Moore’s census involved regularly sending simple, automated messages to each one of the 3.7 billion IP addresses assigned to devices connected to the Internet around the world (Google, in contrast, collects information offered publicly by websites). Many of the two terabytes (2,000 gigabytes) worth of replies Moore received from 310 million IPs indicated that they came from devices vulnerable to well-known flaws, or configured in a way that could to let anyone take control of them.
On Tuesday, Moore published results on a particularly troubling segment of those vulnerable devices: ones that appear to be used for business and industrial systems. Over 114,000 of those control connections were logged as being on the Internet with known security flaws. Many could be accessed using default passwords and 13,000 offered direct access through a command prompt without a password at all.
via Pinging the Whole Internet Reveals Unsecured Backdoors That Could Tempt Hackers and Cyber Criminals | MIT Technology Review.
Read the whole thing.
Now this is one of the better offbeat advertising campaigns I’ve seen for enterprise software:
Tibco, a major player in the SOA space, came up with the Greg the Architect campaign. It’s a pretty funny look into the world of the IT foot soldier in a big company. I particularly liked the episode I embedded above, as I used to do a lot of ROI analysis work for software deployments. The latest episode, which pokes fun at analysts, is also really funny.
[Found via: Jeremiah Owyang]
Image by stan via Flickr
Dion Hinchliffe, over at ZDNet, has a great description of cloud computing, why it’s gathering steam, and how it may impact enterprise applications in the years to come.
Enterprise cloud computing gathers steam | Enterprise Web 2.0 | ZDNet.com
The days when organizations carefully cultivated vast data centers consisting of an endless sea of hardware and software are not over, at least not yet. However, the groundwork for their eventual transformation and downsizing is rapidly being laid in the form of something increasingly known as “cloud computing.” This network-based model for computing promises to move many traditional IT capability out to 3rd party services on the network.
It’s a lengthy post that I would recommend everyone to read.