Saturday, 6 March 2010

Google buys DocVerse, steps closer to Office collaboration

Google has acquired a company that allows Microsoft Office users to edit their documents collaboratively on the Web. The acquisition of DocVerse will undoubtedly allow users who are married to Word, Excel, and PowerPoint to edit their documents through Google's services, thanks to a "small, nimble team of talented developers who share [Google's] vision."

Both Google and DocVerse made their announcements Friday afternoon, with each noting that transitioning to cloud document storage and collaboration has been somewhat of a challenge for Office users. "Unfortunately, today, individuals are still forced to make a choice between those two worlds," reads the DocVerse blog post. "Google’s acquisition of DocVerse represents a first step to solve these problems."

Google says that current DocVerse users will be able to continue using the service as usual, but that new signups have been closed until the company is "ready to share what's next." This is no doubt a foreshadowing of Google's plan to integrate DocVerse's capabilities into Google Docs, which allows users to collaborate simultaneously on Google-hosted word processing, spreadsheet, and presentation documents.

The move is just another step in Google's strategy to chip away at Microsoft's dominance in the productivity space. Of course, there are other ways for Office users to share documents online—SharePoint is a popular solution among businesses, for example—but the functionality is still quite different from what's offered through Google Docs. The DocVerse acquisition, combined with Google's recently announced file-storage capabilities, will help beef up Google Docs to the point where it will be even harder for small businesses to resist signing up for Google Apps.

Mindflex Hack: Relax, or Get SHOCKED


Mindflex, the brandwave-detecting game, will probably give you a headache no matter what. But Harcos Labs decided to take it further, with a hacked Mindflex that shocks you when you concentrate too hard. The result: science, and hilarious shock videos.

The original Mindflex headset indicates how hard you're concentrating with a series LEDs. But with a little ingenuity and an electroshock kit, the devilish geniuses at Harcos turned it into something of a torture device:
Harcos hooked up the leads of the LEDs to a transistor/resistor relay network so they'd instead activate an electric-shock kit made by QKit. The end result? Concentrate a little, and you'll get zapped a little. Concentrate hard, and you'll get an electrical pulse that will make you think you've wandered onto the set of Green Mile.
Of course, the more worried you are about getting shocked, the higher the voltage. Which is cruel. And unusual. And so much fun to watch. [Wired]


Source: Gizmodo.com

Apple reconfigures Mac dev program, drops price to $99

Apple has announced that it is scrapping its old developer programs, which included multiple tiers that cost thousands at the top end, for one modeled on its wildly successful iPhone Developer Program. Simply called the Mac Developer Program, it will cost just $99 per year.

Included in the new and improved Mac Developer Program is access to prerelease builds of Mac OS X, member-only developer forums, a series of instructional videos from Apple engineers, and two direct technical support incidents per year. The TSIs give developers direct access to an Apple engineer for assistance with code problems or other troubleshooting, and developers have the option of buying additional TSIs as needed.

The new program replaces the previous ADC Premier, Select, and Student developer programs. The biggest difference between the new and old programs, aside from the much lower price, is the loss of the ADC Hardware Purchase Program benefit that offered steep discounts on Macs for the Select and Premier account holders. Some developers have already said that they'll happily take the lower cost of entry over the hardware discount.

Premier accounts, which cost over $3,000, also used to include one free ticket to Apple's Worldwide Developers Conference, which normally cost $1,200. Ostensibly, any Mac Developer Program member will have a chance to buy a ticket next year (at least until it sells out, like it has the past two years).

The lower barrier to entry is expected to spur an influx of Mac developers, much as the iPhone Developer Program did. Developers familiar with developing for the iPhone should have a relatively easy time of transitioning to developing for the Mac, since both use the same Xcode IDE, Objective-C language, and many similar APIs (though obviously UI considerations are quite different).

Current ADC memberships remain in effect until they expire. Developers that bought an ADC membership after Feburary 1 can contact Apple to get a refund if they wish to join the Mac Developer Program instead. The Mac Developer Program will be the only program Apple offers going forward. Basic access to Xcode developer tools and released versions of Mac OS X SDKs remains free.

Friday, 5 March 2010

Adobe releases Photoshop.com Mobile editor for Android developers

Adobe this morning announced that third-party developers now have access to the Photoshop.com Mobile for Android 1.1 editor, allowing them to make it a part of their applications.

The news comes four months after the company released Photoshop.com Mobile for Android, enabling users to easily edit and share their photos. That app got an upgrade, too.

Amusingly, Adobe also takes a bit of a swing at Apple for not being able to provide such tools to iPhone app developers. Said Doug Mack, vice president and general manager of Digital Imaging and Rich Media Solutions at Adobe:
“Unlike iPhone, the Android platform allows us to make the Photoshop.com editor broadly available to developers so they can provide it within any application they are working on. Photoshop functionality can then easily be accessed from an online auction, real estate or social media application so users can quickly fix photos and make them look their best, before being showcased.”

The updated version of Photoshop.com Mobile for Android 1.1 brings effects like Vibrant (to boost photo colors) and Pop, which brings a ‘pop art’ style to images. The Soft Black and White, and Warm Vintage tools can be used to add a classic and aged effect to photos. Other new effects include Vignette Blur, White Glow and Rainbow.

Adobe Photoshop.com Mobile for Android 1.1 is available as a free download in all countries with Android Market in English only. Search the Android Market for “photoshop.com” to find it.


enTourage eDGe Dualbook Reviewed: Half eReader, Half Netbook Not Quite There Yet

The innovative, if slightly bonkers, enTourage eDGe has been reviewed by Laptop, and as I suspected they had a few issues with the design. They found the half ereader, half netbook too heavy, with the number of options overwhelming.

Part of the lure to a dualbook like the eDGe is that it's got so many features—but it sounds like enTourage has been too generous here, with Laptop pointing out that "it's overkill for consumers mainly interested in surfing the Web, or simply reading eBooks."

There are only 200,000 titles in enTourage's ebook store, with only around half of them being best-sellers. It does have access to over 1 million of the Google Books, but there are no newspapers or magazines available just yet either.

Ultimately, Laptop seemed pleased with the dualbook, awarding it three out of five stars, but slight issues with the resistive touchscreen, fast-draining battery, and limited app store options made them conclude it's probably best to wait until the next version—or at least until enTourage has a more polished offering. [Laptop]

Source: Gizmodo.com

Sony plans new mobile initiative to take on Apple

Perhaps stirred by Apple's claim of being one of the biggest mobile device companies in the world, Sony is planning a number of new devices and services to compete with Apple's iTunes Store, iPhone, and iPad. That strategy will revolve around what's currently being called Sony Online Service, along with smartphone and tablet-like devices meant to connect to it, according to a recent Wall Street Journal report.

Sony plans to launch its online media platform, aimed squarely at Apple's iTunes Store, later this month. The iTunes Store includes the App Store (which offers apps for the iPhone, iPod touch, and now iPad) and iBookstore (which will offer books for the iPad later this month) in addition to music, TV, and movies. Sony Online Service is expected to offer much of the same music and video content, as well as Sony's back-catalog of PlayStation games.

Sony aims to enable a number of devices to connect to the service. The company is planning to make a smartphone capable of playing games made for the PSP Go—a sort of iPhone-like "PSP phone." A project is also underway to build a mobile device that "blurs distinctions among a netbook, an e-reader and a PSP," according to the Journal's sources. That sure sounds like an iPad to us. Other Sony Ericsson phones may also have access to the content, and it would presumably be accessible via the company's Vaio line of laptops as well.

The initiative is part of CEO Howard Stringer's plan to turn the company around after the recession and slow sales triggered job cuts and plant closings at the end of 2008. Since then, sales of the company's mobile devices, such as the PSP Go and Sony Ericsson mobile phones, have been dismal at best. Even a major price cut on the Playstation 3 lead to only a temporary spike in sales.

Sony needs new products that can move in significant numbers if Stringer's plan to tie products into its online media service is to succeed. "It's still not quite clear what specific steps Sony will take to achieve that, especially when iPad and other highly capable mobile devices are crowding the market," Nobuo Kurahashi, a consumer-electronics analyst at Japanese brokerage Mizuho Investors Securities, told WSJ.

Though the PSP Go's high price tag and confounding issues with the download-only games have resulted in poor sales, the company has reportedly learned its lesson about how to develop products that rely on a download-only service (we'll remain skeptical). Sony has hundreds of products spread across camcorders, digital cameras, video games, and A/V equipment, but a laser sharp focus on a smaller range of products—a strategy that has served Apple well—may be the only way to turn the ship around.

Thursday, 4 March 2010

Facebook 1.1.0 Update For webOS Looks Gorgeous, Brings Enhanced Inbox and Photo Albums


Ooh la la! You can now update to version 1.1.0 of the Facebook app for webOS. It looks great and it brings an enhanced inbox, photo album access, more profile viewing options, events, and search. Finally!

According to Palm, this is the breakdown of the new features:
  • Enhanced Inbox – Now, your inbox lets you compose, send, and reply, so you can always access your Facebook messages.
  • Photo albums – Now you can view photo albums from all your friends, not just the photos in their news feeds. Uploading photos is easier as well, and includes the ability to add captions.
  • Profiles – The new app lets you view users' profiles, whether they are your friends or not. View and post to their walls, view their information, and see their photo albums (subject to privacy settings, of course).
  • Events and birthdays – Now you can see upcoming birthdays from your friend list as well as upcoming events.
  • Friend search – Easily find your friends using the Friend Search feature. This takes you to their profile, where you can see and post to their wall, view their information, and look at their photos.
Anyone tried the update yet? How do you like it? [Palm via Engadget]


How Nokia helped Iran "persecute and arrest" dissidents

A new report out of Finland suggests that the country's corporate poster child, Nokia Siemens, has been involved in some pretty tawdry dealings with Iran, dealings that go beyond the company's admitted involvement with the Iranian regime.

Journalist Hanna Nikkanen quotes Nokia's Lauri Kivinen saying that "there's been this perception internationally that we've supplied them [Iran] with internet surveillance equipment, but this is not true. The statement was made on February 20, 2010, but Nikkanen obtained leaked manuals to the equipment in question and concluded, " The surveillance made possible by the Nokia Lawful Interception Gateway (LIG) extends to mobile internet usage. Either Kivinen was lying or his knowledge of his company's core competence field isn't quite adequate."

Do the deals made in Espoo lead directly to arrests in Tehran?

Yes, they do

That might sound like an overwrought characterization of a complicated situation, but the words aren't ours—they come right from the European Parliament, which took the extraordinary step last month of trashing Nokia Siemens in a public resolution.

MEPs were disgusted by the aftermath of the contested Iranian election last year and the brutal crackdown on the Green movement in the country. In a resolution adopted February 10, Parliament railed against Iran's "jamming of international radio and TV networks, many international websites, including Facebook and Twitter, as well as local opposition sites and mobile-phone services in Tehran, thereby also causing transmission problems on networks in other Middle Eastern countries and even in Europe."

Where did the gear to do this come from? "European and Russian companies have been providing Iran with the necessary filtering and jamming devices, some of which might even pose a health risk to those living in the vicinity of the installations," said the resolution.

Then it named names: Parliament "strongly criticises international companies, in particular Nokia Siemens, for providing the Iranian authorities with the necessary censorship and surveillance technology, thus being instrumental in the persecution and arrest of Iranian dissidents," it said.

Parliament called on the European Commission to immediately ban surveillance tech exports to Iran and other countries where the gear "could be instrumental in the violation of human rights."

But it was legal!

Nokia Siemens has been battling such accusations since the Iranian election last year. On June 22, 2009, overwhelmed with press inquiries, Nokia Siemens issued a public statement on its involvement with Iran.

"Nokia Siemens Networks has provided Lawful Intercept capability solely for the monitoring of local voice calls in Iran," it said. "Nokia Siemens Networks has not provided any deep packet inspection, web censorship or Internet filtering capability to Iran."

So it was only "local voice calls"? Not quite. Nokia Siemens admitted in a "further statement" that its gear could "intercept phone calls and text messages," so it's clear that there are data recording and analysis features built into the gear in addition to simple voice recording.

But every time the issue came up, Nokia Siemens made a valid point: this tech has all been pushed by the Europeans and Americans. Nokia Siemens says that these capabilities are "a requirement in the European Union, the United States, and most other countries, and parallels a similar requirement for landlines that has existed for decades."

Lawful intercept capabilities translate traditional wiretap rules into mobile networks, often adding new features like text message intercept along the way. The Internet posed an additional challenge, and US and European firms led the way in developing deep packet inspection gear that can siphon off an individual user's traffic and pass it to law enforcement. The idea was that the criminals could not gain anonymity simply by dropping their landlines and postal boxes for e-mail and Skype.

Accessing the surveillance network from a command-line interface

Such a system has huge potential for abuse, which is why judicial oversight has always been important. In a country like Iran, where such oversight and judicial protections are limited, some argue that international companies like Nokia Siemens have to be aware that their gear will be used differently than it will in Europe.

As one Iranian blogger put it last year, "True, the monitoring system may be used to prevent criminal and terrorist activities in democratic countries where violation of privacy is subject to court’s permission. But in a country like Iran, 'Lawful Interception' means much more than this. It means continuous violation of basic human rights of freedom seekers."

More communication is always better

The newly finished report on Nokia Siemens suggests that the capabilities sold to Iran go far beyond phone call monitoring, though the article is not specially compelling; where are the quotes from the manuals that illustrate this?

We spent some time trolling through the manuals, which are all in English and date from 2005-2007; none appear to suggest that the gear can monitor general Internet traffic from mobile devices. The Lawful Interception Gateway (LIG) software complained of in the article is, according to the documentation, able to "intercept 2G and 3G mobile data calls, and the IP Multimedia Subsystem (IMS)." IMS is used to deliver controlled "services" and help wireless providers avoid becoming mere "bit pipes," but IMS monitoring gear would not appear to allow general Internet monitoring of mobile devices. In any event, as Nokia Siemens points out, most of Iran's Internet traffic is on fixed lines.

But the Nokia Siemens gear does allow the monitoring of text messages, which were important organizing tools in the days after the disputed election (the Iranian Internet was essentially cut off completely from the world right after the election, and only restored piecemeal as new blocking capabilities were brought online). Combined with the Iranian regime's eventual decision to simply block sites like Facebook and Twitter wholesale at the border, many of the decentralized organizing tools were dismantled or made risky to use.

The intercept browser, circa 2006

The debate over Nokia Siemens' involvement in Iran mirrors quite closely the debate over China, where Cisco sold the country much of the gear it uses to conduct surveillance. And despite Cisco's claims about just offering basic functionality to the Chinese, it eventually emerged that the company's reps were pitching China on using the gear to combat the "evil" Falun Gong and other "undesirables."

China routinely makes the same argument made by companies like Nokia Siemens and Cisco: "Hey, America and Europe do it too! Any companies that want to do business here need to follow local laws."

Businesses routinely say they don't want to play global policeman, and that these are issues for governments to work out. Clearly, there is plenty of "gray area" here for debate, but it does seem as if there are a few regimes where companies might easily conclude that the likelihood of abuse is so great that no sales should be made. (Of course, "warrantless wiretapping" in the US might lead one to wonder where, exactly, surveillance safeguards can be guaranteed.)

On the other hand, Nokia Siemens likes the argument that Google made when it censored its Chinese search results: more connectivity is better for people, even if it comes with some undesirable caveats. Nokia "firmly believes that providing people, wherever they are, with the ability to communicate ultimately benefits societies and brings greater prosperity."


Obama admin declassifies major cybersecurity plans

Bowing to pressure from activist groups and to the dictates of common sense, the Obama administration has done what the Bush administration wouldn't and declassified some general information [PDF] about the Comprehensive National Cybersecurity Initiative (CNCI), a sweeping program that the Bush White House launched in early 2008 to protect the government and critical civilian networks from cyberattacks. It turns out that, like at least one other effort launched by the Bush administration in the name of national security, the program was too secret for its own good.

In May of 2008, some members of congress became frustrated with the CNCI's combination of extreme secrecy and hefty pricetag, and asked in vain for someone from the Bush administration to give a bit more information on it than a former DHS official's brief description of it as a "Manhattan Project to defend cyber networks." Civil libertarians were also up in arms over the program, as were security experts—the former because the extent of the government's intrusion into private networks wasn't known, and the latter because no one could say who, if anyone, had been consulted in the plan's formulation.

After the arrival of the Obama administration at the close of the year, the Congressional Research Service began working on a review of legal basis underpinning CNCI. The study found that the program's constitutional basis was questionable because Bush had mainly relied on his Article II powers in issuing the presidential directive that started the program. In other words, because Congress couldn't be told about it, they couldn't give it the level of explicit backing that would've put a program with this much impact on the private sector on firmer constitutional footing. The program was also too secret to enjoy the benefit of any real third-party scrutiny.

This past Tuesday, the the Obama administration lifted a bit of the veil on the program. Bush's original directive wasn't declassified, but the White House did release a five-page summary of the program to the public.

The summary document gives brief descriptions of the 12 different initiatives that make up the program, each of which is as long on ambition as it is short on detail. The document ultimately reads like a kind of wish list for national cybersecurity, and one in which some of the goals are at odds with one another.

Perhaps the main tension in the document is between the federal government's need to "centralize," "manage," and "control," and the reality that network security benefits from redundancy, federation, and distribution. For instance, take the description of initiative #4, which I reproduce below in its entirety:
Initiative #4: Coordinate and redirect research and development (R&D) efforts. No single individual or organization is aware of all of the cyber-related R&D activities being funded by the Government. This initiative is developing strategies and structures for coordinating all cyber R&D sponsored or conducted by the U.S. government, both classified and unclassified, and to redirect that R&D where needed. This Initiative is critical to eliminate redundancies in federally funded cybersecurity research, and to identify research gaps, prioritize R&D efforts, and ensure the taxpayers are getting full value for their money as we shape our strategic investments.
But is it really a problem that federally support cyber-related R&D isn't centrally directed and completely lacking in redundancy? Are central planning and lack of redundancy really conducive to the kind of innovation that's required for the US to keep up in cyberspace?

I'm reminded of the interview that I did with Stanford president and RISC computing pioneer John Hennessy, where we touched on this very topic. In the context of a discussion about federal and monopoly funding for "blue sky" research—where a bunch of smart guys in different labs get a budget from the government, or from a monopoly like Ma Bell or Cold War-era IBM, and are let loose for years to just chase their geek fancy—Hennessy attributed the birth of RISC to the kind of multi-lab redundancy that's now considered wasteful.
We need to move back to the model where DARPA is funding groups that can work for a long period of time on hard systems problems. What led to lots of the breakthroughs in the VLSI arena was that there was a symbiotic group of universities working together, and there was a lot of sharing of ideas and stuff going on. I think that when we [at Stanford] did the RISC work, had Berkely not been there, either one of us alone would've been branded as a heretic... because IBM was below the radar, and nobody knew about the work. One of us couldn't have survived alone in this environment.
Back in the 50s, before milestones and benchmarks and redundancy elimination, the federal government knew exactly how to spur innovation: fund academic labs that specialized in certain areas, and leave them alone to do their thing.

Unfortunately, what the CNCI document describes sounds like the opposite of innovative, which isn't a surprise, given that the impulse to conceive and develop it entirely in secret was the opposite of democratic. In the end, there's no better way to stifle innovation than to let a single entity control it. But that's the kind of wrong-headed groupthink that takes root and grows in small groups that are restricted by excessive secrecy.

Wednesday, 3 March 2010

Apple loses one, gains one in employee shuffle

Long-time Apple executive Pablo Calamera has left Apple in favor of a CTO gig elsewhere, while former Mozilla security chief Window Snyder started work at 1 Infinite Loop on Monday. Pablo will become the CTO at Thumbplay, a company specializing in ringtones and streaming music, while Snyder will work as a senior security product manager at Apple.

According to the Thumbplay announcement, Calamera served as director of MobileMe service while at Apple. Despite the service's less-than-stellar reputation during his time there. Thumplay saw fit to scoop up Calamera. The newly branded CTO spent time at Danger Inc. and WebTV Networks, among others, before joining Apple.

As noted by PC World, the Snyder hire comes on the heels of her time managing security consultants at Microsoft and working on Windows XP and 2003 Server. What Snyder will do at Apple remains unclear, but the two variants of Safari (Windows and Mac) or the iPhone OS seem to be likely candidates for her expertise.


Microsoft rivals push to send browser ballot on world tour

The lobbying group European Committee for Interoperable Systems (ECIS) today called on antitrust regulators worldwide to follow the European Commission and pressure Redmond into offering a browser ballot, similar to what the company began serving yesterday to European customers via Windows Update, everywhere. The ballot is offered to consumers on Windows XP, Windows Vista, and Windows 7.

ECIS members include Adobe Systems, Corel, IBM, Nokia, Opera, Oracle, RealNetworks, Red Hat, and Sun Microsystems. It was Norwegian browser maker Opera that first filed a complaint with the European Union in December 2007, accusing Microsoft of violating EU antitrust law by bundling IE with Windows. And the company isn't satisfied yet. "Opera is a member of ECIS, which supported the complaint to the European Commission because it promoted the ECIS core values of competition, interoperability and consumer choice," reads a statement in an ECIS press release today. "Microsoft agreed to change its business practices in the face of formal charges from the Commission. Consumers deserve the same unbiased browser choice on all the world's more than 1 billion personal computers." Of course, Opera doesn't rule the ECIS alone, but given that the lobbying group is mainly composed of Microsoft rivals, we doubt any of them would object to Opera's proposition.

Meanwhile, Microsoft has dismissed the ECIS' call to arms. "The issues in the Internet Explorer case have already been the subject of extensive legal action in several other countries around the world, including the United States, which have each developed their own legal solutions which are different than the browser choice screen pursued by the European Commission after years of litigation," a Microsoft spokesperson told Ars.

Microsoft is not obligated to take the ballot screen outside the boundaries of the EU, but the push from ECIS could spur other consumer groups, competition agencies, and antitrust regulators to band together against the software giant. It worked in Europe, but will it work in the rest of the world?


Tuesday, 2 March 2010

Detached teens use Internet and TV more—or vice versa?

Parents of Internet- or TV-addicted teens finally have confirmation of something they have long suspected: the more screen exposure teenagers get, the more detached they are from those around them. Those are the findings of a paper set to be published in the March issue of the Archives of Pediatrics and Adolescent Medicine, which examined the relationship between adolescent screen time and social involvement with parents and peers. Though the paper doesn't quite say that Internet and TV are the cause of the detachment, it's clear that the two are related.

The paper, called "Adolescent Screen Time and Attachment to Parents and Peers," surveyed behaviors of 3,043 New Zealand students in 2004. Among the findings were a 4 or 5 percent increase in detachment to parents for every hour spent watching TV or surfing the Web, respectively. It's not all about the parents, either—more time spent gaming was associated with low attachment to peers as well. More time spent reading offline and doing homework was associated with higher attachment to parents.

What's curious about the findings is that, when compared to a similar study from the 1980s, these percentages are actually going down. In 1988, there was a 13 percent increase detachment to parents for every hour of screen time, as well as a 24 percent increase in detachment to peers.

The researchers do note in the paper, however, that the numbers from 2004 include numerous Internet-related offerings (that weren't available in 1988) that have helped offset the numbers. For example, there was another previous study that found a positive association between educational Internet use and family relationships. The paper acknowledges that further research is necessary when it comes to specific content and its effect on social behaviors, especially given the rapid development of screen-based technologies.

There have been numerous studies in recent years on whether computer use isolates people from each other, with a recent study out of China going so far as to say that Internet-addicted adolescents are more likely to engage in self-injury. Given these previous findings, it's easy to say that being a couch- or desk-chair-potato is the cause of this detachment, but that's not necessarily the case.

"[I]t is also possible that adolescents with poor attachment relationships with immediate friends and family use screen-based activities to facilitate new attachment figures such as online friendships or parasocial relationships with television characters or personalities," say the paper's authors.

Scammers use Twitter, Facebook for $150k bridal show scam

Scammers took advantage of brides-to-be and exhibitors last week when they set up a Twitter account to promote a nonexistent bridal show. The scammers had set up the Twitter account as if they were representing The Boston 411, a legit community info site for Bostonites, and promoted preregistration for the bogus show to both attendees and exhibitors. Needless to say, the Twitter account, the site, and the bridal show were all scams, and police are on the hunt for those behind the charade.

According to the Boston Globe, police began their investigation into the scam last week but held a press conference Monday to alert victims of the scam. Some 5,000 people paid for $15 tickets to the show, while 200 businesses shelled out $350 to $4,000 in hopes of exhibiting. Because the show was promoted to be taking place between March 5 through 7 (next weekend), police wanted to give victims the chance to cancel any travel plans they might have made.

The Twitter account in question has been promoting the show since September of 2009 and has somehow gotten 185 followers, despite the fact that nothing but that has been tweeted in the history of the account. Still, word of the show apparently reached far and wide, with interested parties getting out their wallets for nothing more than a (no longer available) Facebook page and a PayPal account. According to the Globe, scammers also managed to pull in at least one radio producer who had created ads for the show in exchange for a discounted booth rental.

On the one hand, it's hard to say what victims should have done differently to avoid this kind of scam. The promotion looked like it came through legitimate channels and it's not uncommon for bridal shows to sell preregistration tickets at a discount. A hundred people see it on Twitter, register, tell their friends, and boom. On the other hand, looking at that Twitter timeline sets off our spam radar.

If you or anyone you know has any information on what happened, the Boston police would like to hear from you at victims.bpd@cityofboston.gov.

UK Bill Would Outlaw Open Public Wifi Hotspots

If passed, something called the Digital Economy Bill over in the U.K. could do the unthinkable in this, the digital age: Ban open wifi spots.

The ban comes as part of a bill that seeks to limit copyright infringement, or something. In summary, schools, small businesses and even libraries would have to effectively become their own ISP and manage the wifi hotspot—or face hefty fines. Even if a shop password-protected their wifi and posted the PW publicly (as they probably should be doing anyway), this "management" would also entail detailed record keeping, as the bill requires that hotspot providers log users who've been on their network. Sounds fun!

I'd love for any UK-based small business owners to weigh in on this debate, and the bill. Is it really as annoying as the ZDNet article makes it sound? Are daily, detailed user records really too much a burden for the corner coffee shop to bear? Light those torches and brandish your pitchforks in the comments! [ZDNET]

Source: Gizmodo.com

US military surrenders to social media, changes policy

Members of the US Military will now have limited access to certain social media sites thanks to a new policy (PDF) from the Department of Defense. The DoD finally released its updated policy late last week, which will also apply to parts of the military that have banned social media use from their own networks. Commanders will still have the ability to cut down on the use of Twitter or Facebook if they feel the need to protect against malicious activity and preserve bandwidth.

According to the memorandum, members of military departments and all authorized users of the Non-classified Internet Protocol Router Network (NIPRNET) can now use the publicly accessible capabilities of various social networking and user-generated content sites, instant messaging, forums, and e-mail. This includes YouTube, Facebook, Twitter, MySpace, and others. Access to porn, gambling, or hate crime sites will remain restricted, however, and commanders can cut down on social media use if they feel the need to "preserve operations security."

In August of 2009, the US Marine Corps issued a policy of its own that banned the use of social media on the Marine Corps Enterprise Network (MCEN) due to malware concerns and "information exposure" to adversaries. It wasn't much of a surprise, either: security exploits are sprinkled throughout social networking sites, not to mention that fact that people just plain share too much. If IT admins are uneasy about the totally careless behavior of workers on social networking sites, the Marines undoubtedly had that much and more to worry about.

Of course, NIPRNET is separate from MCEN, but the Army’s Chief of Public Affairs advisor Lindy Kyzer told the New York Times that the new policy will indeed override the Marine Corps' current ban, as well as the Army's older ban on YouTube. All military units will need to open up access to social media sites, and any bans that take place must be temporary. "DoD is moving away from the silly notion of having ‘blacklisted’ social media sites and saying, ‘We’re not going to lay down the hammer and tell you where you can and cannot go, we’re going to mitigate risk as it comes,'" she said.

Monday, 1 March 2010

The A4 and the A8: secrets of the iPad's brain

Most companies, when they go to the enormous expense of designing a complex chip, tell everyone about it. Even a company like Sun or IBM, whose chips are used only in their own computers, unveil the details of their new processors well before products based on those new parts come to market. This is true for game consoles, for SoCs of all flavors, for PC chips, and for most of the rest of the semiconductor industry. It's not, however, true for Apple.

Since the unveiling of the iPad last month, all the public has learned about the application processor that powers the device is a two-letter name: A4. The rest of the details have been treated as Top Secret, and this secrecy has stoked plenty of speculation, some of it reasonable and some of it completely and totally unhinged.

Why has Apple been so secretive about the A4? Why hasn't the company presented a paper on the device at ISSCC, or published a whitepaper?

I don't know the answer to these questions, but given what I do know about the A4, I suspect that the reason is twofold. First—and this is purely my supposition—Steve Jobs just loves secrets. The A4 no doubt gives him that special, "I have my very own custom SoC that you don't know anything about" feeling, and if we're honest with ourselves, wouldn't we all love to know what it's like to have that feeling? I know I would.

The second, and perhaps most likely reason behind Apple's silence, is that the A4 just isn't anything to write home about—and on this second point, I actually know a thing or two. If Apple were to tell you what's in the A4, most of the focus would be on what the chip is not, rather than on what the iPad is.

Meet the A4
As I watched the videos and read the reports of the iPad in action at the launch event, I was thoroughly convinced that the device was built on the out-of-order Cortex A9, possibly even a dual-core version. But it turns out that the the A4 is a 1GHz custom SoC with a single Cortex A8 core and a PowerVR SGX GPU. The fact that A4 uses a single A8 core hasn't been made public, but I've heard from multiple sources who are certain for different reasons that this is indeed the case. (I wish I could be more specific, but I can't.)

In all, the A4 is quite comparable to the other Cortex A8-based SoCs that are coming onto the market, except that the A4 has even less hardware. The iPad doesn't have much in the way of I/O, so the A4 itself can do away with the I/O that it doesn't need. In contrast, the typical Cortex A8-based SoC has more I/O hardware than a mobile phone can use, because you never know what customers will need which interface types.


For instance, an A8-based SoC like the Freescale i.MX51 shown above has an infrared block, three UART blocks for serial communication (RS232 and the like), four USB blocks, and a keypad controller, to name just a few. Of these, the iPad probably needs only one USB port and one UART for serial connections, both of which are wired to the 30-pin connector (assuming that this is the same 30-pin connector as the iPhone). The multitouch input controller will interface with the chip via either a USB port or a serial port (I looked at the datasheet for the STM32TS60, which can do either USB or serial), so perhaps there's another port for that purpose.

Apple's 30-pin connector supports TV-out, but no external display attachment has been announced for the device, so it's possible that the SoC forgoes the common TV-out I/O block and related support for a secondary display. (It has video out. Apologies for missing this detail.)

Another common SoC set of blocks that the A4 probably does without are related to still and video camera support. Apple's iPad may well be the only Cortex A8-device to come to market without any type of camera built in, so Apple has probably ditched some dedicated image processing blocks.

While it's fun to speculate about what Apple didn't include in the A4, the ultimate point is this: with one 30-pin connector on the bottom and no integrated camera of any kind, the A4 needs a lot less in the way of I/O support than comparable chips that are intended for smartphones or smartbooks. This means that the A4 is just a GPU, a CPU, memory interface block (NAND and DDR), possibly security hardware, system hardware, and a few I/O controllers. It's lean and mean to a degree that isn't possible with an off-the-shelf SoC.

What was the role of P.A. Semi?
So if Apple just licensed the A8 and didn't design a custom CPU core, then what was the point of the P.A. Semi acquisition? The answer to this question is still unclear.

Apple bought P.A. Semi in late April 2008. A little over a year isn't near enough time to do a new core design around the ARMv7 architecture. Something like Qualcomm's Scorpion core, which is a custom implementation of ARM v7 that's comparable to the A8, but with a wider SIMD engine and a deeper pipeline, was a multiyear project. I could easily imagine that Apple is working on something comparable to Scorpion, but this wouldn't be ready for a while.

If they were involved at all in the A4 design, and it's still not 100 percent clear that they were, it's likely that the P.A. Semi team made its biggest contribution to the A4 in the area of dynamic power optimization.

The PWRficient chip that the P.A. Semi team unveiled in late 2005 achieved miraculous levels of efficiency through pervasive use of power and clock gating. Power gating is a relatively straightforward technique that involves shutting down the parts of a chip that aren't in use. It's harder to implement in practice than it sounds, though, because you have to divide the chip up into blocks that can be put to sleep and awakened independently. You also have to size and arrange those blocks so that the extra delay involved in entering and exiting sleep states doesn't screw up the chip's overall timing. These delay and timing issues make power gating hard to implement in high-speed processors, which is why the amount of power gating that the PWRficient processor used was remarkable for a high-performance processor.

Clock gating is the other technique that PWRficient used extensively, and it also comes with its own challenges. The clock distribution network can account for up to half the dynamic power draw in a modern SoC. Clock gating is a method for pruning the clock tree by cutting off the clock to parts of the chip that don't need it at a particular moment.

The exact degree to which the A4 uses either of these two techniques won't be clear until Apple does a big reveal, and that may not ever happen. But even if they're not extensively used in the current A4, these techniques are very likely to be a larger part of future iterations or variants of the processor.

Speaking of variants, it's entirely possible that the majority of the P.A. Semi team's efforts are going not into an iPad chip, but into an SoC for the iPhone. Because the iPad's LCD is so large and its power draw so great relative to the other components, it's hard to imagine that the A4 gives the iPad more than a few percent battery life advantage vs. a chip like the Snapdragon—in the grand scheme of things for a tablet device, the extra hardware that chips like the Snapdragon and the i.MX515 have on A4 probably doesn't matter a whole lot. But a chip that's really aggressively optimized for the iPhone might give the phone a real battery life and performance advantage over the competition.

The iPad as Wii, or, "it's the software, stupid"
In the end, I keep coming back to the idea that Apple has stayed quiet about the A4 because any real magic or "wow factor" that the iPad delivers will come from the software—the efficiency of the OS, the user interface design of the OS and apps, and the snappiness of the overall experience all come from the software team.

In this respect, the iPad is actually a lot like the Mac. The Mac combines commodity hardware with great industrial design and a superior user experience. The iPad aims to do the same, but under a new compute paradigm that replaces the venerable keyboard-and-monitor combo with a slate form factor, and the decades-old WIMP-based UI (Windows Icons Menus Pointer) with multitouch.

Perhaps an even better analogue for the iPad is Nintendo's Wii, which is another product that relies for its success not on its processor, but on its novel interface and broadly accessible software. I'm sure that if the iPad can do for mobile computing what the Wii did for console gaming, Apple will consider it a resounding success.

Update: I thought I had checked thoroughly to ensure that there wasn't an official announcement of video out support on the iPad, but I hadn't. So, yes, it has video out, and I should not have implied that this was somehow an unknown.

Why Google makes it easy to leave Google

We profiled Google's Data Liberation Front when the initiative was first made public last year, but what has Google's in-house data export team been up to since? Designing stickers, for one thing.

"CAGE FREE DATA," they proclaim, which sums up the Data Liberation Front's efforts succinctly. The team's goal is nothing less than to make it simple for people to leave Google's many services, taking e-mails, photos, and documents along with them.

Its most recent work has been on Google Docs, which now sports a batch download option. Select the documents you want, click a button, and Google will zip them all into one compressed archive of up to 2GB and mail them to you.

On a recent visit to Google's Chicago office, where the DLF team is based, we sat down with team leader Brian Fitzpatrick to talk more about how and why he wants to make it easy for people to abandon Google's services.

Stopping stagnation
Certainly there's PR value in hosting such a "not evil" initiative within the company, but DLF didn't begin life as a top-down project. Fitzpatrick says it "started off as naïveté" on his part; after listening to company president Eric Schmidt wax eloquent for years on the virtues of not locking users in, Fitzpatrick noted that not all of Google's products made this easy.

DLF was the result of his work. The team has been together for two years now, and although it began by seeking out other engineering teams, Fitzpatrick says that those teams are "now coming to us" to ask how they're doing.

Data lock-in isn't bad just for users; Fitzpatrick argues that it's also bad for Google. "If you create a user base that's locked in," he says, "there's no way you're not going to become complacent."

Making it as easy to leave Google Docs as to leave the Google search engine plays to one of Google's strengths: hiring really smart people. DLF's work "sets that fire under an engineering team," Fitzpatrick says, since the engineers need to keep users happy through innovation, not lock-in.

Do people actually care about liberating their data? Some do, but usage of the export features remains low. Google sees a "continuous low-level of use of these things," said one engineer on the team, especially when it chooses to shut down underperforming services. Having export tools actually makes it easier to do such shutdowns, too; recall that DRM-laden music stores ran into problems when they eventually tried to shut down their DRM servers. Google's data openness helps the company avoid this sort of public criticism in the event of service shutdowns, as when the company closed its Google Notebook product.

Nicole Wong, Google's Deputy General Counsel, told us separately that DLF matters to Google for two reasons: 1) it provides control to users and 2) "when we say our competition is one click away," initiatives like DLF prove that it's true.

This last comment is a reminder that openness does have real strategic benefits for the company that go beyond engineering and user empowerment. Google is increasingly under antitrust scrutiny by a more aggressive Department of Justice in the US, and it's already fending off antitrust investigations in Europe. DLF is one more part of the argument that Google is not a gatekeeper.

The DLF team does face occasional criticism that Google's products are "open" only to exporting material of less value to Google (see this comment from researcher Ben Edelman on getting data out of AdWords, for instance). But DLF has now worked with more than 25 teams at Google to make data export easier, and its efforts on products like Google Docs are certainly good news for users.

"We try to raise awareness within the company," said Fitzpatrick, though he admitted with a grin that he has no "authority" to make anyone do anything.

There's always more to do. The team does monitor a Google Moderator page where users can make suggestions—and there are plenty. "Gmail contacts—being able to export them and reimport an edited version, without duplicating every single one," says one idea. "Add hCalendar microformats to Google Calendar, so that events can be reused elsewhere," says another. "Let me get my Chat history from gMail," says a third.

Fitzpatrick promises that more is coming, though he can't talk about projects in the pipeline. What he can do, though, is mail you a sticker.


Internet overtakes print in news consumption among Americans

The Internet has surpassed newspapers as a primary way for Americans to get news, according to the Pew Internet and American Life Project. That makes the Internet the third most popular news platform overall, with many connected users taking advantage of nontraditional consumption methods such as social media postings, personalized news feeds, and getting their news on-the-go.

National and local TV stations still dominate the news cycle for most Americans, but the Internet now stands third in the list, ahead of national and local newspapers. Additionally, the majority of news consumers say they use two to five websites per day to get their fix—a number we think sounds about right—but a surprisingly high number (21 percent) rely on that one favorite site to get everything they need.

Pew points out that consumers who don't just rely on newspapers and TV are much more interactive with their news, too. A full third of those with cell phones said that they get their news while mobile, and 37 percent of those with Internet access reported having contributed to the creation of news themselves, commenting on it, or disseminating it via Facebook or Twitter.

And even though not everyone participates in commenting or sending it out, these methods are still quite effective in getting the general population involved. Three-quarters of people who consume news online said they do so thanks to e-mails or posts on social media sites. Those "e-mail a friend" or "post to Facebook" links apparently work well.

Still, Pew's data shows that 59 percent of those surveyed get their news both online and offline. CNN and CBS were quite popular among the sample, as well as various local stations, and these two categories remain highly popular among Americans (73 percent and 78 percent, respectively).

Only 17 percent said they read the print version of a national newspaper, however, and 50 percent said they read local papers. According to Pew, newspapers were most likely to be read by people who were over 50 or those who don't own cell phones—yikes. The data clearly reflects print media's continued decline, though Pew pointed out that the online versions of newspapers (such as the New York Times or USA Today) were just as much a part of an online news consumer's day as any other website. Now if only the papers could figure out how to stop bleeding money.

Sunday, 28 February 2010

Apple Reports Discovery of Child Workers In Their Factories

February has not been a good month for the Apple supply chain. After the assault, the arson, and the poisonings, now Apple's annual supplier report reveals that this year 11 minors were found working in factories that manufacture their products.

The 24-page report is full of bad news. The worst of it: three different factories Apple uses to manufacture parts employed 15 year old workers, 11 minors total, in countries that had a minimum working age of 16.

Other unsavory findings include over 50 factories keeping workers on the job for longer than the maximum 60 hour work week and at least 24 factories paying workers less than the minimum wage. Stuff that would be bad normally but doesn't seem quite as bad in light of the child labor: only 61% of the factories Apple uses were following correct safety regulations and only 57% had the necessary environmental permits for operation.

Apple didn't reveal which factories were culpable, or the nations in which these facilities were located—they contract independent factories in China, Taiwan, Singapore, the Philippines, Thailand, Malaysia, the Czech Republic and the United States—but they are still using them to manufacture their products. Apple confirmed that the child laborers are no longer employed.

Apple's no stranger to supply chain controversy, and all of these details come right from their own supplier responsibility report. You'd imagine that at some point people would stop gawking at Apple's supply chain scandals and actually put pressure on them to make some significant changes in their manufacturing. Hopefully these latest discoveries are enough to start that process. [Telegraph and Bloomberg]

Update:
Many commenters have made some good points about Apple's report and how it should be received. To be fair, these discoveries did come from Apple's own audits of the factories it uses. I changed the title of the post to better reflect that. But the reason they're performing those audits in the first place is to rectify their image when it comes to overseas labor. It's great that Apple's putting more resources into finding these problems, and it's admirable that the company is making this process public. But with such a long running history of ugly supply chain incidents, it's discouraging that the audits found conditions to still be as unfavorable as they are.

We got an eye-opening look at Apple's attitude toward manufacturing when a tipster recently told us Steve Jobs' mantra circa 1996: "Apple will be the Nike of consumer electronics." I'm glad that the company's trying to clean up their act, but with a legacy like that, it's hard for me to applaud them for admitting they found underage workers. Image credit gnta.


Source: Gizmodo.com

Weird Science finds marriage can kill

If you're unhappily married, you might as well be single: At least if your goal in life is to have it all end via a fatal stroke. It's just a meeting abstract with an accompanying press release, but the results seem pretty clear cut. Single men have an elevated risk of dying from stroke compared to married men. But, if you separate out the men who report their marriage as "not so successful," then they have the same risk elevation as their single counterparts. Looking on the bright side, only 3.6 percent of the men viewed their marriage as that much of a downer.

Mouse species views the Y chromosome as irrelevant: Those of us who survived high school biology know that mammals use an X/Y sex determination system. But that's apparently one of those "lies for children"—sex determination systems evolve extremely rapidly, so there's plenty of potential for an exception to this rule. And, in fact, these exceptions exist: "A limited number of mammal species have, however, evolved to escape convention and present aberrant sex chromosome complements," as the authors of a recent paper put it. Behold the African pygmy mouse, Mus minutoidesz, which apparently has a perfectly normal Y chromosome, but has an unusual looking X that can override it, creating XY females.

Scientists measure the speed of racing turtles: If you heard the phrase "like swimming through sand," you'd probably expect it to refer to an arduous, inefficient process. For newly hatched sea turtles, however, the same flippers that help them scoot through the ocean can apparently compact a sandy surface, at which point they can push off it as if it were a solid. Young loggerhead turtles can turn in equivalent performance when scampering across sand as they do when making their way across sandpaper. Videos of scientists sending turtles off to the races are available.

Karma makes life less disappointing: There's a well described phenomenon called disconfirmation sensitivity, that describes how a mismatch between expectations and reality can lead to disappointment. But what happens if you believe that the Universe is structured in a way that compensates for your disappointments? Researchers performed a study of disconfirmation sensitivity in India, and found that the strength of one's belief in karma correlated with a decrease in subjects' tendency to experience the disappointment.

If you're not in it for the money, you must be incompetent: It's a two-fer of weirdness from the Journal of Consumer Research. US society as a whole is based on the assumption that the profit motive drives all sorts of creativity and competence. Apparently, we've internalized that message so well that we assume nonprofits are incompetent. Consumers feel warmly towards nonprofits, but aren't especially interested in buying anything from them. Sending subtle signals that suggest the nonprofit is good at what it does can overcome this effect, at which point the warm feelings make consumers even more likely to buy.

Robo-foot gains efficiency through fake ankle: As someone who has badly sprained both of his ankles at various points in the past, I've always viewed them as one of evolution's low points. But, as it turns out, they're a good thing: when functioning properly, they take some of the energy that would otherwise be dissipated by the foot and recycle it into the next stride. Researchers have now created a microprocessor-controlled robo-equivalent. Shut off the controller, and the ankle exacts a 23 percent energy cost; switch it on, and that cost drops to 14 percent. The researchers hope to put it into prosthetics some day.

Install Boxee Beta on Apple TV the Easy Way

The shiny new Boxee Beta didn't launch with Apple TV support, but there was a geeky hack to load it up. Now it's much, much easier to install, or upgrade, the Beta onto Apple's would-be HD media center.

If you'd already loaded an Apple TV with the Boxee alpha, you should simply be able to head to your "Launcher" menu, head to Downloads and upgrade the Launcher itself, and then upgrade Boxee to get the Beta up and running. If you're installing the Beta fresh, you can follow these instructions or, if you're already hip to the how-to of this sort of thing, just grab the updated ATVUSB-Creator, unplug your Apple TV, stick in the upgraded USB drive, and then power back on.

We haven't tried out the Beta on our Apple TV rig yet. Apple's somewhat under-powered media device will never provide exactly impressive HD video performance, at least compared to other modern media centers, but some forum posters report a more efficient operation with the Beta. If nothing else, it's a much nicer interface.