Despite running a campaign with about twice the money and twice the staff of Governor Mitt Romney's presidential bid, President Barack Obama's campaign under-spent Romney's on IT products and services by $14.5 million, putting the money instead into building an internal tech team. Based on an Ars analysis of Federal Election Commission filings, the Obama campaign, all-inclusive, spent $9.3 million on technology services and consulting and under $2 million on internal technology-related payroll.
According to the article they hired their own team and used open source tool and cloud based infrastructure. By contrast Romney spent a bundle on outside vendors.
The Romney campaign spent $23.6 million on outside technology services—most of it on outside "digital media" consulting and data management. It outsourced most of its basic IT operations,
Sen. Patrick Leahy has abandoned his controversial proposal that would grant government agencies more surveillance power — including warrantless access to Americans' e-mail accounts — than they possess under current law.
Speaking at a special press conference at the Government Computing Center in Jerusalem about the cyber war against Israel that has accompanied Hamas’s rocket attacks, Steinitz said that hackers “are trying to disable the symbols of Israeli sovereignty, to enter web sites and install anti-Israel content, thus compromising information and data and damaging the government’s ability to serve the public.” Most of the attacks, he said, were against government sites, like the Prime Minister’s Office site, and security-related sites, such as that of the Home Front Command, the body charged with informing Israelis on how to protect themselves in the event of an attack.
Out of those 44 million-plus attacks on government and defense related sites, said Steinitz, only one succeeded – partially. One site, which he did not name, was “wobbly for a few minutes,” but quickly recovered. Even though the government has been successful in warding off hack attacks, Steinitz said that government sites were fully backed up and mirrored, meaning that they could be replaced by a duplicate site instantly if the original site were compromised.
Advocacy group April has been battling the Unitary Patent because it contends the law "would increase the dangers of software patents," said Gérald Sédrati-Dinet, patent advisor at April, in an email. An E.U.-wide patent system would open the door for E.U.-wide sales bans on smartphones for instance, whereas at the moment product bans related to patent infringement cases are granted on a country-by-country basis.
Sédrati-Dinet warned that some aspects of the compromise may still be found to be contrary to European law, but the European Parliament committee said that according to their experts the compromise is legal.
"We believed there is a willful effort on the part of certain members of Autonomy management to mislead shareholders when Autonomy was a publicly traded company, and to mislead potential buyers including HP, Whitman said. "We stand by the forensic review that we’ve seen," she added.
I wish her the same level of success I had when I filed an eBay claim.
The Linux rootkit does not appear to be a modified version of any known piece of malware and it first came to light last week when someone posted a quick description and analysis of it on the Full Disclosure mailing list. That poster said that his site had been targeted by the malware and some of his customers had been redirected to malicious sites.