UPDATE FIXES VERIZON IPHONE 5 DATA GLITCH; CUSTOMERS WON'T BE CHARGED FOR OVERAGES

Verizon iPhone 5 customers may have noticed an issue wherein their phones gobbled up extra cellular data when they were theoretically connected to Wi-Fi networks. Those customers now have two bits of good news: There’s a special software update that fixes the problem, and they won’t be responsible for unexpected charges related to unintended network overages related to the issue that spurred the carrier update in the first place.

10 HOT IT SKILLS FOR 2013

The number of companies planning to hire tech professionals continues to grow, with 33% of the 334 IT executives who responded to Computerworld's 2013 Forecast survey saying they plan to increase head count in the next 12 months..

APPLE WARNS ICLOUD USERS OF LOOMING STORAGE LOSS

Apple on Monday began reminding some iCloud users that they will soon lose the 20GB of free storage they'd received when they migrated from MobileMe.

Nook Video set for fall premier

Barnes and Noble Tuesday announced that Nook Video will premiere this fall in the U.S. and UK. The service will offer access to movies and TV shows for streaming and download.

Eight simple steps to make the upgrade to iPhone 5 easier

A little planning can save time - and voice messages - when you upgrade to the new iPhone 5

Friday, April 23, 2010

1.5 million stolen Facebook IDs up for sale

A hacker named Kirllos is offering to sell the accounts in an underground forum for 2.5 cents per account
A hacker named Kirllos has a rare deal for anyone who wants to spam, steal or scam on Facebook: an unprecedented number of user accounts offered at rock-bottom prices.
Researchers at VeriSign's iDefense group recently spotted Kirllos selling Facebook user names and passwords in an underground hacker forum, but what really caught their attention was the volume of credentials he had for sale: 1.5 million accounts.

IDefense doesn't know if Kirllos' accounts are legitimate, and Facebook didn't respond to messages Thursday seeking comment. If they are legitimate, he has the account information of about one in every 300 Facebook users. His asking price varies from $25 to $45 per 1,000 accounts, depending on the number of contacts each user has.
To date, Kirllos seems to have sold close to 700,000 accounts, according to VeriSign Director of Cyber Intelligence Rick Howard.

Hackers have been selling stolen social-networking credentials for a while -- VeriSign has seen a brisk trade in names and passwords for Russia's VKontakte, for example. But now the trend is to go after global targets such as Facebook, Howard said.

Facebook has more than 400 million users worldwide, many of whom fall victim to scams each day. In one such scam, criminals send out messages from a compromised account, telling friends that the account's owner is trapped in a foreign country and needs money to get home.

In another, they send Web links that lead to malicious software, telling friends that it's a hilarious or sensationalistic video.

"People will follow it because they believe it was a friend that told them to go to this link," said Randy Abrams, director of technical education with security vendor Eset. Once the malware gets installed, criminals can steal more passwords, break into bank accounts, or simply use the computers to send spam or launch distributed denial of service attacks. "There's just a plethora of things that people can do if they can trick people into installing their software," he said.

Kirllos' Facebook prices are extremely cheap compared to what others are charging. In its most recent Internet Security Threat Report, Symantec found that e-mail usernames and passwords typically went for between $1 to $20 per account -- Kirllos wants as little as $0.025 per Facebook account. More coveted credit card or bank account details can go for much more, ranging between $0.85 to $30 for credit card numbers to $15 to $850 for top-quality online bank accounts.

Wednesday, April 21, 2010

5 hot IT certification picks for 2010

Certifications have always been beneficial to IT job seekers, but lately there's increased emphasis on vendor- and technology-specific training as the economy begins to recover and companies look to plug talent holes in their IT organizations.

"There are great opportunities in technology, but there is increased competition for jobs," says Ray Kelly, CEO of certification provider Certiport. "I have never seen a time like today where there is such a focus on certifications."


Cisco, Microsoft certifications increase high-tech salaries

When the economy tanked, certifications became more important for IT pros who wanted to make themselves more employable.

"For the past couple of years, the economy has been challenging, but from a technical education standpoint it has been a positive market," says Fred Weiller, director of marketing for Learning@Cisco. "In pure volume, the foundation technologies such as routing and switching -- without which no network exists -- represent a huge amount of our certification portfolio."

These days, Cisco Certified Internetwork Experts see virtualization as the top networking investment area (cited by 67% of 970 CCIEs polled by Illuminas on behalf of Cisco). Another 64% say security and risk management will continue to be the networking skills in greatest demand -- an expectation echoed by Weiller.

Already, "professionals with 'cyber' on their resume can command a 20% salary premium as both the public and private sectors are becoming more aggressive in building their security talent pipeline," notes Thomas Silver, senior vice president at Dice. The high-tech job board listed more than 62,000 tech jobs available as of early April, about half of which are contract or part-time positions.

Determining the best IT certification to pursue depends on an individual's existing skill level, career goals and accessibility to training. Here we detail five of the hottest IT certifications for 2010.

1. VMware Certified Professional


The VMware Certified Professional (VCP) program, now available on vSphere 4 (VCP4), seems like a no-brainer. With virtualization technology growing within the majority of organizations, it is critical that the talent pool keep up with the technology. Yet recent research shows that enterprises are worried about a lack of expertise specific to virtualization. New skills need to be acquired for virtual systems, and new management and automation technologies must be introduced into the environment to truly reap the rewards of virtualization. According to Forrester Consulting, which interviewed 257 IT professionals on behalf of CA, "the proper skills for the future are difficult to attain and retain."

2. Microsoft Certified Technology Specialist


Microsoft continues to dominate most desktops in U.S. business. Its Windows operating system boasts more than 91% market share, according to March figures from Net Market Share, and Microsoft has seen accelerated interest in the latest revision, Windows 7.

"Microsoft continues to leave its computing fingerprints on most desktops," says Forrester Research analyst Sheri McLeish.

IT professionals who become a Microsoft Certified Technology Specialist (MCTS) can prove their abilities around implementing, building, troubleshooting and debugging specific Microsoft technologies, such as a Windows operating system, Microsoft Exchange Server, Microsoft SQL Server and Microsoft Visual Studio. (Check out this 9 year-old, who's working on his fifth Microsoft certification.)

"In terms of training and certification, we have seen the fastest ramp up on Windows 7 than any technology in the past five years," says Chris Pirie, general manager of sales and marketing for Microsoft Learning. "We are anticipating a big wave of desktop refreshes and we will be having a new wave of Office software this summer. Certification is very hot for us right now."

3. Cisco Certified Architect

IT professionals with a few certifications under their belts could consider upgrading to what has been dubbed the Ph.D. in Cisco.
The network giant last year added to its educational roster with a new level of certification, the Cisco Certified Architect (CCA). While Cisco boasts more than 20,000 CCIEs worldwide, the vendor decided to build another layer of expertise on top of its proven certification program. The CCA requires applicants to already be certified as Cisco Certified Design Experts (CCDE) and have 10 years of experience. The training for CCA would equip IT professionals with the C-level know-how and skills to prevent wasteful investments on technology and better align network projects with business goals, according to Cisco.

"One of the key things we are testing or investigating is the ability for a candidate to understand the business side and translate that into technology demands," Cisco's Weiller says. "The CCA builds upon the CCDE program, which in itself is very much in demand. Networks have become very sophisticated and to be able to design and build a network that can adapt to changing needs and stand the test of time is critically important in making an individual successful in a networking career."

4. CompTIA Strata Green IT

While vendor-specific knowledge and foundational certifications seem a prerequisite for most jobs, IT professionals in 2010 should also consider amping up their vendor-neutral skills around technologies that continue to gain attention from high-tech as well as business leaders.

"From CompTIA's perspective, entry-level certifications such as the A+ and Network+ are going through the roof, and we are seeing double-digit growth in Security+ certifications," says Terry Erdle, senior vice president of skills certification at CompTIA (Computer Technology Industry Association).

Building on the basics, CompTIA just announced a new training track, green IT. CompTIA's Strata Green IT certificate is recommended for IT professionals with 18 months of technical experience and IT credentials such as CompTIA A+ or Server+, and the program is designed to show that a candidate is schooled in power management as well as virtualization techniques. The certification also includes training on developing and calculating ROI for green IT initiatives and knowledge of environmentally sound waste disposal techniques.

"We just launched the Strata Green IT certification to help build the funnel from the lower end to the higher end for people with advanced skills. The best thing we as a nonprofit in the IT industry can do is help fix the unemployment problem in the country, and we do that by adding such advanced skills training to address emerging employment needs," Erdle says.

5. ITIL v3 Foundations


For many, the goal this year is to streamline IT operations, adding automation where possible, while at the same time increasing services to users. The premise of overhauling the way IT works is outlined in the IT Infrastructure Library, or ITIL (Version 3 is currently being adopted).

With four levels of ITIL certification, IT professionals can prove they understand the principals around service life-cycle management and apply them to real-world environments. Companies seeking such expertise would likely desire a candidate who couples ITIL skills with security or other technical expertise. Considered more of a process-oriented area, ITIL can still deliver benefits such as improved availability, faster problem resolution and reduced costs due to streamlined processes.

"Whether you want to call them soft skills or business skills, IT professionals need communications skills, they need to be able to manage a project, and they need ITIL skills to show they understand the service lifecycle," Cisco's Weiller says. "Individuals need all these skills, not just technical skills."

Friday, April 16, 2010

Adobe vs. Apple is going to get uglier

You think things are bad now between Apple and Adobe? Just wait until the lawsuit.
Usually I write about security here, but Apple's iron-bound determination to keep Adobe Flash out of any iWhatever device is about to blow up in Apple's face. Sources close to Adobe tell me that Adobe will be suing Apple within a few weeks.

It was bad enough when Apple said, in effect, that Adobe Flash wasn't good enough to be allowed on the iPad. But the final straw was when Apple changed its iPhone SDK (software development kit) license so that developers may not submit programs to Apple that use cross-platform compilers.

Officially, Adobe's not talking about such actions, but there's no question that Adobe is ticked off big time at Apple. I mean how often in print does one company representative say about a former partner, "Go screw yourself Apple," as Lee Brimelow, an Adobe platform evangelist, did on his personal Web site, The Flash Blog. While Adobe had him retract some of his words, and the blog now has a big disclaimer, "[Adobe would like me to make it clear that the opinions below are not the official views of the company and are entirely my own.]" we can be sure that within Adobe's offices far stronger words were used to describe Apple's attitude towards Flash.

For now, Adobe spokesperson Wiebke Lips maintains that "We are aware of the new SDK language and are looking into it. We continue to develop our Packager for iPhone OS technology, which we plan to debut in Flash CS5." Flash CS5, which is part of Adobe Creative Suite 5, arrived on April 12th, but, at this point, it can't be used to create i-device applications.

Indeed, the net effect of Apple's licensing change, according to John Gruber of Daring Fireball, is to make it impossible to use cross-compilers, such as the Flash-to-iPhone compiler in Adobe's upcoming Flash Professional CS5 release. This also bans apps compiled using MonoTouch -- a tool that compiles C# and .NET apps to the iPhone." In other words, Adobe, Microsoft, not only can you not have Adobe Flash or Microsoft Silverlight running natively on an iPod Touch, iPhone, or iPad, you can also forget about creating an iWhatever program that can get around that requirement.

Adobe, the king of Internet video with 95% Web browser market penetration, is not one bit happy about being locked out of Apple's lucrative mobile device market. Novell's MonoTouch group is "reaching out to Apple for clarification on their intention, and believe there is plenty of room for course-correction prior to the final release of the 4.0 SDK." Adobe, which doesn't want to let go of its hold on Internet-based video, isn't anything like as optimistic.

So, unless things change drastically between Apple and Adobe in the next few weeks, from what I'm hearing you can expect to see Adobe taking Apple to court over the issue. It's not going to be pretty.

source : ITworld.com

Monday, April 12, 2010

Hacker restores "Other OS" to PS3; has Sony opened Pandora's box?

Last week on April 1st, Sony pushed out a (more or less mandatory) firmware update (version 3.21) that clobbered the "Install Other OS" feature from older PS3s (the feature had already been disabled from the newer PS3 Slim).

When Sony revealed that a firmware update would remove this feature, hacker George "Geohot" Hotz announced that he'd see what he could do about helping people retain this functionality while still being able to use their PS3 on the Playstation Network. His plan was to build a custom version of firmware 3.21 that had all of Sony's content (such that is is; the update didn't seem to do anything but remove the feature) while retaining Other OS.

Yesterday he released video purported to show an early version of his custom firmware in operation (video embedded below). Hotz's blog post offers a few more details, but the one caveat is that your PS3 has to have firmware version 3.15 or earlier in order for this to work. If you've already upgraded to 3.21, you'll be out of luck when Hotz releases his custom version.

What's interesting to me about this story is that Hotz (who, prior to taking on the challenge of the PS3, was big in the iPhone hacking scene) was the first to hack the PS3 back in January. Some suspect that this was the incentive for Sony to go all paranoid and yank the "Install other OS" feature in the first place, so there's some poetic justice in Hotz putting that feature back in.

Now I don't know George Hotz and I'd never heard the name "Geohot" before that news in January, and only recently have I started reading his blogs. From reading him, it sounds like he initially hacked the PS3 just for the challenge of doing so and because he's legitimately interested in seeing how things work. He states more than once that he doesn't condone piracy and for now, let's take that at face value. On the other side of the coin, I can understand how Sony can be so skittish about having their hardware hacked, considering how much rampant piracy (accomplished via custom firmware) impacted the Sony PSP. But I think Hotz makes a really good point in the closing paragraph of his most recent blog post:

"Note to the people who removed OtherOS, you are potentially turning 100000+ legit users into "hackers." There was a huge(20x) traffic spike to this blog after the announcement of 3.21. If I had ads on this site I guess I'd be thanking you."

How many PS3 owners were paying attention to the PS3 hacking scene before Sony yanked this feature on them? It didn't seem like there were that many, but now it's become big news. Is Sony trying to put out a fire with gasoline? Newer PS3s didn't have the "Install Other OS" option. Now Hotz says it's possible that his hack will enable it on those new systems too. If that turns out to be true, Sony has done themselves more harm than good. Accepting that Hotz has no interest in piracy, that certainly isn't true of everyone and it seems logical that his custom firmware will offer a good starting point for those with more nefarious reasons for hacking their PS3. By removing the Install Other OS feature, all Sony has managed to do is garner ill-will and encourage the PS3 hacking scene that it was trying so hard to quash.


Monday, March 22, 2010

To fight scammers, Russia cracks down on .ru domain

In a bid to cut down on fraud and inappropriate content, the organization responsible for administering Russia's .ru top-level domain names is tightening its procedures.

Starting April 1, anyone who registers a .ru domain will need to provide a copy of their passport or, for businesses, legal registration papers. Right now, domains can be set up with no verification -- a practice that has allowed scammers to quickly set up .ru domains under bogus names.


The changes will help Russia align its rules with international best practices, said Olga Ermakova, informational projects manager with the Coordination Center for the .ru top-level domain, in an e-mail interview. The .ru administrators care about the "cleanness" of the domain, she added. "We don't need negative content, and such content is often [created] by unknown users."

Loopholes in the domain name system help spammers, scammers and operators of pornographic Web sites to avoid detection on the Internet by concealing their identity. Criminals often play a cat-and-mouse game with law enforcement and security experts, popping up on different domains as soon as their malicious servers are identified.

Criminals in eastern Europe have used .ru domains for a while, registering domain names under fake identities and using them to send spam or set up command-and-control servers to send instructions to networks of hacked computers.

With the new domain registration requirements, it will be more difficult for criminals to continue with business as usual. At the very least, the requirement that registrants must submit paper documents will make setting up domains a more costly and time-consuming process.

"It's pushing the malicious activity elsewhere," said Rodney Joffe, chief technologist with Neustar, a DNS service provider. "If it's so much of a hassle, they'll say, 'Screw it. I'm going to register another top-level domain.'"

Russia has been under pressure to clean up the .ru system, which is widely perceived as a safe haven for scammers. China made similar changes last month to the way that its .cn space is administered.

Joffe said it's too early to say how effective the .cn changes have been.

The .ru domain has been a top source of fraud of late, agreed Robert Birkner, chief strategy officer with Hexonet, a domain name service company. But even if it is cleaned up, criminals will have other places to go. Vietnam's .vn domain and Indonesia's .id have also been a problem lately, he said.

Earlier this week, representatives from the U.S. Federal Bureau of Investigation and the U.K.'s Serious Organised Crime Agency (SOCA) lobbied the group responsible for coordinating the Internet's domain name system to enforce tighter name recognition policies. Now it is "ridiculously easy" to register a domain name under false details, said Paul Hoare, senior manager and head of e-crime operations with SOCA.

Last month, a study of Internet domain name databases found that only 23 percent of records were accurate.

source: ComputerWorld.com

Google eyes departure from China on April 10, report says

Beijing newspaper says search giant to reveal plans Monday; Google mum
A report today in the Chinese press says Google will announce on Monday that it plans to pull its business out of China on April 10.

The China Business News, a Beijing-based newspaper, is reporting that Google is just days away from putting a specific deadline on its departure from China. "I have received information saying that Google will leave China on April 10, but this information has not at present been confirmed by Google," the newspaper quoted an unidentified sales associate who works with the company as saying.

In an emailed response to Computerworld, a Google spokesman said, "We have repeatedly made clear that we are not going to comment on our discussions with the Chinese government."

This latest report comes just days after both Google and the Chinese government appeared to be leaking word that the search firm may soon shutter its operations there as negotiations between the two break down.

The Wall Street Journal reported Monday that the Chinese government had begun informing news Web sites in that country that Google's Chinese site is likely to close soon.

"I think Google is serious about this and I think their reputation would be damaged by capitulation," said Ezra Gottheil, an analyst with Technology Business Research. "I thought this was pretty inevitable from the beginning, considering how both parties have made pretty firm statements. It doesn't mean that a new arrangement cannot be made in a year or two, but it will require at least the appearance of compromise on both sides."

Google first threatened to halt its operations in China after disclosing in January that an attack on its network from inside China was aimed at exposing the Gmail accounts of Chinese human rights activists. At the time, Google also said it was reconsidering its willingness to censor search results of users in China as required by the government.

Google has since been negotiating with the Chinese government to find a way to continue operating in the country.

Google's continuing stand against China has been met mostly with support from industry watchers, who say it is helping the search company overcome the major hit in good will it's taken in recent years by ceding to China's censorship demands.

source: ComputerWorld.com

China state media cranks up Google tension amid speculation

State-controlled Chinese media accused Google of political motives in its threat to exit China, suggesting a hostile government stance as speculation grows that Google could act on a plan defying the country's regulations.

Other editorials published in recent days, which appear to mark a coordinated attack on Google in Chinese state media, played down the effects any exit by the company would have in China.

"It is unfair for Google to impose its own value and yardsticks on Internet regulation to China, which has its own time-honored tradition, culture and value," a commentary by writers at the official Xinhua news agency said Sunday. "One company's ambition to change China's Internet rules and legal system will only prove to be ridiculous."

Google said in January that it planned to stop censoring results on its China-based search engine, Google.cn, but that the move might mean having to shut down that Web site or Google's China offices altogether. Google cited reasons including hacking attempts allegedly launched from China and concerns about restrictions on free speech.

The Wall Street Journal on Sunday cited an unnamed person familiar with the matter as saying Google could announce its latest plans for China this week.

Another state-media editorial, run in the China Daily, said Google leaves itself less room for negotiations the more it "politicizes the issue."

Chinese officials have repeatedly warned that Google and other foreign companies must follow China's laws to operate in the country.

"Chinese netizens did not expect the Google issue to snowball into a political minefield and become a tool in the hands of vested interests abroad to attack China under the pretext of Internet freedom," China Daily said in another editorial.

A constant message in the editorials was that a Google exit would have no effect on the growth of the Internet in China. Chinese Internet users will simply move on to other search engines if Google is unavailable, and Google "will be the biggest loser in all of this," China Daily said.

Google did not immediately reply to a request for comment.

source : ComputerWorld.com

Mozilla confirms critical Firefox bug

Slates patch for March 30; flaw can't be used in upcoming Pwn2Own hack contest
Mozilla yesterday confirmed a critical vulnerability in the newest version of Firefox, and said it would plug the hole by the end of the month.

Although the patch won't be added to Firefox before next week's Pwn2Own browser hacking challenge, researchers won't be allowed to use the flaw, according to the contest's organizer.

"The vulnerability was determined to be critical and could result in remote code execution by an attacker," Mozilla acknowledged in a post to its security blog late Thursday. "The vulnerability has been patched by developers and we are currently undergoing quality assurance testing for the fix."

Firefox 3.6, which Mozilla launched in January, is affected, Mozilla said, adding that it would be patched in version 3.6.2, currently slated to ship on March 30.

The bug was disclosed by Russian researcher Evgeny Legerov a month ago in a message posted on a forum hosted by Immunity, the Miami Beach, Fla. developer best known for its Canvas penetration testing framework. Legerov works for Moscow-based Intevydis, which produces the VulnDisco add-on for Canvas.

Legerov did not publish attack code, and initially refused to provide details to Mozilla, according to a March 4 entry he posted on his blog. "I've ignored e-mails ... from Mozilla, please do not waste my and your time anymore," Legerov wrote. The blog has since been deleted, but is still available via Google's cache.

In comments appended to a vulnerability alert published by Danish bug tracker Secunia, several users questioned Legerov's motives for making the announcement, while others chided Secunia for not thoroughly testing the flaw or claimed that it was all a hoax.

Mozilla yesterday said Legerov had eventually sent them "sufficient details to reproduce and analyze the issue."

Until the March 30 patch is released, users can upgrade Firefox to the beta of version 3.6.2, which includes the fix, by downloading the preview.

Although Apple and Google have recently updated Safari and Chrome, respectively -- beefing up the browsers' security before the $100,000 Pwn2Own hacking contest starts March 24 -- the version of Firefox that will be used in the challenge will lack the patch for Legerov's vulnerability. Pwn2Own will pit only production versions of Chrome, Firefox, Internet Explorer (IE) and Safari against the hacking talents of researchers.

However, that doesn't mean hackers will be able to use the bug to claim one of the $10,000 prizes for successfully exploiting Firefox. "We will have our entire research team on-site so that we can do our best to ensure that known issues such as this one do not turn up at our contest," said Aaron Portnoy, a research team lead with 3Com TippingPoint, the company sponsoring Pwn2Own.

Portnoy, who organized the fourth annual contest, has predicted that Microsoft's IE8 will be the first browser to fall during the three-day event.

Mozilla will also patch Firefox 3.0 (with 3.0.19) and Firefox 3.5 (with 3.5.9) on March 30. Firefox 3.0.19 will be the final security update for the browser Mozilla debuted in mid-2008.

Source: ComputerWorld.com

Friday, March 19, 2010

Hands on: Internet Explorer 9 Platform Preview shows speed, not much else

For now, the main selling points are increased performance and support for HTML 5
The Internet Explorer 9 Platform Preview exhibits to good effect two of what Microsoft says will be the new browser's selling points: speed and HTML 5 support. If the final version is as fast as or faster than the preview, IE will no longer be a laggard in the browser race and will most likely beat out Firefox. HTML 5 support is a nice extra, but it's still too early to tell how important that will be.

At this point, the IE9 Platform Preview is little more than a browser display engine, and it isn't intended for users. Instead, it's Microsoft's attempt to give developers a heads-up about where the browser is headed. There's no address bar, no navigation features or Favorites, no Back or Forward buttons, no multiple tabs, no malware protection or other basic or advanced browser features. To visit a Web site, you have to press Ctrl-O, type in the URL and then press Enter. When you click a hyperlink that would normally open a new window, that page will open in your default browser.

Not surprisingly, the IE9 Platform Preview doesn't replace your existing version of IE. Instead, it runs alongside it. It cannot be set as your default browser. It runs only with Windows Server 2008 R2, Windows Vista Service Pack 2 or Windows 7. To run it on Vista SP2 and Windows Server R2, you'll need the Platform Update. It won't run on Windows XP -- now, or when it finally ships, according to Microsoft.
The need for speed

IE8 and previous versions of IE have been criticized for being far slower than competing browsers such as Firefox and Chrome, and tests have proved that out. The IE9 Platform Preview fixes that problem. In my testing on two PCs -- one with Windows Vista and other with Windows 7 -- I found it far speedier than earlier versions of IE, and faster than Firefox.

I ran the SunSpider JavaScript Benchmark on a Dell Dimension 9200 with an Intel Core 2 Quad CPU and 2GB of RAM. I tested the Internet Explorer 9 Platform Preview, Internet Explorer 8, and the current versions of Firefox (3.6) and Chrome (4.1). IE9 exhibited a dramatic speed improvement; with an average score of 804ms, it performed more than six times faster than IE8 (5078ms) and nosed out Firefox (914ms) but was beaten by Chrome (489ms).


Microsoft says that one way it sped up the browser was by using a separate processor core to compile JavaScript in the background. JavaScript is only one benchmark for speed, of course. The vendor says it has taken steps to speed up the browser in other ways as well, notably by using a PC's graphics processor to accelerate the rendering of text and graphics.

There's no way to adequately test this, so I can't report on it accurately. But on the IE9 Test Drive site, you can find several impressive demonstrations of interactive HTML 5 graphics powered by your graphics processor. I also tested Chrome and Firefox; both were significantly slower than IE9 and did not display the test graphics properly. However, there's no way to know whether the graphics on the page have been specifically tuned for IE9, so it's hard to know how significant the results are.

Adherence to standards

Microsoft is also touting IE9's adherence to HTML 5 standards, including a variety of features such as the ability to embed video and to interactively change and animate the borders of Web pages. To show them off, the company has created a set of Web pages on its IE9 Test Drive site.

The results are fast and impressive, but again, it's hard to know how well the browser will work in the real world, since the pages may have been tuned for it. And because HTML 5 is not in general use, this may not be a big selling point in the short term, although it could be important in the long term.

Currently, IE9 doesn't play HTML 5 videos using the HTML 5

Tuesday, March 9, 2010

IT gives Windows 7 the green light

After taking a pass on Vista, organizations are ready to commit to Microsoft's new OS
Jim Thomas said no to Windows Vista — but Windows 7 is an entirely different matter.
Thomas, CIO at Pella Corp., says his IT team began beta testing Vista's successor a year ago as an upgrade path from Windows XP. By October, just two months after Windows 7 launched, the Pella, Iowa-based window and door manufacturer had 225 Windows 7 clients up and running — and the feedback from both IT staff and end users has been generally positive.

Pella is ready to move forward, Thomas says. "We will have 50% of our users, that's 2,500 machines, deployed on Windows 7 in 2010," he says. By the end of next year he expects to have 90% of the business on the new operating system.

This time, IT organizations say, it looks like Microsoft has finally delivered the goods. And just in time. About 80% of IT organizations didn't move forward with Vista, according to Gartner Inc. Instead, the vast majority of enterprise users remain on Windows XP, an outdated, eight-and-a-half-year-old operating system that should have passed into the high tech-fossil record long ago.

Computerworld surveyed 285 IT professionals to gauge their attitudes and intentions with regard to Windows 7. Overall, 72% said they plan to migrate to Windows 7, with 70% saying they will implement it within a year or that they already are installing the new OS.

The number one reason cited for upgrading: To get off the aging Windows XP platform. That said, however, almost 40% of survey respondents will take XP support to the end — April 2014 — before they install Windows 7 on all their Windows machines.

Those willing to wait that long, however, are in the minority. "We're ready to move on," says Paul Shane, IT director at the Seattle offices of Milliman, Inc., an actuarial consulting firm in Seattle. He avoided Vista, which he says was initially problematic, clumsy, buggy and continues to suffer from slow performance. But he expects to have most of his 150 desktops and laptops upgraded to Windows 7 by the end of this year. Disappointed with Vista, Shane briefly considered the Mac and OS X platforms. Now, he says, "We've cast those aside."

Like Thomas, he's not even waiting for the first Service Pack, which Gartner analyst Michael Silver says customers can expect some time this summer. (Microsoft had no comment on the availability of SP1.)

What IT wants: Enterprise features

For IT, Windows 7 is an opportunity to take advantage of new features and better integration, especially with Windows Server and Microsoft's System Center Configuration Manager, which can save money by requiring fewer pieces of management software, and can make managing desktops easier.

Art Sebastiano, vice president of infrastructure at ModusLink Global Solutions in Waltham, Mass., has been testing Windows 7 on a few dozen machines for a rollout on 3,500 machines in 30 global locations. He says Windows Server's account-credential (password) caching, which facilitates single sign-on and allows access to networked resources when a domain controller is unavailable, works better with Windows 7 clients. "Driver support and legacy compatibility has been good," he says, and adds that Microsoft offers a downloadable XP Mode program to facilitate backward compatibility.

For his part, Shane says group policy controls are improved under Windows 7. "We really love the new client group policy. You can manage a lot of things through group policy now that used to require a login script," he says.

For University HealthSystem Consortium in Oakbrook Ill., DirectAccess, which allows secure remote access without a separate VPN client and login, is a big win. Donald Naglich, director of technology infrastructure, says that for the half of his 275 users who use laptops, remote access will become more seamless. "It's one of the main reasons we want to [move to] Windows 7," he says. "It's one less piece of software we have to worry about from an integration standpoint." He plans to start migrating to Windows 7 early next year and hopes to have all systems upgraded by the end of 2011.

Pella is considering deploying DirectAccess for the same reasons. "Users don't like having to remember to launch a VPN client and log in," Thomas says. He's also interested in BranchCache, a remote office content-caching technology designed to speed up access to files stored on Windows Server 2008 from Windows 7 clients. "We want to see if it adds value," Thomas says.

Both Pella and Milliman Inc. see BitLocker, which provides full-volume encryption, as a solid win for laptop users. "We used a third-party product that didn't integrate well with Windows and had a separate password," says Milliman's Shane. "Now we can secure laptops and the encryption and security is transparent to the user." He says some offices are already using BitLocker to Go, which encrypts USB storage. Then, through group policy, machines are set up so that they can't store data on any USB device that's not using encryption.

Thomas says moving from Windows XP to Windows 7 has reduced the number of system images he'll need by 80%. "It has to do with drivers and Windows 7 being able to understand and adapt to them versus having a specific image built," he says. Pella has about 25 images for all of its users, each of which must be kept up to date with the latest software updates, patches and security fixes. His team expects to have fewer than five once the deployment is complete, which should save on administrative costs.

What users like
While IT executives say Windows 7 boots up faster than Vista, is more stable and removes the intrusive user access control pop-ups, most end users didn't have Vista. Instead, end users tend to compare the new user interface in Windows 7 to what they've had with Windows XP.

ModusLink's Sebastiano says that, on the whole, his users like the interface, particularly features like drag-and-drop "snap" resizing of windows for easy side-by-side comparison and task bar previews.

But Shane says his users are split on the new task bar. "People either love it or hate it." It's a challenge, he says, because he has users who can't navigate the Start menu in Windows XP to find programs. "If it's not a shortcut on the desktop they're in trouble." He fears that another change to the task bar may just add to user confusion.

Users also don't always understand Windows 7 libraries, a concept that replaces the standard folder metaphor with a more sophisticated model that allows groupings of files that may be stored in different locations. What's more, File Explorer defaults to the local library — even if you don't want users pointed there. Shane says that even administrators may find it annoying at first. "When you're rolling out a bunch of PCs on a network it gets in the way," he says.

Shane says his users like Windows 7's interface improvements, such as those Sebastiano described, and more subtle changes, such as how Windows automatically makes desktop icons bigger on larger screens with higher resolution. "That has helped users with poor eyesight," he says. Users particularly like what he calls the "shake and bake" feature on the Aero desktop that lets the user minimize all open windows on screen except for the currently selected one by simply grabbing and shaking that window from side to side.

Such features have been well received, he says. "But users have to be told about them."

Thomas warns that a migration from XP to Windows 7 won't be a slam-dunk with users without a little training. "Users haven't always gotten value of the tools we shove their way. This time we're spending more time up front trying to understand where the values are and actually promoting that."

Challenges and roadblocks

Given a choice between bringing in Windows 7 on new machines and upgrading old ones, most organizations prefer the former. Most (58%) of the survey respondents, however, say they will also upgrade at least some existing machines, particularly those purchased within the last two years.

One way to avoid replacing end user PCs is to use PC virtualization technologies. Naglich plans to do exactly that at University HealthSystem Consortium. And he's not alone in considering the use of desktop virtualization to ease the transition to Windows 7. Nearly one in five (18%) of IT professionals surveyed said they plan to move at least some Windows XP users from traditional Windows PCs to hosted virtual desktops as they migrate to Windows 7.

Naglich is working on a proof of concept for VMware-based desktop virtualization. That should roll out in the next month or two, he says. He hopes that hosted shared desktops will make administration easier and reduce application and hardware conflicts during the transition to Windows 7 by using a few common, centralized system images on back end servers. "For some people, the first Windows 7 they have may be on a virtualized desktop," he says. But he's not ready for a broader rollout. Most of the 275 Windows clients will be upgraded to a local version of Windows 7.

That's smart, because both Windows 7 and desktop virtualization products are still maturing, says Gartner's Silver, adding that what you save on desktops you'll need to invest in back end servers, virtualization software and associated infrastructure. The real benefits come from easier management. The sweet spot for organizations that want to do both at once, he says, is late 2011. By then, he contends, both Windows 7 and desktop virtualization technologies will be more mature.

For existing hardware that meets Windows 7 system requirements, all of the usual upgrade issues apply. "Fresh installs are quick," Sebastiano says. On the other hand, while a Vista upgrade to Windows 7 is fairly straightforward, getting user profiles and settings moved over from XP is more challenging. He's looking at using Laplink Software's PCmover to bring those over.

Application compatibility is another potential issue, particularly for older software. Axium Healthcare Pharmacy Inc., an online specialty pharmacy based in Lake Mary, Fla., is using several internally developed Visual Basic 6 applications that won't run on Windows 7, not even with the XP Mode software. "A lot of ActiveX controls don't play at all," says Norbert Cointepoix, director of IT.

But Matt Okuma has found that some applications run better. Okuma, enterprise architect at BEST Technology Services, a business unit of Pacific Coast Building Products in Rancho Cordova, Calif., says his Cisco unified communications software never worked properly on about 100 of the Vista machines he rolled out. Some of those, he says, had to be rolled back to Windows XP. With Windows 7, however, it runs just fine. "We love it. Everything just works," he says.

Well, almost. Initially Windows 7 machines running Internet Explorer 8 couldn't connect to his iPrism proxy server, but he says the vendor, St. Bernard Software, provided a fix quickly. He plans to start rolling out Windows 7 to all 3,500 users next year.

The IE 8 quandary

The good news is that Internet Explorer 8 follows industry standards more closely than did IE7 and IE6. The bad news: Its lack of backward compatibility with proprietary features in previous versions of the Microsoft browser may cause problems for Web sites and applications designed to work with those browser versions — especially IE6. More than half of survey respondents (53%) said that they may have applications that won't run properly with IE8.

"If you have apps that were written to IE6 you're going to have some issues," Silver says, and he warns that IE8 runs with fewer Windows user rights on Windows 7 than it did on XP. A Microsoft spokesperson says that administrators can set up Windows 7 machines to run previous versions of IE in XP Mode if necessary.

Premier Health Partners has a medical imaging application that still requires IE6 and a clinical application that requires IE7. "We're in a quandary here," says Sam Seay, corporate director of infrastructure. While he could use XP compatibility mode to try to run IE6 and IE7 on some machines, Seay says he prefers to wait for the vendors to support IE 8.

"The biggest issue is making sure you do application compatibility testing," Thomas says. Pella's IT staff has had to update software releases and work through issues on some of the company's approximately 400 applications. Pella is still testing compatibility; the firm started with its most-used applications, in terms of the number of users. "Our issue has been on older apps that didn't necessarily follow current development guidelines," Thomas says, explaining that Pella's had to make some "small adjustments" on approximately 20% of its applications, or get updates if a more current release exists.

In general, he says, "We haven't had too many applications that we haven't been able to get running."

Overall, after more than eight years living with XP, most organizations say they finally feel comfortable moving on. Shane feels confident that the transition will go smoothly at Milliman. "It's not something completely new," he says. "They just made a better Vista."

Cisco unveils next Internet core router

Says its CRS-3 has three times the capacity of its current version
Cisco Systems today introduced its next-generation Internet core router, the CRS-3, with about three times the capacity of its current platform.

"The Internet will scale faster than any of us anticipate," Cisco Chairman and CEO John Chambers said during a webcast announcing the product.

At full scale, the CRS-3 has a capacity of 322Tbit/sec., roughly three times that of the CRS-1, which was introduced in 2004. It also has more than 12 times the capacity of its nearest competitor, Chambers said.

The CRS-3 will help the Internet evolve from a messaging to an entertainment and media platform, with video emerging as the "killer app," Chambers said.

Using a CRS-3, every person in China, which has a population just over 1.3 billion, could participate in a video phone call at the same time. It could transmit the whole printed contents of the Library of Congress in one second and every movie ever made in four minutes, according to Cisco.

"This is the heart and brains of the next-generation Internet," said Suraj Shetty, vice president of worldwide service provider marketing.

Also on the webcast, AT&T announced it has been using the CRS-3 to test 100Gbit/sec. data links in tests on a commercial fiber route in Florida and Louisiana. The router will be available in the third quarter this year.

Source : computerworld.com

Cisco touts new core router's 100G Ethernet, energy efficiency

Cisco's new CRS-3 core router, which the company has boasted will "forever change the Internet," will come with 100Gbps Ethernet interfaces and 322Tbps multichassis interconnect capability.

The router also will support software to help make data center and cloud computing resources more available to users, and will use 60% less power than its predecessor, the CRS-1, said Mike Capuano, Cisco's director of service provider marketing, in an interview following Tuesday's announcement.

Cisco expects to ship the 120G per slot system, which has three times the capacity of the CRS-1, in the third quarter.

100G Ethernet cheat sheet

Some wonder whether such capacity claims are all that meaningful, however, in that Cisco never really delivered on it 92Tbps promises with the CRS-1. The largest CRS-1 multichassis deployment connects eight CRS-1s into a 10Tbps system, Capuano acknowledges.

So will any carrier really need a 322Tbps system any time soon?

"We're continuing to increase the size of our multichassis deployments at a pace where we're meeting customer demand," Capuano said. "We don't want to get ahead of them; we have to time it so that we're delivering the right set of capabilities as time progresses. It's all designed in from the beginning."

Capuano also said all CRS-1 modules are forward compatible with the new router.

The CRS-3 delivers the industry's most energy efficient core router, according to Capuano. It consumes 2.75 watts/gigabit, almost half that of rival Juniper's 4.4 watts/gigabit on the T1600, he said.

The single port 100G Ethernet interface for the CRS-3 supports "singleflow" 100G transmissions through Cisco's QuantumFlow Array chipset. It transmits a single 100G flow while other 100G Ethernet interfaces take two 50G forwarding engines and multiplex traffic across them, Capuano said.

"That makes it much harder to do a multichassis design," he said.

For delivery of data center and cloud services, the CRS-3 supports Cisco software called Data Center Services System. The software detects changes in traffic patterns of workloads between data centers and locates the best path to access compute and storage resources, or content. It works with another attribute of the Data Center Services System software called Cloud VPNs to set up a secure MPLS connection between data centers to balance workloads.

"That's a big part of this next generation Internet -- the emergence of cloud," Capuano said. "It requires scale, savings and service intelligence."

Source : computerworld.com

Monday, March 8, 2010

Five new technologies for your home

Many new technologies and gadgets have taken a back seat to the news of 3D television. Yes, 3D HDTV is astonishing. However, there are some new products out there that will not only improve your geek lifestyle, but also won't require you to wear hulking glasses. Here are five such items. Enjoy!

Can't find your remote control? No problem.

The Re™ from New Kinetix can turn your iPhone or iPod touch into a universal remote control. Simply snap on the IR attachment, download the software, and you can control your home theater with probably the best illuminated remote you'll ever see. Essentially, this application turns your iPhone/iPod into a learning remote. You hold your antiquated remote face to face with the dongle and the software will copy the infrared signals needed to operate your television, sound system, etc.


Price: Not yet set



RGB and...Y? QuadPixel technology is here!

The combination of the colors red, green and blue produces the millions of colors that you see on your LCD television (or computer monitor). Even the most beautiful of modern televisions are limited to these mere millions of colors your screen can produce. No longer. Sharp is introducing it's new QuadPixel LCD TV which adds in a yellow filter to produce more than a trillion colors.

Price: $3,600



Portable Digital TV and DVD player

Are your kids tired of watching the same ol' DVDs as you travel over the river and through the woods? Philips understands. It has introduced the first portable DVD player that can also pick up digital TV stations. Never miss American Idol again when you're traversing this great nation.

Price: $180



Out of the box thinking

The Armour Group has developed a marvelous little radio called the Q2 Cube that tunes in to your favorite internet radio stations. Change the station by physically flipping the box onto one of it's four sides. Volume control? Tilt the box backwards or forwards.

Price: Not yet set



6 in 1 television

So the other day I was talking to a friend who is a huge sports fan. This product is for him. Samsung has developed the first multi-screen 60-inch HD monitor. Six separate screens that can work in concert or individually. Just think of the possibilities...!



Source : ITworld.com

Sunday, March 7, 2010

Bill calls for NASA to continue push to Moon

Legislation would halt space shuttle retirement and continue human space flight plan
President Barack Obama's plan to push NASA to scrap the "Obama budget scraps NASA manned moon mission" and contract with commercial companies to build space taxis is meeting with some resistance in Congress.

Senator Kay Bailey Hutchison (R-Texas) yesterday introduced a bill that would undo NASA's plans to retire its aging space shuttle fleet later this year. The bill would also require that NASA continue on with its Constellation program, which calls for building rockets and spacecraft to carry astronauts to the International Space Station and further into space.

"We must close the gap in U.S. human space flight or face the reality that we will be totally dependent on Russia for access to space until the next generation of space vehicle is developed," said Sen. Hutchison, in a statement. "If the space shuttle program is terminated, Russia and China will be the only nations in the world with the capability to launch humans into space. This is unacceptable."

Hutchison introduced the bill just a little more than a month after the president released his 2011 federal budget proposal, which would eliminate NASA's plan to return humans to the moon by 2020.

The budget plan aims to turn the agency's attention to developing new engines, in-space fuel depots and robots that can venture into space.

NASA administrator Charles Bolden has repeatedly said since the budget plan was proposed that the Constellation program is behind schedule, and projected to ultimately be over budget. He said he feared that NASA's Constellation program would sap funding and attention from developing new technologies.

Sticking with the plan would also drain funds from the space spation program, and would force NASA to withdraw its support from the international effort as early as 2015, he added.

The Obama administration's new plan calls for NASA to work with commercial aeronautics companies to design and build so-called space taxis that could take astronauts to the space station and eventually into outer space.

Obama's plan - and the fact that it could lead to job losses in both Florida and Texas -- got a pretty chilly reception in Congress this week. Bolden faced a vigorous round of questions in front of Congress earlier this week about the space agency's missions and what the new budget plan means for NASA.

he Wall Street Journal reported late yesterday that Bolden has asked senior managers at NASA to draw up an alternate plan in case Congress shoots down Obama's proposal. The alternative would be a compromise that would include ideas from both the administration and Congress, according to the Journal .

Sen. Hutchison's bill is designed to enable NASA to postpone the retirement of the space shuttle fleet until work is complete on a next-generation American spacecraft.

She also wants to push forward with NASA's goal of moving beyond human flights in low-Earth orbit and extend missions out to the moon or Mars.

Hutchison called the administration's plan short-sighted.

"Not only are we turning our backs on 40 years of American space superiority, we are giving up vital national security and economic interests to other nations," she added. "This must not be an 'either-or' proposition where we are forced to choose between continuing to fly the shuttle to service the station and maintain our independence in reaching space, or investing in the next generation of space vehicle. We can and must do both."

Dan Olds, an analyst with The Gabriel Consulting Group, said Hutchison is obviously motivated to keep jobs in her area and boost her public approval. However, that doesn't mean that the legislation won't garner much support across the country. "Some politicians are, of course, concerned about losing major facilities and employers in their districts, but that doesn't necessarily mean that their argument is without merit," said Olds. "If the space shuttle is retired now, we do lose our ability to launch humans into space until the new, privately built space taxis comes on line. I do think that private industry can probably do a better, faster, and less expensive job of it than the government, but they're not going to be able to get these new vehicles off the ground as quickly as hoped." He added that it comes down to how long the U.S. wants to go without being able to launch an astronaut into orbit on its own.

"In fact, I can put together a compelling case for launching politicians into orbit that would be sure to gather broad public support and immediate funding from voluntary contributions," he added.

Source : computerworld.com

Google giving away phones to (some) Android devs

Google just can't stop giving away phones!
The first time we heard about what is now called the Nexus One, it was because Google was handing them out at a company meeting. Then they gave everyone at the TED conference a Nexus One. Everyone who attended the Android Developer Lab's at MWC got one. We're told they'll be giving either a Nexus One or a Motorola Droid to qualified developers at next week's Game Developer's Conference. Earlier this week we ran a story (still rumor at this point) saying that anyone registered for the canceled Washington DC Android Developer Lab would get a free "Android device."

Clearly Google wants to get Android phones into the hands of as many tech pundits and developers as possible in order to create buzz and build out the community of Android developers as quickly as possible. But here's a twist to the story. Now Google is giving either a Droid or a Nexus One to existing Android developers. How do you qualify? You have to have an app on the Android Market that has at least a 3.5 rating and at least 5000 downloads. That's a fairly low bar; Google is going to be giving out a lot of devices!

The program is called the Device Seeding Program for Top Android Market Developers. Here's the full text of the email going out:
Due to your contribution to the success of Android Market, we would like to present you with a brand new Android device as part of our developer device seeding program. You are receiving this message because you’re one of the top developers in Android Market with one or more of your applications having a 3.5 star or higher rating and more than 5,000 unique downloads.

In order to receive this device, you must click through to this site, read the terms and conditions of the offer and fill out the registration form to give us your current mailing address so that we can ship your device.

You will receive either a Verizon Droid by Motorola or a Nexus One. Developers with mailing addresses in the US will receive either a Droid or Nexus one, based on random distribution. Developers from Canada, EU, and the EEA states (Norway, Lichtenstein), Switzerland, Hong Kong, Taiwan, and Singapore will receive a Nexus One. Developers with mailing addresses in countries not listed above will not receive a phone since these phones are not certified to be used in other countries.

We hope that you will enjoy your new device and continue to build more insanely popular apps for Android!

-Eric Chu
Android Mobile Platform

The big question of course, is why send Android phones to developers who already have Android phones? Presumably the assumption is that many established Android developers have older devices and Google wants them to get started taking advantage of new features in Android 2.0+, or even just taking advantage of the more powerful processors in recent phones.

As an example, Engadget recently ran a post about HyperDevBox, a Japanese studio that's created ExZeus, an Android game that really shows off what the new handsets are capable of. (I've embedded a video below.) This game (currently) only runs on phones with Android 2.0 or later, and a dedicated GPU; Google would like to see more apps of this caliber in the Android Market and that will only happen when more experienced developers have the latest hardware in their hands.

No matter the reason, this has to be good news for developers that qualify!



Source ITworld.com

Cisco quits WiMax radio business

The company will stop making base stations to concentrate on back-end IP infrastructure by Stephen Lawson

Cisco Systems will stop developing and making WiMax base stations to concentrate on the IP (Internet Protocol) networks that sit behind them.

Cisco acquired Navini Networks, which made WiMax RAN (radio access network) equipment, in 2007. The dominant IP networking company said at the time that it saw a powerful opportunity to bring broadband Internet access to developing countries through WiMax.

However, despite hitting the market first, WiMax has taken a back seat to LTE (Long-Term Evolution) as a 4G (fourth-generation) mobile technology. LTE is backed by the industry body behind GSM (Global System for Mobile Communications) and is on the road maps of most major carriers that have chosen a 4G system. In the U.S., Verizon Wireless plans to launch LTE commercially this year and AT&T will follow next year.

Cisco can serve both markets with products it acquired through its purchase last year of Starent Networks, which made gateways between radio networks and a carrier's core IP infrastructure. Both WiMax and LTE are based on IP packet networks. In order to concentrate on this business, the company will get out of making the actual radios that deliver WiMax signals to subscribers' devices.

"Cisco's mobile strategy has always been to provide a radio-agnostic approach that focuses on the packet core and IP network, where the company can add differentiated value. After a recent review of our WiMax business, we announced a decision to discontinue designing and building new WiMax base stations and modems, and we also announced a support plan for transitioning existing customers," Cisco spokesman Jim Brady said Friday.

The Navini products haven't played a big role in high-profile WiMax networks. Cisco is a supplier to the world's largest WiMax network project, Clearwire's national U.S. buildout, but only with IP equipment, not radios.

Analysts called the Starent acquisition a move away from WiMax toward the larger LTE market. Unlike WiMax, which had its roots in the wireless LAN world, with strong backing by Intel, LTE is dominated by the giants of cellular equipment, such as Ericsson and Alcatel-Lucent. Cisco has said it does not intend to compete with those types of vendors.

Analysts were not surprised by Cisco's announcement.

"Cisco pulling out at this moment looks like good business," said analyst Laurence Swasey of Visant Strategies. He believes LTE will dominate the 4G world and may even be adopted by current WiMax carriers eventually.

Cisco did the WiMax industry a big favor by buying Navini, Swasey said. "It was a stamp of approval at a time when the market was very fragmented as to what 3.5G and 4G would be to the masses," he said. Today, several major vendors, including Huawei, Samsung and Motorola, are supplying RAN equipment for commercial networks. Cisco's decision to get out of the business will have far less impact than its choosing to get in, Swasey said.

Source :ITnews.com

Printers and Scanners of Tomorrow (and Beyond)

Four ultra-futuristic printers and scanners hint of the possibilities of future tech

Affordable 3D Printers
3D printers are nothing new; in fact they've been around for some time. We've had a look at some of the cool things you can do with these types of printers, including creating models, tools and all sorts of wizardry. Unfortunately, the 3D printers of today cost in excess of $100,000 and are largely reserved for large architecture and development firms.

Thankfully, it won't stay that way forever. HP recently announced its interest in 3D printing, with products potentially available for just $15,000. 3D printers might not make it to your desk this year, but at this rate, the possibility of owning a 3D printer for personal or business use is becoming more likely.


3D Critters of the Future
The products of 3D printers, naturally, aren't limited to flat images. Here are some of the cool things 3D printers let you make.


Biological Printers
We are still a little way off re-growing entire limbs, but we are certainly making strides towards it. Invetech and Organovo have created the first 3D bioprinter, which is capable of printing entire cells. According to Organovo CEO Keith Murphy, the potential uses are wide-ranging - from supporting existing kidney cells to forming the foundations of a tooth.
With a printer capable of producing "tissue on demand," researchers and surgeons will apparently be able to easily repair organs without waiting for a lab to catch up; just press the button and go. It's all a bit freaky, but if these end up in every hospital they could literally be a life saver.


Food Printers
To us, this seems even more unlikely than biological printers. Then again, science fiction movies have told us for years that one day we'll have replicators that can reproduce anything on command. This concept from MIT doesn't quite reach those heights, but it sure does get close. By mixing liquid ingredients to suit the user's preferences and then either heating or cooling it, the "Cornucopia" can recreate a meal with any number of textures and tastes.

We're not sure of the final taste, but somehow we don't think these food printers will be making it into five-star restaurants anytime soon.


Food Printer Products
This opens all kinds of possibilities . . . liquid lasagna, anyone?



3D Scanning
We've seen plenty of devices that help you get designs out of a computer, but how about something to get 3D objects back in? Step in Ortery's Photosimile 5000, allegedly the world's first 3D scanner for the office. The Photosimile 5000 is essentially a big box that allows you to attach compatible Canon SLR cameras, and automatically takes a succession of photos. The product lies on a rotating turntable, giving you a full 360 degree view of the product.

The scanner is undoubtedly useful for product manufacturers everywhere (and it could even threaten the jobs of in-house product photographers). It even automatically creates a 3D animation of the product, though this has to be viewed using Ortery's proprietary software.


Saturday, March 6, 2010

USB 3.0 vs. eSATA: Is faster better?

While USB 3.0 is good, it's not as simple as "Whoever's the fastest wins." Let's take a closer look at these new and improved ports on our PCs

Up-to-date computers now include external ports that, in theory, can handle data at rates of up to 5 Gigabits per second. But which is better?

If you've been in the computer business for any length of time you can probably painfully remember when serial RS-232 ports could barely handle 28 Kilobytes per second. And, adding insult to injury, the standard was loose enough that you could have 'compatible' devices that you could never physically connect. How things have changed! Now, eSATA can handle 300 MBps (MegaBytes per second) and USB 3.0 can wheel and deal up to 625 MBps.

So that makes USB 3.0 better right? Well, while USB 3.0 is good, it's not as simple as "Whoever's the fastest wins." Let's take a closer look at these new and improved ports on our PCs.

ESATA (External Serial Advanced Technology Attachment) is the external version of the technology, SATA, that your computer is likely already using for its hard drive. While SATA and eSATA are both older than USB 3.0, its proponents would still claim that it's better than USB 3.0.

They can make this argument because the most common use for eSATA is for external hard drives. Internally, these drives are still using SATA even if you're connecting to these devices with USB or FireWire on the outside. Thus, the argument goes, these devices must use a bridge chip to translate from the ATA protocol to USB or the FireWire IEEE 1394 protocol.

There are two ways to do this. The first is to encapsulate the SATA protocol-borne data into USB or FireWire. The other is to actually convert the data into one of the external data transmission protocols. In either case, this requires extra steps and processing, which slows down the effective throughput.

Various benchmarking tests support this claim. In particular, eSATA has clearly been shown to be faster than USB 2.0.

Today, USB 3.0's SuperSpeed 5 Gbps (Gigabits per second) is more than ten times faster than USB 2.0's top theoretical speed of 480 Mbps (Megabits per second). In addition, USB 3.0 supports asynchronous data transfers, which means that, unlike USB 2.0, it doesn't need to wait to poll a USB device every time it wants to start shipping data one way or the other.

In addition, USB 3.0 includes a new transfer method called Bulk Streams. With Bulk Streams, USB now supports multiple data stream transfers. The net effect of this is that the protocol will do much better with huge data transfers such as those required by viewing an HD movie that's residing on an external hard drive.

Still, on those same external drives, USB 3.0 must deal with the SATA to USB protocol conversion slowdown. So, who wins when it comes to raw read and write speeds? We still don't know.

I did, however, run some rough benchmarks to get an idea of what we're dealing with. For my devices I used a Western Digital My Book Studio Edition II 1TB 7,200 RPM external hard drive with its eSATA port and ran it against a Western Digital My Book 3.0 with a similar drive inside. I attached these to a Gateway SX2802 PC with a 2.5GHz Intel Core 2 Quad Q8300 CPU and 6GBs of DDR2 memory. On this system I was running Windows 7 Ultimate. To enable it to handle USB 3.0, I installed a StarTech 2 Port PCI Express SuperSpeed USB 3.0 Card Adapter.

With this setup, USB tends to be about 20% faster than eSATA at reads, while eSATA was about 20% faster at writing data to the disk. While I make no claims for these to be definitive benchmarks (I used the freeware Crystal DiskMark 3.0 program for my tests), I do think the results indicate what you can expect to see from today's eSATA and USB 3.0 drives.

In both cases the real world results were quite a bit slower than their theoretical bests. With reads, my USB drive averaged 90 MBps, while the eSATA drive came in at 75 MBps. When it came to writing to the disk eSATA still processed data at 75 MBps while the USB drive dropped to 62 MBps.

This kind of difference between real world and theoretical results is quite common. Nothing in your office or home, or even the test bench, will ever run as fast as its design specifications call for.

That said, I was surprised to see USB 3.0 do as poorly as it did. Mind you, it's still much faster than USB 2.0 and somewhat faster than eSATA in data reads. I had expected better from it. I strongly suspect that as USB 3.0 devices and drivers mature, it's speed will significantly improve.

USB 3.0 does have some other advantages over eSATA. For example, like USB 2.0, you can power devices through a USB 3.0 connection, while you'll need another power connection for external eSATA devices.

In addition, USB 3.0, which can handle up to 50% more power than USB 2.0, should be thriftier with energy than 2.0. Alas, it's not. As Brian Nadel reported in ITworld's sister publication Computerworld, current USB 3.0 implementations will drain your laptop's battery faster than their equivalent USB 2.0 devices. Again, the next generation of devices and drivers should handle this better.

Another noteworthy point is that while USB 3.0 is backwards compatible with USB 2.0 cables and devices, you can't use a USB 3.0 cable with a USB 2.0 or earlier device. In addition, you can't use any USB 3.0 device with a USB 2.0 cable. That's because while the flat USB Type A plug, the one that goes into your PC, is compatible with USB 2.0 ports even though it has an extra pair of connectors, the other end is a different story entirely. The Type B plug, which is the one that you use to connect devices to the computer, comes in two different varieties. Neither of these will fit into a USB 2.0 B port.

So, what should you do? If I were you, I'd stand pat for now. USB 3.0 is the wave of the future. Later this year, as the technology matures, USB 3.0 devices should be consistently faster than today's eSATA devices, but we're not there yet.

In addition, for now, you'll still pay a premium for USB 3.0 devices, boards with USB 3.0 ports, and even PCs with USB 3.0 built-in. Towards the year's end though USB 3.0 will become the default on almost all PCS and peripherals. Much as I like USB 3.0, I don't see any reason to hurry up and adopt it today. I'd advise you to wait too

N. Korea develops operating system with Windows-like GUI, Linux guts

Bundle includes thinly disguised versions of Firefox, OpenOffice.org

The North Korean government appears to have developed its own graphical Linux-based "Red Star" operating system, though its people still prefer that symbol of Yankee high-tech imperialism, Microsoft Windows.

That's according to the blog of a Russian college student, 'Mikhail,' studying at a university in North Korea's capital city, Pyongyang.


According to translations of the blog by Russian satellite news channel, Russia Today, as well as Google's Translate tool, installation DVDs of Red Star can be freely purchased in Pyongyang for $5 and come in both client and server versions.

Red Star requires, at minimum, a Pentium III 800 MHz CPU (state-of-the-art in developed countries about ten years ago), 256MB of RAM and 3GB of hard disk space.

Installation takes 15 minutes, and users may only choose to run it in the Korean language. A more serious quirk: The clock on the bottom right shows the year in both the standard international Gregorian calendar, and the North Korean "Juche Idea," in which 2010 is the year 99.

Local North Koreans told Mikhail that Red Star is not stable, and that they still prefer Windows XP, Vista or 7.

Mikhail did not comment on what version of Linux that Red Star may be built upon. Cuba released its own version of Linux last year called Nova that is based on Gentoo, a Linux variant that is run by a foundation based in New Mexico.

Red Star includes applications such as a thinly disguised version of the Mozilla Firefox browser, an OpenOffice.org-like productivity suite, an e-mail client called 'Pigeon,' and a number of other utilities.

Two programs that were apparently developed by North Korea include a firewall program called "Pyongyang Fortress," and an antivirus application called "Woodpecker."

The browser's search engine defaults to the North Korean government's official Web site, Naenara.

Thursday, March 4, 2010

Internet freedom and security

It's already been a busy year in the area of Internet freedom and security.

10 of the Worst Moments in Network Security History


First, Google reported that it, along with a bunch of other major companies, had been hacked, and pointed the finger at China.

Then Secretary of State Hillary Rodham Clinton gave a few "Remarks on Internet Freedom" in which she pushed for one Internet, without barriers.


Separately, the Federal Trade Commission notified about 100 companies that some of their secrets had been exposed by employees who were running peer-to-peer software.


Finally the Internet security firm NetWitness said that it had figured out that 75,000 computers at 2,500 companies had been compromised with the ZeuS Trojan starting in 2008.


Nope - not a good start to 2010. I would like to think that things will quiet down some for the rest of the year but it does not look like that will happen.


In early January, Google announced that it had been hacked from China, that the hackers seemed to be after the gmail accounts of Chinese human rights activists and that Google was going to review "feasibility of our business operations in China."


Well, that caused quite a splash. Google's accusation fit so well with the general public perception of China's approach to the Internet that it was easy to assume that the hacking was directed by the Chinese government.


Clinton did not go quite so far as to accuse the Chinese government of complicity during her speech on Internet freedom,but she did call upon it to "conduct a thorough review" of the Google hacks and that the results of the review be transparent. Clinton's speech was quite a good one from the point of view of those of us who value the positive impact of the communication enabled by the Internet.


Properly, she did not hide the fact that communication over the Internet can be used for good (human rights activists) and evil (terrorists).

India adds IT jobs despite recession

The largest addition of jobs in the country came in the IT services and BPO industries

India added 487,000 jobs in its IT and BPO (business process outsourcing) export industries in the quarter ended Dec. 31, despite the global recession, according to a Quarterly Quick Employment Survey by the country's labor bureau.

The survey was conducted to assess the impact of the economic slowdown on employment in India.

The results, released Thursday, found that of a total of 638,000 jobs added across the economy, 580,000 were in the exports sector. IT services and BPO exporters led the pack.

Besides Indian service providers, a large number of multinational companies like IBM and Accenture have set up IT services and BPO operations in the country, that service both the Indian market and markets abroad. Most of India's IT and BPO exports go to the U.S. and the U.K.

In January this year, a large number of Indian outsourcers, including the largest, Tata Consultancy Services (TCS), and the second largest, Infosys Technologies, reported plans to increase hiring in anticipation of improved business conditions.

TCS, for example, added 7,692 positions in last quarter of 2009, taking the total staff at the end of the quarter to 149,654. The company plans to hire about 8,000 trainees and about 3,000 experienced staff in the current quarter, it said.

India's software and services exports are expected to grow at 5.5 percent to US$49.7 billion in the Indian fiscal year to March 31, 2010, Minister for Communications and IT Sachin Pilot told Parliament on Thursday.

That growth rate for software and services exports is well behind the 16.5 percent rate in the year to March 31, 2009, and 29.5 percent in the previous year.

However an expected uptick in business later this year is driving new hiring by the IT and BPO sector. The National Association of Software and Service Companies (Nasscom) said in February that India's exports of software services and BPO are likely to increase by 13 to 15 percent in the fiscal year to March 31, 2011.

Some companies have also indicated that they will increase staff salaries soon. Raises were cut down or held back last year after the recession hit the industry.

IT management: Zero in on business impact

Push users to think past the idea that technology will be a cure-all
CIO Executive Council - Within five years of moving into IT management, Jay Kerley found his purpose: working with the business to affect business outcomes and results. And he set his sights on the CIO role when it became clear that the best way to create change and effect a business impact on as wide a scale as possible is to have that executive-level, strategic role. "With a CIO's cross-division view of processes, you are in the position to shift and turn the company," says Kerley, who was promoted to the position of deputy CIO at Applied Materials in 2009.

Kerley, a winner of CIO magazine's and the CIO Executive Council's 2009 CIO Ones to Watch Award, identifies three milestones in his path to the c-suite: building business outcome-focused IT leadership teams, taking on risky challenges with big payoffs for the company, and cultivating a portfolio perspective.

Kerley's first taste of driving business results came in his first leadership position, where he discovered that he had a knack for rallying and motivating teams to tackle complex, business-oriented challenges. What motivated him -- and his team, in turn -- was the chance to create and enable business improvements. He built a close-knit team of people during his time in that position -- many of whom have stayed with him as he moved to new companies and new locations -- that led projects with far-reaching impact on the company, including globalization of processes for more efficient and consistent operations, and merging acquired business units without disrupting service to the customers.

Kerley realized that a willingness to face new challenges would bring greater benefits to the business, and he had this in mind when he joined Applied Materials, the world's largest supplier of manufacturing equipment to the semiconductor, display and solar photovoltaic industries. There he took a risk by evaluating applications that hadn't been meeting the engineering users' needs for years, pushing people to think past the idea that technology would be a cure-all, and examining the underlying processes as the source point for potential improvements. He then partnered with business leads to develop new processes and a technology solution to enable them. In the end, the engineering team not only had a better user experience, but was able to use the system in ways it hadn't before, including collaborating across the globe.

Much of this came together because Kerley found a strong CIO mentor early on, who complemented weaknesses -- while Kerley came up in IT via infrastructure and applications development, this mentor came from a leadership development and project and portfolio management background. Being exposed to that side of the IT world was a revelation, Kerley says. Having a portfolio perspective enables IT leaders to serve as a bridge into the business and to see the potential for cross-functional improvements, a skill-set necessary to being a results-oriented CIO.

Jay Kerley is deputy CIO at Applied Materials and a member of the CIO Executive Council. The Council's Pathways Program was created by CIOs to build business and IT leadership skills in senior IT leaders through group mentoring with CIOs, 360-degree competencies assessment, targeted seminars and community forums. To learn more, visit council.cio.com/pathways.html.

Microsoft's Charney suggests 'Net tax to clean computers

The company recently used the U.S. court system to shut down the Waledac botnet

How will we ever get a leg up on hackers who are infecting computers worldwide? Microsoft's security chief laid out several suggestions Tuesday, including a possible Internet usage tax to pay for the inspection and quarantine of machines.

Today most hacked PCs run Microsoft's Windows operating system, and the company has invested millions in trying to fight the problem.


Microsoft recently used the U.S. court system to shut down the Waledac botnet, introducing a new tactic in the battle against hackers. Speaking at the RSA security conference in San Francisco, Microsoft Corporate Vice President for Trustworthy Computing Scott Charney said that the technology industry needs to think about more "social solutions."

That means fighting the bad guys at several levels, he said. "Just like we do defense in depth in IT, we have to do defense in depth in [hacking] response."

"I actually think the health care model ... might be an interesting way to think about the problem," Charney said. With medical diseases, there are education programs, but there are also social programs to inspect people and quarantine the sick.

This model could work to fight computer viruses too, he said. When a computer user allows malware to run on his computer, "you're not just accepting it for yourself, you're contaminating everyone around you," he said.

The idea that Internet service providers might somehow step up in the fight against malware is not new. The problem, however, is cost.

Customer calls already eat into service provider profits. Adding quarantine and malware-fixing costs to that would be prohibitive, said Danny McPherson, chief research officer with Arbor Networks, via instant message. "They have no incentive to do anything today."

So who would foot the bill? "Maybe markets will make it work," Charney said. But an Internet usage tax might be the way to go. "You could say it's a public safety issue and do it with general taxation," he said.

According to Microsoft, there are 3.8 million infected botnet computers worldwide, 1 million of which are in the U.S. They are used to steal sensitive information and send spam, and were a launching point for 190,000 distributed denial-of-service attacks in 2008.

Saturday, February 27, 2010

More than 100 companies targeted by Google hackers

Two months after hack, security firm says another 68 command-and-control servers have been identified

IDG News Service — The hackers who broke into Google two months ago have gone after more than 100 companies, according to an estimate by security vendor Isec Partners.

Researchers have been closing in on the unidentified criminals responsible for the attack over the past month. In the process, they have uncovered another 68 so-called command-and-control servers, used to control the hacked machines.

Investigators had already identified 34 hacked companies after examining the single command-and-control server used in the Google attack, and the discovery of another 68 servers could mean that many more companies were compromised than previously thought. "It's easily over 100 companies," said Alex Stamos a partner with Isec Partners.

In the weeks since Google went public with details of the hack, informal discussion lists have sprung up, including security experts and staffers from companies that have been compromised. In those discussions, "that list of control machines keeps getting longer and longer," Stamos said.

The code used in the attacks, known in security circles as Aurora, has been in use for at least 18 months, Stamos said. But the security industry was unaware of Aurora until Google discovered the intrusion last December. That allowed hackers to get onto corporate networks undetected.

Other technology companies, including Intel, Adobe, and Symantec, have also been hit by the attack, which investigators have traced back to China.

To break into victim companies, the hackers sent carefully targeted e-mail or instant messages to victims, hoping to trick them into visiting Web pages or opening malicious documents that would then attack their computers.

The worst part of the attack is what happens once the initial victim has been compromised. The hackers then use a variety of techniques to acquire additional usernames and passwords and fan out across the targeted company's network, downloading sensitive data, which is then moved offshore.

This type of targeted attack is not new, but it is dangerous because it is so good at circumventing traditional security measures, said Rob Lee, a computer forensics instructor with the SANS Institute. "We've been dealing with [these attacks] for five years," he said. "They're basically going around all the security appliances via email."

Not all of these attacks have been linked to Aurora, but Lee said that "there have been hundreds of companies infiltrated."

Stamos agreed that traditional security products such as antivirus and intrusion detection systems are not enough to stop the attack. "The interesting thing to me about these attackers is they're very patient," he said. "They'll spend a lot of time writing custom malware to get around people's antivirus."

"They'll use a social network to learn about one person in the company, and then will send emails or chats messages as that person's friend," he added.

Facebook Tips and Tweaks

Add-ons, plug-ins, and services to streamline and simplify your Facebook experience.
by Rick Broida, PCWorld - I like using Facebook to keep tabs on my friends, but I don't like the endless stream of "so-and-so took this quiz" and "Joe became friends with Jane" messages. I just became a fan of Facebook Purity, an add-on that removes those notifications from your Facebook home page. Facebook Purity is a script that requires Greasemonkey. Once you've installed that and restarted Firefox, just install the FP script, start up Firefox again, and fire up Facebook.


The effects are subtle--don't expect a major makeover--but definitely worthwhile. You may not notice any immediate changes, but you should see a "FB Purity hid" header like the one highlighted in this screen shot. The tally refers to the number of Facebook apps and "extras" hidden from your home page. If you're curious to see what they are, just click Show for either category.

If you want to edit the list of apps and extras Facebook Purity blocks, see the developer's FAQ page. Speaking of which, the script doesn't cost anything, but the developer sure would appreciate a few bucks if you find it useful. (Click the Donate button on his page to make a contribution via PayPal.)

By the way, Facebook Purity is compatible with Google Chrome, Opera, and Safari, but using Greasemonkey scripts with those browsers is a bit more complicated. Again, see the FAQ page for details.

Download Photo Albums in a Flash

For a service as photo-oriented as Facebook, the simple act of downloading photos is annoyingly complicated. In fact, there is no download option; you have to view each photo in turn, right-click it, and choose Save Image As or Save Picture As (depending on your browser).

So what happens if a friend posts a bunch of pictures you want to download? Are you really supposed to go through and save them one by one? Not if you install the FacePAD plug-in for Firefox. Short for Facebook Photo Album Downloader, it does exactly what its name implies: downloads entire albums at a time.

After loading the plug-in and restarting Firefox, select Tools, Add-ons, find FacePAD, click Options, and choose your language. Click OK and you're good to go.

To use FacePAD, just navigate your way into a friend's photo library, right-click an album link, and choose Download Album with FacePAD. In a matter of minutes the plug-in will plunk every photo into your default Firefox Downloads folder.

It's too bad you can't specify a folder or do any batch-renaming; all the photos end up with cryptic numerical file names. Still, FacePAD works as advertised, and it's a damn sight easier than retrieving each photo manually.

Add Facebook Chat to Your Firefox Sidebar

Let's solve another Facebook hassle: When you leave the site, your chat sessions get left behind. Wouldn't it be nice if you could keep a Facebook chat going regardless of what site you're viewing?

If you use Firefox as your Web browser, you can add Facebook chat to the Sidebar, thus keeping it alive and active even while you browse elsewhere. (I also find it a more convenient location than the bottom-right corner of the screen, which is where Facebook shoehorns it.) Here's how to make it happen:

In Firefox, press Ctrl-B to open the Sidebar in Bookmarks view. Right-click the bookmark folder where you want to add Facebook chat, then choose New Bookmark. Name the new bookmark "Facebook Chat," then paste this URL into the Location field: http://www.facebook.com/presence/popout.php Check "Load this bookmark in the sidebar," then click OK.

Now just click your new bookmark and presto: Facebook chat in the sidebar. Not too shabby, eh?

Simplify Your Facebook Experience with Brizzly

Brizzly provides a clean, simple, ad-free interface for Facebook (Twitter, too).

Getting started with this free Web service is a snap. Sign up for an account, then supply your user name and password for Facebook and/or Twitter. You'll have to click through a couple "approval" pop-ups, which is normal for any outside service seeking access to your account.

Now you've got a simple front end for your Facebook news feed. You can update your status, comment on friends' posts, watch posted videos, write on walls, and so on. You don't get every single Facebook feature--you can't "hide" a friend or play any games--but you do get a refreshingly streamlined interface.