Bikers begin descent on South Carolina resort for rallies

Saturday, May 14, 2005

Myrtle Beach, South Carolina —This weekend is the kick-off for two motorcycle rallies held annually in the U.S. eastern seacoast town of Myrtle Beach. Enthusiasts this year are expected to meet or exceed the 170,000 bikers that arrived last year in droves to the small resort town of 23,000. Festivities span two weeks, and extend again this year into the Memorial Day.

Leading off is the week-long Harley rally, followed by the next week’s BikeFest. In and around town, both day and night are punctured by the sounds of bike engines gunned and revved at stop lights and in parking lots. Groups of cycle riders dominate the streets.

“By Friday night, the front parking lot will be a full line of motorcycles to the corner.” said motel owner Ranjan Patel. The Super 8 motel takes up half a block at its location in the heart of the downtown motel strip. “Both sides [of Ocean Blvd] are nothing but bikes.” Both she and her co-owner husband agree, the influx of bikers dwarf in size the numbers of tourists who visit during regular summer months for ocean-side and family amusement park attractions.

The highly accesorised bikes, decked with chrome and polished to show it, flashed the townscape. Choppers made a showing, but road hogs dominated the ridership, often going twosome. Many rally goers arrived on the scene with SUV’s or big pickup trucks towing cargo trailers loaded with cycles.

Growth in the sheer size of the two rallies led police to make changes in the handling of traffic flow. During BikeFest last year, the mostly black crowd that came in on the heels of the largely white Harley rally the week earlier, were faced with confusion when the two-lane Ocean Blvd was made one-way.

A branch of the NAACP in Conway, the next town over from Myrtle Beach, alleged discrimination by Horry County and Myrtle Beach Police. They claimed authorities and police used an overwhelming and aggressive police presence, combined with a restrictive one-way traffic pattern, to intimidate and discourage the participants in the rally.

An injunction was issued earlier this week by U.S. District Judge Terry Wooten, who ruled that bikers at both rallies be treated the same. Myrtle Beach city lawyers immediately filed an appeal to the ruling at the Fourth U.S. Circuit Court of Appeals, saying “the trial court erroneously determined that the plaintiffs would likely succeed on the merits; that is, that the city of Myrtle Beach intentionally treats Memorial Day weekend tourists differently from others similarly situated because of their race.”

A plan to submit an opposition to the notice has already been announced by Michael Navarre, an attorney for Steptoe & Johnson, who represents the NAACP civil rights group. “We certainly don’t think the judge has ruled erroneously,” Navarre said, according to The Sun News.

Traffic control and safety measures were in full swing Friday morning on US-17. Both directions of the 4-lane divided highway south of Myrtle Beach had traffic cones and parking barriers set up to control traffic. Large flashing road signs on each side of the highway warned cars to use the passing lane. The warning sign flashed a message that the right lane was for motorcycle use only. Police monitored the pull-offs near a Harley dealer’s lot where popular attractions were set-up in the immediate vicinity.

This article features first-hand journalism by Wikinews members. See the collaboration page for more details.
This article features first-hand journalism by Wikinews members. See the collaboration page for more details.
Retrieved from “https://en.wikinews.org/w/index.php?title=Bikers_begin_descent_on_South_Carolina_resort_for_rallies&oldid=3148237”

Economic policy makers conclude Washington meetings

Monday, April 14, 2008

This weekend, April 12–13, the joint Development Committee of the World Bank Group and the International Monetary Fund (IMF) held its annual Spring Meeting in Washington, D.C.

The Group of Seven (G7), which is comprised of the economic policy makers from the United States, United Kingdom, France, Germany, Italy, Canada, and Japan, held its annual meeting on Friday, April 11. This meeting, which rotates locations, was also held in Washington, D.C.

The Development Committee meeting ended on Sunday, with a call from the economic leaders for assistance to the countries which been adversely affected by rising food prices. Economic growth has slowed to its lowest rate in five years, while the rising costs of food and energy have not slowed.

Robert Zoellick, the president of the World Bank, said, “We have to put our money where our mouth is. Now. So that we can put food into hungry mouths. It’s as stark as that.” He called for US$500 million in emergency funds for the United Nations’s World Food Programme by May 1, 2008.

“All that has been done [in the past decade] can be undone very rapidly by the crisis coming from the increase in food prices,” said Dominique Strauss-Kahn, the managing director of the IMF.

“Children will be suffering from malnutrition, with consequences for all their lives,” he said. He cited the growing use of land for biofuels as contributing to rising food costs. In the end growing violence and civil unrest could be a result.

Strauss-Kahn further warned that eventually it could become “not only a humanitarian question,” but could also affect developed nations by leading to trade imbalances.

Specifically cited as a current example, was Haiti, where just this weekend, violence escalated resulting in the death of a United Nations peacekeeper and the ousting of Prime Minister Jacques-Édouard Alexis.

United States Secretary of the Treasury Henry Paulson cautioned that affected countries “need to resist the temptation of price controls and consumption subsidies that are generally not effective and efficient methods of protecting vulnerable groups.”

We have to put our money where our mouth is. Now. So that we can put food into hungry mouths. It’s as stark as that.

Price controls and subsidies “tend to create fiscal burdens and economic distortions while often providing aid to higher-income consumers or commercial interests other than the intended beneficiaries,” Paulson said.

In their Friday statement, the G7 said “there have been at times sharp fluctuations in major currencies, and we are concerned about their possible implications for economic and financial stability.” This marked the first time since the February 2004 meeting in Boca Raton, Florida, that the wording on foreign exchange has been altered.

The G7 presented a plan to strengthen regulation of capital markets. They urged financial firms to “fully” disclose their at-risk investments and improve capital reserves. While the G7 did not outline new monetary or fiscal policies, it did promise action “as appropriate.” The timetable for the plan is 100 days.

While action is unlikely in the short run, they are probably already considering a pre-emptive move in foreign exchange markets to slow the dollar’s decline.

The head of G7 Market Economics at Tullett Prebon, Lena Komileva, observed, “The implicit message is that the G7 is moving closer towards concerted action in the event that persistent volatility in the foreign exchange market presents new risk of systemic failure in the financial industry.”

“While action is unlikely in the short run, they are probably already considering a pre-emptive move in foreign exchange markets to slow the dollar’s decline,” added Komileva.

Economists at Goldman Sachs told their clients, “After a period where the possibility of G7 policy intervention seemed very remote, providing no counterweight to the dollar depreciation forces, we are moving towards a regime where G7 intervention is a more real possibility.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Economic_policy_makers_conclude_Washington_meetings&oldid=4656844”

Custom Lapel Pins Have Many Promotional Uses Worldwide}

Submitted by: Lee Lapel

Custom lapel pins have been popular for many years as a way to show support for many worthy causes. Many different shapes, including flag pins, ribbon pins, dress-shaped pins and others are worn to support causes people consider important to them.

Several factors make custom lapel pins a strong marketing tool. To begin with, theyre economical to produce and sell. Because of their low cost, they can be distributed widely to promote a cause. Well-designed custom lapel pins also are attractive, giving them a jewelry-like appeal.

Custom lapel pins are subtle. They dont shout a message loudly, but rather make a quiet statement that invites others to ask the wearer what the custom lapel pin means. That gives the wearer a chance to explain more fully the cause that the pin represents.

[youtube]http://www.youtube.com/watch?v=Sr7pa_F9eQY[/youtube]

Many businesses use custom lapel pins as a motivational tool for employees. Some give them as a reward for reaching specific performance goals, such as sales objectives or revenue figures. Many companies give them as a reward for reaching a certain number of years on the job. These small rewards help employees take pride in their work, and let them know that management appreciates their hard work and dedication.

Another rapidly growing segment of the custom lapel pin market is trading pins. These are immensely popular in youth sports worldwide. Trading pins have been a part of Little League Baseball for many years. Now, other sports, including soccer, hockey, football and basketball are adopting the custom as well. Academic competitions such as Destination ImagiNation and Odyssey of the Mind have their own custom trading pins too.

Ribbon custom lapel pins, introduced in the 1990s, have become a universal symbol of social causes. Ribbon pins of various colors represent many worthy causes, ranging from anti-racism programs to cancer awareness and support.

Flag lapel pins are always popular. Many people choose to wear an American flag custom lapel pin to show their patriotism and support for U.S. troops. Yellow ribbon custom lapel pins also are a popular way to show support for U.S. soldiers in Afghanistan and Iraq.

Schools use custom lapel pins too, often as a reward for academic achievement. Presenting them at school assemblies can do much to encourage students to excel and boost their self-esteem. Some schools also reward students who achieve perfect attendance with custom lapel pins as well.

Many civic and fraternal organizations use custom lapel pins to show membership in the group, enabling members to recognize each other in public. Civitan, Rotary Club, Chambers of Commerce and other civic organizations use custom lapel pins extensively. On college campuses throughout the nation, many members of fraternities and sororities also wear custom lapel pins to show they are members of such Greek organizations. Other campus organizations also depend on custom lapel pins to showcase their groups as well.

Ultimately, custom lapel pins are just about the most versatile way possible to market a cause in a low-key way, denote membership in an organization, mark a fun adventure or reward outstanding achievement at all levels. Custom lapel pins are the perfect promotional item for just about anything under the sun.

About the Author: Lapel Pin SuperStore is the source for the finest quality custom lapel pins available at the lowest price possible.

lapelpinsuperstore.com

If you would like to know more, or want to order custom lapel pins, contact us toll free at 1-866-862-8842, or by email at sales@lapelpinsuperstore.c

Source:

isnare.com

Permanent Link:

isnare.com/?aid=585157&ca=Marketing}

US, UK embassies in Yemen close due to al-Qaeda threat

Monday, January 4, 2010

The United States and the United Kingdom closed their embassies in Yemen Sunday, pointing to ongoing terrorist threats. The closures came after the two nations pledged to boost counter-terrorism support to the Yemeni government.

The American embassy’s website said the threats come from al-Qaeda in the Arabian Peninsula, the group linked to the failed Christmas Day airplane bombing attempt in the United States. The message in part said, “The U.S. Embassy in Sana’a is closed today, January 3, 2010, in response to ongoing threats by Al-Qaeda in the Arabian Peninsula (AQAP) to attack American interests in Yemen.”

Further adding, “On December 31, the U.S. Embassy sent a warden message to Americans citizens in Yemen to remind them of the continuing threat of terrorist actions and violence against American citizens and interests throughout the world. The U.S. Embassy reminds U.S. citizens to maintain a high level of vigilance and to practice enhanced security awareness.”

Deputy National Security Advisor for Homeland Security and Counterterrorism John O. Brennan said on CNN’s State of the Union with John King, “There are indications that al Qaeda is planning to carry out an attack against a target inside of Sana’a, possibly our embassy.” Brennan added, “And what we do is to take every measure possible to ensure the safety of our diplomats and citizens abroad, so the decision was made to close the embassy.”

The U.S. Embassy in Sana’a is closed today, January 3, 2010, in response to ongoing threats by Al-Qaeda in the Arabian Peninsula (AQAP) to attack American interests in Yemen.

A spokesperson for the British Foreign Office said their embassy would be closed on Sunday and a decision to reopen would be made on Monday.

The closures come a day after U.S. General David Petraeus visited the capital, Sana’a, to discuss security issues with President Ali Abdullah Saleh. The general, who oversees the U.S. wars in Afghanistan and Iraq, recently announced that the United States would more than double its security aid to the impoverished nation.

The United States gave $67 million last year to Yemen, the only country that receives more aid is Pakistan with $112 million, according to the Associated Press.

Yesterday, in his weekly radio address, President Barack Obama linked the suspect in the attempted bombing of Northwest Airlines Flight 253 to al-Qaeda saying, “We know that he traveled to Yemen, a country grappling with crushing poverty and deadly insurgencies. It appears that he joined an affiliate of al-Qaeda, and that this group, al-Qaeda in the Arabian Peninsula, trained him, equipped him with those explosives and directed him to attack that plane headed for America.”

Obama annouced, “So, as President, I’ve made it a priority to strengthen our partnership with the Yemeni government-training and equipping their security forces, sharing intelligence and working with them to strike al-Qaeda terrorists.”

Obama said that they had already results prior to the Christmas Day bombing attempt saying, “So, as President, I’ve made it a priority to strengthen our partnership with the Yemeni government-training and equipping their security forces, sharing intelligence and working with them to strike al-Qaeda terrorists.”

Britain has also announced plans to join with the United States in funding a counter-terrorism police unit in Yemen, as well as plans to hold an international conference on Yemeni security later this month.

Earlier today, British Prime Minister Gordon Brown told the BBC, “This is a new type of threat and it is from a new source which is obviously Yemen, but there are many other potential sources Somalia, as well as Afghanistan and Pakistan.”

Editor Hakim Almasmari, of the Yemen Post newspaper, thinks the conference might be advantageous if it results in more development projects for rural Yemen. However, he fears what any foreign-backed military attacks could mean.

“Al-Qaeda right now is not very strong,” Almasmari said. “Its followers are not more than 400 in all. However, if the U.S. does attack Yemen, al-Qaeda will get stronger and stronger because people who lose their families in the airstrikes will join al-Qaeda not because they want to but because they want revenge against the Americans and the Yemeni government for the attacks.”

The situation has gained new urgency as the government in Sana’a finds itself overwhelmed not only by the growing terrorist threat, but also two separate rebellions, one of which has become something of a proxy war, at least in rhetoric, between Iran and Saudi Arabia.

U.S. military experts have warned that vast reaches of the impoverished nation, with its booming population and dwindling resources, could spin permanently out of the government’s control.

Militant groups from Somalia said that they would send fighters to help aid al-Qaeda in Yemen. Yemen has vowed to keep foreign extremists out.

The U.S. embassy has faced attacks from the local al-Qaeda group before, with an assault outside its gates in 2008 that left 19 people – civilians and militants – dead.

Retrieved from “https://en.wikinews.org/w/index.php?title=US,_UK_embassies_in_Yemen_close_due_to_al-Qaeda_threat&oldid=3340158”

Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin

Tuesday, October 2, 2007

Ray Scott is running for the Family Coalition Party in the Ontario provincial election, in the Algoma-Manitoulin riding. Wikinews’ Nick Moreau interviewed him regarding his values, his experience, and his campaign.

Stay tuned for further interviews; every candidate from every party is eligible, and will be contacted. Expect interviews from Liberals, Progressive Conservatives, New Democratic Party members, Ontario Greens, as well as members from the Family Coalition, Freedom, Communist, Libertarian, and Confederation of Regions parties, as well as independents.

Retrieved from “https://en.wikinews.org/w/index.php?title=Ontario_Votes_2007:_Interview_with_Family_Coalition_Party_candidate_Ray_Scott,_Algoma-Manitoulin&oldid=1052031”

On Chexsystems? Consider Debit Card Accounts To Get Back To Banking

By Kurt Lehmann

If you’ve ever written a bad check (whether it was on purpose or accidental) or have had problems with banks, there’s a pretty good chance that you’re on a list maintained by ChexSystems. This list can cause you a lot of problems when it comes to getting a new bank account or doing other banking tasks. ChexSystems is a Consumer Reporting Agency, like TransUnion, Experian, and others. It provides a list of customers that it considers to be high risk to banks across the country.

Not everyone on this list really is a big risk, though. Some people end up on it because of errors in data, theft of their identities, and many other mistakes. Once you’re on the list, however, it becomes very hard to get a new bank account. Most banks use ChexSystems data to decide whether or not you’ll be allowed to open an account, whether or not that data is accurate. If you’ve been trying to find a bank that doesn’t use the ChexSystems database in your area, you might have gotten frustrated, and resigned to going through life without an account. However, don’t give up hope yet. Debit cards and Internet bank accounts are still an option.

If you’re tired of constantly carrying cash, getting money orders, and using check cashing services, getting a debit card account could be the answer you’re looking for. You can use these cards just like regular credit cards – at bookstores, gas stations, the grocery store, restaurants and online. Anywhere a Visa or MasterCard is accepted, you can use your debit card, including for getting cash from the ATM.

[youtube]http://www.youtube.com/watch?v=7fIix2wFips[/youtube]

A debit card automatically deducts the amount of the purchase from your account, meaning that you don’t have to pay interest or deal with credit. Since the transactions show up on your bank statement, you’ll be able to track your spending. If you want, you can choose to have your paycheck deposited directly into your debit card account. That way, you won’t have to use check cashing stores to get your money.

The biggest difference between a regular checking account and a debit account is that you normally don’t get a checkbook with your debit card. You’ll be able to pay your bills online via Echeck, or automatic debit. Many people prefer to use online banking services (such as those provided by debit card accounts), because they are free — you don’t even need to pay for a stamp and an envelope! Further, using online banking makes it even easier to keep your account balanced, so you avoid further banking problems.

This means that you still get most of the advantages of an ordinary checking account. There are still plenty of banks that permit opening a debit card account for people who are on the ChexSystems list. That makes this an excellent option if you’re on the list and can’t find a local bank that doesn’t use it. A debit card account is a great alternative to an ordinary bank account.

About the Author: Kurt Lehmann is a financial services expert, researching and writing about topics including

ChexSystems

,

Payday Loans

, and

Second Chance Checking

.

Source:

isnare.com

Permanent Link:

isnare.com/?aid=212554&ca=Finances

Harrier jet crashes in Rutland, England, pilot survives

Monday, June 16, 2008

A Royal Navy pilot has safely ejected from his Harrier GR7 aircraft moments before it crashed in a field near the small village of Ashwell in the county of Rutland in England. The crash occurred at about 1350 BST today.

The pilot was taken by air ambulance to Queen’s Medical Centre in Nottingham for treatment for spinal injuries.

Local resident Vic Harrison spoke to the BBC about the incident: “I thought he didn’t stand a chance, but I looked up and saw the parachute of the pilot. I really thought he had hit the houses. It was a narrow miss – it must have been just 400 yards from our house. It has been an exceptionally lucky escape.”

The plane, from the nearby RAF Cottesmore airbase, was on a training mission and is said not to have been carrying any weapons.

Retrieved from “https://en.wikinews.org/w/index.php?title=Harrier_jet_crashes_in_Rutland,_England,_pilot_survives&oldid=750176”

UAE launches national authority for scientific research

Wednesday, March 19, 2008

The United Arab Emirates (UAE) has announced its first national authority for scientific research (NASR) to coordinate and fund scientific research in the country.

The national authority for scientific research was announced on March 7 by Shaikh Nahyan bin Mubarak Al Nahyan, UAE minister for higher education and scientific research. NASR will begin with an annual budget of AED100 million (approximately US$27.2 million). The authority hopes to receive additional contributions from the public and the private sector.

NASR will look to fund research projects in various fields, including engineering, technology, medicine, water and agriculture, proposing specific projects to be competed for by researchers at universities and private research institutes.

“Projects are going to be selected to help promote scientific research and the growth of UAE society and we will compare them with international scientific research criteria,” Gulf News quoted Al Nahyan as saying at the launch.

NASR will also train scientists and develop programmes for promoting public science awareness. It will also coordinate with government authorities on the issue of intellectual property rights, by providing advice on how companies and research centres should go about protecting their discoveries in the form of patents or licenses. It will also provide scholarships for researchers in the UAE to work on international research programmes, and organise national scientific conferences. NASR forms part of the UAE’s strategic plan to improve higher education and scientific research.

Zakaria Maamar, associate professor at the College of Information Technology at Zayed University, UAE, told Science and Development Network (SciDev.Net) that, “This initiative is another boost to the research and development activities that are carried out in the UAE. It will definitely provide researchers with the appropriate funds to sustain such activities and promote best practices in the community.”

Said Elnaffar, assistant professor at the college of information technology at the United Arab Emirates University, told SciDev.Net that, with this initiative, the UAE is taking the lead and setting a good example by building a strong development infrastructure founded on knowledge discovery and research.


This article is based on UAE launches national authority for scientific research by scidev.net (Wagdy Sawahel) which has a copyright policy compatible with our CC-BY 2.5. Specifically “CC-BY-2.0 UK

Retrieved from “https://en.wikinews.org/w/index.php?title=UAE_launches_national_authority_for_scientific_research&oldid=625053”

Man remanded in custody after allegedly spraying urine on goods in Gloucestershire, UK

Monday, May 19, 2008

Sahnoun Daifallah, of White City, Gloucester, was today remanded in custody by Cheltenham magistrates after being arrested for spraying a “foul-smelling, brown substance” from a sports bottle. The liquid is thought to have contaminated food, books, wine bottles, and other items across several stores in Gloucestershire.

Mr Daifallah, the court was today told, committed the offences over multiple days. The attack on a Tesco supermarket, where frozen chips and wine bottles were contaminated with what Tesco claims to be a “mix of human urine, faeces, and domestic products” happened on Friday. He is also accused of a similar offence in a Morrisons supermarket 4 miles away on the same day. Two days previously, Mr Daifallah is accused of spraying the substance inside a pub near Cheltenham, contaminating food, and contaminating over 700 books in a Waterstone’s bookstore in nearby Cirencester.

Mr Daifallah today confirmed that he was at the locations stated, however he indicated he will be pleading not guilty to the charges. He has been remanded in custody until May 28th, when he will appear before Stroud magistrates via videolink to be committed to Gloucester Crown Court – a decision made by magistrates after the estimated damage by the defendant was given at over £10,000, plus cleaning and replacement expenses.

Retrieved from “https://en.wikinews.org/w/index.php?title=Man_remanded_in_custody_after_allegedly_spraying_urine_on_goods_in_Gloucestershire,_UK&oldid=1972971”

What Are Survivable Computer Systems

Submitted by: Darren Miller

Definition Of A Survivable Computer System

A computer system, which may be made up of multiple individual systems and components, designed to provide mission critical services must be able to perform in a consistent and timely manner under various operating conditions. It must be able to meet its goals and objectives whether it is in a state of normal operation or under some sort of stress or in a hostile environment. A discussion on survivable computer systems can be a very complex and far reaching one. However, in this article we will touch on just a few of the basics.

Computer Security And Survivable Computer Systems

Survivable computer systems and computer security are in many ways related but at a low-level very much different. For instance, the hardening of a particular system to be resistant against intelligent attacks may be a component of a survivable computer system. It does not address the ability of a computer system to fulfill its purpose when it is impacted by an event such as a deliberate attack, natural disaster or accident, or general failure. A survivable computer system must be able to adapt, perform its primary critical functions even if in a hostile environment, even if various components of the computer system are incapacitated. In some cases, even if the entire “primary” system has been destroyed.

As an example; a system designed to provide real-time critical information regarding analysis of specialized medications ceases to function for a few hours because of wide spread loss of communication. However, it maintains the validity of the data when communication is restored and systems come back online. This computer system could be considered to have survived under conditions outside of its control.

[youtube]http://www.youtube.com/watch?v=t8QuUEwrKm8[/youtube]

On the other hand, the same system fails to provide continuous access to information under normal circumstances or operating environment, because of a localized failure, may not be judged to have fulfilled its purpose or met its objective.

Fault Tolerant And Highly Availability Computer Systems

Many computer systems are designed with fault tolerant components so they continue to operate when key portions of the system fail. For instance; multiple power supplies, redundant disk drives or arrays, even multiple processors and system boards that can continue to function even if its peer component is destroyed or fails. The probability of all components designed to be redundant failing at one time may be quite low. However, a malicious entity that knows how the redundant components are configured may be able to engineer critical failures across the board rendering the fault tolerant components ineffective.

High availability also plays a role in a survivable computer system. However this design component may not maintain computer system survivability during certain events such as various forms of malicious attack . An example of this might be a critical web service that has been duplicated, say across multiple machines, to allow continuous functionality if one or more the individual web servers was to fail. The problem is that many implementations of high availability use the same components and methodology on all of the individual systems. If an intelligent attack or malicious event takes place and is directed at a specific set of vulnerabilities on one of the individual systems, it is reasonable to assume the remaining computer systems that participate in the highly available implementation are also susceptible to the same or similar vulnerabilities. A certain degree of variance must be achieved in how all systems participate in the highly available implementation.

What’s The Difference Between An Attack, Failure, And Accident? How Do These Differences Impact A Survivable Computer System

In many cases when I am discussing the security of systems with customers, the question of business continuity and disaster recovery come up. Most companies that provide a service that they deem critical just know the system needs to be operational in a consistent manner. However, there is typically little discussion about the various events or scenarios surrounding this and that can lead to great disappointment in the future when what the customer thought was a “survivable computer system” does not meet their expectations. Some of the items I like to bring up during these conversations is what their computer systems goal and objective is, what specifically does continuous operation mean to them, and specifically what constitutes an attack, failure, or accident that can cause loss of operation or failure to meet objectives.

A failure may be defined as a localized event that impacts the operation of a system and its ability to deliver services or meet its objectives. An example might be the failure of one or more critical or non-critical functions that effect the performance or overall operation of the system. Say, the failure of a module of code that causes a cascading event that prevents redundant modules from performing properly. Or, a localize hardware failure that incapacitates the computer system.

An accident is typically an event that is outside the control of the system and administrators of a local / private system. An example of this would be natural disasters such as hurricanes, if you live in south Florida like I do, or floods, or wide spread loss of power because the utility provider cut the wrong power lines during an upgrade to the grid. About two years ago, a client of mine who provides web based document management services could not deliver revenue generating services to their customers because a telecommunications engineer cut through a major phone trunk six blocks away from their office. They lost phone and data services for nearly a week.

An now we come to “attack”. We all know accidents will happen, we know that everything fails at one time or another, and typically we can speculate on how these things will happen. An attack, executed by an intelligent, experienced individual or group can be very hard to predict. There are many well known and documented forms of attacks. The problem is intelligence and human imagination continuously advance the form of malicious attacks and can seriously threaten even the most advanced designed survivable computer systems. An accident or failure does not have the ability to think out of the box or realize that a highly available design is flawed because all participants use the same design. The probability that an attack might occur, and succeed may be quite low, but the impact may be devastating.

Conclusion

One of the reasons I wrote this article was to illustrate that it’s not all about prevention. Although prevention is a big part of survivable computer system design, a critical computer system must be able to meet its objectives even when operating under hostile or stressful circumstances. Or if the steps taking for prevention ultimately prove inadequate. It may be impossible to think of all the various events that can impact a critical computer system but it is possible to reasonably define the possibilities.

The subject of survivable computer systems is actually one of complexity and ever evolving technology. This article has only touched on a few of the basic aspects of computer system survivability. I intend on continuing this article to delve deeper into the subject of survivable computer systems.

About the Author: Darren Miller is an Information Security Consultant with over seventeen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals.Please visit us at

defendingthenet.com

Source:

isnare.com

Permanent Link:

isnare.com/?aid=40163&ca=Computers+and+Technology