers

Trending Tickers features significant U.S. stocks showing the most dramatic increase in user interest in Yahoo Finance in the previous hour over historic norms. The list is limited to those equities which trade at least 100,000 shares on an average day and have a market cap of more than $300 million.