Latest Entries »

Company website now live

The company website is now live for viewing but a great deal of content must still be added thereto.

Click here to be taken to the page. It is still under construction so please be sure to visit often for updates to our content.

The next time you go for a job interview as a potential ‘perfect fit’ for a position for which you’ve applied, and we’ve all done it at one time or another, here’s something to consider: in a recent article in the online version of Inc. Magazine, they talk about three very simple questions that more and more hiring managers are asking, where there used to be anywhere from 10 to what seem like hundreds, during which many candidates start to make up answers, secretly wishing the job interview were already over.

The three questions are:

  1. How did you find out about this job?
  2. What did you like about the job before you started?
  3. Why did you leave?

This simple but surprisingly effective interview technique doesn’t take very long, maybe 15 – 30 minutes depending on the complexity of the responses, but according to John Younger, CEO and Founder of Accolo, an internet recruiting solution provider, actually created the process.

According to Younger, who has literally interviewed thousands of potential candidates for a variety of positions, "What’s amazing is that after a few minutes, you will always have learned something about the candidate — whether positive or negative — that you would never have learned otherwise.”

He adds by the time a person gets to their 3rd, 4th or 5th job  in their career, if they haven’t been pulled into a job by someone they previously worked for, that’s a red flag, which shows they didn’t build relationships, develop trust, and show a level of competence that made someone go out of their way to either bring them back into their former organization, or their new organization if they, themselves have changed jobs."

As of June 25, 2012 Chrysallid Enterprise Technology Solutions has entered into a strategic business partnership, after an agreement between CEO Matthew Booker, representing Chrysallid Enterprise Technology Solutions and Mr Danté D ‘Anthony, the CEO of Chronos Pictures, an independent film and game production firm currently based in New York City.

Mr D ‘Anthony, on 31 May 2012, contacted Chrysallid Enterprise Technology Solutions with an animated sci – fi film/video game project along the lines of Star Wars. Chronos Pictures’ game developer has over 30 years bringing titles to the gamers’ market, and their selected animation firm was nominated for an Emmy for their space animation with national geographic and recently did "Red Tails" with George Lucas.

Chrysallid Enterprise Technology Solutions has agreed to this strategic partnership, and will serve as Chronos Pictures’ I.T. advisor and consultant on all of their projects. Chronos Pictures, in turn, will head up our NEW MEDIA SERVICES division and will be one of two effects houses, the other being Mind Taffy Design, and its CEO, Wallace Jackson.

Additional details will be made available as they are finalized.

 

On 28 December 2010, CETS opened a dialogue with Bose Corporation in Framingham, Massachusetts and The Blender Foundation in the Netherlands (specifically Amsterdam).

While Bose will not be CETS’ sole provider for Computing Solutions Audio, depending on the configuration of the final solution, Bose premium speakers may be made available at a percentage discount from the consumer price. 

CETS has initiated negotiations with ASUSTek and TYAN Corporations of China as the leading manufacturers of motherboards sold in the United States and is awaiting word on the decision from both companies, which is expected to come shortly.

This would mean additional options for the construction of CETS systems, including Workstation and Server solutions.

 

CETS has completed negotiations for its 3rd Channel Partnership and a second exclusivity to Seagate Technologies for its Solid State storage system technology for desktop, mobile and server storage solutions. 

Seagate also markets storage solutions that include SSD / HDD that have the capability of automatically encrypting the data stored on the drive (on their SAS models only, however), meaning little or no intervention on the part of the user, which is especially suited for SMB, Small and Large Enterprise environments.

Storage solutions through Seagate include drives with capacities up to 2.5 TB for 3.5” models and up to 600GB for 2.5” SSD models.

 

Following up from  a previous article dated 6 August 2010, Chrysallid Enterprise Technology Solutions has just awarded an exclusive Channel Partnership to Crucial Technologies,  the largest RAM Manufacturer headquartered in the United States.

Crucial is a subsidiary of Lexar Media, both of whom are subsidiaries of Micron Technologies, one of the ten largest computing solution component manufacturers in the world.

All RAM utilized in CETS Desktop, Mobile, Workstation and Server Computing Solutions will be Tri – Channel DDR3 (for server solutions, RAM may be 2 – channel DDR2) and available in denominations of 1GB, 2GB, 4 GB and 8GB.

Both companies, that is, CETS and Crucial hope that this partnership will be a long and fruitful one.

Chrysallid Enterprise Technology Solutions has just achieved Channel Partner status with the first of more than 20 technology vendors.

As of about 12 August 2010, CETS has achieved Channel Partner status with Intel, one of four makers of motherboards and processors. Pending approval, CETS will soon follow suit with AMD, Cavium Networks and NetLogic Microsystems.

When building systems using Intel boards and processors, CETS will utilize Intel’s complete line of processors with compatible motherboards. 

This represents a major business achievement and only a small part of what CETS hopes will be a long and profitable future.

CETS is apparently going to be the first company to build desktop, mobile, workstation and server systems that are exclusively x64 (that is, systems that have exclusively 64-bit architectures).

Other companies do build x64 systems, but apparently none build systems that are exclusively x64, meaning that many companies still also build x86 (32 – bit) systems.  What are the advantages of x64 systems?

A common misconception is that 64-bit architectures are no better than 32-bit architectures unless the computer has more than 4 GB of main memory. This is not entirely true:

Some operating systems and certain hardware configurations limit the physical memory space to 3 GB on IA-32 systems, due to much of the 3–4 GB region being reserved for hardware addressing. This is not present in 64-bit architectures, which can use 4 GB of memory and more. However, IA-32 processors from the Pentium II onwards allow for a 36-bit physical memory address space, using Physical Address Extension (PAE), which gives a 64 GB physical address range, of which up to 62 GB may be used by main memory; operating systems that support PAE may not be limited to 4GB of physical memory, even on IA-32 processors.

    Some operating systems reserve portions of process address space for OS use, effectively reducing the total address space available for mapping memory for user programs. For instance, Windows XP DLLs and other user mode OS components are mapped into each process’s address space, leaving only 2 to 3 GB (depending on the settings) address space available. This limit is currently much higher on 64-bit operating systems and does not realistically restrict memory usage.

    Memory-mapped files are becoming more difficult to implement in 32-bit architectures. A 4 GB file is no longer uncommon, and such large files cannot be memory mapped easily to 32-bit architectures; only a region of the file can be mapped into the address space, and to access such a file by memory mapping, those regions will have to be mapped into and out of the address space as needed. This is a problem, as memory mapping remains one of the most efficient disk-to-memory methods, when properly implemented by the OS.

    Some programs such as data encryption software can benefit greatly from 64-bit registers (if the software is 64-bit compiled) and effectively execute 3 to 5 times faster on 64-bit than on 32-bit.

      The main disadvantage of 64-bit architectures is that relative to 32-bit architectures, the same data occupies more space in memory (due to swollen pointers and possibly other types and alignment padding). This increases the memory requirements of a given process and can have implications for efficient processor cache utilization. Maintaining a partial 32-bit model is one way to handle this and is in general reasonably effective. For example, the z/OS operating system takes this approach currently, requiring program code to reside in 31-bit address spaces (the high order bit is not used in address calculation on the underlying hardware platform) while data objects can optionally reside in 64-bit regions.

    Currently, most proprietary x86 software is compiled into 32-bit code, with less being also compiled into 64-bit code (although the trend is rapidly equalizing, so much does not take advantage of the larger 64-bit address space or wider 64-bit registers and data paths on x86 processors, or the additional registers in 64-bit mode. However, users of most RISC platforms, and users of free or open operating systems (where the source code is available for recompiling with a 64-bit compiler) have been able to use exclusive 64-bit computing environments for years due to the likelihood of the existence of someone willing to compile the code thusly. Not all such applications require a large address space nor manipulate 64-bit data items, so they wouldn’t benefit from the larger address space or wider registers and data paths. The main advantage to 64-bit versions of such applications is the ability to access more registers in the x86-64 architecture.

There is a standard within the computing industry…well, not so much a standard as an industry – wide practice which renders the majority of computing systems in use today disposable.

The practice is called ‘planned obsolescence’ and it the reason that some computer manufacturers charge extra for extended warranty plans.

Chrysallid Enterprise Technology Solutions will offer an unprecedented 8 – year  warranty on every PC, Workstation, Server and Mobile Computing Solution we build, and, where possible, this warranty also extends or supersedes existing warranties on the individual components, e.g. hard drives, optical drives, motherboards, RAM, graphics cards and so on for a better computing experience. 

More complete details of the warranty will be posted later this week but in essence, the warranty covers normal wear and tear, accidental damage (both of which will be thoroughly investigated by CETS or an authorized station in the city and state to which the system is shipped).

Provided that the damage is found to be accidental or as a result of wear and tear due to normal usage as opposed to misuse or abuse of the machine, arrangements can be made for a CETS authorized technician to come to the site and effect any repairs necessary to restore the system to proper and optimal working order.

What will happen next? Hewlett Packard Chief Executive was sent packing Friday after the surfacing of allegations by a corporate event host of sexual harassment.

Mark Hurd, 53, was released from his duties as CEO of Hewlett Packard with a severance package worth approximately $28M, where he had previously been in recent talks with HP for a new contract worth nearly four times that, approximately $100M.

The loss of his job came after reports of sexual harassment, filed by a woman who had worked for HP as a hostess for some of their higher  – profile events, who also received monies for work she did not perform.

Hurd’s additionally falsifying expense reports with HP in order to hide his relations with the woman are indicative that, "it would be impossible for him to be an effective leader moving forward and that he had to step down," HP general counsel Michael Holston said during a conference call Friday.

Cathie Lesjak, currently HP’s CFO, has been named Chief Executive on an interim basis until a permanent replacement can be named.

As part of his severance package, Hurd will receive about $12M in cash and almost 350,000 shares of the company, worth another $16M, as well as an extension of the deadline for Hurd to purchase an additional 775,000 shares in the company.

As a result of this news, HP shares de-valued by just short of 10% in after – hours trading Friday.

The top 3 RAM manufacturers in the United States, in order, Crucial, Corsair Technologies, and OCZ Technology, are to be approached as potential suitors for the sole provider of 64-bit RAM for the company.

Work began Thursday, 5 August 2010, on negotiations for Channel Partner exclusivity with each of the three companies, and plans to begin work with the selected vendor are anticipated within the next 10 days. 

More specifically, the question is ‘What does it mean for a technology company to be compliant in the competitive technology landscape?’

In July 2002, the United States Congress passed the Sarbanes-Oxley Act which was designed to require that over 8,000 corporations publicly traded on U.S. financial markets certify financial results as well as the effectiveness of internal financial controls and related processes. This new legislation has dramatically increased pressure on management teams to ensure transparent and reliable processes aimed at improving trust and investor confidence.

As an example, in 2003 and early 2004, the Securities Exchange Commission completed investigations into ‘creative’ (meaning unethical) accounting practices by several publicly traded companies. Subsequently, legislation was enacted that requires companies to alter the process in which they manage and maintain their records, including but not limited to email communications and any attachments submitted therein.

SEC Rule 17a

Requires that certain business records and communications be readily accessible for two years and at least accessible for a year after that. It further requires that transaction-related records and communications be kept and accessible for seven years after the event.

    National Association of Securities Dealers (NASD) Conduct Rules 3010 and 3110

  • Requires NASD members to designate a supervisory role within the company to ensure compliance with regulations, and have a system in place to supervise the activities of its employees and associates. This system must enable the retention and review of transactions and correspondence.
  • Requires members to preserve all books and correspondence, including customer order tickets, account information, and complaints. Much of this material is in the form of e-mail.

    The Sarbanes-Oxley Act

    Specifically related to document retention, the Act states the following:

  • A failure to maintain audit or review of work papers for at least five years is punishable by up to five years in prison, and/or a fine.
  • Corruptly altering, destroying, or concealing records or documents in order to compromise the integrity of the record for use in an official proceeding is punishable by up to 20 years in prison, and/or an unspecified fine amount.
  • The alteration, destruction, or concealment of any records with the intent of obstructing a federal investigation carries an unspecified fine amount, and/or jail time of up to 10 years.

    Other examples of compliance, that are not exclusive to information Technology, include the development of what is referred as a Compliance Framework. 

    A Compliance Framework consists of three key components:

    Governance, or more to the point, Governance Policies, which describe the overall management approach through which senior executives direct and control the entire organization, using a combination of management information and hierarchical management control structures. These activities ensure that critical management information reaching the executive team is sufficiently complete, accurate and timely to enable appropriate management decision making, and provide the control mechanisms to ensure that strategies, directions and instructions from management are carried out systematically and effectively.
    Risk Management is the set of processes through which management identifies, analyses and where necessary responds appropriately to risks that might adversely affect realization of the organization’s business objectives. The response to risks typically depends on their perceived gravity, and involves controlling, avoiding, accepting or transferring them to a third party. Whereas organizations routinely manage a wide range of risks (e.g. technological risks, commercial/financial risks, information security risks etc.), external legal and regulatory compliance risks are arguably the key issue in GRC.

    Compliance, as used in the business world, means conforming with stated requirements. At an organizational level, it is achieved through management processes which identify the applicable requirements (defined for example in laws, regulations, contracts, strategies and policies), assess the state of compliance, assess the risks and potential costs of non-compliance against the projected expenses to achieve compliance, and hence prioritize, fund and initiate any corrective actions deemed necessary.

    Of course no single article could possibly cover the entire realm of IT Compliance. but CETS will always be committed to the highest possible ethical standards.

The Federal Government, and more specifically the US Copyright office, essentially granted immunity to the more than one million current iPhone users who have switched service providers because even though they liked the usability of the device itself, they were less than pleased with the service from the wireless providers they previously had.

The term is called ‘jailbreaking’ and in this case it refers to iPhone and smartphone users who unlock their phones so that they can switch carriers at their leisure.

Currently, in the United States, AT&T is the only provider of service for Apple’s iPhone and smartphone, and “jailbreaking” has been popular since the introduction of both in 2007.

While previously a violation of the Digital Millennium Copyright Act, none of the more than one million iPhone owners who have already done so, in a statement from the Electronic Frontier Foundation, are going to be held accountable.

According to a subsequent statement from a spokesperson for Apple, who makes the iPhone, recently published in the Wall Street Journal, “Jailbreaking can severely degrade the experience” of the iPhone and can violate the warranty causing the iPhone to become unstable and not work reliably.”

 

This one from executives at the search engine Google, who cite issues with Windows 7 and the version of Internet Explorer Windows 7 uses, version 8.0, as the primary reason for its more than 20,000 employees switching from Windows – based systems to Linux or Mac.

The alleged security breach in January is responsible for a theft of Google’s intellectual property and its subsequent reasoning for the change from Windows – based machines to Linux or Mac based systems.

It is equally likely that Google, who has plans to release its own OS, Chrome, later this year, which includes a version of the browser by the same name, may have decided to make the switch from Windows for competitive reasons and the reasons cited to Microsoft may have been less than genuine.

This means that Google now has an opportunity to open up the way for the Chrome OS to take more of a share of the current OS market.

Microsoft blogger Brandon LeBlanc, in a post from June 1, made the statement [paraphrased here] that hackers have openly admitted that Microsoft has made Windows more secure and more invulnerable to security threats than any competitor company who offers the same type of software products.

LeBlanc also commented that among the steps Microsoft is taking to do this, it is shipping updated software to its partner vendors, as well as offering security updates through its Microsoft Update and Windows Update pages [how to perform those updates is explained following the main article] as well as improving its BitLocker and Windows Firewall software.

Windows 7, according to the same post, uses Address Space Layout Randomization … as well by randomizing data in memory to improve security.

Address Space Layout Randomization (ASLR) is a computer security technique which involves randomly arranging the positions of key data areas, usually including the base of the executable and position of libraries, heap, and stack, in a process’s address space.

One very important issue to keep in mind, Microsoft support for Windows XP ended in April of this year and support for Windows Vista with no Service Packs ended about two weeks ago [on or about 15 July 2010]

As for how to perform the Windows update:

For versions of Windows prior to Vista, do not use Automatic Update. Instead, go to the site below.

For Windows Vista and Windows 7, go to the Control Panel and select Windows Update. in both cases, select only those updates marked critical and make certain you review any optional updates Microsoft offers because some of them are completely unnecessary. 

 

Microsoft and Windows OS software updates prior to Windows Vista

Starting this week, CETS will approach the makers of BitDefender and ESET Internet Security solutions as exclusive VAR / Channel Partner Suitors for its own initial Internet Security Solutions.  (Channel Partners are persons or organizations that provide services or sell products on behalf of a software or hardware vendor. Value-added resellers (VARs), managed service provider (MSPss), consultants, systems integrators (SIs), original equipment manufacturers (OEMs) and distributors may all be called channel partners. Many companies, including CA, Microsoft, AMD, IBM, SAP and Oracle, have formed channel partnership programs to work more closely with the distributors for their products).

PC World magazine recently ranked the two Internet Security Solution makers within the top 10 and ESET recently won CNET’s Editor’s Choice Award (April 2009) for its Internet Security Solutions packages.

It is hoped that one of the two vendors will provide mutually lucrative opportunities.

For more information on ESET Security Solutions

For more information on BitDefender Security Solutions

For more information on CNET reviews

Some of the general public is under the belief that the best indicators of the performance of a technology company is how it does on a given day on the NYSE or the NASDAQ.

While these are, indeed, good indicators of a given company’s performance, it is but one facet of the total picture. To illustrate, let’s suppose that company JFK has had a record of success in the stock market, generating, as an example, 30% profit each quarter.

Not bad in and of itself, but now let’s also account for the fact that, from a standpoint of end – users / clients, the company isn’t doing very well, either because the company didn’t honor a number of its issued warranties, or because it didn’t do this, that or the other.

Ask any industry insider and they will tell you that some of the fastest ways for a technology company to fold, are because of an acquisition or because it may have violated Anti – Trust laws or because it thought certain technological advances, such as ‘Cloud Computing’ were too expensive for it to invest in and implement or for any of a multitude of other reasons, like not honoring its warranties and having subsequent complaints filed with a particular state’s Attorney General, and so on.

Unfortunately, more and more technology companies are falling prey to this, as well as companies like Microsoft, who have not only had to contend with multiple anti – trust suits, but also, more recently, have made a determination that stepping into the world of what is called ‘Cloud Computing’ (which refers to certain computing services being performed over the internet, such as Software as a Service (SaaS) or Platform as a Service (PaaS), as well as some remote Administration services) would be too expensive at this time.

Yet in order to succeed in business, especially in the Technology, Media and Telecommunications Sector, it is more and more vital to ‘keep up with the Joneses’, even if, at first, the technology is expensive to implement.

The above practices, or, where applicable the abstinence from the above practices are more likely to allow a company to succeed.

Well…it sounds like Dell’s done it again.

In a story released by the Reuters News wire, Dell is having to replace server components, specifically the motherboards used to build them, and that the virus, called the W32.Spybot worm, which was written to steal sensitive information from the client / end – user’s servers and workstations, wasn’t caught because the application Dell uses to test hardware components was itself infected with the bot “as a result of human error”, said Forrest Nerrod, the GM and VP of Dell’s server platforms.

Nerrod also indicated that the virus infected motherboards shipped as replacement parts and not boards shipped with new systems.

What’s at issue is whether hardware components are just as vulnerable to virus and trojan attacks as the software that runs on it. Well, guess what? It is! The W32 bot was originally discovered in 2003 and establishes communications with remote ‘handlers’ who in turn instruct the bot to perform various tasks, including the theft of sensitive data.

Dell said on its website that the issue affects less than 1 percent of four of its server models — PowerEdge R310, R410, R510 and T410. It said customers would be safe from attack if they were running up-do-date anti-virus software.

They probably want people to run the virus software they include on their machines, which I believe is Trend Micro, which, according to PC World doesn’t even rank in the top 10, but there are infinitely better AVs available.

The posts from the 1st Generation of this technology blog can be found by following this link:

http://bookermatthew.wordpress.com

The name of the company, ‘Chrysallid Enterprise Technology Solutions’ is actually a three – fold process as follows:

1) Chrysallid (this would be the British spelling) – n. a form or derivative of the word chrysalis, referring in this case to ‘a protected stage of development’

2) Enterprise Technology – well, we all know what technology is, and most of us at least have a general concept of what the word enterprise means as used in the business world, but how it relates here is that Enterprise Technology suggests that my company creates technologies specifically for Enterprise – level businesses, and, while true, this is only a small part of what the company does.

3) The word ‘Solutions’ in these instances refers to complete answers to the varying computing needs of not only Enterprise – level businesses, but also to other types and levels of business, education, government and the private individual.

Follow

Get every new post delivered to your Inbox.