Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

Sunday, March 29, 2009

Nokia ready to change its fortunes in the U.S. market


NOKIA HITS US MARKETS.....
Nokia has steadily lost ground in recent years, watching its market share shrivel to single digits.
Nokia hopes to reverse that trend. On Mar. 30, AT&T (T), the largest wireless carrier in the U.S., plans to announce it will soon carry Nokia's e71x, the thinnest smartphone available in the U.S. The phone is similar to traditional BlackBerry devices in looks, but is a sleeker 0.39 inches thick. It has a Qwerty keyboard, allowing for Web browsing and corporate e-mail access via regular wireless networks and Wi-Fi hotspots at cafés and airports. The device also has a built-in Global Positioning System, a music player, a video camera, and a memory card slot. The Nokia e71x is expected to hit the U.S. market in May and should cost $100 after rebate with a two-year contract.

"We believe this is a great opportunity for Nokia," says Hugo Hernandez, Nokia's head of E-series marketing for North America. "We are bringing in a device with the right [features] and the right price point."

Investing more in the U.S. market
To gain back market share and prove it's serious about the U.S. market this time, Nokia needs to follow up the e71x with comparably promising phones. In particular, the company needs to develop more phones with the CDMA wireless technology used by Verizon Wireless and Sprint (S). "It'll be difficult [to increase their market share] due to their [near] lack of CDMA presence," says Hughes De La Vergne, a principal analyst at Gartner (IT).

Tuesday, February 10, 2009

US Broadband Infrastructure Investments necessitate Transparency

broadband infrastructure investments planned as part of the economic stimulus package need transparency if they're to be effective

The key public policy problem with broadband is that citizen-consumers and policy-makers still lack basic information.

Government investment in broadband networks has emerged as one of the more contentious parts of the economic stimulus legislation slated for a Senate vote Tuesday. Already, at least $2 billion of a planned $9 billion for broadband has apparently been cut from the latest bill, as legislators and interest groups squabble over who should control Internet communications funding, and under what rules.

What should be less controversial is that intelligent spending decisions about funding for high-speed Internet connections can't be made without excellent and transparent data about our broadband infrastructure.

The key public policy problem with broadband is that citizen-consumers and policy-makers still lack basic information. The Bush administration set a goal of achieving universal broadband by the end of 2007, then declared "mission accomplished" without providing much evidence to substantiate its claim. And under former Federal Communications Commission Chairman Kevin Martin, the agency refused to release what data it did have about competitors in the broadband marketplace.
President Obama's commitment to "change" has included a more hands-on approach to promoting broadband. Throughout the presidential campaign, and repeatedly since the election, Obama has emphasized the importance of "expanding broadband lines across America." With input from his telecommunications advisors, the House stimulus bill included $6 billion for broadband. Early versions of the Senate measure raised the total to $9 billion.
Statistics?
Equally important is Obama's commitment to empirically-driven policymaking. In January, Obama became only the second president—after William Howard Taft in 1909—to invoke "statistics" in an inaugural address, when he spoke of "the indicators of crisis, subject to data and statistics."

The US spends more than $8 billion a year on statistics. Much of that goes to fund the Census Bureau and data collection about agricultural and labor markets, such as the monthly unemployment report, which on Friday brought the grim news that the economy had shed 598,000 jobs in January. Last week, when the Agriculture Department released its own census, Agriculture Secretary Tom Vilsack reminded reporters: "Numbers and data are very important. They direct policy; they shape policy. They can tell us what we are doing right. They call tell us what we are doing wrong."
Yet almost none of this $8 billion in statistical spending goes to compiling information about broadband, the infrastructure of the knowledge-based economy. And the data that has been collected has been made to mislead.
The FCC—the official record-keeper on private-sector telecommunications—for years claimed that there was adequate competition in broadband because the median ZIP code was served by eight separate providers. The Government Accountability Office's assessment of the same data found a median of two providers per ZIP code. Worse, the FCC refuses to release the information that it has about competition.
A variety of organizations—including my own free web service, BroadbandCensus.com—have stepped in to do our best at collecting, compiling and releasing public broadband information. We believe that if you want to build a road, you need a map that tells you where existing roads lie before you begin taking construction bids, let alone start pouring concrete. Where will our nation's new broadband highways, by-ways and access points be built? Who's going to let the contracts? Who will own this infrastructure?
These questions can't be answered without detailed broadband data. To that end, I've supported a proposed "State Broadband Planning and Assessment Act," which could be introduced as an amendment to the fiscal stimulus measure. The goal of this effort, as of BroadbandCensus.com, is to unleash the Internet as means of sharing information about the Internet itself.
For two-and-a-half years, I've been trying to get access to basic broadband data for the public, including citizen-consumers, businesses, and local policy-makers. I've been seeking to identify which carriers offer service in a particular ZIP code, as well as smaller units, like census blocks. In September 2006, when I headed a project at the Center for Public Integrity that investigated the telecommunications industry, we filed a Freedom of Information Act lawsuit against the FCC to force them to release basic broadband data about carriers by ZIP code.
The project obtained and displayed similar location information about broadcasters and cable operators from the FCC's cumbersome web site. But our attempts to get broadband data were thwarted by the FCC and by industry. AT&T, Verizon Communications, and the lobbying organizations representing the Bell companies, the cable companies, the cell phone carriers, and wireless broadband providers all asked the FCC to deny information to the public. Even though every consumer who buys broadband knows the name of the company that provides them with service, the telecoms argued that compiling this information into a single location would reveal "proprietary" data. The FCC agreed.


The FCC did not want disclosure, and neither did the telecom incumbents and their lobbyists. They did not want successful broadband competition.

In its legal briefings, the FCC argued that releasing the data would lead to competition in communications—which was why it couldn't release the data! "Disclosure could allow competitors to free ride on the efforts of the first new entrant to identify areas where competition is more likely to be successful," the agency told the federal district court in Washington.

The once-vaunted virtue of competition in federal telecommunications policy—the underpinning of the 1996 Telecom Act—had taken a back seat to the privilege of supposedly proprietary information. The FCC did not want disclosure, and neither did the telecom incumbents and their lobbyists. They did not want successful broadband competition.
Congress was critical of the FCC's meager broadband statistics. In October it passed the Broadband Data Improvement Act to prod the agency to collect broadband data at a level more granular than the ZIP-code. The FCC began doing just that in June, as the bill was working its way through Congress.
But under pressure from telecom lobbyists, Congress dropped a core provision from the House version of the bill: the requirement that a separate agency, the Commerce Department's National Telecommunications and Information Administration, take responsibility for conducting a national broadband census and producing a public map with the names of individual carriers and where they offered service.
The House version of the stimulus bill reintroduces the NTIA broadband map. But it takes out any mention of publicly releasing individual carrier names. Worse, the Broadband Data Improvement Act enshrined the business model favored by the carriers: providing information to an entity like Connected Nation, which agrees to excise the names of broadband providers from the maps they produce.
The House stimulus bill allocated $40 million to this business model. Last week's version of the Senate stimulus bill upped the total to $350 million.
President Obama has the opportunity to make broadband a priority in his administration by ensuring that the NTIA creates a public map of our national broadband providers and infrastructure. Map in hand, the Obama administration's broadband policy should be guided by three important principles:
1) Use the Internet to empower citizens and consumers.
With the FCC keeping broadband data out of the hands of the public, I started BroadbandCensus.com to publish the same information that any consumer can know: the name of their Internet service provider and type of broadband connection, how much they are charged for service, and the Internet speeds they are promised and actually delivered. The government of Ireland publishes exactly the same information on its communications ministry web page.
Some broadband data efforts focus on the needs of telecommunications carriers and their unionized employees. Based in Kentucky, Connected Nation has been promoting their state-wide maps of broadband availability as a means for providers to sell more service. The Communications Workers of America's Speed Matters campaign has collected random speed tests from Internet users to provide a snapshot about download and upload speeds. Both of these initiatives are good, so far as they go.
But to rigorously understand the condition of broadband, we can't rely only on the information provided by the carriers. It needs to be verified by Internet users. To truly unlock the power of Internet-enabled "crowdsourcing," an effective broadband strategy must focus on citizens. Empower them by releasing basic information and letting citizen-consumers add to the mash-up. It's about making citizens contributors as well as constituents.
2) Ensure that infrastructure investment is made on the basis of cost-benefit data.
In 1790, the United States was the first country to institute a periodic national census. What started as a questionnaire seeking only demographic information had broadened by 1840 to information about employment in mining, agriculture, manufacturing, and the "learned professions and engineers." Such information has enabled our government, our universities and our business sector to rely on good-quality statistical information.
We're going to need that kind of data, and a lot more of it, to make sound investment decisions about broadband. Because of our nation's agricultural origins, our statistical agencies provide far more data about crop production than they do about broadband availability, speeds, or prices. In the absence of good data, the temptation is to make public infrastructure investment decisions based on political pressure or lawmaker influence, rather than upon solid cost-benefit analyses.
3) Use the transparency of the Internet to regulate incumbents through public disclosure.
The regulatory philosophies of the New Deal—maximum and minimum wages and prices, hands-on federal regulation—have faded and are not likely to be revived even in the current crisis. Yet one Depression-era innovation of Franklin D. Roosevelt remains as valid as ever: the disclosure-based regime of the Securities and Exchange Commission.
The SEC is vigilant in requiring punctilious compliance with requirements that public companies disclose details of their operations. By and large, the SEC doesn't require substantive actions so much as it requires procedural compliance and full disclosure. Open information flows mean that poor corporate decisions are punished in the marketplace.
Equally important is that role that independent efforts, like those of BroadbandCensus.com and others, can play in collecting and aggregating public broadband data about speeds, prices, and reliability.
For more than a year, BroadbandCensus.com has provided a platform allowing Internet users to compare their actual broadband speeds against what they are promised by their carriers. We use the open-source Network Diagnostic Tool (NDT) of Internet2. All speed test data is publicly displayed under a Creative Commons license. This approach to public monitoring Internet traffic has recently been followed by Google and the New America Foundation and their "Measurement Lab" initiative, which also uses NDT.
Ultimately, broadband carriers that offer good speeds and good service will see the value in an objective and transparent broadband census. Fortunately, consumers don't need to wait on the carriers to begin collecting and publishing broadband of their own.
Neither should the government. No matter how much Congress decides to allocate to stimulate broadband, it should insist that information about speeds, prices, technologies, and specific locations of high-speed Internet availability are publicly available to all.
more.......
Guiding principles for U.S. broadband infrastructure economic stimulus
As Congressional leaders and the incoming administration of U.S. President-elect Barack Obama mull economic stimulus legislation including a portion of which is expected to be devoted to telecommunications infrastructure to boost broadband Internet access, I offer these guiding principles:
1. The focus should be on the so-called "last mile" or local access network portion of the system. There's a broad consensus that the lack of adequate broadband access in the United States is due to technological shortcomings on this segment of the telecommunications infrastructure, its weakest link. The overall goal should be full build out of this currently incomplete but vital infrastructure to serve all residents and businesses.

Sunday, February 8, 2009

when it comes to advanced vehicle batteries :innovation and a little stimulus money could head off another OPEC scenario

An array of 88 lithium ion batteries sits in the rear of this Johnson Controls i3 plug-in hybrid.
There's a saying as the nation pushes for cleaner electric cars: The United States will end up trading dependence on Saudi oil for dependence on Asian batteries.
Most of the big players in advanced batteries - the ones used to power the cars of tomorrow - are from Japan, South Korea or China.
America's battery industry is in need of a shock. Enter Stimulus.
As part of the nearly $900 billion economic lifeline, lawmakers plan on spending $2 billion in loan guarantees and grants for makers of advanced batteries. They don't necessarily have to be U.S. companies that get the money, but they need to set up shop on American soil.
Industry observers have high hopes for the plan, but worry that the money won't be doled out fast enough or that it will be eaten up by a few big players.
Stimulus money: Not chump change
The money involved may seem small by stimulus standards, but for the nascent high-tech battery business it's serious cash.
Two billion is more money than what's flowed into the sector from venture capital and private equity firms over the last four years combined, said Heather Daniel, a power storage analyst at the research firm New Energy Finance.
"It could be a significant boost," said Daniel. "If there's a little guy that's got the technology, it could have big implications."
Most advanced batteries for plug-in hybrid electric vehicles, like the Chevy Volt set for debut in 2010, rely on lithium ion batteries.
Lithium batteries - where the ultra light metal lithium is used as the conducting material - are more efficient and lighter than the nickel-metal hydrate batteries currently used in the hybrid cars of today.
Having a light and efficient battery is essential if cars are to move from current hybrids - which use battery power only for low speed driving - to plug-in hybrids where battery power is the only thing turning the wheels.
Getting the right battery is key to making plug-in hybrids commercial - current batteries are still a bit too heavy and a bit too expensive. (There may also be an issue with getting enough lithium - much of it appears to be concentrated in a few South American counties, but that's another story.)
King of battery hill
The company or companies that nail the technology are potentially set for big profits and big hiring sprees. And currently, while many foreign firms have manufacturing operations in the United States, most of those companies are not headquartered here.
Japan's Panasonic, NEC, and GS Yuasa; South Korea's LG; and China's BYD are the main players in this market, and account for nearly all current lithium ion sales.
"The United States is alarmingly vacant from this list," said Rob Wilder, manager of the WilderHill clean energy index, an investment fund. "It's painful as a patriotic American to see just how far behind we are."
That said, U.S. firms are not out of the game.
Companies like Johnson Controls (JCI, Fortune 500), Ener1 (HEV), Maxwell (MXWL), Valence (VLNC), and privately held A123 Systems are noted for innovative, advanced-vehicle battery technology, if not a huge amount of current sales.
General Motors is working with A123 Systems on the Volt, although it seems LG will make most of the initial batteries.
There's also an array of smaller American startups that are scraping by while they search for venture capital funding.
Wilder said that for the stimulus money to be effective, it should be available to these smaller companies that might have good designs but lack lobbying power.
"They just don't have the resources to get the money like GM or Ford, who came late to the game anyway," he said.
What are companies' eligibility requirements for this money, what projects will get funded, and over what period of time is what the industry wants to know, said Joseph Muscat, a clean tech director at the accounting and advisory firm Ernst & Young.
A spokesperson for the House subcommittee that wrote the battery portion of the bill said those specifics would be hammered out by the Department of Energy if and when the bill gets approved.
"Clearly, it's a help," said Muscat. "There are a lot of companies here, and it will be interesting to see how the technology plays out."


Economic rescue plan would increase payments and extend benefits for the unemployed. It would also provide access to subsidized health insurance.

The federal stimulus package is designed to create millions of jobs, but it also provides many benefits to those who just can't find work.
The measure, which congressional leaders hope to finish next week, currently proposes:
increasing and extending unemployment insurance;
expanding coverage to more low-income and part-time workers;
subsidizing health insurance coverage;
and recharging state unemployment insurance trust funds, which are running dry as layoffs climb.
A growing number of people are depending on unemployment benefits, with continuing jobless claims hitting a record 4.79 million in late-January. The figures are sure to grow with companies shedding more than 250,000 jobs so far this year.
The federal government releases January's national unemployment rate on Friday. Currently at 7.2%, it is expected to rise to 7.5%.
Bigger checks: The unemployed would see their checks rise by $25 a week, paid for with federal funds. The current average weekly benefit is $297.
The increase would have a big impact on those at the lower end of the pay scale who are likely to spend it all, said Wayne Vroman, economist with the Urban Institute.
Mike Grigsby of Portland, Ore., would certainly welcome another $25 a week. The political organizer is scraping by on a weekly pre-tax benefit of $304, which barely covers his $545 monthly rent and other expenses.
"I could have fresh fruits and vegetables in the house, instead of canned goods," said Grigsby, 37, who has been unemployed since November. "I could buy a new interview suit at Goodwill."
The Senate version would also forgive income taxes on the first $2,400 of benefits.
Extended benefits: The bill push back the deadline to apply for extended benefits.
The jobless typically get 26 weeks of unemployment insurance, paid for by the states. Last summer, the Bush administration and Congress added an additional 13 weeks of benefits, paid for by the federal government.
In November, federal officials added another seven weeks of benefits in all states. Those who live in states with unemployment rates higher than 6% -- 34 states meet that criteria as of December -- could receive a total of 20 additional weeks.
The federal program is set to expire in March, but under the stimulus package, the jobless could apply for the extended federal benefits through Dec. 31.
With the deepening recession making it harder for people to land new positions, extending benefits is crucial, said Heidi Shierholz, economist at the Economic Policy Institute.
Randall Paynter depends on his $320 weekly unemployment check to support his family. Even though his wife works full-time, they are living on half of what they did before Paynter lost his job as a warehouse supervisor in May.
A Rome, Ga., resident, Paynter is back in school studying computers in hopes of getting a job in automated manufacturing. But he doesn't graduate until 2010 so he hopes the federal government keeps extending the benefits.
"I need as much time as I can get to get retrained," said Paynter, 54, who has an 11-year-old son.
Expanding coverage: The package would enact the Unemployment Insurance Modernization Act, which provides $7 billion in incentives for states to expand the ranks of jobless that qualify for benefits.
States that allow workers to count more recent wages in their applications could share in $2.3 billion. The remaining funds would go to states that adopt additional reforms, including providing benefits to those seeking part-time work and those who quit because of a family member's illness or relocation of a spouse.
States would also divvy up $500 million to cover administrative costs.
This expansion would allow more women, part-timers and low-wage workers - who are often the most vulnerable of the unemployed - to collect benefits, Vroman said.
Subsidized access to health insurance: The bill would allow many workers to continue coverage under their former employer's health insurance, known as Cobra, by subsidizing 65% of the premiums for as long a year. The benefit would apply to those who lose their jobs between September 2008 and the end of 2009.
The typical family premium under Cobra is $1,000, according to House Speaker Nancy Pelosi, D-Calif.
The House bill would also allow workers who are 55 and older, or have been with their employer for at least a decade, to extend their Cobra until they become eligible for Medicare or secure coverage with another company.
Also, those unemployed whose family's gross income is below 200% of the federal poverty guidelines could temporarily receive Medicaid, under the House bill. The benefit, paid for by the federal government, would apply to those who lose their jobs between September 2008 and the end of 2010.
Assistance for states: The package would temporarily waive interest payments and accrual of interest on loans taken by states to pay unemployment benefits. Five states - Indiana, Michigan, New York, Ohio and South Carolina - are currently borrowing from the federal government.
Safety and stimulus
Advocates for the jobless are hailing the provisions in the package, saying they will help those struggling to survive while looking for work, said Christine Owens, executive director of the National Employment Law Project.
On top of that, it will help stimulate the economy, since most people receiving unemployment benefits spend the money quickly, economist said.

Tuesday, January 27, 2009

"Camera Phone Predator Alert Act" to protect citizens from being photographed illegally, without us knowledge


Congress Intros Bill to Force Cell Camera Sounds
The Camera Phone Predator Alert Act (H.R. 414) is the real deal. Fresh off the legislative desk of New York Representative Peter King (R), the bill--currently cosponsored by goose egg--would require an audible tone to accompany all cellular phones with an installed camera that are created in the U.S. This tone, likely a clicking noise of some sort, would sound, "within a reasonable radius of the phone whenever a photograph is taken with the camera in such phone." And don't think that evildoers would be able to conceal their predatory ways by flicking an iPhone-style audio toggle switch. Any mobile phones built after the bill becomes a law would be prohibited from including any way to eliminate or reduce the volume of said noise.
Camera Click Sound to be Legal Requirement
The draft of the legislation also mentions that the click sound should be audible within a sensible" distance.
The US is reportedly readying the "Camera Phone Predator Alert Act" to protect citizens from being photographed illegally, without their knowledge.While the topic has been mulled over for years, it is only now that the country is planning to put forth a legislation to make the camera click sound audible when a picture is clicked. While some cell phone manufacturers already have compliant devices in place, there are others where simply putting the phone into silent mode would let voyeuristic photography go undetected. Even for those phones on which the camera click sound cannot be turned off, users have been able to hack into the phone's firmware and remove the sound.The proposed bill would fall under the domain of the Consumer Product Safety Commission and is expected to be provided the status of a "safety requirement". Additionally, the draft of the legislation also mentions that the click sound should be audible within a "reasonable" distance.Similar laws are already in place on countries like Japan and Korea and most device manufacturers have been able to comply with the same.


Micro Camcorder - 'World's Smallest'
Things are getting ever smaller. If you doubt this, just check out the Micro Camcorder - a spy camera developed by Spy Gadget. The camcorder has claimed the spot for the 'World's Smallest Camcorder'.

The camcorder is so small that it can be hidden in a chewing-gum pack. It's a one touch record function and records videos at 15 fps (frames per second). The captured video is stored on a flash microSD card. It has built-in batteries and charges via USB. The camera can record video for over 30 hours with a 1GB card installed. The price quoted for the taking is USD 295 (Rs.11,800).


Monday, January 26, 2009

The world's best coolest ear buds

Skullcandy veered away from standard-issue black and white headphones - and struck gold.
Skullcandy is using fake alligator skin and rhinestones to shake up the headphone market, giving Philips and Sony a run for their money.

The half pipe tucked in a corner of the office is the first clue that Skullcandy is not your average company.
Other clues: In the teeth of the worst recession in generations, the five-year-old private company is growing like a weed. And it just scored a round of funding, from private-equity shop Goode Partners, at a time when investment dollars are scarce.
If the name Skullcandy doesn't register, it will with your kids (so will the term half pipe, which is a ramp, in this case for skateboarding, shaped like a pipe cut in half lengthwise).
Skullcandy's business is headphones, and they dominate the 12- to 25-year-old demographic with a line-up of gear covered in faux gator skin, gold foil, rhinestones and hip hop-inspired graphics. Pull back the hoody on any kid riding a snowboard in Park City, Utah and chances are pretty good, a pair of Skullcandy headphones, probably the top-selling "Smokin' Buds," will be pumping music into their ears.
Making electronics cool
From a distant No. 10 three years ago, Skullcandy is now North America's third-largest manufacturer of headphones by unit sales, behind consumer electronics giants Philips Electronics (PHG) and Sony (SNE), according to NPD Group. "We'll be No. 2 soon," predicted Skullcandy president Jeremy Andrus, legs dangling from the office half pipe. "My guess is some time next year."
After that, Skullcandy and the band of snowboarders, skaters, surfers and DJs that founder Rick Alden has assembled in Park City, will be gunning for No. 1. That is, if Alden, the CEO and creative madman to Andrus' operations guru, can figure out a way to do it without diluting the company's cool factor.
Skullcandy didn't invent headphones; what the company has done is make them into a fashion item. Kids don't want one pair, they want five. "We're like sunglasses," Alden said. "Except we sit on top of your head, and you wear them a lot more."
Skullcandy headphones are not the type you will hear audiophiles gushing about. They are mostly solid-sounding pieces of affordable gear that, unlike Sony's grey and black headphones, or Apple's white, don't disappear into the background. On the contrary, they make a statement. The snowboard, surf and skate inspired graphics and colors ask for attention, and speak to a lifestyle, or in most cases, a wannabe lifestyle.
Successful clothing brands are able to evoke that lifestyle magic, but it is the rare consumer electronics company that does it. Apple (AAPL, Fortune 500) with its iPod is the obvious and most successful current example. Skullcandy has pulled it off so far, and in doing so sent revenue from essentially zero to approaching $100 million in just a few years. Sales more than doubled in 2008.
To put in perspective Skullcandy's momentum, when many consumer electronics companies saw sales fall off a cliff in November, Skullcandy's quadrupled year over year, according to Andrus.
That success is obviously gratifying to Alden, but it also has him worried about overexposure. "I was at the mountain riding with my son the other day, and everyone I saw was wearing Skullcandy headphone, I mean they were everywhere," Alden said. "I may go back to wearing black Sony's just to be different."
He's kidding, but his concern is real. Alden and his design team need to keep Skullcandy fresh, so it doesn't fall out of fashion and black becomes the new black. Fortunately the Skullcandy team has a secret weapon when they seek inspiration, design-wise and business-wise.
"We head to the mountain," Alden said, checking for the latest snowfall report on his laptop. "No good ideas ever come from sitting in an office, not around here at least."

more...

The Potential of Earbuds
There is great disagreement about:
Whether earbuds could potentially sound good, given their small size.
Whether any actual earbuds sound good, or whether the whole idea needs further development.
Which earbuds sound good and which sound bad.
Which of the expensive ($40-$80) earbuds sound so good that the extra cost is justified.

After testing many headphones and earbuds and applying my extensive experience tweaking equalizers, I think that earbuds actually have the potential to sound even *better* than standard headphones. In any case, all headphones and earbuds need a new approach: a calibrated equalization curve built into the player, to yield flat response. Megabass is a step toward such a compensation curve.
Like the Etymotics, earbuds have the potential to have smoother response than even the best popular standard headphones, such as the Sennheiser 580's. I've dialed in some truly vibrant, open sound using equalization together with $10 earbuds. It is easy and straightforward to equalize earbuds; just do anti-rolloff to a greater or lesser degree, and leave the rest flat; there aren't mysterious jags hidden along the entire spectrum that need unique shapes of compensation. I'd rather trust my ears than the common assumption that earbuds are inferior. If the conditions are right and the appropriate, ordinary EQ compensations are made, earbuds can be superior, rather than inferior, to good standard headphones. It's simply a matter of starting with a decent earbud driver, and providing the inverse of the earbud driver's frequency response.
If someone shows me a measured response curve of an earbud and it's rough and jagged, I will change my view somewhat, but in any case, I think that eq-compensated earbuds at least *can sound* unusually smooth and natural. Players need more fancy curves to compensate for specific earbud models.
"Though I like the R3 stock earbuds even better than the 888's, I can't stop seeking for even better sound, as I believe it can be a lot better. If I press against an earbud I get very powerful bass, so it is possible. I will keep on looking, and if I find something interesting I will let you know. Please let me know your findings on this matter." (from a private email to me)
Some people haven't been lucky and haven't heard the one or two models that are really good. No wonder they think earbuds are a poor packaging and sound poor. I was starting to suspect that *some* Sony stock earbuds (included with the player) sound great, and some sound lousy.

Internet Explorer 8 Focuses on better Security and Privacy

Some of the features of liberate Candidate 1, now existing to the public, are similar to functionality that’s already included in Firefox 3.
Microsoft's updated browser, Internet Explorer 8, promises an assortment of new features designed to help make Web browsing with IE safer, easier, and more compatible with Internet standards. We looked at the first release candidate of the new browser released to the public today, Release Candidate 1 (RC1). On the surface, IE 8 seems to be a lot like IE 7, but Microsoft has made a number of changes under the hood. You may have seen some of these new features already, however, in IE's no-longer-upstart competitor, Mozilla Firefox 3.
Tabbed Browsing

If you accidentally close a browser window in IE 8, you can opt to restore it when you reopen the program (just as you can in Firefox). IE 8 will use color coding to group related tabs together. If you open a link from pcworld.com in a new tab, for example, it will open adjacent to the original tab, and the tabs themselves will have a matching color. You can move tabs from one group to another, but if you have three unrelated pages open, you cannot create a group out of them.
Perhaps the most novel addition in IE 8 is what Microsoft calls tab isolation. The feature is designed to prevent a buggy Web site from causing the entire Web browsing program to crash. Instead, only the tab displaying the problematic page will close, so you can continue browsing.
Of course, IE 8 RC1 retains some of the features introduced in the first beta, including WebSlices and accelerators; see "Updated Web Browsers: Which One Works Best?" for more details.
Searching

IE 8 can use multiple search engines besides Windows Live Search, and you can add other search engines to the mix. Also, IE 8 will give you search suggestions as you type. For example, I can type in 'PC World' into the search field, and IE 8 RC1 will give me Live Search suggestions such as 'pc world magazine' or 'pc world reviews'. In addition, IE 8 lets you switch between search engines on the fly by clicking an icon at the bottom of the search field's drop-down menu. IE 8 can search Yahoo and Ask.com, and you can install add-ins that give IE 8 the capability to search Wikipedia, Amazon, and the New York Times, among other sites.
Improved Security
Microsoft touts IE 8 as its most secure browser to date, and Microsoft has indeed added a good number of security features to the mix, ranging from phishing detection to private browsing, plus a new feature to prevent clickjacking, an emerging data theft threat.
IE 8 RC1 includes two security features under the 'InPrivate' label: InPrivate Browsing and InPrivate Filtering. Both existed in earlier prerelease versions of IE 8, but IE 8 RC1 lets you use the two features separately, whereas before each relied on the other.
If you enable IE 8's InPrivate Browsing feature, the browser will not save any sensitive data--passwords, log-in info, history, and the like. Afterward it will be as if your browsing session had never happened. This feature is very similar to Private Browsing in Apple's Safari browser, except that an icon in IE's address bar makes InPrivate Browsing's active status more obvious.
InPrivate Filtering--called InPrivate Blocking in earlier IE 8 builds--prevents sites from being able to collect information about other Web sites you visit. This feature existed in IE 8 Beta 2, but you could use it only while using InPrivate Browsing. In RC1, you can use InPrivate Browsing at any time.
The browser's phishing filter--called SmartScreen--improves on its predecessor's filter with such features as more-thorough scrutiny of a Web page's address (to protect you from sites named something like paypal.iamascammer.com) and a full-window warning when you stumble upon a suspected phishing site. SmartScreen relies largely on a database of known phishing sites, so new, unknown phishing sites may slip through the cracks.
IE 8 displays sites' domains in a darker text color, so you can more readily see whether you're visiting a genuine ebay.com page, say, or a page simulating an eBay page on some site you've never heard of. Microsoft could still put a little more emphasis on the domain name (using a different color background, for example), but the highlighting is a welcome addition.
Finally, IE 8 RC1 includes a feature designed to prevent clickjacking, a method in which Web developers insert a snippet of HTML code into their Web page code to steal information from Web page visitors. When you use IE 8 to view such a page, IE 8 can identify an attempted clickjacking and will warn you of the attempt.
Web Compatibility
Creating a site that looks identical in Internet Explorer, Firefox, and Safari can be a challenge. IE 8 Beta 2 offers better support for W3 Web standards--a set of guidelines developed to ensure that a Web page appears the same in all browsers. The downside is that IE 8 will break some pages designed for earlier Internet Explorer versions.
To counteract this problem, Microsoft has added a compatibility mode: Click a button in the toolbar, and IE 8 will display a page in the same way that IE 7 does. In my testing, I found that most pages worked fine with the standard (new) mode, and that most errors were minor cosmetic ones. Unfortunately, the Compatibility Mode toggle button may not be obvious to most users, because it's pretty small; a text label would have helped.
Though it probably won't convince many Firefox users to jump ship, Internet Explorer 8 Release Candidate 1 shows promise, and may be worth considering for people who have not yet solidified their browser loyalties. (Keep an eye out for our report on the final release of IE 8.)
See more like this: internet explorer, browser security, online privacy.
more....
Microsoft on Monday released a near-final "release candidate" version of Internet Explorer 8, the next version of its Web browser.
The software maker plans to say more on its Web site around noon, but, as noted by enthusiast site Neowin, the code is already available from Microsoft's download center.


With IE 8, Microsoft is hoping to regain some lost ground by adding features such as private browsing, improved security, and a new type of add-ons, called accelerators.
On the security front, Microsoft is adding a cross-site scripting filter, as well as protections against a type of attack known as clickjacking.
In an interview, IE General Manager Dean Hachamovitch said there will be little change between the release candidate and the final version, though he declined to say when the final version will be released.
"The ecosystem should expect the final candidate to behave like the release candidate," Hachamovitch said.
Internet Explorer 8 will work with Windows XP (Service Pack 2 or later) and Windows Vista. A version of IE 8 is also being built into Windows 7.
However, the IE code in Windows 7 is a pre-release candidate version.
"Windows 7 enables unique features and functionality in Internet Explorer 8 including Windows Touch and Jump Lists which require additional product tests to ensure we are providing the best Windows experience for our customers," the software maker said in a statement. "Microsoft will continue to update the version of Internet Explorer 8 running on Windows 7 as the development cycles of Windows 7 progress.






The future 3D holographic television to become realism


Picture this: you're sat down for the Football World Cup final, or a long-awaited sequel to the "Sex and the City" movie and you're watching all the action unfold in 3-D on your coffee table.
It sounds a lot like a wacky dream, but don't be surprised if within our lifetime you find yourself discarding your plasma and LCD sets in exchange for a holographic 3-D television that can put Cristiano Ronaldo in your living room or bring you face-to-face with life-sized versions of your gaming heroes.
The reason for renewed optimism in three-dimensional technology is a breakthrough in rewritable and erasable holographic systems made earlier this year by researchers at the University of Arizona.
Dr Nasser Peyghambarian, chair of photonics and lasers at the university's Optical Sciences department, told CNN that scientists have broken a barrier by making the first updatable three-dimensional displays with memory.
"This is a prerequisite for any type of moving holographic technology. The way it works presently is not suitable for 3-D images," he said.
The researchers produced displays that can be erased and rewritten in a matter of minutes.

To create television sets the images would need to be changing multiple times each second -- but Peyghambarian is very optimistic this can happen.
He said the University of Arizona team, which is now ten-strong, has been working on advancing hologram technology since 1990 -- so this is a major step forward. He believes that much of the difficulty in creating a holographic set has now been overcome.
"It took us a while to make that first breakthrough, but as soon as you have the first element of it working the rest often comes more rapidly," he said. "What we are doing now is trying to make the model better. What we showed is just one color, what we are doing now is trying to use three colors. The original display was four inches by four inches and now we're going for something at least as big as a computer screen."
There are no more great barriers to overcome now, he said.
The breakthrough has made some long-time researchers of the technology believe that it could now come to fruition.
Tung H. Jeong, a retired physics professor at Lake Forest College outside Chicago who had studied holography since the 1960s told NJ.com; "When we start talking about erasable and rewritable holograms, we are moving toward the possibility of holographic TV ... It has now been shown that physically, it's possible."
And what might these holographic televisions look like?
According to Peyghambarian, they could be constructed as a screen on the wall (like flat panel displays) that shows 3-D images, with all the image writing lasers behind the wall; or it could be like a horizontal panel on a table with holographic writing apparatus underneath.
So, if this project is realized, you really could have a football match on your coffee table, or horror-movie villains jumping out of your wall.
Peyghambarian is also optimistic that the technology could reach the market within five to ten years. He said progress towards a final product should be made much more quickly now that a rewriting method had been found.
However, it is fair to say not everyone is as positive about this prospect as Peyghambarian.
Justin Lawrence, a lecturer in Electronic Engineering at Bangor University in Wales, told CNN that small steps are being made on technology like 3-D holograms, but, he can't see it being ready for the market in the next ten years.
"It's one thing to demonstrate something in a lab but it's another thing to be able to produce it cheaply and efficiently enough to distribute it to the mass market," Lawrence said.
Yet, there are reasons to be optimistic that more resources will be channeled into developing this technology more quickly.
The Japanese Government is pushing huge financial and technical weight into the development of three-dimensional, virtual-reality television, and the country's Communications Ministry is aiming at having such technology available by 2020.
Peyghambarian said there are no major sponsors of the technology at present, but as the breakthroughs continued, he hopes that will change.
Even if no major electronics company commit themselves, there is hope that backers could come from outside of the consumer electronics industry, he said.
"It could have some other applications. In training it's useful to show people three-dimensional displays. Also it would be good to show things in 3-D for defense command and control and for surgery," he said.

Sunday, January 25, 2009

Wireless power technologies are moving closer to becoming feasible options.






PowerMat Wireless Charging Plate

A vision of our wireless future, courtesy of PowerMat. The company teamed up with Michigan-based HoMedics to introduce more than a dozen products at this year's Consumer Electronics Show.

This year probably won't be the tipping point for wireless electricity. But judging from all the new techniques and applications of this awe-inspiring technology, getting power through the airwaves could soon be viable.
Fulton Innovations showcased blenders that whir wirelessly and laptops that power up without a battery at the Consumer Electronics Show (CES) earlier this month. The devices are all powered by electromagnetic coils built into the charging surface, and there's not a plug in sight.

Fulton's wireless electricity technology is called eCoupled, and the company hopes it can be used across a wide rage of consumer devices. Fulton was one of half a dozen companies that wowed consumers at CES.
10 Wireless Electricity Technologies
ECoupled uses a wireless powering technique called "close proximity coupling," which uses circuit boards and coils to communicate and transmit energy using magnetic fields. The technology is efficient but only works at close ranges. Typically, the coils must be bigger than the distance the energy needs to travel. What it lacks in distance, it makes up in intelligence.
In conjunction with the Wireless Power Consortium, Fulton, a subsidiary of Amway, has developed a standard that can send digital messages back and forth using the same magnetic field used to power devices. These messages are used to distinguish devices that can and can't be charged wirelessly, and to relay informtion like power requirements or how much battery is left in a device.
Using this technique, an industrial van parked outside the Fulton booth at CES charged a set of power tools from within its carrying case. The van was tricked out by Leggett & Platt people )--a diversified manufacturing company based in Carthage, Mo., and an eCoupled licensee--and is designed to solve its customers' biggest headache: arriving at the job site with a dead set of tools. Fulton, which teamed up with Bosch to design the setup, already has test vehicles rolling around in the field and plans to sell them to utility and other industrial companies by the end of the year.

more about news....

Bosch Wireless Powertool Set The eCoupled setup uses a technique called close proximity coupling, so the devices can remain in their case while charging. Generally, the efficiency of the wireless-electricity transfer decreases with distance.

In another area of the vast CES show, cellphones, videogame controllers and a laptop charged wirelessly on a silver and black mat created by Boulder, Colo.-based WildCharge.
The mat uses a conductive powering technique, which is more efficient than inductive powering but requires direct contact between the devices and the charging pad. Though most of the mats or pads on display are intended to power only a handful of devices at a time, WildCharge says the product design is certified for up to 150 watts--enough to power 30 laptops.
Across the room from WildCharge, PowerCast displayed Christmas ornaments and floor tiles glowing with LEDs powered by ambient radio waves. The devices harvest electromagnetic energy in ambient radio waves from a nearby low-power antenna. Because of the dangerous nature of electromagnetic waves in high doses, Pittsburgh-based PowerCast is targeting its application for mall devices like ZigBee wireless chips, which require little power.
Perhaps the most promising wireless power technology was the latest iteration of WiTricity, the Watertown, Mass.-based brainchild of MIT physicist Marin Soljacic, on display in a private suite high in the Venetian hotel tower.
The technology uses a technique developed by Soljacic called "highly coupled magnetic resonance." As proof that it works, an LCD TV is powered by a coil hidden behind an oil painting located a few feet away. Across the hotel room, WiTricity Chief Executive Eric Giler walks in the direction of another coil holding an iPod Touch in the palm of his hand. Power hungry, it starts to charge when it gets within two meters.
Soljacic has already earned a $500,000 genius grant from the John D. and Catherine T. MacArthur Foundation for his work, but Giler said the technology is at least a year away. In the meantime, WiTricity has obtained an exclusive license from MIT to bring Soljacic's idea to market and hopes to have an estimated 200 patents.
But because Soljacic published his academic paper in Nature magazine, companies like Intel (nasdaq: INTC - news - people ) have been able to replicate the effect in their labs based on his principles.
Elsewhere at CES, PowerBeam showcased wireless lamps and picture frames. Located in Sunnyvale, Calif., the company uses yet another wireless-powering approach. Its technology beams optical energy into photovoltaic cells using laser diodes. Although the company says it can maintain a constant energy flow across long distances, the difficultly of targeting a laser means that it's not ideal for charging moving devices.
So, while 2009 may not be the year wireless electricity takes off, the nascent sector is certainly on its way.




Downadup worm replicates itself at astonishing speed!

Call it Conficker, Downadup or Kido - the fact is the nasty worm is spreading at a very rapid speed! There is no checking the pace at which it is infecting PCs; and with already more than 9 million victims, including corporate networks worldwide, the worm is still going strong!
The Downadup worm made its first appearance two months back, exploiting a critical Windows flaw in the way the Server Service handles RPC requests. A blended threat, the malware relies upon many attack vectors - from brute-force password guessing to hitching rides on USB sticks - for replicating itself to spread throughout a network.
The unique rate of speed at which the worm replicates has perplexed experts. Security researcher, Derek Brown, of TippingPoint's DVLabs Team, said: "The notion of using multiple attack vectors is not terribly new. The unique thing about this worm is the speed at which it has spread and I think that's a result of the big size of the Microsoft vulnerability."
Experts also opine that though the Downadup malware got started because of the Microsoft flaw, it later proliferated quickly through the unpatched Windows operating systems of the users.
Though the malicious worm knows no land barriers, the hardest hit countries, as per Symantec Security Response, are China and Argentina. According to the Symantec vice president, Alfred Huger, China accounts for almost 29 percent of the infections tracked, Argentina was next in line with over 11 percent infections.
more.....

Computer worm called 'authentic risk

If you’ve never heard the words “Conficker” or “Downadup,” wait a few hours.

They’re rapidly becoming household words for personal computer owners.
Various major newspapers and television news shows reported Friday morning that the latest computer worm might now infect as many as 10 million computers worldwide.
According to a report in the Detroit Free Press, the worm is so virulent because it seems to “mutate” and launch “brute force attacks” that relentlessly try thousands of letter and number combinations in codes to steal personal passwords and login information.
Because most computer users choose passwords that they can remember easily, the words might also be something the worm can guess easily. Once in control of a computer the worm can launch spam, phishing attacks, shut down the Internet with massive traffic or access bank records.
According to F-Secure, an antivirus software company, the Conficker worm is spreading at a rate of 1 million new machines a day. It can be spread by USB stick also.
F-Secure has updated its Downadup removal tool, and the United States Computer Emergency Readiness Team has issued Alert TA09-020A, which describes how to disable AutoRun on Microsoft Windows systems in order to help prevent the spread of Conficker/Downadup via USB drives.
According to Symantec, the top infected countries in order of infection are: China, 28.7 percent; Argentina, 11.3 percent; Taiwan, 6.7 percent; Brazil, 6.2 percent; India, 5.8 percent; Chile, 5.2 percent; Russia, 5 percent; Malaysia, 2.8 percent; Columbia, 2.1 percent; and Mexico, 1.9 percent.
Philip Templeton of PT Technologies in Athens said everyone should keep his or her virus protection and software updates current.
“I have seen in the last four to six months more people getting viruses,” said Templeton. “But no matter what antivirus software you buy, nothing is 100 percent. Make sure your Windows Firewall is on, and it doesn’t hurt to change passwords periodically. I usually advise to make this a quarterly chore.”

Saturday, January 24, 2009

Windows 7 beta to be offered through Feb. 10



Hints at weaker-than-expected demand since Jan. 10 launch

Microsoft announced Friday night that computer enthusiasts will have a while longer to get their hands on the beta version of Windows 7.

In a blog posting, Microsoft said that the test version of the operating system will be available for download through February 10. Previously, Microsoft had said that the OS would only be open through late this month.

We are at a point where we have more than enough beta testers and feedback coming in to meet our engineering needs, so we are beginning to plan the end of general availability for Windows 7 Beta," Microsoft's Brandon LeBlanc said in the blog posting. "Because enthusiasm continues to be so high for the Windows 7 Beta and we don't want anyone to miss out, we will keep the Beta downloads open through February 10th."
Those who start the download process before February 10 will have until February 12 to finish the task.
The deadline applies to the general public, while members of Microsoft's TechNet and MSDN developer programs will continue to have access to the code, LeBlanc said.
CEO Steve Ballmer announced the beta of Windows 7 during his speech at the Consumer Electronics Show in Las Vegas on January 7. After a slight hiccup, Microsoft made the code available on January 10.

Keep Your laptop data safe,now fix it.

Follow InfoWorld's encryption-based data-protection plan, which can safeguard your most at-risk PCs .
The largest single type of security breach is the stolen or lost laptop, according to the Open Security Foundation, yet these computers are among the least protected of all IT assets. The costs of a data breach can be huge, including the loss of trade secrets, marketing plans, and other competitive information that could have long-term business damage, plus the immediate costs of having to notify people if their personal information was possibly at risk from the breach. Particularly in a recession, enterprise management can't afford to take these risks lightly.

There is a way for IT to protect those laptops and the confidential information they contain: encryption. Without the combination of password security and encryption, any halfway-competent hacker has no problem siphoning hard drive contents and putting it to nefarious use.
[ Stay up to date on key security issues and solutions in InfoWorld's Security Adviser blog. Keep abreast of the latest mobile developments in the Mobile Pulse blog. ]
Perhaps the most important advantage of full disk encryption, though -- beyond the peace of mind it gives your business's lawyers -- is the "safe harbor" immunity that accrues under many data privacy regulations. For example, credit card disclosure rules don't apply to encrypted data, and even California's strict data-disclosure statute makes an exception for encrypted records -- provided you can prove they're encrypted. That's trivial with full disk encryption but not so easy with partial encryption techniques, which depend on user education for safe operation.
A key challenge for IT in deploying encryption on its laptops is the sheer number of encryption options available. Some Windows Vista editions, as well as the forthcoming Windows 7, support Microsoft's built-in BitLocker encryption, and numerous third-party encryption products cover the range of mobile operating systems from XP through Windows 7, Linux, and Mac OS X. Encryption granularity is widely variable as well, ranging from protecting individual files to encrypting virtual disks to deploying fully armored, hardware-based full disk encryption. Prices range from free to moderately expensive.
If you've put off laptop data security due to perceived technical shortcomings or high costs, you need to take another look at the field -- before you lose another laptop.

The maximum encryption protection possible: TPMIdeally, you'll deploy the full-metal-jacket approach to laptop data protection: full disk encryption using the Trusted Platform Module (TPM) technology. If you can afford the cost, waste no time with inferior methods. All you need is a laptop containing a TPM security coprocessor and, optionally, an encryption-enabled hard drive from one of the major hard drive manufacturers.
The TPM is a chip soldered on to the laptop's motherboard, providing hardware-based device authentication, tamper detection, and encryption key storage. The TPM generates encryption keys, keeping half of the key information to itself, making it impossible to recover data from an encrypted hard drive apart from the computer in which it was originally installed. Even if an attacker gets the user's part of the encryption key or disk password, the TPM-protected drive's contents can't be read when connected to another computer. Further, the TPM generates a unique digital signature from the motherboard in which it's embedded, foiling attempts to move the TPM chip itself to another machine.

TPM-enabled full disk encryption, especially hardware-based implementations of it, provides one other key benefit to enterprises: data erasure upon laptop decommissioning or repurposing. A common bugaboo in the enterprise is the accidental disclosure of data when seemingly worthless outdated laptops are discarded or sold, or transferred to another employee. Erasing sensitive information in such situations is not trivial, and even removing and physically mangling a laptop's hard drive is no guarantee against disclosure. However, because TPM has absolute control over the encryption keys -- remember, half of the key information is stored with the TPM itself -- you can simply tell TPM to forget its keys, and the hard drive is instantly reformatted and effectively rendered nonrecoverable. Disk sectors aren't zeroed, but no computationally feasible method exists today to decrypt the residue.

A great many enterprise-class laptops manufactured in the last two to three years shipped with embedded TPM chips; Apple's Macs are a key exception, as none since 2006 include a TPM chip. But the TPM chips must be explicitly enabled to use them as the authentication mechanism for encryption.
If your laptops have a TPM chip, don't try enabling it without carefully following the vendor's instructions -- otherwise, you could accidentally wipe out the laptop's hard drive. Before enabling the TPM chip in a laptop, you must first take ownership of it, a process that establishes user and management-level passwords and generates the initial set of encryption keys. The management password lets IT administration monitor the inventory of TPM devices, recover lost user passwords, and keep track of usage.
A TPM works with the laptop's resident operating system to encrypt either the entire hard drive or most of it, depending on the OS encryption implementation. (Microsoft's BitLocker, for example, requires a small, unencrypted initial-boot partition). Alternatively, a TPM can interoperate with encryption-enabled hard drives to perform encryption entirely outside of, and transparent to, the operating system.
The TPM technology isn't perfect, but it provides very solid protection in the most common incident, where a laptop is lost or stolen and the user has not left it logged in. If the laptop is powered off, TPM protection is absolute. Most implementations use 256-bit AES encryption, which is considered uncrackable for the foreseeable future. Powering up the device requires entering pre-boot credentials in the form of a password, a PIN, a smartcard, biometric data, a one-time-password token, or any combination of these. If the lost laptop is powered on (but not logged in), or just powered off, an attacker would have to use extraordinary procedures to recover the encryption keys from live memory.
However, if a lost device is powered up and logged in, a TPM provides zero protection. An interloper can simply dump the data off the hard drive in the clear using ordinary file copies. Thus, it's essential that TPM-protected systems have noncircumventable log-in timeouts using administrator-protected settings.

To achieve the ultimate in full disk encryption protection requires hardware-enabled encryption on board the hard drive. Drive-based encryption closes all of TPM's loopholes, since the encryption key is no longer stored in OS-accessible memory. Hardware-based full disk encryption also eliminates the performance penalty incurred by software-based full disk encryption, although with today's fast, processors, that software encryption overhead is not noticeable to most users.

The cost for TPM protection starts at zero for Microsoft's BitLocker, which is built into Vista Enterprise and Ultimate, Windows Server 2008, and the forthcoming Windows 7. Major laptop manufacturers also sell software bundles that enable TPM in any Windows version, including XP, such as Wave's Embassy Trust Suite and McAfee's SafeBoot. The advantage of bundled software is sole-source support and pre-tested configurations.
You can also roll your own software protection using stand-alone packages such as PGP Whole Disk Encryption.
All these products support a wide range of enterprise-class management tools that let you enforce uniform policies and centrally store encryption keys, including special data-recovery keys that solve the problem of lost passwords and prevent employees from locking employers out of their hard drives.

If you can't do TPM, here's your plan B for encryptionAlthough the deployment of TPM-based full description is ideal, you may count the cost of full disk encryption and come up short-funded, especially if you just refreshed your enterprise laptops with non-TPM models. Forklifting your entire laptop population is an undeniably expensive proposition, as is replacing the non-TPM laptops if your company has a mix of TPM and non-TPM laptops. If you can't go all TPM, there's a plan B that can give you much of the encryption benefits you need.
You might think that plan B involves partial disk encryption, typically deployed by designating specific folders on a laptop as encrypted; as files are moved into that folder, they are automatically encrypted. Apple and Microsoft have long offered this form of encryption, via FileVault on the Mac and the Encrypted File System tools in Windows XP and Vista. But this approach has a major flaw: It depends on users to properly store sensitive data only in encrypted form.

A variation of folder-level encryption is virtual disk encryption (VDE), in which a single disk file contains a virtual disk image that the user can mount when needed; this virtual disk collects all sensitive files in one location. Microsoft's BitLocker offers this feature in all Vista editions, as well as in Windows Server 2008 and Windows XP. Third-party products such as PGPDisk and even free open source software programs such as TrueCrypt have VDE capabilities. Many of these third-party utilities are easier to use than BitLocker, so they can save you some implementation expense.
Another form of partial disk encryption is to apply encryption to specific files, typically those residing on corporate servers that users want to open locally. In this approach, users must enter a password every time they open a protected file. IT not only is on the hook to ensure that all sensitive files get encrypted but also has no way to stop users from simply saving the opened file as an unencrypted copy. Still, this protection is better than nothing and is widely available via free disk utilities. But key management can be a problem, and these file-level encryption tools generally don't support multifactor authentication.

But the best plan B to TPM-enabled full disk encryption isn't any of these partial disk methods. The best plan is software-only full disk encryption, in which either the operating system or a third-party program performs the same encryption as with TPM but uses another method to store the encryption keys, such as a thumb drive or a smart card.

The good news is that virtually all-TPM full disk encryption suppliers' offerings, including BitLocker, can operate in this software-only mode, which relies on a removable hardware token so that you can use this approach for your non-TPM devices while having a consistent encryption method to manage across all your laptops.
It's true that software-based full disk encryption is less secure than if you have a TPM-equipped laptop: The entire drive can still be encrypted, but a determined hacker will have more opportunities to gain access through compromised keys. For example, if the key-storage token is left with the notebook computer (how likely is that?), the hacker may be able to simply plug the token in and gain access to the drive contents. Even multifactor authentication in this scenario is subject to attack by inspection, since the key token is not tightly bound to the system motherboard.
Still, when TPM-enabled encryption is not an option, pure software full disk encryption can still give you considerable peace of mind, as well as provide the "safe harbor" benefits afforded encrypted systems in data-privacy regulations. Software full disk encryption solutions have also been around long enough that they're available for most mobile computing platforms, including Linux and Mac OS X.
TPM technology changes to comeAlthough TPM full disk encryption with hardware-based encryption in the hard drive is the best you can do for data protection today, security researchers are constantly testing TPM's mettle and devising improvements to it.
One potential vulnerability of today's separate TPM chip implementation is that keys must be transported across conductors in the motherboard to the CPU for software-based full disk encryption, or to the hard drive for hardware-based full disk encryption. That could provide an entry point for a hacker. That's why a major vendor trend is to move all TPM-oriented data manipulation on to the CPU chip set in the form of customized silicon. Intel has advertised its vPro solution, which is part of the upcoming Danbury processor and Eaglelake chip set. This feature will perform all encryption and decryption for SATA and eSATA drives without involving the CPU, OS device drivers, or even the hard drive itself.

Such an approach could make TPM even more secure. But there's no reason to wait until such chips are standard in laptops. With today's TPM-equipped laptops, and with the software-based fallback option for non-TPM laptops, you have a platform for a consistent, manageable, secure deployment strategy.




Friday, January 23, 2009

New York City & Google starting a new trend in city-oriented tourist Web sites

Google and New York City Mayor Michael Bloomberg have launched a new initiative today, designed at helping tourists and residents to get around New York without feeling like they’ve missed any of the city’s exciting places and events.
In what could be a model for other cities, New York has partnered with Google to launch a Web site for tourists and a high-tech visitor's center. Interactive tables and a Video Wall let visitors explore New York, get local opinions, and save information. An forecaster called New


York's high-tech center an development of "out-of-home" marketing.


New York City may be starting a new trend in city-oriented tourist Web sites. In partnership with Google, it has launched the NYCgo.com site, a portal to promote tourism, and opened a high-tech information center for visitors. The Web site uses Google Maps and other information to make it easy for a visitor or a local resident to quickly find things to do, places to go, restaurants and other points of interest. The site also provides discounts and promotions.
Just Ask the Locals
The information center at 810 Seventh Avenue offers touch-sensitive horizontal screen tables that also use Google Maps. In a statement on The Official Google Blog, New York City Mayor Michael Bloomberg wrote that the new Web site and information center will "help make it easier for both visitors and residents to explore the energy , excitement and diversity of New York City's five boroughs."
Visitors can move around a table's map of the city's five boroughs. If the user has selected a category such as Museums & Galleries or Dining, the map will flag those places as a token is moved around. Each flagged item can then be opened to reveal photos and more information.
Since there are probably 10 million opinions about the city, no visitor's center would be complete without at least a few virtual New Yorkers. A visitor can browse a Just Ask The Locals section, where famous New Yorkers give recommendations.
'Custom Itinerary Flyover'
Visitors can save sites, recommendations and more to a physical disk and take it to a Video Wall where a "custom itinerary flyover" soars virtually over a detailed, three-dimensional map of the city. The wall also offers yet more advice from celebrities and local experts, and the visitor can send the itinerary to his or her cell phone, e-mail, or print it.
Andrew Frank, an analyst with Gartner, said such a high-tech center for visitors could be a marketing tool for other cities.
If done with an eye toward ease of use, as New York's appears to be, Frank indicated that such centers could appeal to the wide range of technological sophistication among visitors and locals in any city. He also said New York's center is another indication of "the evolution of out-of-home" marketing experiences, which increasingly are accompanied by ways to measure how people use them.
But, Frank noted, an issue with these centers -- and even Web sites -- is keeping them up to date, not only with data , but with the latest technology and fastidious, shining surfaces.
MORE..


Google powers new NYC information hub


Google Maps and Google Earth are the centerpiece of NYCGo, a new information and reference project launched by the New York City government to provide resources to both visitors and locals. Wednesday's launch announced the debut of NYCGo.com, a Google Maps-fueled local search and reference site, as well as the unveiling of the renovated New York City Information Center a few blocks north of the tourist-heavy Times Square district.
NYCGo.com contains not just Google map and search data, but also travel deals from Travelocity and local content from what-to-do powerhouse Time Out New York, nightlife culture magazine Paper, the New York Observer, and eco-living guide Greenopia.
The information center, located on Seventh Avenue between 52nd and 53rd streets, is equally Googly. The city's technocratic mayor, Michael Bloomberg, even contributed a guest post to the official Google blog to announce it: "The Information Center features interactive map tables, powered by the Google Maps API for Flash, that let you navigate venues and attractions as well as create personalized itineraries, which can be printed, emailed or sent to mobile devices," the blog post explained. "Additionally, there's a gigantic video wall that utilizes Google Earth to display a 3D model of New York City on which you can map out personalized itineraries."
Bloomberg has been aggressive about promoting tech initiatives during his time in office, from a wind power plan (part of the much bigger "GreeNYC" project) and a city-run venture firm. Under his watch, the Mountain View, Calif.-based Google opened its New York satellite office, taking over several floors of the historic former Port Authority building downtown.

Wednesday, December 17, 2008

BLADE Network Technologies' -2009 Most Valuable Performers Award

BLADE Network Technologies' President and CEO, Vikram Mehta, With Technology Industry's 2009 Most Valuable Performers Award.

BLADE Network Technologies, Inc. (BLADE), the trusted leader in data center networking, announced today that Network Product Guide, a world leading publication on technologies and solutions, has honored BLADE President and CEO Vikram Mehta with the information technology industry's 2008 Most Valuable Performers (MVP) recognition. This prestigious industry award recognizes senior executives from around the world with the essential characteristics of leaders that exhibit the qualities of most valuable performers.
Vikram Mehta has been at the helm of BLADE since its inception. Through his passionate commitment to customer service and product innovation, BLADE has become the trusted leader in data center networking, the industry's leading supplier of blade server switch solutions and a pioneering provider of the new breed of 10 Gigabit Ethernet data center switches. Prior to establishing BLADE as a privately held company in 2006, Mehta held leadership and executive positions at Nortel Networks, Alteon Web Systems, Ensim and HP. Mehta is an electrical engineer from the Birla Institute of Technology, Ranchi, India.
Network Products Guide also has named BLADE as a 2009 Hot Companies finalist. Selected from a global industry analysis of information technology vendors that included established large companies, mid-size and new start-ups, BLADE has advanced to the finalists stage based on the "4Ps" selection criteria -- namely Products, People, Performance, and Potential. The coveted 2009 Hot Companies award criterion encompasses companies in all areas of information technologies including security, wireless, storage, networking, software and communications.
Over half of Fortune 500 companies rely on BLADE's Ethernet switches to equip their essential data center infrastructures. BLADE has shipped 5 million Ethernet switch ports to more than 5,000 customers worldwide. Through its partnerships with HP, IBM, NEC and Verari Systems, BLADE has delivered more than 220,000 Gigabit and 10 Gigabit Ethernet switches to enterprise data centers to connect over 1.1 million servers. BLADE's market share of data center switches for blade servers now stands in excess of 48.5 percent combined on HP and IBM blade servers and 66 percent on NEC blade servers. To date, BLADE's market share and Ethernet port shipments on both IBM and HP platforms are more than 2x greater than the nearest competitor's.
"The new economy leaders are essentially those that are adapting best in the current economic environment and will emerge with higher standards," said Rake Narang, editor-in-chief, Network Products Guide. "We are proud to honor Vikram Mehta with this year's 2008 Most Valuable Performers award and recognize BLADE as a 2009 Hot Companies Finalist."
Network Products Guide 2008 MVP leaders have a clear vision and mission, have set measurable goals and objectives for themselves, are selfless and mentors to others, and most importantly demonstrate respect and trust for their staff, employees and the high-technology industry. Senior executives were honored from companies around the world which include Ingres Corporation, Cisco Systems, Inc., IBM, AppGate Network Security, Crossroads Systems, Lumeta Corporation, SECNAP Network Security Corp., Dyadem International Ltd., Permabit Technology Corporation, M-CAT Enterprises, Google, Inc., BLADE Network Technologies, CaseCentral, ONStor, SolarWinds, BlueCat Networks, Inc., Rohati Systems, Inc., VirtualPBX, IBRIX, LogMeIn, Inc., GTB Technologies, Inc., Kazeon, Riverbed Technologies, Protegrity, Everyone.net and Xiotech Corporation.
The 2009 Hot Companies winners will be announced and honored at the 2009 "World Executive Alliance Summit" in San Francisco on March 26-27, 2009. BLADE will be among other key industry players at this event. CEOs of finalists will be presenting their company's 4Ps criteria live to an audience of leading entrepreneurs, IT companies, venture capitalists, corporate strategists and media. To see the complete list of finalists please visit http://www.networkproductsguide.com/hotcompanies/
About Network Products Guide Awards
Network Products Guide, published from the heart of Silicon Valley, is a leading provider of products, technologies and vendor related research and analysis. You will discover a wealth of information and tools in this guide including the best products and services, roadmaps, industry directions, technology advancements and independent product evaluations that facilitate in making the most pertinent technology decisions impacting business and personal goals. The guide follows conscientious research methodologies developed and enhanced by industry experts. To learn more, visit www.networkproductsguide.com
About BLADE Network Technologies
BLADE Network Technologies is the leading supplier of Gigabit and 10G Ethernet network infrastructure solutions that reside in blade servers and "scale-out" server and storage racks. BLADE's new "virtual, cooler and easier" RackSwitch family demonstrates the promise of "Rackonomics" -- a revolutionary approach for scaling out data center networks to drive down total cost of ownership. The company's customers include half of the Fortune 500 across 26 industry segments, and an installed base of over 220,000 network switches representing more than 1,100,000 servers and over 5 million switch ports. For more information, visit www.bladenetwork.net.
BLADE Network Technologies and the BLADE logo are trademarks of BLADE Network Technologies. All other names or marks are property of their respective owners. CONTACTS:
Tim Shaughnessy
BLADE Network Technologies
(408) 850-8963
Email Contact
Zee Zaballos
ZNA Communications
(831) 425-1581 x201
Email Contact

Wednesday, October 10, 2007

Smartphone performance : Monzilla


Iphone is turning to the mobile computer, to provide the customer satisfaction
The iPhone isn't a true mobile computer yet, but it's on the right track, according to a Mozilla executive.

"Getting a no-compromise web experience on devices requires significant memory (>=64MB) as well as significant CPU horsepower. High end devices today are just approaching these requirements and will be commonplace soon," wrote Mike Schroepfer, vice president of engineering at Mozilla, in a blog post Tuesday, implying that while the iPhone and its current competitors don't quite have what it takes under the hood to be full-fledged mobile computers, we're not all that far away.
It seems to me like there's a bit of a chicken-and-egg thing going on here. Are smartphones slower than people would like because the hardware is too rudimentary, or because truly useful software is too bloated for the limited memory and power requirements of smartphones? I don't think too many people bought an iPhone expecting it would be just as zippy as their PC, but just how much slower is it than a PC?

Schroepfer thinks, based on third-party tests, that the iPhone is about 10 to 100 times slower than a MacBook Pro on scripting benchmarks and about 3 to 5 times slower than a ThinkPad T40 laptop when operating on the same Wi-Fi network. "But rapid improvements in mobile processors will close this gap within a few years," he wrote.


He estimates that the iPhone is using about 128MB of system RAM, and a processor (known to be an ARM-based chip from Samsung) running at between 400MHz and 600MHz. Apple's iPhone application development policy means we're not going to see Firefox on the iPhone anytime soon, but that's information that Mozilla is using to work on future mobile browsers for devices like the iPhone that won't be able to run unmodified PC software for several years.

As Schroepfer notes, the nice thing about the chip industry is that we can be reasonably sure that there will be more performance to work with every couple of years. Both ARM and Intel have set aggressive performance and power consumption goals for chips due out over the next several years.

But Schoepfer seems to be operating under the assumption that it's the hardware that is holding back a true Internet experience on a smartphone. "Up until very recently, device limitations required writing new mobile browsers from the ground up," he wrote. I wonder if that was such a bad thing; I'm sure to save time and effort developers would rather port as much of their PC code as is feasible over to smartphones, but is it better to develop mobile software that's designed specifically for mobile devices or to investigate ways to move the multitude of software that's already out there for PCs to a new category of mobile devices?

Mozilla wants to work both sides of the fence, not wanting to throw away all the work they've done on PC development when mobile processors are bound to get more capable, but recognizing that mobile-computing requirements are different. "There is far from a dominant player in this marketplace and even the best mobile browsers today have compromises in user experience, performance, and compatibility. There is still *plenty* of room for innovation," Schroepfer wrote.

I'm no software developer, and I'd welcome feedback about this from those who are examining this problem. It seems pretty clear to me that true mobile computing is going to require new thinking about software development in addition to faster hardware, the same way multicore processors have shaken up the PC software development industry. And those concepts are even going to merge at some point: by 2010 ARM's partners will have multicore mobile processors on the market.

Does that mean personal-computing software development is headed down two different development paths or that smartphone developers and PC developers are converging at some point down the road? Let me know what you think.

Monday, October 8, 2007

Robots to Help Elderly


Can we think that robot is doing all the odd job of human .Robot is becoming as a right worker of many things.
If you grow old , expect to be served food by a robot, ride a voice-recognition wheelchair or even possibly hire a nurse in a robotic suit — all examples of cutting-edge technology to care for the country's rapidly graying population.

With nearly 22 percent of Japan's population already aged 65 or older, businesses here have been rolling out everything from easy-entry cars to remote-controlled beds, fueling a care-technology market worth some $1.08 billion in 2006, according to industry figures.

• Click here for FOXNews.com's Patents and Innovation Center.

At a home care and rehabilitation convention in Tokyo this week, buyers crowded round a demonstration of Secom Co.'s My Spoon feeding robot, which helps elderly or disabled people eat with a spoon- and fork-fitted swiveling arm.

Operating a joystick with his chin, developer Shigehisa Kobayashi maneuvered the arm toward a block of silken tofu, deftly getting the fork to break off a bite-sized piece. The arm then returned to a preprogrammed position in front of the mouth, allowing Kobayashi to bite and swallow.

"It's all about empowering people to help themselves," Kobayashi said. The Tokyo-based company has already sold 300 of the robots, which come with a price tag of $3,500.

"We want to give the elderly control over their own lives," he said.

The rapidly aging population here has spurred a spate of concerns: a labor shortage, tax shortfalls, financial difficulties in paying the health bills and pensions of large numbers of elderly.

Moreover, a breakdown of family ties in recent years means a growing number of older Japanese are spending their golden years away from the care traditionally provided by children and grandchildren.

That's where cutting-edge technology steps in.

A rubber and nylon "muscle suit" developed by the Tokyo University of Science helps keep the elderly active by providing support for the upper body, arms and shoulders.

Powered by air pressure actuators, the prototype suit — which looks like an oversized life jacket — provides subtle backing to help older people lift heavy objects.

The intelligent wheelchair TAO Aicle from Fujitsu Ltd. and Aisin Seiki Co. uses a positioning system to automatically travel to a preset destination, and uses sensors to detect and stop at red lights, and to avoid obstacles.

Another wheelchair designed by the National Institute of Advanced Industrial Science and Technology responds to oral commands like "forward" and "back," "right" and "left."

Then there are cars designed for easy entry for the wheelchair-bound or those with difficulty walking, like Toyota Motor Corp.'s Welcab series. Its slogan: "A car that's more patient than your daughter."

Tired? Retire to a Lowland futon bed by Kaneshiro Tsuhso Inc. that can be adjusted into a reclining seat.

And there's help for caregivers, too.

A full-body robotic suit developed by the Kanagawa Institute of Technology outside Tokyo is a massive contraption powered by 22 air pumps to help nurses hoist patients on and off their beds.

Sensors attached to the user's skin detects when muscles are trying to lift something heavy — and signals to the air pumps to kick in to provide support.

Though the suit makes its wearer look a little like Robocop, a student who was easily lifted off a table in a demonstration said he felt comfortable during the test.

"It doesn't feel at all like I'm being lifted by a robot," he said. "This feels so comfortable and very human."

Sunday, October 7, 2007

MX Air , actually half mouse and half remote control.


Logitech has created a computer mouse called the MX Air that’s actually half mouse and half remote control.

The MX Air is made to be used “on the desk” or “in the air.” It works like a regular, wireless mouse when you push it on a flat surface.

But, it also works like a combination laser pointer and video remote controller when you wave it in the air and point it towards your TV.

It is made to let you control – from near or far - the latest breed of multimedia Windows PCs. Especially new media computer units which require placement close to those shiny, flat-screens, high-definition televisions.

The MX Air looks like many other modern wireless laser mice. It’s black and steel colored with stealth backlighting that quietly appears when you move the mouse. There are also a lot of extra control buttons that you normally don’t find on a mouse.

On top is a very large, touch-sensitive scrolling bar that runs down the middle. On either side are the left and right “click” buttons. And below the scroll there are buttons for ‘Back’. ‘Select’, ‘Play/Pause’ and ‘Volume so you can take charge of your computer’s digital audio and video media.

The secret weapon inside is called Freespace Motion Control technology. It translates raw sensor data into precise on-screen interactions by using a combination of micro-electromechanical sensors (tiny motors), digital signal processing and radio-frequency technologies. That means it can accurately interpret the mouse’s movements regardless of its orientation.

The MX Air wirelessly connects to your computer via a USB dongle, which looks like a very small memory stick. The wireless radio controller has a range of 30 feet. It’s powered by a rechargeable lithium-ion battery which should be good for up to five days use per charge.

Of course, good looks and promises don’t always translate into a better user experience. In this instance I’ve had mixed results.

When used as a wireless mouse on a flat surface, the MX Air is a great performer – once you adjust it properly. Right out of the box I found the controls to be very twitchy until all the motions were slowed down almost to their minimum settings. The scroll bar seems to move way too quickly whatever settings I choose. It took a few tries to get most everything set to my liking.

Logitech’s MX Air has a suggested retail price of $149.99.

I found the mouse to be somewhat less endearing when used “in the air”. The cursor is larger and easier to see in this mode, but its motions are somewhat more difficult to control. I found that it takes a little time to get used to using the MX Air across the room – but really like the idea of having only one device control everything that a Windows Media Center mouse and remote control needs to do.