Showing posts with label Network Technology. Show all posts
Showing posts with label Network Technology. Show all posts

Tuesday, March 24, 2009

T-Mobile felt the time was right to roll out its new webConnect USB Laptop Stick.


WebConnect USB Laptop Stick on T-Mobile ..
Manufactured by Huawei Technologies Co., this small, portable modem lets you connect to the Web on your laptop using T-Mobile's 3G network or Wi-Fi, and comes with built-in T-Mobile Connection Manager software to automatically detect the best available Internet connection.
In addition, the WebConnect laptop stick offers tri-band 3G connectivity (HSDPA/UMTS 1900/AWS/2100), so you'll be able to use it on compatible networks overseas. If you're in an area where there is no 3G coverage, it is compatible with GPRS/EDGE networks, so you're not left to search out a Wi-Fi hot spot as your only option of getting online.
Aside from connectivity, the T-Mobile WebConnect laptop stick can also double as a portable storage device. Similar to the AT&T USBConnect Mercury, it's equipped with a microSD/SDHC expansion slot that can accept up to 8GB cards. The accessory features a swivel USB design and measures 3.5 inches tall by 1.1 inches wide by 0.4 inch thick and weighs 1.5 ounces.
The T-Mobile WebConnect USB Laptop Stick will be available in select T-Mobile retail stores and online starting March 25. There are various pricing options available: $49.99 with a two-year contract after rebate; $99.99 with one-year contract; or $249.99 with no contract.

Friday, March 13, 2009

Apple unveiled the new iPod Shuffle


Apple iPod Shuffle....
Apple unveiled the new iPod Shuffle, which is only half the volume of the previous iPod Shuffle, which itself was about the size of a quarter. The new one looks like a sleek aluminum tie clip, or maybe a slightly elongated stick of Trident gum; a AA battery hides it completely. There's just enough room on the back for a mirror-finish spring clip for fastening to your clothes. (If you order from apple.com, you can get a custom message laser-etched onto the clip.)
Apple's third-generation iPod Shuffle MP3 player ($79) is the smallest MP3 player you can buy. Its unique size and uncommon, remote-controlled design won't suit every purpose, but people looking for the next best thing to an invisible iPod will appreciate the player's minimal approach.

Design

At first glance, the iPod Shuffle looks almost like a practical joke--as if someone is trying to convince you that their tie clip plays MP3s. The aluminum-encased hardware measures just a few hairs larger than a paper clip (0.7 inch by 1.8 inches by 0.3 inch) and includes not a hint of button, knob, or screen. The headphone jack sits on the top edge of the Shuffle along with a switch that controls playback mode (shuffle playback/consecutive playback) and power.

Fortunately, Apple doesn't expect you to control the Shuffle's volume and playback using mind control (not yet, at least). The earbud-style headphones bundled with the Shuffle include a remote control on the cable, just below the right ear. The remote offers three buttons: two for volume control (up/down); and a central button with multiple functions. You press the center button once to pause music playback, twice to skip forward, and three times to skip back. Of course, the downside to this headphone-controlled design is if you lose your headphones, you also lose control of your iPod. Apple's own replacement earbuds for the Shuffle run $29, but it's possible to grab third-party headphones and adapters for less.
The headphone cable reaches 3 feet, which should be more than enough length considering that the Shuffle is meant to be clipped to your clothing. A hinged chromed metal clip runs the length of the Shuffle on one side and includes a slot for attaching a lanyard or keychain. An Apple logo is engraved on the clip, and custom engraving is offered on orders placed through Apple's online store.

Features

The Shuffle is purely a digital audio player. There's no FM radio, no voice recording, and--obviously--no photo or video playback. Audio formats supported include MP3, AAC, Audible, WAV, AIF, and Apple Lossless, but no hope for WMA or FLAC.

The third-generation version of the iPod Shuffle offers a few new features over previous models, though. For one, this is the first Shuffle that tells you what you're listening to, which is no small accomplishment considering the player doesn't have a screen. The Shuffle uses a synthesized voice to announce artist and song title information whenever you hold the headphone clicker down. Apple is calling this feature VoiceOver and offers support for 14 languages, with voice quality hinging on what type of computer and operating system you're using.

Monday, March 2, 2009

Internet pioneer Yahoo! is open to selling its Web search business

Internet company's chief financial says any deal needs to be done for the right reasons.

Internet pioneer Yahoo! is open to selling its Web search business or entering into a partnership with another company, but doing a deal would be hard.
Microsoft has expressed interest in Yahoo!’s search business and made a bid for the Sunnyvale, California-based firm last year but Jorgensen did not mention the US sofware giant as a potential partner.
He stressed the difficulties of doing a deal.
“What people don’t quite appreciate is the complexity of the business, and how these businesses are intertwined,” he said. “For example at a data center, we don’t parse between search or non-search.
“It’s extremely difficult to draw a line down the middle of the organisation and split it in two pieces,” Jorgensen said. “It doesn’t say we couldn’t do it, we certainly could, but we want to do it for the right reasons and the right economics.”
Yahoo! rejected a takeover bid by Microsoft last year but Microsoft chief executive Steve Ballmer has said the software giant remains interested in a search partnership with Yahoo!
Speculation of such a deal has been revived with the departure of Yahoo! chief executive Jerry Yang, who opposed the Microsoft bid, and his replacement by new CEO Carol Bartz.
Hilary Schneider, another Yahoo! executive, said that with Bartz’ arrival “it’s really clear there’s a new sheriff in town, and it’s a sheriff with a consumer outlook.”
Google is the overwhelming market leader for Internet search with a market share of more than 63% in January according to research firm comScore, followed by Yahoo! with 21% and Microsoft with 8.5%


The search business is deeply intertwined with Yahoo's other online products and properties, and so any deal, whether a partnership or a sale, would be done for the right reasons and the right economics.

"It's extremely difficult to draw a line down the middle of the organization and split it into two pieces," Jorgensen told the Goldman Sachs Technology and Internet conference.

He did not mention specifically Microsoft Corp. (MSFT, Fortune 500), which has repeatedly said it was interested in doing a search deal with Yahoo to compete against market leader Google Inc. (GOOG, Fortune 500)

The comments come as Yahoo is rumored to be on the brink of undertaking a major corporate reorganization under Chief Executive Carol Bartz, who took the reins in January.

Yahoo rebuffed a $47.5 billion acquisition bid from Microsoft last year, and saw a deal to form a search advertising partnership with Google fall apart amid antitrust concerns.

Bartz has said she did not join the company to sell it, nor did she have a preconceived notion of doing a search deal, but that "everything is on the table."

Yahoo's stock (YHOO, Fortune 500) was up 2% or 27 cents, at $12.75 in after-market trade, after closing down 27 cents in the Nasdaq session.

Tuesday, February 24, 2009

U.S. consumers are already watching broadcast TV shows on free websites such as Hulu.com,



"OnDemand Online" will be available free to Comcast cable TV subscribers, Business Insider reports. That means only customers inside Comcast's cable zone can sign up, but the service itself is available anywhere. For example, a user could still watch on demand videos away from home (the company is working on a way to verify subscriptions). Also of note, the service would count against Comcast's 250 GB monthly bandwidth cap.

The major difference between this service and Hulu is content. While Hulu's videos come from NBC, Fox and their cable channels like FX, Comcast is inking deals with other cable networks, possibly providing a streaming opportunity for channels like the Food Network and Discovery. In other words, Comcast is going to focus on content that isn't already online.

Because Comcast and other cable providers pay fees that account for roughly half of cable channels' revenue, it's in the channels' best interests to keep providers healthy, Business Insider notes. By comparison, hardly any money comes in through online viewing, so its more likely for a channel to give its content to Comcast than to an online-only service like Hulu.
U.S. cable, programmers set for Web TV by summer,,,
Cable and satellite TV providers are working on a free online video service to deliver up-to-date cable shows to computers and mobile phones, but the industry is worried the project could cannibalize pay-TV's long-standing revenue model.
cable network programing is available primarily on cable and satellite TV services, such as Comcast Corp (CMCSA.O) and DirecTV Group Inc (DTV.O), or nascent video services from phone companies.
This is about bringing new amounts of content to the Internet in a business model that continues to support the creation of that content," said Sam Schwartz, executive vice president of Comcast Interactive Media.

Comcast is leading talks with programmers like Viacom Inc (VIAb.N) and Discovery Communications Inc (DISCA.O), with Time Warner Cable (TWC.N), DirecTV and others involved. Their plans are at different stages, and cable operators will likely discuss putting cable programing online at an industry meeting this week according to people familiar with the plans.

The project would let cable and satellite TV subscribers watch up-to-date cable shows on the Web, and possibly on mobile phones, for free possibly as soon as this summer, the sources said.

The idea is to give customers added flexibility to view their favorite shows. It is also seen as a preemptive strike against possible 'cord-cutting' of video services, particularly by younger subscribers used to watching other programs online.

But the project presents a number of business and technology challenges to both operators and programmers.

Cable programmers like Viacom's MTV Networks make money from advertising sales, as well as affiliate fees that cable and satellite TV service providers pay.

TECHNOLOGICAL ISSUES

Whatever business models are agreed upon will depend to some extent on overcoming technological challenges.

One involves identifying which customers have the right to view a show, and managing digital rights to avoid over-wide distribution. There is also the need to accurately 'time' the content so it is available to users for a restricted period -- so as not to jeopardize other media content distribution systems such as video on demand and DVD releases.

Yet executives also acknowledge the risk of ignoring the Web, as seen by the music and newspaper industries that have suffered as consumers change their media consumption habits.

Comcast sees the project, which it calls On Demand Online, as a natural progression from digital video recorders and video-on-demand channels.

It is working on technology to authenticate subscribers who go to Comcast's Fancast and Comcast.net websites for video. This would effectively create a "wall" behind which programmers might feel comfortable keeping some of their premium shows.

Friday, February 20, 2009

Xbox Live is being targeted by malicious hackers


Halo 3 players are a popular target for the Xbox attacks
Hackers target Xbox Live players.The booting services are proving popular with players who want a way to get revenge on those who beat them in an Xbox Live game.

The attackers are employing data flooding tools that have been used against websites for many years.

Microsoft is "investigating" the use of the tools and said those caught using them would be banned from Xbox Live.

"There's been a definite increase in the amount of people talking about and distributing these things over the last three to four weeks," said Chris Boyd, director of malware research at Facetime Communications.

Attack tool

"The smart thing about these Xbox tools is that they do not attack the Xbox Live network itself," he said.

He said the tools work by exploiting the way that the Xbox Live network is set up. Game consoles connecting to the Xbox network send data via the net, and for that it needs an IP address.

Even better, said Mr Boyd, games played via Xbox Live are not hosted on private servers.
"Instead," he said, "a lot of games on Xbox Live are hosted by players."

If hackers can discover the IP address of whoever is hosting a game they can employ many of the attacks that have been used for years against websites, said Mr Boyd.

One of the most popular for the Xbox Live specialists is the Denial of Service attack which floods an IP address with vast amounts of data.

The flood of data is generated by a group of hijacked home computers, a botnet, that have fallen under the control of a malicious hacking group.

When turned against a website this flood of traffic can overwhelm it or make it unresponsive to legitimate visitors.

When turned against an Xbox owner, it can mean they cannot connect to the Live network and effectively throws them out of the game.

"They get your IP address, put it in the booter tool and they attempt to flood the port that uses Xbox traffic," said Mr Boyd. "Flooding that port prevents any traffic getting out."

Skill set

The hard part, he said, was discovering a particular gamer's IP address but many malicious hackers had honed the skills needed to find them.

Some interconnect their PC and Xbox and use packet sniffing software to hunt through the traffic flowing in and out of the console for IP addresses.
Others simply use con tricks to get the target to reveal their net address.

The technical knowledge needed to hunt down IP addresses was quite high, said Mr Boyd, but many of those who had the skills were selling their expertise to those keen to hit back at their rivals on the Xbox Live network.

For $20 (£13) some Xbox Live hackers will remotely access a customer's PC and set up the whole system so it can be run any time they need it.

Some offer low rates to add compromised machines to a botnet and increase the amount of data flooding a particular IP address.

Defending against the attack could be tricky, said Mr Boyd: "There's no real easy solution to this one."

Although IP addresses regularly change, people could find it takes hours or days for their ISP to move them on to a new one.

In response to the rise in attacks, Microsoft said: "We are investigating reports involving the use of malicious software tools that an attacker could use to try and disrupt an Xbox LIVE player's internet connection."

It added: "This problem is not related to the Xbox Live service, but to the player's internet connection. The attacker could also attempt [to] disrupt other internet activities, such as streaming video or web browsing, using the same tools.

In its statement Microsoft warned: "This malicious activity violates the Xbox Live Terms of Use, and will result in a ban from Xbox Live and other appropriate action.

It urged anyone falling victim to such an attack to contact their ISP to report it and get help fixing it.



In January 2009 Microsoft announced that Xbox Live had more than 17m members.

Updates for Windows 7 Beta Users


5 test updates to PCs running the Windows 7 Beta (Build 7000) via Windows Update. These updates allow us to test and verify our ability to deliver and manage the updating of Windows 7. We typically verify servicing scenarios during a beta.
Next week Windows 7 beta users will get a variety of updates, only they aren't really updates.

Instead, Microsoft said in will sending the patches to test the operating system's updating mechanism.

The company stressed the updates won't actually add new features or update anything.

Brandon LeBlanc explained the nature of the updates in a blog posting .

This is not something we will support in Windows 7. We've talked about and shown a great many "personalization" elements of Windows 7 already, such as the new themepacks which you can try out in the beta. The reasons for this should be pretty clear, which is that we cannot guarantee the security of the system to allow for arbitrary elements to be loaded into memory at boot time. In the early stages of starting Windows, the system needs to be locked down and execute along a very carefully monitored and known state as tools such as firewalls and anti-virus checking are not yet available to secure the system. And of course, even though we're sure everyone would follow the requirements around image size, content, etc. due to performance we would not want to build in all the code necessary to guarantee that all third parties would be doing so.

Most should not be surprised about this decision, not only because of the security and performance concerns, but because Microsoft has not supported customizing boot screens on its previous Windows operating systems.
Personalization
Many of you might be asking if you could include your own animation or customize this sequence. This is not something we will support in Windows 7. We’ve talked about and shown a great many “personalization” elements of Windows 7 already, such as the new themepacks which you can try out in the beta. The reasons for this should be pretty clear, which is that we cannot guarantee the security of the system to allow for arbitrary elements to be loaded into memory at boot time. In the early stages of starting Windows, the system needs to be locked down and execute along a very carefully monitored and known state as tools such as firewalls and anti-virus checking are not yet available to secure the system. And of course, even though we’re sure everyone would follow the requirements around image size, content, etc. due to performance we would not want to build in all the code necessary to guarantee that all third parties would be doing so. One of our design goals of Windows 7 was around making sure there are ample opportunities to express yourself and to make sure your PC is really your PC and so we hope that you’ll understand why this element is one we need to maintain consistently.

This was a quick behind the scenes look at something that we hope you enjoy. With Windows 7 we set out to make the experience of starting a Windows PC a little more enjoyable, and from the feedback we’ve seen here and in other forums, we think we’re heading in the right direction. In addition to our efforts to make boot fast, we also have a goal to make the system robust enough, such that most of you will not see this new boot animation that often and when you do it will be both enjoyable and fast!

Tuesday, February 17, 2009

Microsoft unveiled a new mobile phone strategy.


The software giant announced that at the Mobile World Congress being held in Barcelona, Spain, the company and its key mobile partners were unveiling new smartphones with upgraded Microsoft software.
The next generation of phones will be based on Windows Mobile 6.5, Microsoft's new version of operating system for handsets, which is expected to be available in the later half this year

Microsoft wants to create software buzz on mobiles
Microsoft CEO Steve Ballmer's mobile phone strategy: sell a lot of devices.

Even Microsoft CEO Steve Ballmer knows that it's the hardware that gets people to buy a mobile phone.

"The thing that people buzz about is the actual thing they go and buy, which is the phone, which comes from one of our partners," Ballmer said in an interview Monday.

Microsoft aims to change that with its new effort unveiled at the Mobile World Congress in Barcelona: to persuade consumers to buy smart phones - the fastest-growing segment of the handset market - because they are running Microsoft operating system.

The new software will be Microsoft 6.5 in the series _ but will be marketed to consumers simply as Microsoft Phone, with a new user interface and a new browser. Windows also is launching two new services, one that allows users to synch their text messages, photos, video, contacts and more to the Web and an on-line applications store that will bring together the 20,000 applications developed for Microsoft-based phones.

"It is important for us that we have a strong presence and position on the phone," Ballmer said.

More than 20 million devices carrying Microsoft's operating system were sold in 2008. Ballmer said he expects to grow the market share, but he declined to make forecasts.

"The most important thing we'll do is we're going to work with the guys who build phones that are exciting ... that are hot and tell the story of their Windows phone," Ballmer said. "The Windows phone from HTC, the line of Windows phones from Samsung, from LG, really getting with the partner and telling the story of the partner and their device."

To that end, key partners HTC, LG Electronics and Orange also unveiled new Windows phones based on the new Windows operating system in Barcelona. LG said it will dramatically increase the number of phones it offers running Windows, making it the primary operating system for its smart phones. LG said its volume of Windows phones would increase 10 times this year.

Telecoms operators _ notably Vodafone _ have signaled that they want fewer, not more operating platforms.

But Ballmer thinks Windows Mobile is better positioned than the other operating systems because it can run on phones for a range of prices _ from the $600 smart phone to the $250 model.

"Many phones times a small amount of money, hopefully is enough to make this all make sense," Ballmer said in an interview on the sidelines of the four-day GSMA's World Mobile Congress, where Microsoft unveiled a new mobile phone strategy.

The company that best-known for its PC software, but which has been playing in the mobile field for the last seven years, wants to persuade consumers to buy smart phones — the fastest-growing segment of the handset market — because they are running Microsoft operating system.

That may seem counterintuitive. Even Ballmer knows that hardware — not software — is what creates consumer excitement, something in shorter supply as the world economic downturn has dramatically cut consumer confidence.

"The thing that people buzz about is the actual thing they go and buy, which is the phone, which comes from one of our partners," Ballmer said in an interview Monday.

The new software will be Windows Mobile 6.5 in the series — but will be marketed to consumers simply as Windows Phone — will include a new user interface and a new browser. Windows also is launching two new services, one that allows users to synch their text messages, photos, video, contacts and more to the Web and an applications store that will bring together the 20,000 applications that have been developed for Microsoft-based phones.

"It is important for us that we have a strong presence and position on the phone," Ballmer said. While the mobile business is relatively small part of Microsoft's business, it

More than 20 million devices carrying Microsoft's operating system were sold in 2008. Ballmer said he expects to grow the market share, but he declined to make forecasts. Microsoft doesn't say how much it sells the software for, but analysts at the GSMA put it in the ballpark of $5 to $7 per handset.

"The most important thing we'll do is we're going to work with the guys who build phones that are exciting ... that are hot and tell the story of their Windows phone," Ballmer said. "The windows phone from HTC, the line of Windows phones from Samsung, from LG, really getting with the partner and telling the story of the partner and their device."

To that end, key partners HTC, LG Electronics and Orange also unveiled new Windows phones based on the new Windows operating system in Barcelona. LG said it will dramatically increase the number of phones it offers running Windows, making it the primary operating system for its smart phones. LG said its volume of windows phones would increase 10 times this year.

Telecoms operators — notably Vodafone — have signaled that they want fewer not more operating platforms.

But Ballmer thinks Windows Mobile is better positioned than the other operating systems because it can run on phones for a range of prices — from the upper $600 smart phone to the $250 model.

IDC Analyst Francisco Jeronimo said while Microsoft's numbers are pretty good, the battle for operating system (OS) dominance is still wide hope. The big industry players in the increasingly key smart phone market are Google's Android, Nokia's Symbian — which has opened up to outsiders through the Symbian Foundation — the Linux-based open-source software being developed by the LiMo consortium and Palm OS.

"Definitely, Android, Symbian and Windows Mobile will be top OS in terms of smart phones. The challenge now for Microsoft is: No one wants to pay for an OS when they have Symbian and Android for free. What is the point?"

While 20 million devices last year shipped with Microsoft's OS, Nokia shipped 17 million smart phones to western Europe alone, along with 59 million traditional devices. While the big manufacturers seem to be waiting to make their Android announcements during the second half of the year, Jeronimo said Google's open-source software is sure to be a big player in two or three years.

"Microsoft are the ones challenged now," Jeronimo said. "My question is how long will they continue with a proprietary system?"

Michael Gartenberg, vice president of strategy and analysis for Los Angeles-based market research group Interpret LLC, didn't discount the importance of actual sales. But he said the software maker still needs to build buzz among consumers, rather than relying on the device's reputation as a workhorse that synchs up well with Microsoft's Exchange server.

"I think what they're doing now is reminding the market that these devices are the intersection between business and consumer, personal and work life," Gartenberg said.

Monday, February 16, 2009

mobile technology to provide better healthcare worldwide

A resource for activists using mobile technology worldwide.

Using mobile phones has enormous potential for increasing access to healthcare for poor people aroundd the world, and for improving clinical outcomes. Now a new association, the mHealth Alliance, has been launched to support this emerging field and increase the scale and impact of the many small prokects around the world.

So new, the Alliance has so far no website, press release, or organizaton yet, it was announced to the BBC as part of the GSMA World Congress in Barcelona. The mHealth Alliance is currently under the auspices of three foundations, the UN and Rockefeller Foundations in the United States, and the UK-based Vodafone Group Foundation.

Deploying mobiles in health care in developing countries is not only promising for health outcomes, it is also a hot and potentially lucrative business area. There is enormous interest by NGOs, donors, telcoms, mobile vendors, researchers, and governments in the the use of mobile phones for increasing healthcare for the poorest people in the world.

Three foundations have announced their intention to join in a "mobile health" effort to use mobile technology to provide better healthcare worldwide.
The UN, Vodafone, and the Rockefeller Foundation's mHealth Alliance aims to unite existing projects to improve healthcare using mobile technology.

The alliance will guide governments, NGOs, and mobile firms on how they can save lives in the developing world.

The partnership is now calling for more members to help in mHealth initiatives.

The groundbreaking "mHealth for Development" study produced by the UN/Vodafone Foundation Partnership lists more than 50 mHealth programmes from around the world, showing the benefits that mobile technology can bring to healthcare provision.

The report also outlines how such programmes offer value to the mobile industry.

That, said UN/Vodafone Foundation Partnership head Claire Thwaites, is a crucial step in an industry that like so many others stands at the edge of a downturn.

"I think there's a real need to have an alliance," Ms Thwaites told the BBC at the Mobile World Congress (MWC) in Barcelona.

"It's looking at scaling up and bringing governments together with NGOs and corporations, and it will commission pretty rigorous research on what the market opportunity is for mHealth, answering the question: why should a business get involved in this area?"

Bringing a "value proposition" to network operators is what could bring together the individual, small-scale efforts that so far have existed as purely humanitarian endeavours.

Andrew Gilbert, European president of Qualcomm, says that his firm has launched 29 different programmes across 19 countries, involving some 200,000 people, as part of its Wireless Reach campaign.

"It's not a charitable thing, it's very much aimed at allowing these solutions to become self-sustaining," he said.

Connecting areas
Because 3G mobile technology is cheap and easily made widespread, Mr Gilbert added, comparatively small amounts of investment can wreak great change in these so-called emerging markets.

Connecting areas
Because 3G mobile technology is cheap and easily made widespread, Mr Gilbert added, comparatively small amounts of investment can wreak great change in these so-called emerging markets.

In India, there are 1m people that die each year purely because they can't get access to basic healthcare," said Dan Warren, director of technology for the GSM Association, the umbrella organisation that hosts the MWC.

"The converse angle to that is that 80% of doctors live in cities, not serving the broader rural communities where 800 million people live."

Simply connecting rural areas with city doctors using mobile broadband would allow the provision of better healthcare to more people, and many of the initiatives to date have focused on that kind of connection.

In 2007, the GSMA supported Ericsson in its Gramjyoti project, providing broadband to the remote Indian villages in the southern state of Tamil Nadu.

A band of paramedics in a mobile broadband-equipped van visited the villages and were able to cover vast areas, referring many queries back to doctors in major cities.

Fragmented market
Yet mobile technology, as much as it can multiply the efforts of city-dwelling doctors and bring diagnoses to far-flung villages, cannot make up for some shortfalls.

"There's 4 billion mobile phones now in the world, 2.2 billion of those in the developing world," said Ms Thwaites. "Compare that to 305 million PCs and then look at hospital bed numbers: there's 11 million of them in the developing world."
As a result, mHealth projects must also be able to provide an ounce of prevention, and the report sheds light on some particularly successful initiatives.

In South Africa, the SIMpill project integrated a sensor-equipped medicine bottle with a SIM card, ensuring that healthcare workers were advised if patients were not taking their tuberculosis medicine.

The percentages of people keeping up with their medicine rocketed from 22% to 90%.

The medium of text message can overcome sociological barriers as well.

The Project Masiluleke SMS message campaign provided people with free text messages, with the remainder of the 160 characters used to provide HIV and Aids education.

In Uganda, the Text to Change text-based HIV quiz campaign resulted in a 33% increase in calls to an HIV information hotline.

"There are a couple of interesting benefits that the project brought to light," says UN Foundation spokesperson Adele Waugaman. "One of them is the benefit of talking to people in their local language.

"Also, HIV is very stigmatised in South Africa, so people don't like to discuss it publicly. The benefit of getting these private text messages is it's a new form of access that addresses these stigmatisation and privacy concerns."

Healthcare includes improving quality of life as well. One case study from Qualcomm's Wireless Reach programme, - 3G for All Generations - shows how mobile broadband has brought the company together with the Spanish Red Cross and Vodafone Spain to provide a custom software solution for Spain's elderly.

They can have video calls with care providers, call for help, or simply have a chat, providing real social interaction without anyone needing to travel.

Each of these and the many more in the new report showcases the potential of the technology but underlines the significant stumbling block of mHealth so far.

"The biggest problem is fragmentation of small projects," says Ms Thwaites.

"A lot of the work being done on the ground is NGO- and foundation-led, but let's join those efforts with the Microsofts and the Qualcomms and the Intels and the Vodafones.

"There's a business case for it now; you have to have the experience of the NGOs on the ground talking to the big corporates out there and creating real business models, and that's why I think the mHealth Alliance can tackle that."

Thursday, February 12, 2009

Google adds tracking tech to Gmail signatures


Google must be on a location-aware kick this month. Just a week after the search firm released its Latitude mobile device friend-tracker, Google Labs has a new tool that lets Gmail automatically include your location in an e-mail's signature.

"Sometime ago, I noticed how all mail systems tell you when an email was written, but not where it was sent from," said Marco Bonechi, the author of the tool on Gmail's blog. "Because I love to travel, the first question in many messages I receive is 'where are you?' and by the time I answer I am often somewhere else."

The experimental feature can be switched on by going to the Labs tab in Gmail settings. Users also need to have their email signature enabled and have the "append your location to the signature" option clicked in the general settings tab.

you can always just delete the location info in the email if you don't want the recipient in the location of your secret bunker – or just embarrassed about what a shut-in you've become.


Gmail give away your location...

Google Inc. certainly is focused on where you are and letting others in on that information.
A week after unveiling Google Latitude, which enables people to track the exact location of friends or family through their mobile devices, the company today announced that its Gmail software can now show the location of e-mail writers.

"Some time ago, I noticed how all mail systems tell you when an e-mail was written, but not where it was sent from," said Marco Bonechi, a Google software engineer, in a blog post. "Because I love to travel, the first question in many messages I receive is "Where are you?" and by the time I answer, I am often somewhere else. So in my 20% time, I wrote an experimental Gmail Labs feature that detects your location and appends the city region and country names to your signature."

Bonechi noted that people can use the new Location in Signature feature by going to the Labs tab in Gmail under Settings and then clicking on Signature Preferences.

"It'll use your public IP address to determine your location, so it may not always be that accurate," he noted. "For example, if you're at Heathrow Airport, IP detection may put you in Germany. If you want more accurate location detection, make sure your browser has a version of [Google] Gears that supports the location module. That way, Gears can make use of Wi-Fi access-point signals to recognize that you're actually in London."

Bonechi also added that users who want to keep their locations private can disable the option or delete their locations from specific e-mails.

Google's tracking technology hasn't received full support from security experts.

Just a day after Google Latitude was released, Privacy International called Google's new mapping application an "unnecessary danger" to users' security and privacy.

Simon Davies, director of the London-based privacy rights group, said in a statement that Google Latitude could be a "gift" to stalkers, prying employers and jealous partners.

But Google was quick to respond. Replying to Computerworld questions in an e-mail, a spokeswoman said the company's engineers and designers took privacy and security concerns into account when they created Google Latitude.

Wednesday, February 11, 2009

mobile phone networks has crossed the 4 billion mark worldwide

The number of connections on mobile phone networks has crossed the 4 billion mark worldwide, industry association GSMA said on Wednesday, forecasting additional growth to 6 billion by 2013. painful issues.
The number of connections does not translate directly into the number of users, however, because in many mature markets, one user may have two mobile phones, or a phone and a mobile data device, which would both count as two connections.
In Western Europe, about a fifth of connections are estimated to be due to one user having more than one device, a figure that probably applies to many developed markets, a GSMA spokesman said.
In developing countries, by contrast, phones are often shared.
In the run-up to the Mobile World Congress in Barcelona -- the wireless industry's biggest trade show which starts next Monday -- the GSMA said some 100 million connections were "mobile broadband" connections. This refers to mobile data connections using the high-speed HSPA standard.
The figure reflects the popularity of "dongles" which connect laptops to the Internet via mobile phone networks, as well as phones with high-speed data connections made by Nokia or HTC or the latest version of Apple's iPhone.

Tuesday, February 10, 2009

US Broadband Infrastructure Investments necessitate Transparency

broadband infrastructure investments planned as part of the economic stimulus package need transparency if they're to be effective

The key public policy problem with broadband is that citizen-consumers and policy-makers still lack basic information.

Government investment in broadband networks has emerged as one of the more contentious parts of the economic stimulus legislation slated for a Senate vote Tuesday. Already, at least $2 billion of a planned $9 billion for broadband has apparently been cut from the latest bill, as legislators and interest groups squabble over who should control Internet communications funding, and under what rules.

What should be less controversial is that intelligent spending decisions about funding for high-speed Internet connections can't be made without excellent and transparent data about our broadband infrastructure.

The key public policy problem with broadband is that citizen-consumers and policy-makers still lack basic information. The Bush administration set a goal of achieving universal broadband by the end of 2007, then declared "mission accomplished" without providing much evidence to substantiate its claim. And under former Federal Communications Commission Chairman Kevin Martin, the agency refused to release what data it did have about competitors in the broadband marketplace.
President Obama's commitment to "change" has included a more hands-on approach to promoting broadband. Throughout the presidential campaign, and repeatedly since the election, Obama has emphasized the importance of "expanding broadband lines across America." With input from his telecommunications advisors, the House stimulus bill included $6 billion for broadband. Early versions of the Senate measure raised the total to $9 billion.
Statistics?
Equally important is Obama's commitment to empirically-driven policymaking. In January, Obama became only the second president—after William Howard Taft in 1909—to invoke "statistics" in an inaugural address, when he spoke of "the indicators of crisis, subject to data and statistics."

The US spends more than $8 billion a year on statistics. Much of that goes to fund the Census Bureau and data collection about agricultural and labor markets, such as the monthly unemployment report, which on Friday brought the grim news that the economy had shed 598,000 jobs in January. Last week, when the Agriculture Department released its own census, Agriculture Secretary Tom Vilsack reminded reporters: "Numbers and data are very important. They direct policy; they shape policy. They can tell us what we are doing right. They call tell us what we are doing wrong."
Yet almost none of this $8 billion in statistical spending goes to compiling information about broadband, the infrastructure of the knowledge-based economy. And the data that has been collected has been made to mislead.
The FCC—the official record-keeper on private-sector telecommunications—for years claimed that there was adequate competition in broadband because the median ZIP code was served by eight separate providers. The Government Accountability Office's assessment of the same data found a median of two providers per ZIP code. Worse, the FCC refuses to release the information that it has about competition.
A variety of organizations—including my own free web service, BroadbandCensus.com—have stepped in to do our best at collecting, compiling and releasing public broadband information. We believe that if you want to build a road, you need a map that tells you where existing roads lie before you begin taking construction bids, let alone start pouring concrete. Where will our nation's new broadband highways, by-ways and access points be built? Who's going to let the contracts? Who will own this infrastructure?
These questions can't be answered without detailed broadband data. To that end, I've supported a proposed "State Broadband Planning and Assessment Act," which could be introduced as an amendment to the fiscal stimulus measure. The goal of this effort, as of BroadbandCensus.com, is to unleash the Internet as means of sharing information about the Internet itself.
For two-and-a-half years, I've been trying to get access to basic broadband data for the public, including citizen-consumers, businesses, and local policy-makers. I've been seeking to identify which carriers offer service in a particular ZIP code, as well as smaller units, like census blocks. In September 2006, when I headed a project at the Center for Public Integrity that investigated the telecommunications industry, we filed a Freedom of Information Act lawsuit against the FCC to force them to release basic broadband data about carriers by ZIP code.
The project obtained and displayed similar location information about broadcasters and cable operators from the FCC's cumbersome web site. But our attempts to get broadband data were thwarted by the FCC and by industry. AT&T, Verizon Communications, and the lobbying organizations representing the Bell companies, the cable companies, the cell phone carriers, and wireless broadband providers all asked the FCC to deny information to the public. Even though every consumer who buys broadband knows the name of the company that provides them with service, the telecoms argued that compiling this information into a single location would reveal "proprietary" data. The FCC agreed.


The FCC did not want disclosure, and neither did the telecom incumbents and their lobbyists. They did not want successful broadband competition.

In its legal briefings, the FCC argued that releasing the data would lead to competition in communications—which was why it couldn't release the data! "Disclosure could allow competitors to free ride on the efforts of the first new entrant to identify areas where competition is more likely to be successful," the agency told the federal district court in Washington.

The once-vaunted virtue of competition in federal telecommunications policy—the underpinning of the 1996 Telecom Act—had taken a back seat to the privilege of supposedly proprietary information. The FCC did not want disclosure, and neither did the telecom incumbents and their lobbyists. They did not want successful broadband competition.
Congress was critical of the FCC's meager broadband statistics. In October it passed the Broadband Data Improvement Act to prod the agency to collect broadband data at a level more granular than the ZIP-code. The FCC began doing just that in June, as the bill was working its way through Congress.
But under pressure from telecom lobbyists, Congress dropped a core provision from the House version of the bill: the requirement that a separate agency, the Commerce Department's National Telecommunications and Information Administration, take responsibility for conducting a national broadband census and producing a public map with the names of individual carriers and where they offered service.
The House version of the stimulus bill reintroduces the NTIA broadband map. But it takes out any mention of publicly releasing individual carrier names. Worse, the Broadband Data Improvement Act enshrined the business model favored by the carriers: providing information to an entity like Connected Nation, which agrees to excise the names of broadband providers from the maps they produce.
The House stimulus bill allocated $40 million to this business model. Last week's version of the Senate stimulus bill upped the total to $350 million.
President Obama has the opportunity to make broadband a priority in his administration by ensuring that the NTIA creates a public map of our national broadband providers and infrastructure. Map in hand, the Obama administration's broadband policy should be guided by three important principles:
1) Use the Internet to empower citizens and consumers.
With the FCC keeping broadband data out of the hands of the public, I started BroadbandCensus.com to publish the same information that any consumer can know: the name of their Internet service provider and type of broadband connection, how much they are charged for service, and the Internet speeds they are promised and actually delivered. The government of Ireland publishes exactly the same information on its communications ministry web page.
Some broadband data efforts focus on the needs of telecommunications carriers and their unionized employees. Based in Kentucky, Connected Nation has been promoting their state-wide maps of broadband availability as a means for providers to sell more service. The Communications Workers of America's Speed Matters campaign has collected random speed tests from Internet users to provide a snapshot about download and upload speeds. Both of these initiatives are good, so far as they go.
But to rigorously understand the condition of broadband, we can't rely only on the information provided by the carriers. It needs to be verified by Internet users. To truly unlock the power of Internet-enabled "crowdsourcing," an effective broadband strategy must focus on citizens. Empower them by releasing basic information and letting citizen-consumers add to the mash-up. It's about making citizens contributors as well as constituents.
2) Ensure that infrastructure investment is made on the basis of cost-benefit data.
In 1790, the United States was the first country to institute a periodic national census. What started as a questionnaire seeking only demographic information had broadened by 1840 to information about employment in mining, agriculture, manufacturing, and the "learned professions and engineers." Such information has enabled our government, our universities and our business sector to rely on good-quality statistical information.
We're going to need that kind of data, and a lot more of it, to make sound investment decisions about broadband. Because of our nation's agricultural origins, our statistical agencies provide far more data about crop production than they do about broadband availability, speeds, or prices. In the absence of good data, the temptation is to make public infrastructure investment decisions based on political pressure or lawmaker influence, rather than upon solid cost-benefit analyses.
3) Use the transparency of the Internet to regulate incumbents through public disclosure.
The regulatory philosophies of the New Deal—maximum and minimum wages and prices, hands-on federal regulation—have faded and are not likely to be revived even in the current crisis. Yet one Depression-era innovation of Franklin D. Roosevelt remains as valid as ever: the disclosure-based regime of the Securities and Exchange Commission.
The SEC is vigilant in requiring punctilious compliance with requirements that public companies disclose details of their operations. By and large, the SEC doesn't require substantive actions so much as it requires procedural compliance and full disclosure. Open information flows mean that poor corporate decisions are punished in the marketplace.
Equally important is that role that independent efforts, like those of BroadbandCensus.com and others, can play in collecting and aggregating public broadband data about speeds, prices, and reliability.
For more than a year, BroadbandCensus.com has provided a platform allowing Internet users to compare their actual broadband speeds against what they are promised by their carriers. We use the open-source Network Diagnostic Tool (NDT) of Internet2. All speed test data is publicly displayed under a Creative Commons license. This approach to public monitoring Internet traffic has recently been followed by Google and the New America Foundation and their "Measurement Lab" initiative, which also uses NDT.
Ultimately, broadband carriers that offer good speeds and good service will see the value in an objective and transparent broadband census. Fortunately, consumers don't need to wait on the carriers to begin collecting and publishing broadband of their own.
Neither should the government. No matter how much Congress decides to allocate to stimulate broadband, it should insist that information about speeds, prices, technologies, and specific locations of high-speed Internet availability are publicly available to all.
more.......
Guiding principles for U.S. broadband infrastructure economic stimulus
As Congressional leaders and the incoming administration of U.S. President-elect Barack Obama mull economic stimulus legislation including a portion of which is expected to be devoted to telecommunications infrastructure to boost broadband Internet access, I offer these guiding principles:
1. The focus should be on the so-called "last mile" or local access network portion of the system. There's a broad consensus that the lack of adequate broadband access in the United States is due to technological shortcomings on this segment of the telecommunications infrastructure, its weakest link. The overall goal should be full build out of this currently incomplete but vital infrastructure to serve all residents and businesses.

Monday, February 2, 2009

cybercrime is rising sharply, experts have warned at the World Economic Forum in Davos.


Cybercrime threat rising stridently.
The threat of cybercrime is rising sharply, experts have warned at the World Economic Forum in Davos.

They called for a new system to tackle well-organised gangs of cybercriminals.

Online theft costs $1 trillion a year, the number of attacks is rising sharply and too many people do not know how to protect themselves, they said.

The internet was vulnerable, they said, but as it was now part of society's central nervous system, attacks could threaten whole economies.

The past year had seen "more vulnerabilities, more cybercrime, more malicious software than ever before", more than had been seen in the past five years combined, one of the experts reported.

But does that really put "the internet at risk?", was the topic of session at the annual Davos meeting.

On the panel discussing the issue were Mozilla chairwoman Mitchell Baker (makers of the Firefox browser), McAfee chief executive Dave Dewalt, Harvard law professor and leading internet expert Jonathan Zittrain, Andre Kudelski of Kudelski group, which provides digital security solutions, and Tom Ilube, the boss of Garlik, a firm working on online web identity protection.

They were also joined by Microsoft's chief research officer, Craig Mundie.

To encourage frank debate, Davos rules do not allow the attribution of comments to individual panellists

Threat #1: Crime

The experts on the panel outlined a wide range of threats facing the internet.
There was traditional cybercrime: committing fraud or theft by stealing somebody's identity, their credit card details and other data, or tricking them into paying for services or goods that do not exist.

The majority of these crimes, one participant said, were not being committed by a youngster sitting in a basement at their computer.

Rather, they were executed by very large and very well-organised criminal gangs.

One panellist described the case of a lawyer who had realised that he could make more money though cybercrime.

He went on to assemble a gang of about 300 people with specialised roles - computer experts, lawyers, people harvesting the data etc.

Such criminals use viruses to take control of computers, combine thousands of them into so-called "botnets" that are used for concerted cyber attacks.

In the United States, a "virtual" group had managed to hijack and redirect the details of 25 million credit card transactions to Ukraine. The group used the data to buy a large number of goods, which were then sold on eBay.

This suggested organisation on a huge scale.

"This is not vandalism anymore, but organised criminality," a panellist said, while another added that "this is it is not about technology, but our economy".

Threat #2: the system

A much larger problem, though, are flaws in the set-up of the web itself.

It is organised around the principle of trust, which can have unexpected knock-on effects.

Nearly a year ago, Pakistan tried to ban a YouTube video that it deemed to be offensive to Islam.

The country's internet service providers (ISPs) were ordered to stop all YouTube traffic within Pakistan.
However, one ISP inadvertently managed to make YouTube inaccessible from anywhere in the world.

But in cyberspace, nobody is responsible for dealing with such incidents.

It fell to a loose group of volunteers to analyse the problem and distribute a patch globally within 90 minutes.

"Fortunately there was no Star Trek convention and they were all around," a panellist joked.

Threat #3: cyber warfare

Design flaws are one thing, cyber warfare is another.

Two years ago, a political dispute between Russia and Estonia escalated when the small Baltic country came under a sustained denial-of-service attack which disabled the country's banking industry and its utilities like the electricity network.
This was repeated last year, when Georgia's web infrastructure was brought down on its knees during its conflict with Russia.

"2008 was the year when cyber warfare began.. it showed that you can bring down a country within minutes," one panellist said.

"It was like cyber riot, Russia started it and then many hackers jumped on the bandwagon," said another.

This threat was now getting even greater because of the "multiplication of web-enabled devices" - from cars to fridges, from environmental sensors to digital television networks.

The panel discussed methods that terrorists could use to attack or undermine the whole internet, and posed the question whether the web would be able to survive such an assault.

The real problem, concluded one of the experts, was not the individual loss.

It was the systemic risk, where fraud and attacks undermine either trust in or the functionality of the system, to the point where it becomes unusable.



What solution?

"The problems are daunting, and it's getting worse," said one of the experts. "Do we need a true disaster to bring people together?," asked another.

One panellist noted that unlike the real world - where we know whether a certain neighbourhood is safe or not - cyberspace was still too new for most of us to make such judgements. This uncertainty created fear.

And as "the internet is a global network, it doesn't obey traditional boundaries, and traditional ways of policing don't work," one expert said.

Comparing virus-infected computers to people carrying highly infectious diseases like Sars, he proposed the creation of a World Health Organisation for the internet.

"If you have a highly communicable disease, you don't have any civil liberties at that point. We quarantine people."

"We can identify the machines that have been co-opted, that provide the energy to botnets, but right now we have no way to sequester them."

But several panellists worried about the heavy hand of government. The internet's strength was its open nature. Centralising it would be a huge threat to innovation, evolution and growth of the web.

"The amount of control required [to exclude all risk] is quite totalitarian," one of them warned.

Instead they suggested to foster the civic spirit of the web, similar to the open source software movement and the team that had sorted the YouTube problem.

"Would a formalised internet police following protocols have been able to find the [internet service provider] in Pakistan as quickly and deployed a fix that quickly?" one of them asked.

How Soon Will Cybercrimes Be Punished?
In criminal offenses, there would be no crime when there is no law punishing it. That explains why various crimes done through the internet still persist these days. In cases where the offenders are caught, court proceedings won't go so well because only the part of the offense which is governed by the Revised Penal Code (RPC) is being litigated. The main bulk of the offense, the cybercrime, is usually left untouched. This is the main issue; yet, the current RPC is still inadequate to deal with such matter. Hence, the government's highest monitoring body for the conditions and status of Information Technology in the Philippines is now putting pressure on the legislature to propose a bill against cybercrimes.
The Commission on Information and Communication Technology (CICT) define cybercrimes as those offenses done in the realm of the internet which, just like usual offenses, have grave and concrete effects to the ones who are affronted. The crimes identified are hacking, identity theft, phishing, spamming, website defacement, denial-of-service (DoS) attacks, malware or viruses, child pornography, and cyber prostitution. Such crimes are not yet punishable under the country's criminal law. That is why there is a need for a legislative action to eventually make each of the aforementioned offenses become a felony in order for perpetrators to be punished in accordance with the law.
CICT is very hopeful that increased awareness and support will push the Congress to finally pass a bill against cybercrimes. The commission endorsed the "Cybercrime Prevention Act of 2008" wherein four cyber-related bills authored by different lawmakers are consolidated. A representative from the Council of Europe, an organ of the European Council, also joined the technical working group in refining the bill a year prior to the endorsement. Such representation is meant to "harmonize" the bill with European standards on cybersecurity. It has to be considered that such crimes are not solely confined to one nation but rather that they traverse territorial boundaries considering that the crimes are committed in the World Wide Web..
Currently, CICT feels that there is an increasing support from private sector groups. The Business Process Association of the Philippines (B/PAP) which represents the outsourcing industry is an example. The said umbrella organization supports such bill because it infers that once the country is secured from different forms of cybercrimes through existing and enforceable laws, it would be easier to sell the services that are done in the country to foreign investors. The bill would ensure that the clients are well covered when we speak of cybersecurity in the Philippines.
With these, it can be said that the current conditions the country is facing calls for progressive and up-to-date legislations. Neighboring countries like Singapore and Malaysia have already adopted such measure. Unluckily though, the bill is hampered by the other so called "more important" considerations discussed in both Lower and Upper House of the Congress in the Philippines. It is already five years since the bill was endorsed, yet, the Congress still fails to accommodate it. While increased support and awareness regarding cybercrimes becomes more apparent, hopefully ,the legislature will finally act on this issue.

Microsoft patent makes smart phones like more then pc


'Smart system' includes cradle that allows smart phone to connect to peripherals, networks, through a USB connection.

Microsoft Corp. has patented smart phone-docking technology that would allow the devices to connect to peripherals and networks similar to the way PCs do.

According to a filing with the U.S. Patent and Trademark Office, Microsoft has patented a "smart system" that includes a smart-phone cradle that allows the device to interface to peripherals, networks and large video displays through a USB connection.


Some of the peripherals the cradle would allow the smart phone to link up to include printers, TV screens, cameras, external storage devices and speakers, according to the patent, which Microsoft acquired Jan. 22.

For years Microsoft executives -- particularly Chairman Bill Gates, who is no longer on full-time duty at the company -- have discussed publicly how PCs and smart devices are reaching an intersection, and how PC technology will be available in smaller devices.

The patent filing reflects this notion. "The cell phone is rapidly evolving into a smart communications device that can provide sufficient computing power and functionality to drive a wide variety of peripherals as well as access network services," according to the filing. "A major impediment to taking advantage of this evolving technology in the cell phone, for example, is the inability to connect the phone to peripheral devices and systems."

Apple Inc.'s iPhone, introduced in mid-2007, was probably the first and best example of the intersection between PCs and smart phones; it's more like a mini-PC than a mobile phone. With devices based on the Windows Mobile operating system that third parties sell, Microsoft also offers a similar hybrid of PC and smart phone.

Microsoft also released a Zune music and video player to compete with Apple's iPod, but the device has garnered only lukewarm customer interest, leaving the future of the product uncertain. Rumors swirled that Microsoft would unveil a combination Zune/Windows Mobile device to rival iPhone at the Consumer Electronics Show in Las Vegas earlier this month, but that did not happen.

Microsoft did not immediately comment on the patent Friday. The company doesn't typically comment on technologies it patents, which may or may not end up as products or as a part of products Microsoft sells.

Thursday, January 29, 2009

Google's new online tools that will diagnose your network connection & performance.l

Google and a group of partners have released a set of tools designed to help broadband customers and researchers measure performance of Internet connections.
The set of tools, at MeasurementLab.net, includes a network diagnostic tool, a network path diagnostic tool and a tool to measure whether the user's broadband provider is slowing BitTorrent peer-to-peer (P-to-P) traffic. Coming soon to the M-Lab applications is a tool to determine whether a broadband provider is giving some traffic a lower priority than other traffic, and a tool to determine whether a provider is degrading certain users or applications.


Think your Internet Service Provider (ISP) is messing with your connection performance? Now you can find out, with Google's new online tools that will diagnose your network connection.
Here's a quick walkthrough on how to make the best of them.
Google's broadband test tools are located at Measurementlab.net. On that page, you'll see an first icon that says "Users: Test Your Internet Connection". Click that, and then you'll be taken to a page where there are three tests available, and two more listed as coming soon. However, out of the three available tests, only one of them is fully automated and easy to use.
Glasnost , second on the list, will check whether your ISP is slowing down (like Comcast) or blocking Peer2Peer (P2P) downloads from software such as BitTorrent. P2P apps are commonly used for downloading illegal software and media content like movies and music, but also are used for legal purposes as well, such as distributing large software packages to many users at once.
To use the measurement tool, you will be redirected to the Glasnost site. You'll need the latest version of Java installed, and you should stop any large downloads that you may have running before you begin the test. If you're on a Mac, a popup message will prompt you to trust the site's Java applet.
When you're ready to start, you can choose whether you want to run a full test (approximately 7 minutes long) or a simple test (4 minutes long). When I tried to test my connection, Glasnost's measurement servers were overloaded and an alternative server was offered, but that was overloaded as well. After a short while I was able to run the test.
In the tests of my connection (my provider is Vodafone At Home, in the UK) all results indicated that BitTorrent traffic is not blocked or throttled. But I'm looking forward to hearing from you in the comments how your ISP performed in Glasnost's diagnostics. Meanwhile, make sure you keep an eye on the other tests that will be available soon from Measurementlab.net.

Wednesday, January 28, 2009

Hidalgo County, Texas is considering $500,000 project that would blanket the city with a wireless Internet system


Pharr is considering a $500,000 project that would blanket the city with a wireless Internet system geared toward serving city workers and emergency responders.
Negotiations are still in extremely preliminary stages — and both the city and contractor say a timetable isn't set — but leaders have expressed intrigue at the prospect of a system that can seemingly meet their wildest high-tech fantasies.
"The possibilities for the future are really interesting," Pharr City Manager Fred Sandoval said.
Bobby Vassallo, a wireless Internet consultant, has met with the City Commission twice over the last six weeks to help pitch the concept of a wireless Internet "clothesline" that could help the city handle everything from police video surveillance to wireless water meter-reading.
Behind the pitch is Brownsville businessman Oscar Garza, who leads the corporation Valley Wireless Internet Holdings.
Sandoval emphasized that the city hasn't made any decisions yet.
"It's a very interesting concept," he said. "We definitely want to be at the forefront."
REGION-WIDE
Pharr isn't alone in its consideration of wireless systems.
While wireless Internet is already the standard in some large cities, the technology now seems to be taking root in the Rio Grande Valley.
Cities across the region are pursuing high-tech, wireless Internet options that have the potential to promote efficiency in virtually all municipal departments by keeping workers in the field connected to City Hall.
Using wireless "mesh" systems, cities can provide Internet access over a large area to their employees through a series of nodes attached to structures like water towers or streetlights.
That means building inspectors could send reports back to City Hall from a work site, traffic citations could appear in court computers almost instantly, and police could set up surveillance cameras without fear of their cables being cut.
McAllen is already moving forward with plans to install up to 120 surveillance cameras throughout the city, which will be connected wirelessly to a fiber-optic cable running through the city.
The cameras would be served by a downtown wireless network, which could also provide support to other city workers in the area.
Last summer, a pilot program provided wireless to city workers in Bill Schupp Park. McAllen is currently soliciting proposals from vendors and is scheduled to meet with them today.
The focus of McAllen's project would be city usage, but eventually it could be opened up to residents, said Belinda Mercado, McAllen's information technology director.
Meanwhile, Hidalgo leaders are examining the possibility of creating a citywide blanket of wireless Internet similar to the one Pharr is examining. The system would provide access to emergency responders and residents on two separate networks, explained Rick Mendoza, Hidalgo's information technology director.
He said the talks are in preliminary stages and price estimates aren't available. But the city would like to offer Internet service to residents at no cost.
"We want to offer Internet service to members of our community who don't have the means of getting either DSL or cable," Mendoza said.
He added that a citywide wireless network would help Hidalgo compete with neighboring cities.
Edinburg leaders have also discussed the possibility of creating some sort of wireless system that would include various hot spots throughout the city, though they are only in discussions and the city hasn't started talks with any specific vendors.
Brownsville officials, meanwhile, expect their $6.6 million wireless project to be operational within four months, Mayor Pat Ahumada said.
The city is erecting signal towers, which will provide wireless access to city employees, utility workers and emergency responders, though it remains to be seen how much access the general public will have.
COST
The systems don't come cheap, however.
The network being pitched to Pharr could cost as much as $500,000 for the initial infrastructure, $25,000 a month to operate and even more for cameras, wireless water meters and other high-tech equipment needed to actually take advantage of the system.
At a time when cities across the region are struggling financially, at least some have questioned whether the cost of such an ambitious undertaking can be justified.
Pharr is just starting to climb out from under its financial woes after it wiped out its reserves last year.
"I believe the No. 1 question we should be asking, besides ‘Can we afford this?' is ‘Do we need it?'" said Pharr Finance Director Juan Guerra at a city workshop earlier this month. "From what I'm hearing ... I'm not sure if we do."
TIMING
Interestingly, the Valley's pursuit of wireless comes as cities elsewhere are struggling with their Wi-Fi projects.
Internet service provider Earthlink, which has partnered with Philadelphia, Houston and other large cities on wireless programs, announced layoffs within its municipal division in November. The company told shareholders it no longer makes sense for Earthlink to invest in municipal wireless.
As a result, some community wireless projects have been put on hiatus.
Earlier in the decade, companies like Earthlink offered to provide wireless systems at virtually no cost to cities. In exchange, the networks were privately owned, and the companies could charge subscription fees to consumers or hit them with advertising.
That model is changing, as it has become apparent that broadband access is becoming more readily available and affordable to consumers.
Today, cities are designing the systems for themselves to meet their own needs, such as giving support to emergency workers or keeping public works employees connected while in the field.
Those purpose-driven networks — as opposed to ones that are simply designed to give residents Internet access — are the ones that are now poised to succeed, writes Governing magazine's Christopher Swope, an expert on municipal wireless systems.
Vassallo, the wireless Internet consultant, emphasized to Pharr leaders that the city could create some public hot spots, but providing all-encompassing Internet service to residents isn't worth the cost or stress to the city.
Regardless of how, exactly, Pharr and other cities' projects takes shape, advocates say it's high time the Valley embraces wireless.

Tuesday, January 27, 2009

Google will begin to offer browser-based offline contact to its Gmail Webmail application

Google announced the release of a new system which allows users to access their accounts offline.
Google Delivers Offline admittance for Gmail
Google will begin to offer browser-based offline access to its Gmail Webmail application, a much-awaited feature.
This functionality, which will allow people to use the Gmail interface when disconnected from the Internet, has been expected since mid-2007.
That's when Google introduced Gears, a browser plug-in designed to provide offline access to Web-hosted applications like Gmail.
Gears is currently used for offline access to several Web applications from Google, like the Reader RSS manager and the Docs word processor, and from other providers like Zoho, which uses it for offline access to its e-mail and word processing browser-based applications.
Rajen Sheth, senior product manager for Google Apps, said that applying Gears to Gmail has been a very complex task, primarily because of the high volume of messages accounts can store. "Gmail was a tough hurdle," he said.
Google ruled out the option of letting users replicate their entire Gmail inboxes to their PCs, which in many cases would translate into gigabytes of data flowing to people's hard drives. It instead developed algorithms that will automatically determine which messages should be downloaded to PCs, taking into consideration a variety of factors that reflect their level of importance to the user, he said. At this point, end-users will not be able to tweak these settings manually.
"We had to make it such that we're managing a sizable amount of information offline and doing it well in a way that's seamless to the end-user," he said.
For example, in Gmail, users can put labels on messages, as well as tag them with stars to indicate their importance, and Google can use that information to determine which messages to download. Sheth estimates that in most cases Gmail will download several thousand messages, preferring those that are more recent as well. Depending on the amount of messages users have on their accounts, they may get downloads going back two months or two years, he said.
Google will begin to roll out the Gmail offline functionality Tuesday evening and expects to make it available to everybody in a few days, whether they use Gmail in its standalone version or as part of the Apps collaboration and communication suite for organizations.
While the feature was "rigorously" tested internally at Google, it is a first, early release upon which Google expects to iterate and improve on. That's why it's being released under the Google Labs label. Users are encouraged to offer Google feedback.
Users have been able to manage their Gmail accounts offline via other methods for years, since Gmail supports the POP and IMAP protocols that let people download and send out messages using desktop e-mail software like Microsoft Outlook and others.
However, the Gears implementation will let people work within the Gmail interface without the need for a separate PC application. When offline, messages will be put in a Gears browser queue, and the desktop and online versions of the accounts will be synchronized automatically when users connect to the Internet again. This will come in handy for people who travel a lot and often find themselves without Internet access, Sheth said.
To activate the offline functionality, users of standalone Gmail service and the standard Apps edition should click "settings" after logging on to their Gmail account. There, they should click on the "Labs" tab, select "Enable" next to "Offline Gmail" and click "Save Changes." A new "Offline" link will then appear in the right-hand corner of the account interface. Users of the Education and Premier Apps versions will
have to wait for their Apps administrators to enable Gmail Labs for everyone on the domain first.
Google is also rolling out Gears-based offline access for its Calendar application. However, it will be for now read-only and exclusively available to Google Apps account holders. Previously, Google introduced read-only offline access to the Spreadsheet and Presentation applications in Google Docs, which is also part of Google Apps.

release of offline Gmail.

The early version of the app is available now to users with the U.S./U.K. English version of Google Labs.
Pegged as an "experimental" feature, the app is aimed at maintaining Gmail's functionality even when you're not online. Built on Google's Gear's platform, once enabled the feature downloads a cache of your mail to your PC. When you're logged on the Web, it syncs the cache with the Gmail servers.
While you're offline, you can read, star, and label messages. If you send a message when you're offline, Gmail places it in your outbox and sends it as soon as you log back in. A special "flaky connection" setting splits the difference between on and offline modes ("when you're 'borrowing' your neighbor's wireless," says Google), utilizing a local cache while syncing it with the online version.

Wednesday, December 17, 2008

BLADE Network Technologies' -2009 Most Valuable Performers Award

BLADE Network Technologies' President and CEO, Vikram Mehta, With Technology Industry's 2009 Most Valuable Performers Award.

BLADE Network Technologies, Inc. (BLADE), the trusted leader in data center networking, announced today that Network Product Guide, a world leading publication on technologies and solutions, has honored BLADE President and CEO Vikram Mehta with the information technology industry's 2008 Most Valuable Performers (MVP) recognition. This prestigious industry award recognizes senior executives from around the world with the essential characteristics of leaders that exhibit the qualities of most valuable performers.
Vikram Mehta has been at the helm of BLADE since its inception. Through his passionate commitment to customer service and product innovation, BLADE has become the trusted leader in data center networking, the industry's leading supplier of blade server switch solutions and a pioneering provider of the new breed of 10 Gigabit Ethernet data center switches. Prior to establishing BLADE as a privately held company in 2006, Mehta held leadership and executive positions at Nortel Networks, Alteon Web Systems, Ensim and HP. Mehta is an electrical engineer from the Birla Institute of Technology, Ranchi, India.
Network Products Guide also has named BLADE as a 2009 Hot Companies finalist. Selected from a global industry analysis of information technology vendors that included established large companies, mid-size and new start-ups, BLADE has advanced to the finalists stage based on the "4Ps" selection criteria -- namely Products, People, Performance, and Potential. The coveted 2009 Hot Companies award criterion encompasses companies in all areas of information technologies including security, wireless, storage, networking, software and communications.
Over half of Fortune 500 companies rely on BLADE's Ethernet switches to equip their essential data center infrastructures. BLADE has shipped 5 million Ethernet switch ports to more than 5,000 customers worldwide. Through its partnerships with HP, IBM, NEC and Verari Systems, BLADE has delivered more than 220,000 Gigabit and 10 Gigabit Ethernet switches to enterprise data centers to connect over 1.1 million servers. BLADE's market share of data center switches for blade servers now stands in excess of 48.5 percent combined on HP and IBM blade servers and 66 percent on NEC blade servers. To date, BLADE's market share and Ethernet port shipments on both IBM and HP platforms are more than 2x greater than the nearest competitor's.
"The new economy leaders are essentially those that are adapting best in the current economic environment and will emerge with higher standards," said Rake Narang, editor-in-chief, Network Products Guide. "We are proud to honor Vikram Mehta with this year's 2008 Most Valuable Performers award and recognize BLADE as a 2009 Hot Companies Finalist."
Network Products Guide 2008 MVP leaders have a clear vision and mission, have set measurable goals and objectives for themselves, are selfless and mentors to others, and most importantly demonstrate respect and trust for their staff, employees and the high-technology industry. Senior executives were honored from companies around the world which include Ingres Corporation, Cisco Systems, Inc., IBM, AppGate Network Security, Crossroads Systems, Lumeta Corporation, SECNAP Network Security Corp., Dyadem International Ltd., Permabit Technology Corporation, M-CAT Enterprises, Google, Inc., BLADE Network Technologies, CaseCentral, ONStor, SolarWinds, BlueCat Networks, Inc., Rohati Systems, Inc., VirtualPBX, IBRIX, LogMeIn, Inc., GTB Technologies, Inc., Kazeon, Riverbed Technologies, Protegrity, Everyone.net and Xiotech Corporation.
The 2009 Hot Companies winners will be announced and honored at the 2009 "World Executive Alliance Summit" in San Francisco on March 26-27, 2009. BLADE will be among other key industry players at this event. CEOs of finalists will be presenting their company's 4Ps criteria live to an audience of leading entrepreneurs, IT companies, venture capitalists, corporate strategists and media. To see the complete list of finalists please visit http://www.networkproductsguide.com/hotcompanies/
About Network Products Guide Awards
Network Products Guide, published from the heart of Silicon Valley, is a leading provider of products, technologies and vendor related research and analysis. You will discover a wealth of information and tools in this guide including the best products and services, roadmaps, industry directions, technology advancements and independent product evaluations that facilitate in making the most pertinent technology decisions impacting business and personal goals. The guide follows conscientious research methodologies developed and enhanced by industry experts. To learn more, visit www.networkproductsguide.com
About BLADE Network Technologies
BLADE Network Technologies is the leading supplier of Gigabit and 10G Ethernet network infrastructure solutions that reside in blade servers and "scale-out" server and storage racks. BLADE's new "virtual, cooler and easier" RackSwitch family demonstrates the promise of "Rackonomics" -- a revolutionary approach for scaling out data center networks to drive down total cost of ownership. The company's customers include half of the Fortune 500 across 26 industry segments, and an installed base of over 220,000 network switches representing more than 1,100,000 servers and over 5 million switch ports. For more information, visit www.bladenetwork.net.
BLADE Network Technologies and the BLADE logo are trademarks of BLADE Network Technologies. All other names or marks are property of their respective owners. CONTACTS:
Tim Shaughnessy
BLADE Network Technologies
(408) 850-8963
Email Contact
Zee Zaballos
ZNA Communications
(831) 425-1581 x201
Email Contact