Tag Archives: DAC

The Hartford Announces Expanded Hedging Program That Effectively Eliminates Currency And Equity Mark

By Business Wirevia The Motley Fool

Filed under:

The Hartford Announces Expanded Hedging Program That Effectively Eliminates Currency And Equity Market Risks On Japan Variable Annuity Block

  • Talcott Resolution, The Hartford’s life run-off operations, now capital self-sufficient
  • Expects first quarter 2013 DAC charge of $600 million to net income due to expansion of hedging program
  • Company’s capital flexibility significantly enhanced

HARTFORD, Conn.–(BUSINESS WIRE)– At its investor meeting being held today, The Hartford said that the risk profile of its legacy variable annuity block has been significantly improved as a result of actions the company has taken, including an expanded Japan variable annuity (VA) hedging program, as well as the benefit of favorable yen weakening and global equity market movements.

Last March, we announced a new strategy for The Hartford focused on positioning the organization, over time, to generate greater shareholder value by reducing the company’s exposure to market volatility, lowering our cost of capital and increasing capital flexibility,” said The Hartford’s Chairman, President and CEO Liam E. McGee. “A key element of that strategy, along with profitably growing our go forward businesses, is to reduce the size and risk of the legacy VA block. We are pleased that as a result of actions we have taken and global market movements, the risk profile of the legacy VA block has dramatically improved and Talcott’s operations are now capital self-sufficient.”

“The company’s capital flexibility is significantly enhanced since year end, and our capital generation outlook heading into 2014 and beyond is improved,” said The Hartford’s Chief Financial Officer Christopher J. Swift. “With the significant progress we have made on The Hartford’s transformation, excess capital generated by the go forward businesses — property and casualty, group benefits and mutual funds — will be available for potential capital management actions or reinvestment in the businesses for future profitable growth.”

The company also announced that financial results for the first quarter of 2013 will include a deferred acquisition charge (DAC) of approximately $600 million, after tax. The charge reflects the elimination of future estimated gross profits on the Japan VA block due to the increased costs

From: http://www.dailyfinance.com/2013/04/11/the-hartford-announces-expanded-hedging-program-th/

Freescale Introduces Healthcare Analog Front End Reference Platform

By Business Wirevia The Motley Fool

Filed under:

Freescale Introduces Healthcare Analog Front End Reference Platform

Comprehensive platform, with hardware, schematics and software, helps decrease development time for healthcare applications

SHANGHAI–(BUSINESS WIRE)– The global proliferation of portable medical devices is making medical technology more accessible to consumers and transforming the healthcare industry by providing previously unavailable technology to end users, often in their own home. Medical device manufacturers are facing the challenges of the consumer marketplace including its price sensitivity and time-to-market pressure. To help simplify product development, reduce cost and speed time to market, Freescale Semiconductor (NYS: FSL) is introducing a Healthcare Analog Front End (AFE) reference platform that includes hardware, schematics and software for easy prototyping.

The Freescale Healthcare AFE reference platform is a highly integrated HW/SW development platform, that helps reduce system cost, board size and complexity. The platform is built around the Kinetis K53 MCU which includes an integrated analog front end (AFE) featuring everything needed to capture biometric sensor data. The integrated AFE contains a precise voltage reference, four high performance amplifiers and two high-resolution ADC and DAC modules. (Photo: Business Wire)

The global medical device industry is growing rapidly and is expected to reach $228 billion by 2015, up from $164 billion in 2010, according to a recent industry research report by Espicom. According to Gartner, portable consumer medical devices, such as blood glucose monitors, blood pressure monitors, insulin pumps and heart rate monitors, represent the fastest-growing segment in that market.

“The continued consumerization of healthcare is putting significant pressure on the medical device engineering community,” said Steven Dean, director of vertical solutions marketing at Freescale. “These engineers are expected to complete designs in a few months, and they appreciate anything vendors like Freescale can do to make the process easier and faster. Our healthcare-specific AFE reference platform allows engineers and external design firms to more easily prototype products and complete more projects in a shorter timeframe.”

Reducing development costs

The Freescale Healthcare AFE reference platform is a highly integrated HW/SW development platform, that helps reduce system cost, board size and complexity. The platform is built around the Kinetis K53 MCU which includes an integrated analog front end (AFE) featuring everything needed to capture biometric sensor data. The integrated AFE contains a precise voltage reference, four high performance amplifiers and …read more
Source: FULL ARTICLE at DailyFinance

Jamie Strandboge: Application isolation with AppArmor – part I

A lot of exciting work has been going on with AppArmor and this multipart series will discuss where AppArmor is now, how it is currently used in Ubuntu and how it fits into the larger application isolation story moving forward.

Brief History and Background

AppArmor is a Mandatory Access Control (MAC) system which is a Linux Security Module (LSM) to confine programs to a limited set of resources. AppArmor’s security model is to bind access control attributes to programs rather than to users. AppArmor confinement is provided via profiles loaded into the kernel. AppArmor profiles can be in one of two modes: enforcement and complain. Profiles loaded in enforcement mode will result in enforcement of the policy defined in the profile as well as reporting policy violation attempts (either via syslog or auditd) such that what is not allowed in policy is denied. Profiles in complain mode will not enforce policy but instead report policy violation attempts. AppArmor is typically deployed on systems as a targeted policy where only some (eg high risk) applications have an AppArmor profile defined, but it also supports system wide policy.

Some defining characteristics of AppArmor are that it:

  • is root strong
  • is path-based
  • allows for mixing of enforcement and complain mode profiles
  • uses include files to ease development
  • is very lightweight in terms of resources
  • is easy to learn
  • is relatively easy to audit

AppArmor is an established technology first seen in Immunix, and later integrated into Ubuntu, Novell/SUSE, Mandriva, Debian, their derivatives and others. Core AppArmor functionality is in the mainline Linux kernel starting with 2.6.36. AppArmor maintenance and development is ongoing.

An example AppArmor profile

Probably the easiest way to describe what AppArmor does and how it works is to look at an example, in this case the profile for tcpdump on Ubuntu 12.04 LTS:

#include <tunables/global>
/usr/sbin/tcpdump {
  #include <abstractions/base>
  #include <abstractions/nameservice>
  #include <abstractions/user-tmp>
  capability net_raw,
  capability setuid,
  capability setgid,
  capability dac_override,

  network raw,
  network packet,

  # for -D
  capability sys_module,
  @{PROC}/bus/usb/ r,
  @{PROC}/bus/usb/** r,

  # for finding an interface
  @{PROC}/[0-9]*/net/dev r,
  /sys/bus/usb/devices/ r,
  /sys/class/net/ r,
  /sys/devices/**/net/* r,

  # for tracing USB bus, which libpcap supports
  /dev/usbmon* r,
  /dev/bus/usb/ r,
  /dev/bus/usb/** r,

  # for init_etherarray(), with -e
  /etc/ethers r,

  # for USB probing (see libpcap-1.1.x/
  # pcap-usb-linux.c:probe_devices())
  /dev/bus/usb/**/[0-9]* w,

  # for -z
  /bin/gzip ixr,
  /bin/bzip2 ixr,

  # for -F and -w
  audit deny @{HOME}/.* mrwkl,
  audit deny @{HOME}/.*/ rw,
  audit deny @{HOME}/.*/** mrwkl,
  audit deny @{HOME}/bin/ rw,
  audit deny @{HOME}/bin/** mrwkl,
  owner @{HOME}/ r,
  owner @{HOME}/** rw,

  # for -r, -F and -w
  /**.[pP][cC][aA][pP] rw,

  # for convenience with -r (ie, read 
  # pcap files from other sources)
  /var/log/snort/*log* r,

  /usr/sbin/tcpdump r,

  # Site-specific additions and overrides. See 
  # local/README for details.
  #include <local/usr.sbin.tcpdump>
}

This profile is representative of traditional AppArmor profiling for a program that processes untrusted input over the network. As can be seen:

  • profiles are simple text files
  • comments are supported in the profile
  • absolute paths as well as file globbing can be used when specifying file access
  • various access controls for files are present. From the profile we see ‘r’ (read), ‘w’ (write), ‘m’ (memory map as executable), ‘k’ (file locking), ‘l’ (creation hard links), and ‘ix’ to execute another program with the new program inheriting policy. Other access rules also exists such as ‘Px’ (execute under another profile, after cleaning the environment), ‘Cx’ (execute under a child profile, after cleaning the environment), and ‘Ux’ (execute unconfined, after cleaning the environment)
  • access controls for capabilities are present
  • access controls for networking are present
  • explicit deny rules are supported, to override other allow rules (eg access to @{HOME}/bin/bad.sh is denied with auditing due to ‘audit deny @{HOME}/bin/** mrwkl,’ even though general access to @{HOME} is permitted with ‘@{HOME}/** rw,’)
  • include files are supported to ease development and simplify profiles (ie #include , #include , #include , #include )
  • variables can be defined and manipulated outside the profile (#include for @{PROC} and @{HOME})
  • AppArmor profiles are fairly easy to read and audit

Complete information on the profile language can be found in ‘man 5 apparmor.d’ as well as the AppArmor wiki.

Updating and creating profiles

AppArmor uses the directory heirarchy as described in policy layout, but most of the time, you are either updating an existing profile or creating a new one and so the files you most care about are in /etc/apparmor.d.

The AppArmor wiki has a lot of information on debugging and updating existing profiles. AppArmor denials are logged to /var/log/kern.log (or /var/log/audit/audit.log if auditd is installed). If an application is misbehaving and you think it is because of AppArmor, check the logs first. If there is an AppArmor denial, adjust the policy in /etc/apparmor.d, then reload the policy and restart the program like so:

$ sudo apparmor_parser -R /etc/apparmor.d/usr.bin.foo
$ sudo apparmor_parser -a /etc/apparmor.d/usr.bin.foo
$ <restart application>

Oftentimes it is enough to just reload the policy without unloading/loading the profile or restarting the application:

$ sudo apparmor_parser -r /etc/apparmor.d/usr.bin.foo

Creating a profile can be done either with tools or by hand. Due to the current pace and focus of development, the tools are somewhat behind and lack some features. It is generally recommended that you profile by hand instead.

When profiling, keep in mind that:

  • AppArmor provides an additional permission check to DAC. DAC is always checked in addition to the AppArmor permission checks. As such, AppArmor cannot override DAC to provide more access than what would be normally allowed.
  • AppArmor normalizes path names. It resolves symlinks and considers each hard link as a different access path.
  • AppArmor evaluates file access by pathname rather than using on disk labeling. This eases profiling since AppArmor handles all the labelling behind the scenes.
  • Deny rules are evaluated after allow rules and cannot be overridden by an allow rule.
  • Creation of files requires the create permission (implied by w) on the path to be created. Separate rules for writing to the directory of where the file resides are not required. Deletion works like creation but requires the delete permission (implied by w). Copy requires ‘r’ of the source with create and write at the destination (implied by w). Move is like copy, but also requires delete at source.
  • The profile must be loaded before an application starts for the confinement to take effect. You will want to make sure that you load policy during boot before any confined daemons or applications.
  • The kernel will rate limit AppArmor denials which can cause problems while profiling. You can avoid this be installing auditd or by adjusting rate limiting in the kernel:
    $ sudo sysctl -w kernel.printk_ratelimit=0

Resources

There is a lot of documentation on AppArmor (though some is still in progress):

Next time I’ll discuss the specifics of how Ubuntu uses AppArmor in the distribution.

Thanks to Seth Arnold and John Johansen for their review.

Filed under: canonical, security, ubuntu
Source: FULL ARTICLE at Planet Ubuntu