Sunday, February 12, 2012
Friday, December 16, 2011
Alternatives to direct browser access
As an alternative to using a web browser, you may download a secure connection program from our source repository, which will be published within the next few weeks. This software will be dual-licensed under the AGPL, and a proprietary license (we need to make a profit somehow). This secure connection utility will allow you to optionally synchronize your data with one of our freely available Cloud servers, after encrypting your data, to ensure that no one, including our employees is able to read your private information. This is in contrast to a number of other Cloud providers, such as Microsoft, Amazon, etc. which store your data in a form where their employees could access it if they wanted to, and read the secure information stored on their servers. As a cloud hosting company, we are concerned by these practices, and intend to modernize both our security infrastructure, and encourage other companies such as Microsoft and Amazon to do the same. Users of these services should always encrypt their information before sending it to any cloud service provider. In the future, cloud hosting providers should provide documentation about technological infrastructures in place which will prevent any employee from gaining access to sensitive customer information. The IDWOS aims to solve this problem, by giving our customers direct access to their information, and even the ability to store the data on their own computers, and access it over a P2P network infrastructure.
Our Cloud goes P2P
P2P distributed computing, and distributed storage is the future direction of the Cloud. We believe that each user of a cloud computing service should directly decide where they want their data to be stored. They can have the option of storing it only on their local computers, with the ability to access the data remotely, or they can synchronize it with our P2P cloud, and access the data anywhere. Either way; we will do our best job to keep our client's information secure. Transitioning the Cloud from the server, to P2P symbolizes the beginning of a less centralized Internet, a more democratic system of data storage, as well as increased security for our users.
What about the future of servers?
In the future, we see servers as being used as data access points, rather than data storage centers. Servers should be used solely for the purpose of accessing your data from any device, and facilitating a communication between a device which is not capable of running our Client application, and the distributed Cloud. Due to the fact that web browsers will still be used, there will not be a decreased demand for servers.
Sunday, November 20, 2011
Thursday, October 20, 2011
- Kernel looks at the URL of the web page, and determines whether or not an existing application is loaded in RAM to process the request. If no application is loaded for the URL, the system will attempt to look in its application database to find the handler application associated with the URL.
- If it does not find a handler, it returns an error page to the client. If a handler is found, it loads the assembly into the virtual kernel, and sends the security token to the virtual application as a WExecutionContext object.
- Once the virtual process is created, control is passed back to native thread running in trusted memory. At this stage, the virtual process is allowed to execute any function within the virtual environment, but is NEVER allowed to call into any native code on host operating system.
- The native thread will then jump back to step 2, and notify the remote process running in the virtual kernel that a request has been received from a client, and passes in a ClientWebRequest object, which contains a Stream to read/write data to/from the client, and information about the request headers that were received from the client.
- The virtual process is free to process the request, and close the stream when it's done. The application will keep running until the server requests the application to terminate. The application will NOT be notified prior to the firing of this event, so it should expect to lose its state at any time. The application may also submit a request to the virtual runtime to kill its process (useful for handling errors and stuff)
Tuesday, May 24, 2011
Hackers like this should put their time into making their own society, instead of breaking into an existing one. Many "hackers" break into things like this, break the law, and these are the ones that SHOULD be put in jail. However, there's also another kind of hacker. The kind who jailbreaks phones, makes security software, custom operating systems, and develops artificial intelligence software. Unfortunately; this kind of hacker always goes unnoticed, finds it impossible to gain employment due to flawed culture in the United States, and sometimes, resorts to this. This attack is a symbol of the weakness of the international opinion against programmers, software developers, and other types of hackers. As a programmer myself, I find it difficult to find any type of employment in the field, because most US software development is outsourced to third-world countries, which usually results in breaches such as this one. If NASA does not want such a breach, they should stop outsourcing this work, and encourage other US companies to do the same.
Tuesday, February 15, 2011
I am proud to announce that IDWNet Cloud Computing will soon be releasing its first PC game, 2 Sided World. The game will span across 2 virtual networks, and connections will be VERY fast and reliable for users of all connection speeds ranging from 1.5MBPS to 100MBPS. Our goal is to give users a consistent experience despite their internet connection speeds. How far are we in developing this game? While; we’ve decided that it’s going to be an in-browser game, and we’ve finished the basic physics engine, particle effects engine, and animated water. Here’s a video showing the current progress of the engine (mainly focused on the animated water) (Our game uses the Away3D engine, which will soon have Molehill support when Molehill is actually released. This should allow all clients to get the same performance as seen in this video):
Monday, February 8, 2010
Various IDW projects have now been open-sourced and ported to Ubuntu – Join the dev team if you’re interested! Now available on Windows and Linux!
You can now join our development team on Launchpad at https://launchpad.net/~idwdevteam
Feel free to create branches and help contribute to the projects! We need as many developers as we can get.