(via Le supermarché virtuel s’installe dans le métro de Séoul | Eco89)
Mois : septembre 2011 (Page 9 of 9)
Websites like Facebook that sit on the open Internet and offer a set of robust services don’t come together overnight. We hire the best and brightest, and have implemented numerous protocols, like our six-week intensive “boot-camp” and peer-reviewed code pushes, to ensure that only code that meets our rigorous standards is active on the site. Even so, sometimes software code contains bugs. Generally speaking, there are bugs in software because of software complexity, programming errors, changes in requirements, errors made in bug tracking, limited documentation or bugs in software development tools. To deal with this, we have entire teams dedicated to searching out and disabling bugs, and we also hire outside auditors to help test our code. Our all night “bug-a-thons” are also successful in locating and fixing issues.
The Eagle system allows agents to observe network traffic and peer into people’s emails, among other things. In the room, one English-language poster says: “Whereas many Internet interception systems carry out basic filtering on IP address and extract only those communications from the global flow (Lawful Interception), EAGLE Interception system analyses and stores all the communications from the monitored link (Massive interception).” On its website, Amesys says its “strategic nationwide interception” system can detect email from Hotmail, Yahoo and Gmail and see chat conversations on MSN instant messaging and AIM. It says investigators can “request the entire database” of Internet traffic “in real time” by entering keywords, email addresses or the names of file attachments as search queries.