UPDATE FIXES VERIZON IPHONE 5 DATA GLITCH; CUSTOMERS WON'T BE CHARGED FOR OVERAGES

Verizon iPhone 5 customers may have noticed an issue wherein their phones gobbled up extra cellular data when they were theoretically connected to Wi-Fi networks. Those customers now have two bits of good news: There’s a special software update that fixes the problem, and they won’t be responsible for unexpected charges related to unintended network overages related to the issue that spurred the carrier update in the first place.

10 HOT IT SKILLS FOR 2013

The number of companies planning to hire tech professionals continues to grow, with 33% of the 334 IT executives who responded to Computerworld's 2013 Forecast survey saying they plan to increase head count in the next 12 months..

APPLE WARNS ICLOUD USERS OF LOOMING STORAGE LOSS

Apple on Monday began reminding some iCloud users that they will soon lose the 20GB of free storage they'd received when they migrated from MobileMe.

Nook Video set for fall premier

Barnes and Noble Tuesday announced that Nook Video will premiere this fall in the U.S. and UK. The service will offer access to movies and TV shows for streaming and download.

Eight simple steps to make the upgrade to iPhone 5 easier

A little planning can save time - and voice messages - when you upgrade to the new iPhone 5

Sunday, December 28, 2008

Sun executive reveals more open source plans for JavaFX

Company also offers updated road map indicating that the mobile platform will be released in March
Sun Microsystems executive has provided a glimpse into the company's future plans for open sourcing JavaFX, its recently released technology for building RIAs (rich Internet applications) for the desktop, mobile devices, and other platforms.

Sun's corporate image is grounded in its embrace of open source software and some components of JavaFX, including the JavaFX compiler and elements of graphic libraries, are now available under the GPLv2 open source license, according to the official JavaFX FAQ.
But other key components are still proprietary. Sun is now working to change this, according to a recent blog post by Jeet Kaul, vice president of the Client Software Group.

"There are some dependencies on licensed code that cannot be open sourced. We are working towards decoupling the dependencies so that the non-proprietary portions can be open sourced," Kaul wrote. "We will put the core runtime out in the open over time."

Kaul did not spell out the nature of the dependencies. A spokesman for Sun did not immediately respond to a request for more information Tuesday.
Sun will also publish specifications for new file formats associated with JavaFX, "shortly," Kaul said.

Kaul's blog post came in response to those questions and others posted by Java developer Osvaldo Pinali Doederlein.

The Sun executive also provided an updated road map for JavaFX, writing that the mobile platform -- now in beta -- will be released "by March" and a visual designer tool will be available in the middle of next year.

While JavaFX will compete with a range of other RIA toolsets, such as Adobe's AIR (Adobe Integrated Runtime) and Microsoft's Silverlight, Sun is banking that Java's pervasive market penetration will give it an edge.

Copyright © 2008 infoworld.com

Thursday, December 25, 2008

Software executive sentenced for hacking

President of Platte River Associates also faces charges of "trading with the enemy"
The president of a U.S. software company has been sentenced to probation after pleading guilty to stealing password-protected files from a competitor.
Jay E. Leonard, 61, was sentenced to 12 months supervised probation and a $2,500 fine after pleading guilty to one count of unauthorized access to a protected computer, a misdemeanor charge.

He said that one of Leonard's employees may have turned his boss in. He knew Leonard professionally and was "very surprised" by the incident, he said.

Leonard accessed the Zetaware site from a Sprint wireless network at Houston's George Bush Intercontinental Airport, located near Zetaware's headquarters, the plea agreement states.

In a separate case, Platte River Associates is also facing charges of "trading with the enemy," for allegedly allowing its software to be used to evaluate oil and gas development opportunities off the shore of Cuba, which is under a U.S. trade embargo. "The company has expressed an interest in pleading guilty," in that case, although no plea has been accepted by the judge, according to Jeffrey Dorschner, a spokesman for the United States Attorney's office prosecuting the two cases.

Leonard and his attorney did not return calls seeking comment for this story.

What can you afford NOT to do on IT security?

Recession is moving companies to stop working on "marginal" projects and "focus on basics"
With the ailing economy putting a crimp in IT budgets, information security managers -- like just about everyone else in the tech world -- are feeling pressure to keep their costs in line.
Few expect to be hit with outright budget reductions, at least in the short term; regulatory requirements and the ever-expanding list of external and internal threats make it hard to devote less money to security efforts. But there is a growing push to curb or defer spending increases, according to IT managers and security analysts.

"It's imperative to squeeze every penny of value out of everything you do," said Jim Kirby, senior network engineer at DataWare Services, an IT services firm in Sioux Falls, S.D. This is a good time to stop working on "marginal" projects and redirect resources to security capabilities that are absolutely necessary, Kirby said.

Matt Kesner, chief technology officer at Fenwick & West LLP in San Francisco, said the law firm's security strategy for next year is to "focus on basics." Its 2009 IT budget doesn't call for reduced spending on security -- but neither does it include a funding increase.

And Fenwick & West is taking some steps to cut costs. The firm is deferring an earlier plan to hire a full-time networking and security expert because of the recession, Kesner said. It is also looking for opportunities to use open source alternatives to some of its security tools.
One of the few new IT projects approved for next year is a replacement of the anti-virus software installed on all of the law firm's PCs -- an upgrade that Kesner said is being driven by the increased threats to corporate data from malware and phishing attacks. Fenwick & West also plans to train end-users more intensively on how to secure their PCs and mobile devices, and on the importance of creating strong passwords.

Even in an economy gone sour, a growing number of government and industry regulations impose security compliance costs that there is simply no getting away from. For instance, new data-protection laws in states such as Massachusetts, Connecticut, and Nevada require companies to use data encryption tools and implement other security controls to safeguard the personal information of state residents.

Similarly, the Payment Card Industry Data Security Standard, created by the major credit card companies, requires all businesses that accept credit and debit transactions to adopt a broad set of data protection controls. And the federal HIPAA law includes data security and privacy rules for health care providers in order to protect patient information.

Meanwhile, cybercrooks are targeting companies with increasingly sophisticated -- and successful -- attacks. For example, Symantec Corp. said in a report last month that at least $1.7 billion worth of bank accounts were compromised in the United States during the 12-month period that started in July 2007.
In light of all that, not making cutbacks in anti-virus subscriptions and purchases of frontline security tools such as firewalls and network intrusion-detection systems is a no-brainer, security managers said.
Kirby said investments in outbound-traffic inspection tools and controls for locking down portable media devices also are worthwhile because of the heightened risk of insider attacks at a time of increased layoffs. In addition, he thinks that cutting back on disaster recovery and business continuity projects wouldn't be wise.

Whittling away at risk management and compliance oversight functions is another bad idea, said the chief privacy officer (CPO) at a large financial services firm. That could leave companies facing potentially serious consequences for not complying with security requirements, he said.

What to cut
But there are other areas in which IT and security managers may be able ease up on spending. Kirby said that although intrusion-detection systems are a must-have item, many companies can live without intrusion-prevention tools, which are more sophisticated but also more expensive and harder to manage. He added that biometric security projects can often be postponed.

Paring back on third-party security education and training programs can also yield some extra dollars that can be used for other purposes, said the CPO, who asked not to be identified. "Companies have a lot of vendor-hosted or vendor-provided education programs -- kind of, 'Here's how you do data security if you're covered by HIPAA or by PCI,' " he said. According to the CPO, the cost of individual programs can sometimes top $200,000 annually, depending on the number of employees being trained.

Marcin Czabanski, director of IT at LifeSecure Insurance Co. in Brighton, Mich., said companies should also look for ways to move applications -- and their security functions -- into the computing clouds offered by vendors such as Google, Microsoft, and Amazon.com.
By doing so, Czabanski said, "you can outsource a lot of the headache" of managing and securing desktop applications -- and do so for less money than keeping the work in-house.

E-mail is another application that can move to the cloud. The Henssler Financial Group in Kennesaw, Ga., is a user of Google's Postini e-mail security and archiving services. Tim O'Pry, Henssler's chief technology officer, said the arrangement has enabled the financial services firm to offload to Google the hassle and expense of securing its e-mail system.

In addition, using the hosted services has "dramatically" reduced Henssler's e-mail archiving costs while making it easier for employees to search for and retrieve old messages, O'Pry said.
Moving e-mail to a cloud infrastructure such as Google's can also help organizations lower the costs of complying with e-discovery rules in legal cases, said David Jordan, chief information security officer for Virginia's Arlington County.
For instance, Google earlier this year launched a Postini service called Message Discovery that is designed to help businesses comply with e-mail retention regulations and speed up the process of retrieving messages in response to lawsuits or other legal matters. Such setups can also help customers trim their e-mail hardware, software, management, and security costs, Jordan said.

Another possible cost-saving option, he noted, is deploying virtualization and thin-client technologies that let employees access a set of centralized applications. Jordan said he thinks that thin-client architectures are inherently more secure -- and thus less costly to manage and control -- than traditional client/server computing models.

Any cutbacks should be carefully weighed, though.

Phil Hochmuth, an analyst at Yankee Group Research Inc., said it's understandable that companies might want to rein in their security spending (see related story, at left). But on a longer-term basis, "it would probably be a mistake if they backed off strategic initiatives" just to cut costs now, Hochmuth said.

O'Pry agreed. "Trying to scrimp and save on security in this economy would be a penny-wise, pound-foolish thing to do," he said. O'Pry noted that as a financial services firm, Henssler is "affected more than anyone else" by the downturn. Even so, there's little talk within the company about cutting security spending. "Your most valuable nontangible asset is your reputation," O'Pry said. "You can't risk taking any hits to that."

Microsoft may release Windows 7 beta at show

Signs are pointing to sometime in January and possibly the CES show in Las Vegas as a likely first public look at Windows 7 .
Attendees at next month's Consumer Electronics Show (CES) could get the first public look at Windows 7, the next version of Microsoft's client OS.
At its Professional Developers Conference in Los Angeles in October, Microsoft said it would release the beta early in 2009. Though nothing has been confirmed, signs are pointing to sometime in January and possibly the CES show in Las Vegas as a likely release date. CES is scheduled for

A member of Microsoft's public relations team in the U.K. said in an e-mail that at the show, "Microsoft will be making some significant announcements including Windows 7." She did not specify exactly what the news around the OS would be. But several blogs, including All About Microsoft, have reported that beta testers are expecting a Windows 7 beta any day.

Furthermore, Microsoft wrote on a Web site for its Microsoft Developer Network Conferences (MDCs) that attendees of those conferences, some of which are scheduled for mid-January, can expect a Windows 7 beta DVD.

Some of the MDCs were this month and the site gave Microsoft an out if the beta wasn't released in December, saying that "the DVD will be shipped to attendees when it becomes available." A Windows 7 beta was not released at those conferences, and the next MDCs are scheduled for Jan. 13 in Chicago and Minneapolis.
Microsoft expects to release Windows 7 in early 2010, although some industry observers expect it may be out by the end of 2009 because of lackluster customer response to Windows Vista. Many business customers in particular have opted to skip Vista and run XP until Windows 7 is available.

Copyright © 2008 infoworld.com

Tuesday, December 23, 2008

Choppy water ahead for VMware?

Wall Street and other investors are openly expressing caution about the virtualization darling
uestion marks have been raised over the ability of VMware to meet its fourth-quarter revenue numbers, after a turbulent 12 months for the virtualization giant that saw the ousting of its co-founders, and a massive decline in its share price.

Despite a string of healthy trading figures, Wall Street seems to have fallen out of love with the virtualization vendor. Other investors are becoming openly cautious about VMware, a point highlighted in a blog by Zachary Scheidt, a managing general partner for a private hedge fund.

Scheidt pointed out that last month Morgan Stanley issued a "sell" recommendation on VMware's shares. UBS followed suit and also rated the virtualization software vendor as a sell.

"On November 4th we initiated an RTI (Research Tactical Idea) for a trading sell on VMW, and now see further risk near term," said Morgan Stanley in its latest research note on VMware. "First, Q4 is off to a slow start and we believe VMW may struggle to hit consensus. Second, ELA (VMware's Enterprise Licence Agreement) momentum is slowing, which likely removes a major driver of license growth. Third, headcount will weigh on margins in the first half of 09."

"Now, I don't always put too much credence in recommendations from brokerages, but since sell ratings are so rare, I thought it worth a look," said Scheidt on his blog. "Upon further review, there were some very interesting red flags raised that indicate caution is still important with this name," he wrote.

Scheidt highlighted the disastrous slide of VMware's shares over the past 14 months. Shares in the company are currently trading at the $24.50 (£16) mark, a far cry from the heady heights of $122 (£82) reached in November 2007.

Scheidt also picked up on Morgan Stanley's concern that VMware will have a difficult time meeting its fourth-quarter revenue numbers. This is because as early as November, the "channel checks" that analysts undertake have suggested weakness in the sector.

A more detailed analysis can be found here.

"As a matter of policy, we don't comment on stock price fluctuations," said Reza Malekzadeh, EMEA Senior Director of Products and Marketing at VMware. "But what I can say is that the fundaments of the business are sound. According to a recent Goldman Sachs IT spending survey, for the past 12 quarters VMware has been gaining increasing amount of IT spend. Indeed, VMware has been the number 1 recipient for IT spend for past 12 quarters."

"We are very mature software company, but some quarters are more back end loaded than others," Malekzadeh told Techworld. "I would say that we have the same financial rhythm as other companies.

"But it is unprecedented times we are currently in, and it would be foolish of me to say it is not affecting us, like other companies," he added.

"VMware as a technology company has to maintain its leadership and has to innovate, and we have no intension of slowing innovation down," he said. "The path that typically customers start down with virtualisation is to virtual the servers in order to get a capital gain (capex), but as they move forward with deploying virtualisation, they start to achieve operational expense savings, for example it requires less administrators to run workloads etc."

Malekzadeh pointed out that we could expect to see product announcements in the following areas over 2009, namely Virtual Datacentre Operating System; Vcloud (allows customers to move their applications seamlessly between their facility and a hosting facility without closing it down); and finally the client.

"The desktop is a huge marketplace with a lot of pain points for companies (managing the systems etc), and virtualisation can bring whole new advantages to that world," he said.

Intel adds to SATA drive range

Intel is expanding its range of SATA solid state drives with a 160GB version in two different sizes.

The company is adding to the X25-M 2.5in SATA solid-state drives with new laptop-friendly 160GB versions now, and is planning a 1.8in version for ultra-light portable devices for release in early January.

Current pricing for the new 160GB Intel SSD drives is US$945 in quantities of under 1,000.

Copyright © 2008 vnunet.com

Check Point buys Nokia security appliance business

Security vendor Check Point Software Technologies has snapped up Nokia’s security appliance business for an undisclosed sum.

The acquisition will enable Check Point to provide an extended security appliance portfolio developed, manufactured and supported internally, the firm said in a statement. It follows a long-standing partnership between the two companies, according to Gil Shwed, Chairman and CEO at Check Point.

“The Nokia security appliance business has been an important strategic partner for Check Point and has helped us achieve early leadership in the security appliance market,” said Shwed.

“Adding Nokia’s security appliance portfolio into Check Point’s broad range of security solutions is the natural conclusion of our long collaboration, and will assure a smooth path forward for our mutual customers.”

Check Point and Nokia claim to have ‘long provided’ customers with a range of security solutions.

Nokia’s security appliance business provides purpose-built security platforms optimised for Check Point firewall, virtual private network (VPN) and unified threat management (UTM) software, the companies said.

About 85 percent of Fortune 500 companies have bought Nokia’s security platforms, and more than 220,000 Nokia appliances have been installed with over 23,000 customers worldwide, it claimed.

The acquisition is expected to close in the first quarter of 2009 subject to regulatory approvals and customary closing conditions. Further details of the transaction were not disclosed.


Copyright © 2008 itnews.com.au

Conroy delays ISP trial of Internet content filters

Broadband Minister Stephen Conroy has come clean on the highly anticipated technical trials of content filter technologies by ISPs, announcing he will push them back until at least mid-January 2009.

It has been reported this week by News.com.au that ISPs which had expressed interest in participating in the trials, including iiNet, were still yet to receive word from the government on whether they’d been accepted into the program.

The trials were initially set to run before the end of the year.

However, Conroy has now pushed the technical trials into next year, just days after announcing the trials would be expanded to test filters that can examine peer-to-peer and BitTorrent traffic .

“The pilot trial will not begin until mid-January and an announcement regarding participants will be made at that time,” said Conroy.

“On 10 November I released an Expression of Interest seeking participation of ISPs and mobile telephone providers in a live pilot. A number of applications have been received from ISPs expressing interest in participating in the field pilot of ISP content filtering.

“The live pilot trial will provide evidence on the real world impacts of ISP content filtering, including for providers and internet users. It will provide an invaluable opportunity for ISPs to inform the Government’s approach,” said Conroy.

First Look: Blackberry Storm compared with iPhone 3G

Thursday December 04, 2008
AUD
$899
Price at time of review.

Vodafone's grabbed itself an exclusive on the Blackberry Storm, but is it an exclusive that was worth it? We've unpacked a Blackberry Storm and given it a quick spin, and comparison with the iPhone 3G - here's our initial impressions.

First Look: Blackberry Storm compared with iPhone 3G






t's a bit of a shock coming face to face with a Blackberry with no keyboard at all, and even with only a bit of exposure to the Storm, we're still finding it a bit tougher than we'd expect to type and tap accurately.

It's not quite as excruciating as
HTC's sluggish Touch Diamond, but it's definitely going to be an acquired taste, as is the tappable screen, which operates for all intents and purposes just like the single-tap-button pad on the new Macbook and Macbook Pro lines.

RIM has at least gone for nice large icons, so you're not delicately trying to select too small an area with each tap.

So how does the Storm compare to the iPhone 3G? Both have large touchscreens, the Storm is slightly heavier at 155g vs 133g for the iPhone, both have GPS, while the Storm boasts a 3.2MP camera vs 2MP for the iPhone.

One major difference is the lack of WiFi on the Storm - possibly a big deal if you rely on your office/home wireless. Another big question will be whether Blackberry can match Apple's App Store.



Model

Blackberry Storm

Apple iPhone 3G





Phone Bands

Quad Band GSM (850/900/1800/1900Mhz), 3G HSDPA

Quad Band GSM (850/900/1800/1900Mhz), 3G HSDPA

WiFI

No

Yes

Screen Size

3.25" 360x480

3.5" 480x320

Weight

155g

133g

Pricing

"Valued" at $899 (but not available to buy outright), only available on minimum $69/month 2 year plan

Caps range from $29 upwards; available unlocked for around $900.

Input

Onscreen QWERTY or SureType Keyboard

Onscreen QWERTY keyboard.

Bluetooth

Stereo

Mono

Camera

3.2 Megapixel

2.0 Megapixel

GPS

Yes

Yes

Web Browser

Blackberry Browser

Mobile Safari

Application downloads

"Coming Soon"

Via iTunes App Store

Copyright © 2008 itnews.com.au

Lenovo IdeaPad S10 takes on Aspire One and Eee PC

Wednesday December 10, 2008
AUD
$749
Price at time of review.

A good netbook with lots of storage, but battery life keeps it from being great

Lenovo IdeaPad S10 takes on Aspire One and Eee PC
If the Lenovo IdeaPad S10 had come along 6 months ago, we probably would have crowned it the best little netbook around. But after having seen the likes of the
Eee PC 1000H and the HP Mini 1001TU, the Lenovo comes off looking a little second-best.

click to view full size image
Lenovo's S10: A vision in white, and largely smudge free


Design
Take, for example, the connections -- the latest Eee models come with 3 USB ports, while the S10 has just two. Although it includes an expresscard slot, it has no Bluetooth. The trackpad is tiny compared to the HP Mini 1001TU, and its white blocky design is nowhere near as attractive as the Aspire One or HP Mini -- although it is reminiscent of the lightweight, but considerably more expensive, NEC S9100.

click to view full size image
Only two USB ports, and no Bluetooth, but there is expresscard


Storage
The big plus for the S10 is the hard drive -- at 160GB, that puts it at the top of the netbook pile for storage. Only the Aspire One offers as much hard disk space. Otherwise, the specs are as expected: 10.2in 1024x600 screen, 1GB RAM, 1.6GHz Atom processor. It’s built solidly and can probably withstand hefty knocks and bumps with ease.

Battery
Sadly, the battery life is the big drawback for the Lenovo. We should qualify up front, however, that our battery testing had a few hiccups where the S10 was concerned: we were unable to change the power management settings, meaning that in order to run our light use test, we had to touch the trackpad every five minutes to ensure that the machine didn't sleep.

This may have shortened the battery life -- the S10 earned a paltry 2hrs 19mins in our light use test -- but for the heavy use test we were able to run it without any tweaking and still only recorded 1hr 49mins. Those results are the poorest we've seen for a netbook.

Performance
Despite our misgivings over battery life, the S10 performs as well as any other netbook, and its ease of use is superior to smaller Eee PCs -- lifting it into the same kind of usability as the Wind or the Aspire One.

Keyboard
The keyboard is spacious and responsive, and although the trackpad is far smaller than we’d like on a 10in netbook, it’s serviceable and feels natural to use.

click to view full size image
Top marks. We've seen some poor Netbook keyboards in our time, and this is not one of them


Conveniently, there’s a trackpad on/off switch above the trackpad in deference to the fact that most people will prefer a mouse – a nice touch we’ve seen on only two netbooks to date.

Overall, though, it's a product that's just not as competitive as it needs to be against the range of current netbook.

Copyright © 2008 itnews.com.au

Saturday, December 20, 2008

Marshal8e6’s new software locks down Microsoft Exchange

Marshal8e6 promises to secure all Internet-based communication streams in the workplace with an internal filtering solution for Microsoft Exchange 2003 and 2007.



Inappropriate content, malware and confidential information are all targeted by the new MailMarshal Exchange product, which inspects all traffic crossing a company’s Microsoft Exchange Server.

“Marshal8e6 is the only independent software company capable of securing all forms of Internet-based communication streams -- including internal corporate emails, Internet-based email services, websites and Instant Messaging, said chief strategy officer and former CEO of Marshal Ed Macnair.

“This announcement shows that Marshal8e6 is on track to be the leader in the Secure Internet Gateway market,” said Macnair.

MailMarshal Exchange safeguards a company against malware, data leakage and can prevent confidential information such as credit card and social security numbers, payroll or medical information from being leaked between employees.

MailMarshal Exchange also blocks the distribution of illegal, offensive, pornographic or harassing content via company email.

Macnair quoted a recent survey which showed that workplace bullying and discrimination costs Australian businesses between $6bn and $13bn a year in lost productivity.

He further said that the Australian Human Rights Commission found in 2008 that 22 per cent of women and 5 per cent of men experienced sexual harassment in the workplace.

“Increasingly, companies are asking for solutions that enforce ethical walls to comply with corporate and regulatory legislation such as SEC and HIPAA. For example, public companies need to prevent insider information from leaking and influencing trades,” said Bradley Anstis, director of Technology Strategy at Marshal8e6.

The product is currently available in Australia with Marshal’s resellers.

Marshal8e6 is a new company created following the recent merger of Marshal, a UK-based vendor of email content filtering and Web security products, and 8e6 Technologies a US-based vendor of Web filtering appliances.

Copyright © 2008 itnews.com.au

New font uses holes to cut ink use

Dutch marketing and communications company Spranq has come up with a novel and free way of slashing printer ink costs by developing a font with holes in it.

The creators of Ecofont took their inspiration from the holes in Dutch cheese, and aim to cut down on the amount of ink used when printing documents for daily use.

"After Dutch cheese, there now is a Dutch font with holes as well," said a Spranq spokesman.

The font is based on the standard Sans Serif typeface, but has a number of small circles removed from each letter. The company spent a long time experimenting with different shapes and sizes to cut down on the amount of ink used while still maintaining readability.

Spranq reckons that the result is still perfectly readable, but can cut the amount of ink used by up to 20 per cent. The Ecofont can be downloaded free although donations are requested.

Copyright © 2008 vnunet.com

Google Chrome uses rivals' code

Google's Open Source web browser Chrome incorporates code and features developed by rivals Apple and Mozilla, Google acknowledged today.

"We were able to make a web browser because there were already good open source projects on which we could build, including [Apple's] WebKit and [Mozilla’s] Firefox," said Sundar Pichai, Vice President of product management.

Apple's WebKit is the rendering engine that forms the foundation of Chrome.

Further, several features championed by Google are already key elements of other browsers. The 'speed dial' homepage and placement of tabs are features of Opera, while the 'Incognito' privacy mode is already implemented in Internet Explorer 8.

Pichai also acknowledged that some of the project's engineers had worked on other browsers previously. For example, software engineer Ben Goodger was previously the lead engineer for Mozilla Firefox.

"There is an element of 'all roads lead to Rome' when you look at the complexity and intricacy of this project. It’s a small pool of people who work on browsers."

Pichai defended Chrome's development by reiterating Google's commitment to the Open Source community.

"To ensure that any advances we made benefit the web community as a whole, [and] not just us, Google Chrome is completely open source," he said.

"Open source projects spur healthy competition. Competition stimulates innovation. Innovation drives evolution. And evolution is the lifeblood of the internet."

Return of the browser wars?

With Chrome, Google steps into the heated competition between web browsers.

It will compete against two key browsers: Microsoft’s Internet Explorer, whose newest version that was released just weeks ago has been slow to pick up market share, and Mozilla’s Firefox, which has almost 20 per cent of the global browser audience.

Mozilla was magnanimous about the release. Former CEO Mitchell Baker said in her blog that Mozilla had created a competitive browser market and would continue to compete in it.

"Yesterday Google announced that it will release its own browser, validating once again the central idea that this tool we call the browser is fundamentally important. Our first great battle — that of relevance and acceptance — has been won," Baker wrote.

Microsoft remained confident that users would prefer Internet Explorer 8 to Chrome.

"The browser landscape is highly competitive," Dean Hachamovitch, general manager of the Internet Explorer group, told the New York Times.

"But people will choose Internet Explorer 8 for the way it puts the services they want right at their fingertips, respects their personal choices about how they want to browse and, more than any other browsing technology, puts them in control of their personal data online."

Pichai dismissed the idea of a new browser war. "I think browser wars are a thing of the past," he said.

Copyright © 2008 itnews.com.au


Adobe releases AIR 1.5 for Linux

Adobe has announced a Linux version of AIR 1.5, its runtime environment for rich internet applications.

Available immediately, AIR 1.5 for Linux now enables applications developed for the environment to run on Linux distributions such as Fedora Core 8, Ubuntu 7.10 and openSuse 10.3 with no modification, according to Adobe.

"The release of Adobe AIR 1.5 for Linux builds on our ongoing commitment to the Linux community, and our legacy of creating technologies that work consistently across operating systems," said David Wadhwani, vice president of Adobe's Platform Business Unit.

AIR enables developers to build cross-platform applications using web technologies such as HTML and JavaScript. Adobe released versions of AIR 1.5 for Windows and Mac OS X in November.

AIR 1.5 also includes some of the new features introduced in Adobe's Flash Player 10, such as 3D transformation and animation capabilities and support for custom filters and effects.

The new version helps businesses meet security compliance requirements via a new encrypted database that enables it to store data more securely on customers' computers, Adobe said.

As with Flash and Acrobat, the AIR 1.5 runtime is a free download for end users.

FREE DOWNLOAD Adobe releases AIR 1.5 for Linux:

DOWNLOAD LINK

Copyright © 2008 vnunet.com

Apple iPhone driving up Wi-Fi use

Smartphone users are driving up the use of Wi-Fi hotspots, according to a new survey, with Apple's iPhone accounting for nearly 10 per cent of access requests in the US.

The survey results, published by mobile advertiser AdMob, showed that eight per cent of web requests in November came from Wi-Fi networks in the US and UK, roughly double that recorded in August.

Apple's iPhone represented 6.3 per cent of all requests in the US, making it the most used device on Wi-Fi networks. AdMob said that 42 per cent of requests coming from the iPhone were over Wi-Fi, compared with just 10 to 20 per cent for other types of Wi-Fi enabled handset.

The iPhone followed by the Nokia N95 and other Nseries phones were the leading Wi-Fi devices in the UK.

The integration of Wi-Fi into popular new smartphones, such as the T-Mobile G1 and the BlackBerry Bold, indicates that Wi-Fi usage will continue to grow in the near future, according to AdMob.

Copyright © 2008 vnunet.com

Wednesday, December 17, 2008

Google opens up for mashup security

OAuth support added to Gadget platform.

Google is embracing a new security standard for its Gadgets online widget platform by adding support for the OAuth system.

The open standard is designed to allow sites to share user information securely for mash-up apps while still allowing users to authorise what data is disclosed.

Google said that it had previously used a proprietary standard for Gadget security, but hopes that the move to OAuth will allow for Gadgets and the iGoogle service to securely expand to other web-based application platforms.

The search giant believes that OAuth will allow different Gadget developers and sites to share data between its own platform and mash-ups based on other platforms such as MySpace.

Eric Sachs, senior product manager for Google's security branch, explained in a blog posting that the system would give users precise control over which sites will be able to share and access information.

Before allowing data to be swapped, the user must allow the site to access information from other services, and only the specified data will be shared.

"One privacy control provided by OAuth is that it defines a standard way for users to authorise one website to make their data accessible to another website, " wrote Sachs.

"In addition, OAuth provides a way to do this without the first site needing to reveal the identity of the user; it simply provides a different opaque security token to each additional website the user wants to share his or her data with."

To kick off the new feature, Google is launching OAuth-equipped Gadgets for AOL Mail, MySpace and Google Book Search. The company has also set up a documentation library for Gadget developers.

Copyright © 2008 vnunet.com

Tuesday, December 16, 2008

Secrets of the underground economy

In IRC channels and web-based forums, the underground economy is thriving, according to the latest year-long report by Symantec. Find out how much a botnet or a set of credit card details would cost you.

The ‘underground economy’ refers to commercial cybercrime activity – specifically, the purchase and sale of fraudulent goods and services. Items for sale might include sold credit card data, bank account credentials, email accounts, and other data.

Services might include cashiers who can transfer funds from stolen accounts into true currency, phishing and scam page hosting, and job advertisements for roles such as scam developers or phishing partners.

The value of the total advertised goods on underground economy servers during the twelve-month period was more than US$276 million.

Information is bought and sold on IRC channels and web forums. Sometimes sellers set up shop on legitimate servers, which makes it harder for police to shut them down.

The underground economy is highly diverse. “The top ten servers control the top 11 per cent of the revenue,” said Craig Scroggie, VP and MD of Symantec Asia Pacific.

Sixty-three (63) per cent of sellers were offering online credit as payment, using wire transfers, or funnelling money through online currencies such as Linden dollars or World of Warcraft gold.

Credit card information was the most highly prized data, accounting for 31 per cent of everything that was sold during the survey period. That included credit card numbers, credit cards with CVV2 numbers, and credit card dumps. It was also the most requested category, making up 24 per cent of all goods requested.

Credit card details might be as cheap as US$0.10 per card, ranging up to US$25, while credit cards with CVV2 numbers ranged from US$0.50 to US$12.

“The thing about credit cards is that it could cost you as little as 10 cents, but the average advertised stolen credit card limit observed by Symantec is more than US$4,000. So it’s an incredible return on investment,” said Scroggie.

“We calculated that the potential worth of all credit cards advertised during the reporting period was US$5.3 billion.”

Credit card information is popular because it’s easy to obtain and easy to use for fraud, explained Scroggie.

“Credit cards are easy to use for online shopping, and it’s often difficult for merchants or credit card providers to identify and address fraudulent transactions before fraudsters complete these transactions and receive their goods.”

Australia has a disproportionately high number of credit card transactions every year. Scroggie explained that in Australia there are 14 million credit cards in circulation, performing 1.4 billion transactions in the last year. By contrast, the UK is three times as large, but had less than 1.8 billion transactions.

“Australia’s always been an early and strong adopter of technology, and we’re an early adopter from a market stand-point. We have high credit card usage relative to other strong economies.”

source : IT-NEWS

Pentagon recalls USB sticks over virus fears

The Pentagon has banned the use of portable USB drives after fears that they are being used to propagate viruses.

No official statement has been released, but internal emails have shown that the Pentagon wants to recall all USB sticks distributed to employees. Warnings emerged last week of a major outbreak of malware targeting USB drives.

"For most organisations, completely banning USB Flash drives would restrict the productivity and efficiency of end users," said Jason Holloway, sales manager for Northern Europe at portable storage firm SanDisk.

"USB drives are productivity enhancing, but the risk of malware infection must be stopped with layers of security, such as hardware-based USB encryption and password protection, and virus scanning on the drive itself."

While refusing to confirm or deny the recall, Pentagon spokesman Bryan Whitman acknowledged the global spread of USB malware.

"This is not solely a department problem, this is not solely a government problem," he told Associated Press.

Virus propagation via USB stick is a throwback to the first virus techniques in which floppy discs were used to carry the code. But for an organisation like the Pentagon to take such a drastic step, the spread of the code must be wider than usual.

Copyright © 2008 vnunet.com

Heroin hacker steals information on 59,000 workers

American company Luxottica Retail, the former owner of the Things Remembered stores seemed to have forgotten to have the right amount of security on the company mainframe.

The red-faced retailer has admitted that more than 59,000 of its former workers could be affected after a huge security breach.

A routine check by the information technology department discovered that a hacker had been inside a computer mainframe and downloaded the personal information of more than 59,000 former workers.

The victims are all over the US and will have lost names, addresses and Social Security numbers to the hacker.

However the cyber-raider cannot have been all that clued up either. Investigators were allegedly able to trace the hacker’s IP address to one Molly Burns.

The 30-year-old has a five-page long arrest record that includes theft, forgery and drug charges.

Inspector Knacker of the Arizona Yard swooped on her apartment during a heroin raid earlier this year and already has a number of her computers at the station.

Investigators are now waiting on the results of a forensics examination of the computers in the hope of finding some of the Luxotta files.

Burns apparently didn’t hang around to answer copper's questions. She has apparently legged it.

Three different police departments in Arizona are also looking for her so her hacking exploits will be only one of many things coppers want a word with her about.

Meanwhile the company sent letters to all the former employees letting them know what happened.

Apparently Luxottica Retail has improved its computer security so that a hacker who is such a novice they don’t think to hide their own IP address can't break down the door.

That's the problem with heroin... it does cloud your judgement a bit.

theinquirer.net (c) 2008 Incisive Media

SMEs urged to manage staff internet use

Many small and medium sized enterprises (SMEs) are ignoring policies to manage non-essential, personal use of the internet at work as they move toward hosted and cloud computing applications.

A report by analyst firm Quocirca for service provider Easynet Connect looked at how internet use by SMEs differs across the UK.

The report suggests that SMEs seem relatively relaxed when it comes to employees using the internet for personal use at work, with only 18 per cent imposing a complete ban and 49 per cent employing a formal internet policy.

However, this means that roughly a third of SMEs surveyed have no formal internet policy at all, thereby compromising their increasingly important internet bandwidth.

When asked how they use the internet at work, 93 per cent of employees cited general web browsing, while just over half visit social networking sites, and almost a third use instant messaging.

"As a rising number of core business applications become web-based, it is important that personal internet use does not compromise the performance of these applications," said Chris Stening, managing director of Easynet Connect.

"However, it is also important for SMEs to strike a balance with their employees. A complete ban is not the answer because, while some internet users can consume a lot of resources, most simply wish to check their emails or do some online banking, which consumes less bandwidth."

Stening believes that a compromise can be reached which allows employees to engage in online activities without hindering the company's core online applications.

"Most small and medium businesses do not measure personal use of the internet at work, potentially compromising their internet connection," said Rob Bamforth, principal analyst at Quocirca and author of the report.

"As the internet has become a strategic business resource, companies need to identify suitable policy controls and protective measures to ensure they have sufficient bandwidth to cope with business needs.

"Those allowing personal use of the corporate internet connection by employees must understand its impact and plan their capacity and services to accommodate these requirements."

The research pointed out that many smaller businesses are turning to software-as-a-service and other managed services as a way of accessing enterprise-class applications without the significant capital outlay. This makes it even more important that they have the service level agreements in place with their ISP, and that employees do not hog the vital bandwidth for personal use.

Copyright © 2008 vnunet.com

Europe adopts new cyber crime agenda

The European Union has adopted the European Commission's strategy on cyber crime, and called for better co-operation between businesses and the police.

Over the next five years the EC strategy will introduce steps for closer co-operation and information exchange between law enforcement authorities and the private sector.

This will feature an early alert system that includes a platform where online crimes affecting businesses can be reported, shared and cross-checked by Europol. A budget of €300,000 has been allocated to create the platform in the short term.

"The strategy encourages the much needed operational co-operation and information exchange between the member states," said EU vice president Jacques Barrot, announcing the move.

"It gives a shared responsibility to the Commission, the member states and other stakeholders to introduce the different measures. If the strategy is to make the fight against cyber crime more efficient, all stakeholders have to be fully committed to its implementation. We are ready to support them, also financially, in their efforts."

These efforts will include internet investigation teams, cyber patrols, joint investigation teams and remote searches.

"Cyber crime is a growing threat to our societies today," said the EU. " Member states suffer thousands of attacks a day against their information systems. Viruses stealing information from personal computers, spam, identity theft and child pornography are increasingly widespread."

Copyright © 2008 vnunet.com

IT vendors team up to address Gershon findings

Compuware and Fujitsu claim they can help federal government agencies address the Gershon Report requirements of cutting contractor numbers and reducing IT budgets – by selling them more software and services.
The two firms have created a Gershon quick start service, which is said to include a set of packaged services, default reports and preconfigured software aimed at quickly delivering key auditable capabilities to address the Report's recommendations, the companies said in a statement.

The software includes Compuware’s Changepoint, an IT portfolio management solution. It can be purchased outright or leased on a fully-hosted SaaS model.

Fujitsu Consulting will also provide a series of fixed-cost consulting engagements ‘designed to assist agencies in understanding their present level of ICT capability and effectiveness, the target level required and a gap analysis’.

"Under the Gershon recommendations this is an essential process," said Wade Buscombe, client executive at Fujitsu Australia.

"Knowing where you are, where you need to be, and how you are going to get there is fundamental.

"Without a baseline on existing capabilities, a strategy, and an integrated program of activities for capability improvement, agencies are putting at risk their day-to-day operations and their participation in major ICT projects and new policy proposals."

Compuware claimed ‘a number’ of agencies had shown interest in the service following a seminar in Canberra last week.

Westpac online customers get free security software

Westpac has extended a deal to give its online banking customers 12 months' free access to PC Tools’ Internet Security suite for a second year.
The new deal covers what is claimed to be an ‘all-in-one security suite featuring anti-spyware, anti-virus, firewall and spam protection’ as well as customer support.

It is now available to Westpac customers that register online .

It extends a previous agreement where PC Tools’ software was offered to customers in its bespoke pieces rather than as a complete security suite, according Rafal Potega, VP of Asia Pacific sales in the business unit at PC Tools.

Potega refused to be drawn on how many of Westpac’s customers had taken up the offer in the first year or how the licenses were being financed.

“It’s under NDA – I can’t disclose or comment on that,” said Potega.

“We were very happy with the uptake last year. It was very much within our expectations.”

Potega said that pursuing banking and finance sector customers was part of PC Tools’ business strategy in the Asia Pacific region.

It has already led to similar deals with NAB’s consumer and SME divisions ; however these offers are for discounted – rather than free – software, and are non-exclusive.

The bank provides similar discounts on ZoneAlarm security software.

NAB’s offer comes with a number of attached legal conditions, including that it ‘does not specifically recommend [PC Tools] over others in the marketplace’ and that ‘no security product is able to protect against all security threats and frauds’.

Westpac has been contacted by iTnews for comment on the extent to which it views the PC Tools suite as a security guarantee for its customers – particularly as the vendor is openly encouraging customers to switch over to their software.

“We encourage customers to uninstall any previous AV software [they have] as the PC Tools package incorporates an AV scanner in conjunction with anti-spam and a firewall,” a PC Tools spokesperson said in a separate statement.

According to a recent F-Secure report, NAB is the third most targeted Australian bank by trojans, while Westpac is ranked sixth.

Wednesday, December 10, 2008

AFP and Telstra to fight hi-tech crime

The Australian Federal Police (AFP) and Telstra will increase cooperative efforts to reduce hi-tech crimes like identity fraud, phishing, botnet networks and attacks on public and private sector computer networks.

The joint cooperation agreement, signed in Canberra today, also covers professional development of Telstra and AFP staff and employee secondment arrangements.

It will assist the AFP in gaining a better understanding of the evolution of the telecommunications environment, according to AFP acting deputy commissioner, Andrew Colvin.

Both organisations will focus immediate attention on identity fraud and internet-enabled crime such as phishing; online paedophile activity; child protection and education; botnet networks and organised crime syndicates; online terrorism activities; and targeted attacks on public, government and private sector computer networks.

“Technology-enabled crime is a complex, dynamic environment with new trends constantly emerging,” said Colvin.

“We must continually look at improving our methods of detection and prevention.

“One of the most valuable ways to do this is for law enforcement agencies and governments to work with the private sector to establish effective procedures to counter technology-enabled crime.

”Secure communications networks, platforms and systems are critical to both national security and the business environment, highlighting the need for vigilance. This is fundamental to Australia’s security,” said Colvin.

Monday, December 8, 2008

Security attacks reach 2.5 billion per day

BM has announced a number of new initiatives which it claims will improve enterprise security and help clients save costs, in response to a massive rise in web-based threats.

The company said that its Internet Security Systems (ISS) business had sprung into action after its X-Force division identified two "startling" developments: a 30 per cent increase in network and web-based security incidents over the past 120 days; and a 40 per cent increase in the number of its clients accessing IBM virtual security operations centres.

IBM said that based on data from its 3,700 managed security services customers worldwide, the number of security events had risen from 1.8 billion to 2.5 billion per day over the past four months, and noted that a significant proportion of clients logging in to the security centre had not done so in the previous six months.

In response to these incidents, IBM's ISS division plans to introduce new identity and access management services which will help companies govern access to sensitive data and applications. IBM said that 42 per cent of systems vulnerabilities are caused by weaknesses in this area.

IBM is also offering a complementary financial assessment of a company's infrastructure management costs to provide an example of the savings that could be made by a move to its own security services.

"We are currently in a perfect storm of security threats as businesses are cutting costs, insider threats are rising and cyber criminals are using the ensuing confusion to create opportunities for themselves," said Val Rahmani, general manager of IBM ISS.

"These services, in conjunction with our new and evolving security products, are unique in helping our clients successfully navigate this storm by reducing costs while improving their overall security and compliance posture."

IBM said that security incidents are only likely to continue, but added that its customers would be notified as soon as potential network and web-based vulnerabilities are discovered.

Copyright © 2008 vnunet.com

Sunday, December 7, 2008

Intel planning to harvest free energy

Intel’s chief technology officer Justin Rattner has been detailing the latest research from Intel labs into power saving and generation.

Chief among the systems being developed are "wireless identification and sensing platform," or WISPs. These small sensors can be implanted into buildings, devices or even humans and could generate power by scavenging it from the environment, micro generating their own power through sunlight, thermal energy or even sound waves

“We’re sitting in a room that’s awash with energy,” he said.

“There’s photons of light hitting the desk, thermal energy from body heat and you could even harvest the energy from a moving trackball on a BlackBerry.”

These sensors would have a small radio and could provide real-time reporting on environments by sending bursts of data to receivers before recharging. A pilot scheme has seen WISPs installed on San Francisco street sweepers to monitor air pollution.

However, the technology has big implications for better data centre management he said. By implanting WISPs in data centres managers could get a far more accurate picture of heat dissipation and shift computing loads to cooler areas of a data centre to cut costs.

“We’ll be able to model the weather inside the data centre,” he said.

“This will enable thermally-aware load management. You can migrate workloads to cooler sections of the data centre and stop freezing the whole data centre and operate at a wider variety of temperatures.”

Looking ahead WISPs could be used on a mass scale in society to track germ movements though the air or even implanted in the human body to identify viruses.

Rattner did say that this technology was 4-5 years away at best but researchers in Intel’s research centres were having very promising results.

Copyright © 2008 vnunet.com

Cybercriminals need to be punished

F-secure has re-ignited its push for the establishment of a global legislative authority that apprehends cyber thieves, claiming it’s the only way to stop them.

The call to action comes as F-Secure released its half year data report which predicts that in 2008 a total of 1.5 million samples of malicious software - which is three times more than in 2007 - will be detected.

Currently, F-Secure detects between 80,000 to 100,000 samples of malware per day compared to 25,000 a day at the beginning of the year.

In Sydney, Chia Wing Fei, security response manager at F-Secure Security Labs APAC said the company is working on developing smart new detections on top of heuristics and behavioural technologies but the growth is explosive, making things really tough.

As a result, F-Secure believes the obvious inefficiency of the international and national authorities in catching, prosecuting and sentencing Internet criminals is a problem that needs to be solved.

“The challenge we face is the challenge of catching those people. The lack of applicable legal framework [is apparent]; it could help,” he said.

A number of high profile arrests took place in 2008 including the arrest of New Zealand hacker, Owen Thor Walker, 18, who admitted taking down a US university's computer. However, he was allowed to walk after promising to use his skills for the good rather than bad.

“The bottom line today is that too few of the perpetrators get punished. As a result, we’re sending the wrong message to criminals: here is a way to make lots of money and you will never be caught or punished,” said Mikko Hyppönen, F-Secure’s chief research officer.

In October, Hyppönen called for the establishment of an Interpol type body to tackle online crime.

Joining, Fei, Graham Ingram, general manager of Australia’s security response team AusCERT, said the world needs a large deterrent. Something like, “A law enforcement agency with enough power to go offensively and find them.”

“Otherwise,” he said, “no matter what security experts do, the criminals always find a counter measure at an increased [sophisticated] level. “It’s an arms race,” he said.

For example, Ingram said a real problem AusCERT is seeing right now is a very precise targeting of corporate executives who coincidently happen to have high network access. “The spread of this is incredible,” he said. “There is even evidence that there are effects on the stock market manipulation,” he added.

Furthermore, according to Fei, the current economic climate cause trigger an even bigger surge in online crime as people continue to lose their jobs. He said: “Lack of employment especially in Brasil, China and Russian these people have families to feed so this is an option they may think about,” he warned.

source : http://www.itnews.com.au/

Thursday, December 4, 2008

Free Download Microsoft Windows XP Service Pack 3 Final



Microsoft Windows XP Service Pack 3 Final (SP3) includes all previously released updates for the operating system. This update also includes a small number of new functionalities, which do not significantly change customers experience with the operating system.

Supported Operating Systems: Windows XP; Windows XP Home Edition ; Windows XP Home Edition N; Windows XP Media Center Edition; Windows XP Professional Edition ; Windows XP Professional N; Windows XP Service Pack 1; Windows XP Service Pack 2; Windows XP Starter Edition; Windows XP Tablet PC Edition.

The Windows Serviceability team is pleased to make available Windows XP Service Pack 3, Release Candidate 2 Refresh (XP SP3 RC2 Refresh).

The purpose of RC2 Refresh is to validate improvements to the Windows Update experience with Service Pack 3. Therefore, this beta release will be available only on Windows Update, in English, German and Japanese. Beyond fixes for common Windows Update issues and the inclusion of support for HD Audio, there are no substantial differences between this beta release (build 5508) and XP SP3 RC2 (build 3311).

XP SP3 RC2 Refresh includes all previously released updates for the operating system, similar to earlier service packs. It also includes previously released updates to the latest versions of some system components, as well as functionality that make it easier for enterprises to co-manage both Windows XP SP3 and Windows Vista PCs within same corporate environment.

While this update is available for anyone, remember that it is pre-release software, is time-limited, and is intended for IT professionals, developers, and other technically-inclined individuals that are comfortable using pre-release software.

The application to enable download of XP SP3 RC2 Refresh is the same application as was used to distribute XP SP3 RC2. This is an application that can be found at the Microsoft Download Center. Running this application on a machine with Windows XP Service Pack 2 will enable Windows Update to offer XP SP3 RC2 Refresh to that machine. Build to build upgrades are not supported for this beta release, so if you have installed XP SP3 RC1 or XP SP3 RC2, please uninstall it before running this application. We strongly recommend that only this application be used to obtain RC2 Refresh and that evaluation and feedback be based solely on releases provided directly by Microsoft.

As with RC1 and RC2, we encourage feedback on XP SP3 RC2 Refresh via this TechNet forum. Information regarding XP SP3 overall can be found on the Windows XP TechCenter. Windows XP SP3 is scheduled for release in the first half of 2008.

DOWNLOAD LINK : Microsoft Windows XP Service Pack 3 Final

Free Download Nokia PC Suite 6.86.9.3


Nokia PC Suite 6.86.9.3 is free applications for Nokia phones that lets you edit, synchronize and back up many of your phone's files
Nokia PC Suite 6.86.9.3 is a package of Windows-based PC applications developed especially for use with Nokia phones.

Depending on your phone model, Nokia PC Suite lets you edit, synchronize and back up many of your phone's files on a compatible PC through a cable or wireless connection.

Here are some key features of "Nokia PC Suite 6.86.9.3":

* Back up and restore phone files
* Transfer information, pictures, and music from phone to phone or phone to PC
* Synchronize your phone and PC calendars
* Edit contacts, pictures, and phone file names
* Install Java-based applications in your phone
* Convert ringing tone formats
* Play multimedia messages and videos
* Send text messages from the PC
* Connect by using your phone as a modem

Download (Nokia PC Suite 6.86.9.3) HERE

Tuesday, December 2, 2008

Flame war: The great Windows 7 debate (part1)

InfoWorld's Randall C. Kennedy and OSNews' Thom Holwerda go head to head over how to assess Windows 7's changes

Not a day goes by in which InfoWorld fails to receive a flaming comment or e-mail attacking InfoWorld's Enterprise Desktop blogger Randall C. Kennedy and his recent analysis of the pre-beta version of Windows 7. As time goes on, it gets more personal. Recently, I received this little gem: "Randall C. Kennedy is a jaded, personally hurt, pathological liar who only does a disservice to your Web site."
What could cause such invective? The article that really poked the hornets' nest was "Windows 7 unmasked," in which Randall lays out his argument that Windows 7 is a simply a point rev of Vista. The attacks came fast and furious. How dare Randall benchmark pre-beta software? How could he possibly draw conclusions based on the evidence he presents?

Several of Randall's detractors have pointed to a critique written by Thom Holwerda, managing editor of OSNews. It was held up as a smackdown and, as it turned out, it was also well written. So what else could we do but invite Thom to debate Randall one on one?

Thom graciously agreed. The ground rules for this e-mail debate were simple. Each message would be of reasonable length. Changes of subject would not be used to circumvent points of disagreement. And both parties would avoid descending into name-calling or profanity. Otherwise, we would not edit the exchange, except to correct spelling or grammatical errors.

I think you'll enjoy the results on the next pages. You'll find more light than heat here, although the discussion is spirited. And while it helps to know something about the inner workings of Windows, both Thom and Randall keep their arguments clear and jargon-free. As Thom says in the final line of the debate: "It's up to the readers to decide which of us is making more sense."

Read more :page 2 - 11
source :www.infoworld.com

Monday, December 1, 2008

USB albums could stick it to CDs with new DDA format launched today


CD collections may soon be a pile of USB sticks in a box if fans take up an Australian digital format launched today.

DDA albums were created to include online extras with a physical music product.

Each album is shipped on a rubber stylised DDA USB stick, identified with a swing tag.

As well as music, each DDA album provides access to online content such as photos, news, music videos, updates from the band and social networking.

It also lets fans access their content from the MyDDA service using any internet-connected computer or mobile phone.

Each USB stick contains a DDA music player and track list builder, which must be activated with a code the first time it is used.

The software displays album art and song lyrics as each song is played.

Tracks will be provided in MP3 or WAV formats to avoid compatibility issues.

The DDA software can transfer albums to iTunes or burn them to a CD without licensing problems.

HMV, Virgin and Sanity will stock the DDA sticks.

Artists and record companies can set the price of each individual DDA but they are likely to be the same as a CD album.

Sneaky Sound System is one of the first bands to release music on the new digital format .

Tuesday, November 25, 2008

INFOWORLD AWARDS

InfoWorld 100 Awards

Every year, InfoWorld's editorial staff names 100 companies that have made the best use of technology to enhance their business. The InfoWorld 100 awards celebrate IT projects that use technology in smart, innovative, creative ways to meet business and technical objectives.

To nominate your company's project, fill out and submit our nomination form below. All nominations will be reviewed by InfoWorld's editors. The deadline for submitting nominations for the 2008 InfoWorld 100 awards has been extended to Sept. 2, and the winners will be announced Nov. 17.

Previous InfoWorld 100 winners
2007 InfoWorld 100
2006 InfoWorld 100
2005 InfoWorld 100
2004 InfoWorld 100
2003 InfoWorld 100

Nomination form: Honor a IT innovator you admire
Has your company, or one you know, devised an amazing IT project lately? Tell us about it

FAQ: Learn all the details on the awards
Find answers to common questions about InfoWorld 100 criteria and other award details

Marketing/PR: Get the promotional materials
Congratulations on winning an InfoWorld 100 award! Look here for all the information you'll need to tell the world.

Sign up to get e-mails on upcoming award deadlines and other editorial plans

Sunday, November 23, 2008

Internet's bandwidth health still in trouble

Nemertes Research continued to throw cold water on the future of the Internet this week, releasing a study projecting that demand for bandwidth on the Web would exceed its capacity by 2012.

The study, which is a follow-up to similar research Nemertes conducted last year, projects that the current global economic recession will only delay rather than eliminate the increased demand for bandwidth the firm predicted last year. Then, Nemertes projected that traffic growth would eclipse supply by 2010, but the firm now says it has adjusted its projections to reflect deteriorating global economic conditions.

Does the bandwidth shortage mean out Internet future is in danger?

Nemertes emphasized it is not projecting that the Internet will crash or shut down altogether. Rather, the typical user probably will experience Internet "brownouts," where such high-bandwidth applications as high-definition video-streaming and peer-to-peer file-sharing will stop performing up to users' expectations, the firm says.

During a presentation at an Internet Innovation Alliance symposium this week, Nemertes analyst Mike Jude said that one consequence of declining Web performance would be that users would look less to the Internet to deliver their desired applications. "More and more applications are coming online that will drive expectations for service quality even higher," he said. "I'm not saying that the Internet is going to crash in 2011, but that people's expectations are going to be throttled. People will stop going to the Internet for those services."

One big reason for the projected growth in traffic is the continuing emergence of virtual workers who work from home or in remote branch offices located far away from companies' central offices, Nemertes says. In particular, these remote workers "expect seamless communications, regardless of where they conduct business" and they "often require more advanced communication and collaboration tools than those who work at headquarters," including videoconferencing and Web conferencing, the report says.

Another factor is simply the large growth in high-bandwidth applications for users to employ. More ISPs in the coming years will follow the lead of such companies as Comcast and AT&T trying out bandwidth caps that will charge extra money each month for heavy bandwidth consumers, Nemertes says. Although Comcast now caps individual bandwidth consumption at a relatively high 250GB per month, average future users will easily reach or surpass that bandwidth limit as they find higher-bandwidth applications to use, the firm says.

"Though this traffic load is [currently] more than typical, it certainly isn't exceptional," Nemertes reports. "This type of usage will become typical over the next three to five years. The fact that Comcast's network is, by its own admission, not able to cope with such usage patterns is a clear indication that the crunch we predicted last year is beginning to occur."

Looking forward, Nemertes says that if this capacity issue is not addressed, the Internet will fracture into a tiered system where companies with the most money will pay for specialized network infrastructure that will ensure their content is delivered at higher speeds than non-favored content.

source : www.infoworld.com

NetWitness releases free version of security software

NetWitness, a vendor of networking threat-analysis software, is offering a free version of its NetWitness Investigator package by download, the company said Monday.
NetWitness Investigator is different from most other network-scanning software in that it uses forensic tools to examine applications and changes on content on the network, as well as attacks coming from outside the network, said Amit Yoran, NetWitness' chairman and CEO. The software package gives users detailed analyses of malicious activity on their networks.

NetWitness Investigator is designed to address gaps in other cybersecurity products, he said. It can help users identify cybersecurity problems, insider attacks, and sophisticated outsider attacks, and it can help with IT audits and antifraud investigations, the company said.

The company, which split off from ManTech in 2006, has customers in the U.S. government and the financial industry, according to NetWitness, based in Herndon, Va.

NetWitness Investigator doesn't rely on a list of known threats to protect users from cybersecurity threats, said Yoran, former director of the National Cyber Security Division of the U.S. Department of Homeland Security. Instead, it looks for changes on the network and alerts users of possible problems
Sophisticated criminals and attackers sponsored by nations aren't going to use commonly known methods to attack their victims, Yoran said. "They're going to be using something a little more complex

Users of many cybersecurity products "are still unable to see a lot of the right information" about their networks, he added. Companies can be lulled into a false sense of security when they're using standard cybersecurity products, Yoran said.

Yoran hopes the free version will drive customers to the company's other products and services, and he sees the free download as a way to expose potential users to a new type of network monitoring, he said.

"We thought this was the right thing to do to contribute back to the community," he said.

The free version of Investigator is fully functional and ready for users to run on their networks. The free license allows up to 25 simultaneous users with a data capture of up to 1GB.

It also contains the major features of the Investigator Enterprise version, available for purchase. NetWitness has a YouTube demo page for Investigator, and the download is available on the NetWitness site.

The enterprise version of the software comes with Linux-based network appliances and is capable of remote network monitoring. The enterprise package of products includes Informer, an automated reporting engine, and Decoder, a data recording package.

Wednesday, November 12, 2008

Windows 7 calculator for Vista


Windows 7 (seven) as the Younger Generation from windows the Vista was still not marketed by Microsoft. Was based on information that I could, windows 7 will be released next year (2009) in public. However for you that used SO your Vista possibly could feel mengunakan Windows 7dengan used Calculator Windows 7 to just was stylish as using Windows 7 or while waiting during the SO Window release 7 tsb. I myself have tried him and compared between calculator that was met to Windows Vista Windows 7. There was gotten by several differences feature and tampilan him. Calculator in windows 7 far more better than that was had by the vista. Pay attention to the picture was supervised this:

This was snapshot calculator that was met to Windows Vista:

And this was snapshot Calculator Windows 7:

Seen clear from tampilan him that windows 7 better. For the function and fitur-fitur him also often was gotten by the increase. One of them in calculator windows 7, we could edit again results of our counting. Then was gotten mode; programmer, statistic. In options him also was gotten; Date Calculation, Template, Unit Conversion. And we could also count easily the calculation of the issuing like the pay, and counted the loan of the pay. And that attracted him this application did not need us install to be able to be undertaken. I myself was still trying him to OS Windows Vista. It did not yet try him in Windows XP. Jika you intended to try him to OS Windows XP, don't forget review him through comment. If you wanted to try him in windows your Vista could download in link download was supervised that was given by me.

Free Download Here (Gubuk Free Download) :Windows 7 Calculator