UPDATE FIXES VERIZON IPHONE 5 DATA GLITCH; CUSTOMERS WON'T BE CHARGED FOR OVERAGES

Verizon iPhone 5 customers may have noticed an issue wherein their phones gobbled up extra cellular data when they were theoretically connected to Wi-Fi networks. Those customers now have two bits of good news: There’s a special software update that fixes the problem, and they won’t be responsible for unexpected charges related to unintended network overages related to the issue that spurred the carrier update in the first place.

10 HOT IT SKILLS FOR 2013

The number of companies planning to hire tech professionals continues to grow, with 33% of the 334 IT executives who responded to Computerworld's 2013 Forecast survey saying they plan to increase head count in the next 12 months..

APPLE WARNS ICLOUD USERS OF LOOMING STORAGE LOSS

Apple on Monday began reminding some iCloud users that they will soon lose the 20GB of free storage they'd received when they migrated from MobileMe.

Nook Video set for fall premier

Barnes and Noble Tuesday announced that Nook Video will premiere this fall in the U.S. and UK. The service will offer access to movies and TV shows for streaming and download.

Eight simple steps to make the upgrade to iPhone 5 easier

A little planning can save time - and voice messages - when you upgrade to the new iPhone 5

Showing posts with label other. Show all posts
Showing posts with label other. Show all posts

Sunday, March 8, 2009

Intel opens up the Atom processor to TSMC

Intel on Monday announced a partnership that could provide access to the chip design of its low-cost Atom processor to Taiwan Semiconductor Manufacturing Co.

The partnership with TSMC could lead to customized chips that could provide Intel access to new markets it can't reach alone, said Sean Maloney, Intel executive vice president and chief sales and marketing officer, during a conference call with reporters.



TSMC will be able to provide its customers with details of Atom's design so that they can design chips based on the chip's core.

Atom chips currently go into low-cost laptops, also known as netbooks, and devices such as mobile Internet devices (MIDs) and smartphones. Future Atom chips will include more integrated PC capabilities, such as graphics and Internet connectivity, that could push the processor into embedded devices and consumer electronics.

To date, Intel has alone developed and sold its Atom processors for netbooks and MIDs. The company wants to maintain tight control over the types of products the derivative Atom chips will go inside, Maloney said. Intel will not be transferring Atom's manufacturing process technology to TSMC, so any chips that result from the deal will be manufactured by Intel.

"What we're doing here ... we will be picking the segments we go after," Maloney said.

The companies have collaborated for close to 20 years on products that include WiMax chips.

Intel officials shied away from answering questions on whether the TSMC deal would affect Atom's product road map or future smartphone chips like Moorestown. Details surrounding the deal are still being worked out, Intel officials said.

This agreement is similar to a strategy employed by Arm, which generates revenue by licensing smartphone and embedded chip designs to chip makers, said Jack Gold, principal analyst at J. Gold Associates. Arm has licensed its chip cores to companies such as Texas Instruments and Qualcomm, which provide chips for smartphones.

"This is a direct attack on competing processors, especially the Arm processor, which is trying to move upstream from phones and embedded gadgets, while Intel is trying to move downstream with Atom into this overlapping space. The battleground in the middle will be aggressive and potentially bloody, with huge potential returns," Gold wrote in a research note.

The partnership will help Intel add a revenue stream by licensing out its Atom core, and adds "massive market potential" through TSMC's customers, Gold wrote. TSMC has connections to many consumer and lower-end products like smartphones and embedded device markets, especially in Taiwan and Japan, Gold wrote.

The partnership is a win for both companies, said Rick Tsai, president and chief executive officer of TSMC, during the call. It is mutually beneficial as it will allow both companies to generate additional revenue and reach new markets, especially at a time when the semiconductor industry is struggling.

"People in our industry must work together ... so we can share the benefits," Tsai said.

Intel has taken a number of steps to develop integrated chips that could fit into new products like set-top boxes and TVs. Intel in February said it was prioritizing its move from the 45-nanometer process to the new 32-nanometer process technology, which should help the company produce faster and more integrated chips.

To that effect, the company said it would spend US$7 billion over the next two years to revamp manufacturing plants. It will also help Intel make more chips at lower costs and add efficiencies to the production process. Intel will begin producing chips with 32-nm circuitry starting in late 2009.


Salacious content driving the adoption of ebooks?

This week's ebook news continues with the announcement that Barnes & Noble has purchased ebook seller Fictionwise for $15.7 million in cash, plus undisclosed earn-out payments if the company meets certain objectives over the next two years.

Fictionwise, founded in 2000 by Steve and Scott Pendergrast, operates the eReader.com site as well as Fictionwise.com. Barnes & Noble says the founders will continue to operate the sites as a separate business unit within Barnes & Noble.

eReader.com sells books only for the eReader Pro software which is available for a wide range of mobile platforms (the notable exception being the Blackberry), as well Windows and OS X computers.

Fictionwise.com, on the other hand, covers a broad range of digital book formats, including audiobooks.

One of the challenges of selling ebooks (pre-Kindle) has been the plethora of formats available. Grabbing a random example off of Fictionwise.com, here's what we find under "available formats":

Available eBook Formats [MultiFormat]: Adobe Acrobat (PDF) [828 KB], eReader (PDB) [289 KB], Palm Doc (PDB) [284 KB], Rocket/REB1100 (RB) [252 KB], Microsoft Reader (LIT) [279 KB] - PocketPC 1.0+ Compatible, Franklin eBookMan (FUB) [280 KB], hiebook (KML) [659 KB], Sony Reader (LRF) [329 KB], iSilo (PDB) [235 KB], Mobipocket (PRC) [294 KB], Kindle Compatible (MOBI) [356 KB], OEBFF Format (IMP) [412 KB]

This strikes me as both a strength and a weakness of ebook sellers. If you've got any kind of device with a screen you can probably find an ebook reader that supports one of these formats. But as a new user hitting the site, the choices can seem overwhelming. Presumably this is the reason for the more focused eReader.com site: Step 1, download our reader software for your device. Step 2, Start buying books from us.

This is also why Amazon probably has the best shot of taking ebooks mainstream.

Barnes & Noble abandoned ebooks once, so why are they coming back to them now? Because the format is starting to take off. Why is that? What's popular on Fictionwise? Well, once again it seems like porn is blazing a path to a new media format. Of the top 10 bestsellers under the "Multiformat" category, nine are tagged "erotica" amd the last is "dark fantasy".

Hey, I'm not judging anyone (one of my dearest friends is an erotic romance author) and yes, I've used the most salacious Top 10 list on the site in my example, but this data backs up my anecdotal observations. People who read erotic romance and 'bodice rippers' love ebooks because of the privacy they offer, both during purchase and when reading.

One of my favorite geek thespians, Felicia Day, apparently agrees with me. Here're a few recent tweets from her:

My Dad got me a Kindle 2.0! Thx Dad! Buying all the trashy novels I'm too embarrassed to buy because of the cover art. Oiled up Chests FTW!

BTW third trashy paranormal romance book read on my Kindle. Just told someone I am reading Dickens, LOL!!! I love this!

Let's take that last one with a grain of salt, shall we? But I do honestly believe that the success of the ebook is being fueled by the romance and erotic romance market. My aforementioned author friend, Samantha Lucas, sells almost all of her novels in ebook format for publishers like Cobblestone Press and Siren Publishing (google Ms. Lucas or the publishers if interested; links not really appropriate for ITWorld!) and tells me the market is growing in leaps and bounds.

It'd be fascinating to learn what percentage of Kindle book sales fall into this category, and I'm looking forward to seeing how much of the more explicit Fictionwise content makes it onto the Barnes & Noble site.

I've danced around this point but let me just say it: most of these erotic romance books are purchased by women (presumably) while most of the visual pornagraphy that drove the success of the VHS and arguably video on the web was consumed by men (again, presumably).

Separate but equal, indeed.


Myths, gods, and titanic disasters: How servers really get their names

Last month we looked into the practice of naming servers, half expecting to discover it was a quirky, geeky thing to do -- and nothing more. To our surprise, readers flooded the story with comments, chiming in about their own naming schemes -- what worked, what didn't, and flashes of brilliance. Let's just say that server naming is a surprisingly complex undertaking. Here's what we learned.

What's in a name?

The practice of naming servers and other machines was born of the basic need to distinguish among machines. In fact, as one reader reminds us, this was a convention in factories long 'before computers ever existed. It helped people working on the machines distinguish which one they were talking about when they had dozens or hundreds of the same machine on the factory floor.'

Photo by Lamerie

And, let's face it, naming things is just part of being human. "Anthropomorphizing gear is a very nice way of making sure that people remember what it does and kind of care for it," says Retep Vosnul. "Picking a suitable name [for] a server is very satisfying as well. For example, a server that needs to have very high service uptime, you might want to give a name that reflects that.... I used Belgarath (7000 year old wizard) and other characters from the Eddings novels and I used to use A'tuin and other Discworld persona for other networks. My former employer did not want names for some reason and I never felt at home in that datacenter, it lacked something."

Courting disaster

If uptime is important to you, why tempt fate?

Consider the case of one reader who named a Windows NT domain "Hades" in an attempt to be "ironic and edgy." Should it really have come as any surprise when 4 computers on that network died in 2 months time?

Photo by cliff1066

Or what about the government agency that named all their servers after disasters? With a main server called Hindenberg (as it used to go down so often), why would you take the chance of backing it up with a server called Titanic?

And then there's the "meaningful" naming convention gone awry: "When told to move to a global standard," a reader writes, "we were told to name Norway's mail server to NOMAIL (at the mail server level), and Canada's physical server name to CANTMAIL (NT was to signify the OS)."

Now that is courting disaster.


Up to the job

Photo by <>

You might think it would be too literal-minded to name a machine after its function but there's something downright elegant about printers named after writers or a plotter named "Moriarty" after the Mr. Moriarty who continually 'plotted' against Sherlock Holmes.

Mail servers, in particular, seem to make good targets for job-based names. MikeH names his servers after constellations, with the mail server being Pegasus, of course. Jim Haynes "always wanted to have a mail server named Norman Mailer." And one reader named his outgoing SMTP server "Newman" from the Seinfield television series. "When it relays to other servers it sends the command 'HELO newman'."

Glenn continued this theme, naming his mail server Hermes, his domain controllers Zeus and Hera, and a tech playground Eris (the goddess of discord). At home his machines are: Tyr (the war driving laptop), Castor and Pollux (a dual boot machine) and Athena (the server).

One if by land...

The natural world is a, er, natural place to look for server naming schemes. One anonymous reader writes that in his Colorado-based company, "the servers are all named after the various 14ers (mountains > 14k feet). This was started by an admin a few years back who set up most of the servers and whose father was in the process of hiking all of the mountains. Between Elbert, Massive, Challenger, Pyramid, Blanca, Crestone, and the rest of the gang, it's a bit of a hike (mentally) to keep them all straight. But darn if I don't hate Quandary some days."

Photo by Dan Hershman

But if it's an ecosystem you're looking for, you might turn to the sea. "All of the groups of systems I've been responsible for over the years had something of an 'ecosystem'," writes one reader. "The best one was based on the notion that test servers would be slower and less functional than production servers. The overarching theme was undersea creatures, production systems getting names like barracuda and test systems getting names like sponge, coral and my favorite, nudibranch. It just so happens that nudibranch became the overall test server for orgs far and wide and I was questioned about the tastefulness of the name more than once. No one ever forgot the name though."

"In our company," writes another reader, "we named servers after fish. steelhead, sturgeon, walleye, king. But the best was 'crappy'. None of our customers wanted to be on crappy."

An eye on the sky

"Most of my machine names come from stars," says egon. "The hardest part is picking a name that short and easy to spell. Some over the years... Nova, Aurora, Polaris, Celaeno, and Orion. All my firewalls have been named Turais, it means 'little shield'. The best machine name was my P6 FreeBSD server. It was held together with duct tape, had sharp edges, was black and safety orange. Hazard."

Photo by provos@monkey

Another reader writes that his company quickly ran through the planets and their moons and "began using, in order, the standard list of (thousands of) smaller asteroids, in order of discovery. The christening of a new server involved learning about the new mythological character, and always helped me keep them straight.... All my workstations are, therefore named after astronomers, since they watch the skies."

And this word of warning from Jeff, who chimed in about a place he worked where the "servers were named after the planets - Mercury, Venus, Earth, Mars, etc. Which was all well and fine, until in a meeting someone stood up and admitted we were 'pulling financial data out of Uranus."

LoTR

Photo by Ryan McD

What article about server naming would be complete without a nod to Lord of the Rings? There are plenty of names to go around and the roles carry particular meaning. One reader, for example, named his "various development boxes after Tolkien names in Middle Earth. Of course, the Linux boxes get names like 'bree' or 'bagend', while the Windows boxes get names like 'mirkwood' or 'doom'. For some reason, I've named laptops after characters like 'gandalf' or 'sam'. [The] best part was when my central server was named 'rivendell'."

"For our research," writes a grad student, "we got many laptops, and I was the first one to pick the names. First we got three, so I named them after the three elven rings from lord of the rings: Narya, Nenya and Vilya. Later my advisor ordered a fourth one, that happened to have slightly better specifications. I thought it would be just perfect to name that 'theOne,' and my advisor being a team player agreed, funny enough he ended up taking over the computer, and we didn't see it for more than a year and a half... and then one day ... it resurfaced, I thought that was very funny, just like the real one ring."

Too clever for their own good

"At U.C. Santa Cruz," writes Jim Haynes, "the acronym for the computing organization was CATS, so the machines were named for famous cats. Except the file servers for the Athena system were named with Greek puns, like Ailurophile (cat lover), Dendrophile (tree lover), etc. At U.C. Berkeley they have a thing of naming things as puns on celebrities. Thus the shuttle that runs between the campus and the BART station is Humphrey Go-Bart. Their first VAX machine was named Ernie Co-Vax."

Photo by Elaine Vigneault

Another reader writes that in a previous job, they "named all the servers after computer scientists:

Fileserver: Bernoulli
Auto-build machine: Babbage
Firewall: Schneier
CVS server: Ritchie
Router: Metcalfe

One day he had to explain the naming convention to Mr. Metcalfe when he responded to a thread on a forum board about an issue we were having."

Rules for success

Like so many things in life, you know a good naming scheme when you see it, but there are a few things you may want to consider:

  • Choose a theme that provides enough names that you won't run out. "All of the machines on my home network (laptops, printers, desktops, routers, cell phones, iPods, portable hard disks, Wii, PS3, etc.) are named after Peanuts characters," says Kwami. "It all started 5 years ago with my laptop named Snoopy, and it's gone on since then. Unfortunately, I'm running out of names!"
  • Steer clear of "meaningful" names: they're boring and they're not at all as meaningful as they seem. One anonymous reader writes that in his company, there is one server "whose name has not changed in the last ten years - even as we have rebuilt its functions onto different hardware, the name keeps being returned to SERVER. Yup, that's right - a file server named Server. This name was chosen by the same person who decided naming our printers after presidents was too confusing and insisted we give them location names instead - like 5Counter (a printer on a countertop on the 5th floor) and 4Cabinet (a printer on a cabinet on the 4th floor)."
  • Spelling matters. Choose names that are too long or complicated and users will get confused and make mistakes. One anonymous reader named servers after characters from Greek, Roman and Egyptian Mythology, each covering a separate operating district. Unfortunately, the naming scheme wasn't in operation a month before he was asked to change it. It seems people couldn't remember how to spell Clytemnestra, Agamemnon, Ashtoreth, Aesculapius, etc.
  • Don't choose something too dear to your heart. One reader writes that he named machines after classical composers but drew the line at Wagner because he didn't want to subject it to the mangled mispronunciation that befell Haydn, Bizen, and Grieg.
  • Go with what you know. A reader writes that he "decided a while ago to go with a Greek Mythology theme for my boxes. About a year ago, my mother's laptop started having problems with both the battery and the power adapter. She gave it to me, and I named it Oedipus, because I recognized it as a Greek name, but couldn't bring to mind the story. I recently looked it up, and I feel cold inside."
  • Still unsure where to start? Read these "official" rules for computer naming

Judge kicks notorious spammer off Facebook

A federal judge in San Jose, California, has ordered convicted spammer Sanford Wallace to stay away from Facebook.

Facebook sued Wallace and two other men last week in an effort to cut down on spam and phishing schemes on the social-networking site. On Monday, Judge Jeremy Fogel of the U.S. District Court for the Northern District of California issued a temporary restraining order barring Wallace and two other alleged spammers, Adam Arzoomanian and Scott Shaw, from accessing Facebook's network.



Wallace was served with notice of the lawsuit on Monday in Las Vegas, said Sam O’Rourke, senior litigation counsel with Facebook. "Basically, he's not allowed to have any contact with our site or our physical location," he said. "Should Mr. Wallace choose to continue to spam us we can actually go out and have a bench warrant and try to have him arrested, so we think it's a pretty significant ruling."

In court filings, Facebook argues that these men gained access to legitimate Facebook accounts and then used them to spam the profile pages of the account holders' friends. Facebook allows users to post messages on the "Wall" of the profile pages of their friends.
·
The Facebook spam messages served two functions -- they enticed users into visiting phishing Web sites where they could be tricked up into giving up their Facebook login credentials; they routed victims to commercial Web sites that paid the spammers for the traffic, Facebook said.

Wallace would entice users with typo-filled messages that had subjects such as "has anyone emailed youu to let you know your defauult image is diisplayed on dynafaces.com," or "I'm not sure if you know but your pix are all over bakescream ^dot^ com->you gotta see it," Facebook said.

Sometimes Wallace would get users to register on these sites and then try to log into Facebook with the same usernames and passwords, hoping the victims used the same credentials for both sites.

News of the lawsuit was first reported Friday by Inside Facebook, a Web site for Facebook developers.

Wallace is one of the country's most notorious spammers, with a career that dates back to the 1990s. Last May a federal judge found him and a partner guilty under the CAN-SPAM act and ordered them to pay US$230 million for phishing and spamming MySpace users with links to gambling, ringtone and pornography Web sites.

Spammers and phishers have been hitting Facebook particularly hard over the past year and a half, said Dave Jevans, chairman of the Anti-Phishing Working Group. Because Facebook spam often looks like it comes from a friend it can be very effective. And because it's Web-based, it skirts traditional e-mail spam filtering tools, Jevans said.

"Some of the bigger guys can get a million people a day to look at their stuff," he said. "It's occasional, but you'll see it."

Spam is just one of several ills plaguing the social network. Over the past few days, Facebook users have also been hit with a new variant of the Koobface worm, which tries to trick victims into installing malicious software onto their PCs. Also, fake applications that send out messages such as "F a c e b o o k - closing down!!!" or "Error Check System" to try to trick victims into sending the messages to their friends have also been circulating around the social network.

Late last year, the judge in the Wallace case awarded Facebook a record US$873 million in damages after Facebook accused other spammers of using stolen logins to pump out more than 4 million spam messages. Facebook says that it doesn't expect the spammers in that case to pay up, but the company hopes that it may serve as a deterrent.

Jevans agreed that lawsuits probably won't stop the big-time Facebook spammers, but he said they could deter the little guys.

Despite criminals best efforts, spam has not become a major problem on the social network O’Rourke said. "I think we're being targeted just because we have 175 million users now. No self-respecting spammer can not pay attention to that."


Friday, March 6, 2009

Gmail outage caused by rogue code

New code triggered a failure during routine maintenance of Google's European data centers, which led to a two hour shutdown of its Gmail system around the world last week.

The outage was an "unforeseen side-effect of some new code that tries to keep data geographically close to its owner," Acacio Cruz, Google's Gmail site reliability manager, wrote in a Google blog post.



The rogue software caused a datacentre in Europe to become overloaded, which caused cascading problems from one datacentre to another.

"It took us about an hour to get it all back under control," wrote Cruz.

Users around the world could either not get access to their inboxes or had to wait a minute or more for them to open during the two-hour outage last Tuesday.

Google has had trouble with Gmail before, and users have voiced concerns over the reliability of the service. In the past six months, Gmail has suffered some form of downtime on five separate occasions. In the month of August alone, Gmail had three significant outages that affected not only individual consumers of the free web mail service but also companies and organisations paying for Apps Premier, the company's hosted suite of collaboration, messaging and office productivity services.

According to Google, the bugs have been found and fixed.

Cruz wrote: "We know how painful an outage like this is - we run Google on Gmail, so outages like this affect us the same way they affect you."


Five Facebook Scams: Protect Your Profile

Beny Rubinstein knows computer security. An employee of a Seattle-area tech giant with 20 years of IT experience under his belt, Rubinstein has seen a side of the industry that most people will never know. He holds a degree in computer engineering, and--oh yeah--he just got scammed out of $1100 on Facebook.



Rubinstein's experience isn't entirely uncommon. (We'll get to the specifics in a moment.) What's striking about his story, though, is that it demonstrates how easily anyone--even a highly trained expert in computer security--can be ensnared by a seemingly simple social network scam. And all kinds of these scams are on the loose.

More than 20,000 pieces of malware attacked social networks in 2008 alone, estimates the online-security firm Kaspersky Lab. That's no surprise, either: While e-mail is still the most spam-filled medium, researchers suspect that social network cybercrime is growing at a far faster rate.

"People are used to receiving spam and malicious messages in their e-mail, but it is much less common on Facebook," says Graham Cluley, a senior technology consultant with Sophos. "They are lulled into a false sense of security and act unsafely as a result."

You can avoid becoming one of the many who make that mistake. We've dug up the dirt on five scams currently posing a threat on Facebook. We turned to analysts who study them as well as to users who have fallen for them, all to help spread the word about how these things work and how you can best dodge them. (Facebook representatives did not respond to our request for comment.)

Knowledge is the greatest weapon against becoming a victim. Read on, and arm yourself well.

Scam #1: The Nigerian 419

The Scam: It may sound like a hip new emo band (or a somewhat old e-mail scam), but the Nigerian 419 will do more than just offend your ears--it'll also empty your wallet. The moniker refers to a scam dating back decades that has recently entered the social network scene.

Back to Beny Rubinstein. A couple of months ago, Rubinstein received some alarming Facebook messages from a friend and fellow tech professional.

"[He said] he was in the UK and was robbed, and needed $600 to fly back to Seattle," Rubinstein recalls.

The messages came both in Facebook-based IMs and in e-mail. They included details such as family members' names, making the notes appear all the more authentic. It wasn't until 2 hours and $1100 later that Rubinstein realized what had happened: Someone had hijacked his buddy's account, contacted his friends, and--at their expense--made off like a bandit.

"Scammers figured out that even though social networks don't have direct access to money, they have access to information that gives you a good shot at getting someone else's money," says Vicente Silveira, a product management director at VeriSign and a personal friend of Rubinstein's.

you send cash to a pal who seems to be in trouble, try to contact him or her outside of the social network--either by phone or by external e-mail. Not feasible? Ask an extremely personal question that a hacker couldn't possibly figure out from information within the profile. We'll leave the specifics up to you.

Next: Be Wary of Widgets, The Koobface Virus, Facebook Phishing

Scam #2: The Widget Warrior

The Scam: Facebook is famous for its widgets--you know, the third-party applications that you can add onto your account. Sometimes, though, widgets turn into warriors with a single mission: stealing your data.

The first rogue widget reared its head in 2008, when researchers realized that a program called Secret Crush had anything but sweet intentions. The application, which was supposed to help you find your virtual admirers, instead installed spyware onto your computer. Even worse, it encouraged you to spread the love by getting other friends on-board--essentially "manipulating humans to pass it along on their own," says Guillaume Lovet, senior manager of Fortinet's Threat Response Team.

Secret Crush has since been crippled, but the potential for similar threats still exists. Just days ago, security experts determined that an application called Error Check System was misusing profile details and possibly stealing personal information. A few months earlier, researchers from Greece's Institute of Computer Science uploaded a malicious app to Facebook as an experiment (PDF). The team was able to configure the widget, which posed as a "Photo of the Day" displayer, to utilize its users' Internet connections for denial-of-service attacks.

The Protection: Use extra caution when installing third-party applications. "When you accept to install one, malicious or not, you are granting its author access to all the info in your profile," Lovet says. Make sure you know what the app's creator will do with it.

Scam #3: The Koobface Virus

The Scam: Don't be fooled by the name--there's little to laugh about when it comes to the quickly spreading Koobface virus. (The word, by the way, is an anagram of "Facebook.") Once the virus infects your PC, it starts sending messages or wall postings to your Facebook friends, directing them to a "hilarious video" or some "scandalous photos" of someone you both know.

"The link promises an enticing video, but when the user clicks, he is presented with a Web page with a fake Adobe Flash update or a fake codec that needs to be downloaded," explains Ryan Naraine, a security evangelist with Kaspersky Lab. "That download is malware."

The Protection: Antivirus software can help keep you safe, but some common sense can also go a long way. "Be wary of any kind of direct URL in messages or postings," advises Jamz Yaneza, a threat research manager with Trend Micro. If a site asks you to download a software update, Yaneza says, click Cancel and go directly to the vendor's page to see if the update is legit.

Scam #4: The Phishing Pond

The Scam: Phishing, a favorite hacker tactic, has found new life at social networking sites. Scammers trick users into following links that open official-looking Facebook log-in prompts. If you enter your user name and password, the information is logged--and your account is theirs.

Brandon Donaldson, a pastor at the Lifechurch.tv Internet Campus, fell for the scam. Someone gained control of his Facebook account and started sending messages to his friends and followers, trying to persuade them to follow the same links and unwittingly give up their accounts, too.

"This was a pretty bad ordeal, since I regularly put video content up on the Web, and I use the Internet as a tool for many relationships," Donaldson says. "You build a certain social trust in these spaces, and you want to keep that trust without these kinds of incidents."

The Protection: The previous plan also applies here: Watch where you click. Plus, if you're ever asked for your password midsession, don't enter it. Manually navigate back to the Facebook.com home page instead, and then log in there if need be.

Next: Fake Facebook Communities, Web of Trust

Scam #5: The Contrived Community

The Scam: Community enthusiasts, be cautioned: Facebook user groups can sometimes be cleverly disguised vehicles for marketing. And--whether you realize it or not--when you click the join link, you're effectively opting in.

Brad J. Ward was one of the first users to find such a scheme in action. Ward, then a member of Butler University's admissions department, discovered a Facebook group called "Butler Class of 2013." The only problem: The people behind it had nothing to do with Butler. After posting about the issue on his blog SquaredPeg.com, Ward soon learned that the names of nearly 400 other schools appeared in similarly suspicious groups, all created by the same small set of people.

"My initial reaction was that some company or person was essentially setting themselves up to be the administrator for hundreds of groups, which provides the opportunity to send out mass messages or to collect data," Ward says.

His instinct was right: The publisher of a college guidebook had set up the groups, seemingly with the goal of building a mass mailing list for marketing its products, Ward discovered.

"Was any of it illegal? Not necessarily," Ward points out. "But was it unethical, and could it be misconstrued as an official university presence? Yes."

Once exposed, the publishing company College Prowler admitted its involvement and agreed to back out of the groups. Still, that's only one company. More than likely, countless others haven't been detected, and are actively using groups to gain the trust (and information) of unsuspecting users.

The Protection: Be very selective in deciding what groups you join. If you aren't sure who runs a given Facebook community, or whether it's officially linked to the organization that it claims to be, don't accept the request. Your privacy is worth more than any membership.

The Web of Trust

In the end, staying safe comes down to maintaining control of your information and carefully selecting with whom you share it--because you never truly know who's on the other end of electronic communication. This past month, for example, a high school student was charged with 12 felonies after investigators say he posed as a girl on Facebook and tricked male classmates into sending him nude photos.

"An online version of the 'web of trust' is formed among users," notes Trend Micro's Jamz Yaneza. "Although this does work in the noncyberspace environment, the platform ... is really different when someone else is in charge of your medium."

It's easy to feel invulnerable while reading about such scams. The second you let your guard down, though, it's even easier to become the next victim. Just ask people who know Beny Rubinstein, the IT pro who lost more than a grand to a Facebook scammer.

"Worse than losing the money, he realized how exposed you are in a social network," says Vicente Silveira, Rubinstein's friend. "We're exposing things now that are in many ways a lot more valuable than money."


Wednesday, March 4, 2009

Visa: New payment-processor data breach not so new after all

Days after Visa Inc. seemingly confirmed that a data breach had taken place at a third payment processor , following on the recent breach disclosures by Heartland Payment Systems Inc. and RBS WorldPay Inc., the credit card company now is saying that there was no new security incident after all.

In actuality, Visa said in a statement issued Friday, alerts that it sent recently to banks and credit unions warning them about a compromise at a payment processor were related to the ongoing investigation of a previously known breach. However, Visa still didn't disclose the identity of the breached company, nor say why it is continuing to keep the name under wraps.

Visa said that it had sent lists of credit and debit card numbers found to have been compromised as part of the investigation to financial institutions "so they can take steps to protect consumers." It added that it currently "is risk-scoring all transactions in real-time, helping card issuers better distinguish fraudulent transactions from legitimate ones."

Visa's latest statement follows ones issued by both it and MasterCard International Inc. earlier this week in response to questions about breach notices that had been posted by several credit unions and banking associations. The notices made it clear that they weren't referring to the system intrusion disclosed by Heartland on Jan. 20 and suggested that a new breach had occurred.

Visa's initial statement, and the one from MasterCard, were both carefully worded; neither said specifically that the breach being referred to was a new one, but they also didn't say that it was a previously disclosed incident. Visa said it was "aware that a processor has experienced a compromise of payment card account information from its systems," while MasterCard said it had notified card issuers of a "potential security breach" affecting a payment processor in the U.S.

MasterCard officials didn't respond Friday to requests seeking clarification on whether its statement referred to a previous breach or a new one.

Benson Bolling, vice president of lending at the Alabama Credit Union in Tuscaloosa, said Friday that officials there had understood the breach to be a new one based on the alerts sent out by Visa - but couldn't say that for sure. According to Bolling, the credit union, which posted an advisory on Feb. 17 and updated it two days later, was informed by Visa of a "big breach" shortly after getting the word about the intrusion at Heartland.

The identifying number that was used in the so-called Compromised Account Management System alert issued by Visa appeared to suggest a new breach, because it was different from those used in previous CAMS notices, Bolling said. It was his understanding, he added, that CAMS alerts related to a previous breach would use the same identifier as the original notifications.

Almost 50% of the credit and debit cards issued by the ACU have been affected between the Heartland breach and the compromises detailed by Visa in the latest CAMS alert, Bolling said, without disclosing the number of compromised cards.

The Pennsylvania Credit Union Association also issued an advisory, dated Feb. 13, in which it described the recent alerts from Visa and MasterCard as being related to a new breach. "As the entity involved has not yet issued a press release, Visa and MasterCard are unable to release the name of the merchant processor," the PCUA said. The advisory appears to have since been removed from the association's Web site, but a cached version can be found via the Google search engine.

An advisory posted by the Tuscaloosa VA Federal Credit Union in Alabama also indicated that "another" payment processor had been breached and said that the compromise involved so-called card-not-present transactions, such as those made online or via the phone. Tuscaloosa VA noted that the "window of exposure" provided by both Visa and MasterCard was from February 2008 to this January. And like the PCUA, the credit union said that because the affected payment processor had yet to publicly announce the breach, Visa and MasterCard were unable to identify it.

Heartland has yet to disclose the scope of the breach in its systems, saying that it still doesn't know how many card numbers were compromised. The company, which processes more than 100 million transactions per month, also has yet to specify when exactly the system intrusion took place, beyond saying that malware was operational on its systems "during part of 2008."

RBS WorldPay, the Atlanta-based payment processing division of The Royal Bank of Scotland Group, disclosed Dec. 23 that its systems had been breached by unknown intruders, resulting in the compromise of personal information belonging to about 1.5 million owners of prepaid payroll and gift cards (download PDF). The compromised information included the Social Security numbers of 1.1 million people, according to the company, which said it had discovered the breach in early November.


Roku & Amazon: Cloud vs Hard Drive

I've owned a Roku video player for almost a year now, and I'm not ashamed to admit that I'm a fan. In case you aren't familiar with the Roku, it's a $99 device that initially was for streaming Netflix's "Watch Now" content to a television. The device is compact and works like a charm, and back when I bought it, it was the only out-of-the-box option for getting a Netflix stream direct to your TV.

Of course since that time, the XBox 360 has added Netflix support, as have a number of Blu-ray players, and this spring, you'll even be able to buy a TV with Netflix streaming built in. (There are plenty of companies betting that Netflix isn't going anywhere!) Roku wasn't sitting still during all this, though. They've promised to add new sources of content to their box, and this morning the first of those promises came true: you can now stream Amazon's Video on Demand service to the Roku.

As I was surfing around reading about this announcement, I read a comment that got me thinking. Amazon allows renting or purchasing content, but the Roku has no hard drive. This commenter — and I honestly can't remember where I read this; it may have been on Twitter (where else?) — questioned why anyone would buy content if it was going to remain "in the cloud." If you watch Amazon's Video on Demand on a TV or a Tivo, you can download purchased content and keep it locally. Obviously this isn't an option on the Roku.

I don't think I really care all that much if my content is in the cloud, to be honest. Ideally, I'd still like a store-bought hard copy with a spiffy case and all that. I like to browse our shelves of movie boxes looking for a DVD or Blu-ray to watch, but if I'm not going to own the physical media, I don't really care where my digital version "lives."

I can see where people who travel a lot would want to download a copy to keep on their laptop for watching on the go, but they can still do that. The only drawback I can see with the Roku is, what happens if your internet goes out? And that's a valid concern, but I'm blessed with a very reliable net connection (knock on wood). My counter argument is this: if you're downloading your content, what happens when your hard drive fails? Sure, you can burn a DVD copy or something, but then you're back to having physical media.

I think I'm very content letting Amazon store my digital copies of any Amazon Video On Demand content I might purchase. That feels easy to me. Let them worry about backups and storage space and all that. (The big caveat here is all the noise we're hearing about ISPs putting bandwidth caps in place. That could rain on everyone's parade.) I love that the Roku is silent and small with no moving parts. I just want to turn on my TV and let the Roku stream my content to me.

What do you think? Am I on the right track, or am I just making excuses for my treasured Roku box? Would you purchase content that was going to remain in the cloud?


Thursday, February 26, 2009

Google blocks paid apps for unlocked G1 users

People who bought an unlocked version of the Android G1 phone are no longer allowed to download new paid applications from the Market, after a change Google made late last week.

Google is prohibiting users of the unlocked phones from viewing copy-protected applications, including those that cost to download.



The Developer version of the G1 comes unlocked to any particular mobile operator and is priced at US$400. Anyone who joins the Android developer program for $25 can buy the phone.

Last week, Google employees began replying to questions people posted on the Android Market Help Web site about being unable to see copy protected applications in the store. "If you're using an unlocked, developer phone, you'll be unable to view any copy-protected application," wrote Google employee Ash on the help site in reply to a user's question on Friday. "This is a change that was made recently."

While Google offered only slim details about why it made the change, it could be an attempt to close a loophole that reportedly allows users of the unlocked phone to download paid applications for free. "The Developer version of the G1 is designed to give developers complete flexibility," Google said in a statement. "These phones give developers of handset software full permissions to all aspects of the device... We aren't distributing copy protected applications to these phones in order to minimize unauthorized copy of the applications."

A couple of developers have theories about the issue behind the move. Tim at the Strazzere.com blog discovered that protected applications are automatically downloaded into a private folder on Android phones. Most phone users can't access that file but users of the Developer phone can.

That means a Developer phone user could buy an application, copy it from the private folder, return the application for a refund and then re-download the application to the phone, the developers say. The Android Market allows anyone to return an application within 24 hours.

The Phandroid blog and a few developers commenting on the blog said they were able to download and copy-protected applications. Some developers are surprised that assigning the application to a specific folder is the only copy protection given to applications.

It's unclear how many people have the unlocked version of the phone. But some vocal developers are very annoyed that they paid $400 for the phone and aren't allowed to access all of the apps in the store.

One, who goes by the name bakgwailo, is proposing a "developer revolt," where all developers pull their applications from the store. "It would be the only way to show Google that this is NOT acceptable, and that devs are not second (third?) class citizens on the Market," he wrote. "I do not know about you, but I am beyond angry that I can not even see my own paid app on the Market with my 400 dollar dev phone!"

"This is a big problem for everyone who has a Dev phone," one developer using the name oscillik wrote. "Assuming that we're pirates is very offensive."


Sunday, February 22, 2009

App Store grows, but apps are seldom used

At least that's the conclusion from data collected by Pinch Media, a company that helps developers track the use of their iPhone applications.

Pinch found that of the users who download free applications from the App Store, only 20 percent use the app the next day, and far fewer do as the days pass. For paid applications, the return rate is only slightly better: 30 percent of people use the application the day after they buy it. The drop-off rate for paid applications is about as steep as for free applications after the first day.

Generally, 1 percent of users who download an application turn into long-term users of it, Pinch found. Pinch has noticed some differences based on the kind of application. For example, sports applications get more use than others in the short term, while entertainment applications tend to keep users for longer than others.

Pinch has discovered, or at least confirmed, some other interesting usage trends as well. Developers have a far greater success rate once they rise to the top of the store, which Apple ranks based on popularity. Once applications hit the top 100, the number of daily new users increases by 2.3 times, Pinch said.

Also, free applications tend to get more use than those that cost. Users run free applications, on average, 6.6 times as often as paid applications, Pinch said.

The findings might surprise and disappoint developers, many of whom regard the iPhone's application ecosystem as the first real opportunity to build a business around wireless applications. Prior to the launch of the easy-to-use App Store, few phone users ever downloaded new applications to their phones. That meant that the best way for developers to offer their applications was to convince operators to preload the applications on phones -- an expensive, time-consuming and challenging proposition.

Pinch Media collected data from "a few hundred" applications in the App Store that use its hosted analytics product. Applications that use the analytics offering include those that have been the number-one paid and free applications available in the store, Pinch said. The store currently has more than 15,000 applications, and users have downloaded applications more than 500 million times.

The data from Pinch might be valuable for developers who are also considering building applications for other stores that have been planned following the success of the App Store. Stores for Android, Windows Mobile, BlackBerry and Palm Pre applications have either been announced or are already open.


Thursday, February 19, 2009

Apple still has 'ideas' for Mac netbook, says analyst

An analyst who met with Apple recently believes the company has "ideas" about producing a Mac netbook, an ultra portable laptop computer.

Analyst Toni Sacconaghi of Sanford C. Bernstein & Co met with Apple's Chief Operating Officer Tim Cook, covering for CEO Steve Jobs during a leave of absence, Apple's Chief Financial Officer Peter Oppenheimer and Apple's marketing chief Phil Schiller.

According to Sacconaghi, Apple's Cook hinted at "ideas" for a netbook as well iPhone price changes, and new smartphone handsets.

"Tim Cook stated that since Steve Jobs announced his leave of absence, he was spending more time on new products, how Apple could take the iPhone into new markets and examining iPhone's business model," said Sacconaghi, who is ranked the top computer analyst by Institutional Investor magazine.

The MacBook Air is Apple's smallest, lightest laptop.

Sanford C. Bernstein & Co manages portfolios for private and institutional investors currently valued at $85 billion.

"Several interesting tidbits point to new iPhones, potentially with different pricing/price points this year," Sacconaghi added.

A Mac netbook has long been rumoured since the success of smaller lighter laptops, typically with a 10" screen, from companies such as Asus, Acer, Dell, HP and MSI Wind.

Last week Asus said they had sold 4.9 million Eee PC netbooks last year despite the economic downturn.

Netbooks are traditionally competitively priced due to their relative lack of power and limited upgradability.

Apple's smallest, lightest laptop the MacBook Air starts at £1,271, which is a long way from what Apple would need to charge to make the a Mac netbook a success.

Apple has also previously said that the iPhone was there netbook, offering email and web surfing on the move.

Analyst Sacconaghi added that he expects Apple's stock to outperform the S&P 500 in the next year.

Sacconaghi also said he expects new Apple iMacs as earlier as next month and an new Apple iPhone in the summer.

Wednesday, February 18, 2009

Charge dropped against Pirate Bay four

A Swedish prosecutor on Tuesday dropped a charge levied against four men on trial for running The Pirate Bay, one of the most popular BitTorrent search engines and trackers on the Internet.

Tuesday's proceedings saw Swedish prosecutor HÃ¥kan Roswall drop a charge of aiding in the making of copies of works under copyright, said Peter Sunde, one of the four on trial. The charge was dropped due to the inability of the prosecution to prove copies of content were made, he said.

"We have definitely won this round," Sunde said.

One charge -- essentially aiding the making of material under copyright available -- remains. Sunde and the other three defendants, Fredrik Neij, Gottfrid Svartholm Warg and Carl Lundström, could face prison time. Swedish authorities want them to forfeit 1.2 million Swedish kronor (US$140,000) in advertising revenue generated from the site.

A lawyer for the music industry, Peter Danowsky, denied that dropping the charge hurt the overall case.

"It's a largely technical issue that changes nothing in terms of our compensation claims and has no bearing whatsoever on the main case against The Pirate Bay," Danowsky said in a statement published by The Local, a Swedish newspaper published in English. "In fact it simplifies the prosecutor's case by allowing him to focus on the main issue, which is the making available of copyrighted works," he said in a statement.

The Motion Picture Association is seeking 93 million Swedish kronor in damages, and the IFPI (International Federation of the Phonographic Industry) is seeking €1.6 million (US$2.06 million) in damages.

Evidence presented by Roswall on Tuesday included screenshots showing computers were connected to The Pirate Bay's tracker, or software that coordinates P-to-P (peer-to-peer) file sharing.

But a majority of the screenshots show that The Pirate Bay was actually down at the time and that the client connections timed out, Sunde said. The clients, or peers, were still connecting with each other, but through a distributed hash table, another protocol for coordinating downloads unrelated to The Pirate Bay.

The schedule for Wednesday includes testimony from a Swedish antipiracy agency as well as the Motion Picture Association, Sunde said.


Obama pours billions into IT with recovery package

Obama's economic stimulus package, which was signed into law yesterday, will see billions of dollars poured into technology in the US.
A significant part of the $787bn total will be spent on IT-related measures. A main beneficiary will be healthcare IT, which is set to receive around $19bn.

Obama wants to introduce electronic care records, computerising all health records in the next five years.

The project will be similar to the UK's £12bn national programme for IT, a part of which aims to automate records, which has weathered a few storms since Tony Blair first introduced the plan.

Obama said in a speech yesterday, "It is an investment that will take the long overdue step of computerising America's medical records to reduce the duplication and waste that costs billions of healthcare dollars, and medical errors that cost thousands of lives each year."
ADVERTISEMENT

In addition, $2.5bn has been earmarked for loans for improving broadband infrastructure in the US, $200m will go into expanding public computer capacity at community colleges and public libraries, and $250m will be available in grants for innovative programmes encouraging broadband adoption.

An innovative technology loan guarantee programme, which will provide loan guarantees for renewable technologies and transmission technologies, will receive $6bn.

The US government will also allow some students to claim money for IT equipment used for studying.

A further $30bn will go towards clean energies and an upgrade of the country's electricity grid.

The US government hopes to be able to detail its economic recovery spending on its recently launched website, recovery.gov, although observers have pointed out that collecting and reporting the data will be a difficult task.

Sunday, February 15, 2009

US Congess passes huge economic stimulus bill

The U.S. House of Representatives and Senate have both passed the final version of a huge economic stimulus package, including billions of dollars for broadband deployment and electronic health records.

The House Friday afternoon voted 246-183 to approve a compromise version of the estimated US$787 billion American Recovery and Reinvestment Act. All 176 House Republicans present voted against the bill.



Late Friday evening, the Senate voted 60-38 to approve the bill, with three Republicans joining Democrats in supporting it.

U.S. President Barack Obama pushed for the legislation and he is likely to sign the bill in the next couple of days.

The House and Senate both passed versions of the bill within the past three weeks, and negotiators from both chambers agreed on a compromise version of the bill earlier this week.

The bill includes $7.2 billion to help deploy broadband in rural and other unserved areas, $17 billion for incentives for health care providers to adopt electronic health records, and $11 billion to update the nation's electricity grid by hooking it up to the Internet.

Republicans complained that the bill included so-called pork-barrel spending and that Democrats didn't seek their input in crafting the bill. "A bill that was supposed to be about jobs, jobs, jobs has turned into a bill about spending, spending, spending," said Representative John Boehner, an Ohio Republican and House minority leader. "We owe it to the American people to get this right."

Republicans also complained they had less than 24 hours to digest the final version of the bill, about 1,000 pages long. No lawmaker has had the time to read the entire bill, Boehner said.

"This is a sad day for our country," said Senator John Thune [cq], a South Dakota Republican. "And it's a sad day for future generations who will be left paying for this billion-dollar spending bill."

Democrats argued the bill is necessary to jump-start the U.S. economy. Senator Joe Lieberman [cq], a Connecticut independent who caucuses with Democrats, said he's confident the bill will "begin the turnaround of the American economy."

Senator Amy Klobuchar, a Minnesota Democrat, applauded the bill for including money for grants and loans to broadband providers that deploy in unserved areas. Residents of the rural United States need broadband to train for high-tech jobs of the future, she said.

"Broadband Internet deployment creates jobs," she said. "I want those jobs to go to Thief River Falls, Minnesota ... instead of India or Japan."


Saturday, February 14, 2009

Blockbuster, Inc announced today that it would add video games to its BLOCKBUSTER Total Access online rental service. A pilot program is planned for Q2 of this year with a goal of national availability by the second half of the year.

This puts Blockbuster in competition with online game rental services such as Gamefly, Gamerang and Gottaplay, none of which have the breadth of distribution centers that Blockbuster has. Additionally, renting games will offer a differentiation point from rival Netflix. Game platforms covered include Nintendo Wii, Sony PS & PS3, and Microsoft Xbox & Xbox 360. As with movies, users will be able to return rentals to a brick and mortar Blockbuster store.

Game enthusiast site Joystiq contacted Bob Barr, vice president and general manager of Blockbuster Online, for further details, including the price. A 3-disk Total Access account costs $19.99 per month. During any month that a game is rented, a $5 charge gets added to that price. During the testing phase, a game counts as a disk.

One of the biggest problems with existing game-rental services is availability of new titles; it'll be interesting to see if Blockbuster can overcome this hurdle.


Wednesday, February 11, 2009

T-Mobile issues firmware update for G1, adds voice search

T-Mobile began pushing out an update that adds a couple of new features and fixes some glitches in the G1, its phone that runs Google's Android software.

The most notable new capability is voice search. Once G1 users get the firmware update, they'll notice an icon for a microphone in the Google search bar on the home screen. When users hit the button they'll hear a "speak now" prompt, after which they can say their query, said Jeff Hamilton, a software engineer for Android, in a blog post.



If voice search doesn't properly interpret the query, users will be able to hit a "down" arrow next to the search box to find other suggestions, one of which might be correct, he said. G1 users will also be able to dial phone numbers and search in their contacts lists using voice commands.

The voice command capability follows the introduction of Google's voice search application for the iPhone in November.

Another minor addition with the Android update is the ability to save attachments sent via MMS. Users will also start seeing notifications when new software updates are available, including for applications in the Android Market. Phone users will also be able to report offensive comments in the Market as spam.

The update fixes a few glitches as well, such as one that automatically ended an instant messaging session when users turned their Wi-Fi connection on or off. Another glitch caused reminders for calendar items not to be delivered.

T-Mobile started pushing the update out Monday and expects all customers to receive it in two weeks.

On a T-Mobile Forum hosted by the operator, an administrator said the update is not related to "cupcake," the name of another update that will include a wider range of new capabilities and bug fixes.


Saturday, February 7, 2009

Identity thieves beat Obama to stimulus package punch

Although the U.S. government's economic stimulus package hasn't even gotten out of Congress, scammers aren't waiting; they've launched multiple campaigns that tempt users into revealing personal information, a security researcher warned Thursday.

One spam-and-scam example, said Dermot Harnett, a principal researcher with Symantec Corp., poses as a message from the Internal Revenue Service (IRS) , and claims that the recipient qualifies for something called a "Stimulus Payment."

"After the last annual calculations of your fiscal activity we have determined that you are eligible to receive a Stimulus Payment," the bogus e-mail reads. The message then tells the user to download the attached document, supposedly a form that must be submitted to the IRS.

The document, in fact, is an identity stealing tool, said Harnett, that asks the user to provide personal information, much or all of it data that the actual IRS would presumably have on file.

Another stimulus-related spam campaign Harnett has monitored touts "Economic Stimulus Grants," and tempts the unwary with a link that offers fake testimonials. "I found the grant I needed and filled out the forms and sent them in and in about two weeks I received a check in my hand for [US]$100,000," one reads.

"This one takes people to a marketing type of site," said Harnett, "and after it asks them to answer a few questions, including salary range, e-mail address, mailing address and date of birth, it promises to send out a CD that shows you how to claim one of these grants. They're building up their files on people." Another twist: The CD comes with a postage and handling charge, which the scammers use to collect credit card information.

It's no surprise that such spam is circulating, said Harnett. "People often have news alerts set from various organizations, so they expect to see subject lines about the stimulus package," he said, noting that the tactic of using current events is nothing new.

Given that stimulus scams cranked up as long as two weeks ago -- and President Obama 's $900 billion plan isn't slated to come to a vote in the U.S. Senate until later Thursday

IBM's Palmisano: Tech's slumdog millionaire

BM's cruel layoff options: Take a job in the Third World and lose your severance, move within the United States at your expense, or lose both your job and severance.

Meet Sam Palmisano, bozo of the month. We diss IBM's CEO for allowing some management numbskull to suggest that the thousands of Big Blue employees who have been fired recently should consider a move to India. And work really cheaply. Always helpful, IBM is willing to pitch in with moving costs and -- in a particularly ironic twist -- visa assistance.

p>Yeah, it's hard to believe. But IBM put it in writing: "IBM has established Project Match to help you locate potential job opportunities in growth markets where your skills are in demand," IBM says in an internal memo first obtained by InformationWeek. "Should you accept a position in one of these countries, IBM offers financial assistance to offset moving costs, provides immigration support, such as visa assistance, and other support to help ease the transition of an international move."

Maybe India's not to your taste. No worries. IBM is also offering to send the newly unemployed to China, Brazil, the Czech Republic, Russia, South Africa, Nigeria, and the United Arab Emirates.

Pink slips at Big Blue
And in a touch that could only be called Dickensian, the IBM memo notes that Project Match, which sounds like a reality show on Bravo, is limited to "satisfactory performers who have been notified of separation from IBM U.S. or Canada and are willing to work on local terms and conditions." Right. The worthy poor who don't mind working for wages that are infinitely lower than what they've been paid in the United States.

(For those who are considering a move overseas, check out InfoWorld's guide to offshoring yourself.)

The stunningly stupid memo comes amid a wave of firings that has cost the jobs of at least 2,800 IBMers, a move the company was unwilling to acknowledge until ousted workers and their union leaked internal documents to the media, including the Associated Press, which said that workers have reported layoffs in Tucson, Ariz.; San Jose, Calif.; Rochester, Minn.; Research Triangle Park, N.C.; East Fishkill, N.Y.; Austin, Texas; and Burlington, Vt.

Did I mention this came at the same time IBM reported strong financial results?

According to the Web site of the Communications Workers of America which represents some IBMers, roughly 1,400 workers in the software group and a similar number in sales have been let go. There are unconfirmed rumors that as many as 16,000 workers could eventually be let go, surpassing even the 13,000 who were canned in 1985. I suspect that number is too high, but we'll see.

The Associated Press reported recently that in 2007, the last full year for which detailed employment numbers are available, 121,000 of IBM's 387,000 workers were in the United States, down slightly from the year before. Meanwhile, staffing in India has jumped from just 9,000 workers in 2003 to 74,000 workers in 2007.

And of course, tens of thousands of tech workers are losing their jobs at other companies, including such giants as Hewlett-Packard, Microsoft, Intel, and Motorola, not to mentions dozens of startups across Silicon Valley.

Take this job or nothing
Meanwhile, some IBM workers who still have jobs are being given a very tough choice: Move across the country at your own expense, or get fired with no severance package.

That information comes from an angry IBMer who spoke with a writer from the Silicon Alley Insider. According to the tipster, one of several who told similar stories, the workers are being placed at newly formed Global Delivery Centers in Colorado, New York, and Iowa. If they don't take the job, IBM labels them a "voluntary departure" and terminates them with no severance.

For those who are simply laid off, outplacement services aren't very good. One IBMer (I know his name but won't use it) gave this account in an e-mail to me: "The outplacement service is pretty bad, like calling the DMV. ... I called last week for a résumé review, left a message on the 800 number. 48 hours later someone calls back and leaves me a message -- they say they are returning my call, please call the 800 number if you would like to talk to someone. I call and get the same message."

Interestingly, this gentleman actually gave some thought to a potential IBM job in Malaysia, but as the pay was about one-third of his current salary, he rejected it. He also tells me that there's yet another catch in the offer to move employees to what we used to call the Third World. "The deal is that if you take the job IBM won't pay severance but will pay 'a portion' (undefined) of your relocation expenses, including tax and visa services. Not a good deal for many of my colleagues who have 20-25 weeks of severance under their agreement."

Sadly, with the economy in terrible shape, layoffs are sometimes necessary. But a company as rich as IBM should handle a downsizing better -- much better. At the moment, I'm ashamed to be an IBM shareholder.


Saturday, January 10, 2009

NASA tests scientific balloon 21 miles above Earth

Agency working toward balloon that can carry a 1-ton payload 110,000 feet aloft

January 9, 2009 (Computerworld) NASA scientists have teamed up with the National Science Foundation to take their scientific experiments to the "brink of space."

NASA announced this week that it successfully launched a super-pressure balloon prototype on Dec. 28 from an NSF hub in Antarctica. Made of a lightweight polyethylene film about the thickness of plastic food wrap, the 7-million-cubic-ft. super-pressure balloon climbed to what NASA called a float altitude of 110,000 feet, which is three to four times higher than the altitude that commercial jets hit.



The balloon is still up there, holding its altitude of nearly 21 miles above the Earth. According to NASA, scientists hope future versions of the balloon will carry a 1-ton scientific instrument aloft and keep it up there for 100 days or more.

"This flight test is a very important step forward in building a new capability for scientific ballooning based on sound engineering and operational development," said W. Vernon Jones, senior scientist for suborbital research at NASA, in a statement. "The team has further work to do to enable the super-pressure balloon to lift a 1-ton instrument to a float altitude of 110,000 feet, but the team has demonstrated they are on the right path."

NASA reports that the prototype is the largest single-cell, super-pressure, fully sealed balloon ever flown. And the space agency said in an online alert that scientists there expect to create a 22 million-cubic-ft. balloon -- a balloon about three times the size of the prototype.

Scientists are focusing on building the giant balloons because of their ability to handle extended missions aloft and because the scientific instruments that they carry can be launched, retrieved and then even launched again.

"Our balloon development team is very proud of the tremendous success of the test flight and is focused on continued development of this new capability to fly balloons for months at a time in support of scientific investigations," said David Pierce, chief of the Balloon Program Office at NASA's Wallops Flight Facility, in a statement. "The test flight has demonstrated that 100 day flights of large, heavy payloads is a realistic goal."

Balloons factor into NASA's research in several different ways.

For instance, NASA is planning an unmanned mission to Titan, Saturn's largest moon, around 2017. Wolfgang Fink, a physicist and senior researcher at the California Institute of Technology, said in an earlier interview that an orbiter would most likely release a balloon-type vehicle that would float above the surface of the moon and send its findings back to Earth.