Wednesday, 7 March 2012

Cloud-streamed games let you click and play

Recently in Cloud

Cloud-streamed games let you click and play

Jacob Aron, technology reporter

Services like Spotify and YouTube make sharing music or videos as simple as sending someone a link, but telling your friends to play your new favourite game normally involves waiting for a hefty download and install process. Now California-based cloud computing firm Numecent and its gaming spin-off Approxy are hoping to let gamers instantly start playing by streaming games to their PC, tablet or smartphone.

Numecent uses what it calls "cloudpaging" to stream any application, not just games, to your PC. It works by analysing the code of a piece of software to discover the most-used elements and only delivering those to your PC. For large applications such as Photoshop, users normally only need around 5 per cent of the code to start using the program and the rest can be streamed in later. "We detect which bits that you really need and only bring those down," says Numecent CEO Osman Kent.

The software shows up in the Windows Start Menu as if it were installed locally, but disappears when you disconnect - though applications can also be stored in a cache and used offline if your software license allows it. Kent showed New Scientist "cloudified" versions of Microsoft Office and Photoshop that appeared just as fast as the real thing, even though he was downloading from Numecent's servers by tethering his PC to his iPhone's 3G connection.

Monday, 27 February 2012

Anatomy Of A Handheld Hospital



1 Processor that can power a pacemakerSmartphones run superfast (in excess of 1 GHz) without consuming much power, much like top-notch pacemakers and cardiac defibrillators.









2 Display that can assess an ultrasoundThe iPhone 4S's resolution (300 pixels per inch) is on par with most hospital-grade ultrasound monitors, and small screen size won't matter once projection tech takes off.








3 Camera that can capture cellsThe HD video camera, which shoots 30 frames per second, is more advanced than some of the ones in colonoscopes, which doctors use to seek out potentially cancerous tissue.








4 Accelerometer that can guide physical therapyThe three-axis accelerometer captures the same subtle movements--tilts, shocks, rotations--as APDM motion sensors, which are used to monitor patients' Parkinson's disease and help them through physical therapy.










5 Microphone that can hear your heartBecause of its flat-frequency response rate--which drastically reduces noise distortion--a smartphone mic (with help from an amplifying attachment) can detect a heartbeat almost as well as a $500 electronic stethoscope.

Smartphones Get Smarter, You May Get Healthier

As Smartphones Get Smarter, You May Get Healthier: How mHealth Can Bring Cheaper Health Care To All

By: Adam Bluestein
Smartphones and tablets are transforming the future of health care. Can we really trust them to save lives?

The average auto refractor--that clunky-looking device eye doctors use to pinpoint your prescription--weighs about 40 pounds, costs $10,000, and is virtually impossible to find in a rural village in the developing world. As a result, some half a billion people are living with vision problems, which make it tough to read and work.

Ramesh Raskar knew fixing this problem would be tricky. It required a new way of thinking about eye tests--and a new kind of device, one powerful enough to support high-resolution visuals, cheap enough to scale, and simple enough to be used by just about anyone. The MIT professor briefly toyed with stand-alone options, which were complicated and costly. Then he reached into his pocket and pulled out an unexpected savior: his iPhone.

"The displays had gotten so good, thanks to people wanting to watch episodes of Lost in high definition," Raskar recalls. "I was immediately energized."

By creating an app and attachment for the popular smartphone, Raskar could tap into a huge existing user base and skirt millions in distribution and manufacturing costs. The result: a plastic clip-on eyepiece that uses an on-screen visual test to determine a patient's "refractive error" (a number doctors then use to dole out prescriptions). When his startup, EyeNetra, begins market testing later this year in Brazil, India, and Mexico--and eventually in the U.S.--its tech will deliver all the functionality of an optometrist's costly machine for less than $30



This is the thrilling, disruptive potential of "mHealth," the rapidly growing business of using mobile technology in health care. Leveraging the wonders of a device that's fast becoming ubiquitous--two in three people worldwide own a cell phone--a new generation of startups is building apps and add-ons that make your handheld work like high-end medical equipment. Except it's cheaper, sleeker, and a lot more versatile. "It's like the human body has developed a new organ," says Raja Rajamannar, chief innovation officer at Humana. Smartphones can already track calories burned and miles run, and measure sleep patterns. By 2013, they'll be detecting erratic heartbeats, monitoring tremors from Parkinson's disease, and even alerting you when it's prime time to make a baby.

At stake is the future of health care--and a share of the $273 billion medical-device industry, which is dominated by the likes of GE and Philips. Although today's mHealth market barely tops $2 billion, experts predict that number will skyrocket over the next decade as smartphones get smarter and patients lose, well, patience with the high costs and hassles of health care. "Why prescribe a $1,000 test in the hospital when all you need is a heart rate?" asks Leslie Saxon, a cardiologist who heads the University of Southern California's Center for Body Computing. With inexpensive new technology, she notes, "I could tell a patient to go to the drugstore and buy an ECG [electrocardiogram] sensor for her phone."

But can we really trust our phones to dispense medical data? That's the question facing the FDA, which has spent the past year or so putting pioneering mHealth products through rigorous evaluations. "We had to show that our phone-computing platform and display quality were on par with existing devices," says Sailesh Chutani, CEO of Mobisante, whose ultrasound attachment was sanctioned in January--after about a year of costly back-and-forth. With this first wave of devices approved and a mobile-specific set of guidelines to be finalized later this year, the FDA expects to streamline its approval process, which should juice the mHealth market. "Regulatory clarity almost always drives investment--provided it's not a big, clear no," says Joseph Smith, who helps run the West Wireless Health Institute.

Whether these tools actually make us any healthier, however, will depend on how we use them. Given the ability to record our snacks, thoughts, naps, movements, and more, "we will be overwhelmed with data," warns John Moore, a lead researcher in the New Media Medicine group at the MIT Media Lab. "We need a holistic vision to make it all meaningful and motivating." Among other advances, that vision will require a seamless flow of data across myriad devices and platforms--think how the MP3 format transformed the music industry--and a physicians' movement to adopt electronic medical records. (Right now, only a third of them have.) And even then, there's no guarantee these tools will change behavior. Will we stop eating sugary foods? Or, as Smith wonders, will we just be staring curiously at "phones that show glucose readings in three colors"? Corporate titans are racing to find out. Johnson & Johnson, the world's largest medical-device maker, recently invested in sleep-monitoring technology from Zeo, a Massachusetts-based startup. Best Buy is funding earbuds that can monitor your heart rate. AT&T helped seed an employee-wellness program with WellDoc, whose apps help users manage diabetes, among other conditions. And Qualcomm, the renowned chipmaker, just launched a subsidiary that's helping to develop all kinds of mHealth devices. "Will this nascent technology attract consumers, health-care providers, and health-care payers?" says Don Jones, a VP at Qualcomm. "The entire world is keeping its fingers crossed."

Tuesday, 21 February 2012

Aug. 23, 1899: First Ship-to-Shore Signal to a U.S. Station


1899: The first ship-to-shore wireless message in U.S. history is sent by Lightship No. 70 to a coastal receiving station at the Cliff House in San Francisco.

Sherman is sighted,” the message said, referring to the troopship Sherman, which was returning a San Francisco regiment from the battlefields of the Spanish-American War. It marked the first use outside England of this technology, still in its infancy.

The name most closely associated with the invention of wireless telegraphy — what we now know simply as radio — is Guglielmo Marconi, but as with so many technologies, there were a number of hands stirring the pot, chief among them Heinrich Hertz, Alexander Popov and Nicola Tesla. Marconi’s claim to primacy was no doubt helped by the fact that he obtained the British patent for wireless in 1896, when Britannia still ruled the waves.

Radio communication at sea quickly evolved into an indispensable safety aid for mariners. By the early 20th century ships were able to communicate with each other as well as with shore-based stations. The Japanese navy used radio communication to scout the Russian fleet during the Battle of Tsushima in 1905, a crushing Japanese victory and a turning point in the Russo-Japanese War.

The failure of radio communication played a major role in the Titanic disaster in 1912. The lone radio operator aboard the Californian had switched off his set for the night (as was common aboard vessels carrying a single operator) and never received the Titanic‘s distress signals. Had someone been at his post, the Californian — by far the closest ship to the stricken liner — could have arrived soon enough to save many of the lives that were lost.

Heinrich Rudolf Hertz celebrated

German physicist, whose experiments led to the wireless telegraph and the radio, has his 155th birthday marked

The Guardian

 
 
 
Heinrich Rudolf Hertz, the German physicist, has his 155th birthday celebrated in a new Google doodle. Photograph: Screengrab

Google's latest animated doodle celebrates the 155th birthday of Heinrich Hertz, the German physicist whose experiments with electromagnetic waves led to the development of the wireless telegraph and the radio.

Born in Hamburg, where he demonstrated great skill in grasping the dynamics of physics even in boyhood, he later enrolled to study the subject in Berlin following a year at the University of Munich.

In Berlin, his progress in investigating electromagnetic phenomena was so rapid that in February 1880 he received his PhD – on electromagnetic induction in rotating spheres – at the age of 22.

After becoming a professor at Karlsruhe Technische Hochschule in 1885, Hertz turned his attentions to open electrical circuits and demonstrated electromagnetic induction to his students using a condenser discharging through an open loop.

In the course of doing this, he noticed an unanticipated phenomenon, the emergence of 'side-sparks' in another nearby loop. By 1888, he was able to demonstrate that the electromagnetic emissions associated with these sparks behaved like waves.

The finding, which effectively clarified and expanded the electromagnetic theory of light that had been put forth by the British physicist James Clerk Maxwell in 1884, was hailed as confirmation that electromagnetic waves could be transmitted and received.
Hertz's name later became the term used for radio and electrical frequencies, as in hertz (Hz), kilohertz (kHz) and megahertz (MHz).

He died in Bonn in 1894 after contracting Wegener's granulomatosis, a rare disorder in which blood vessels become inflamed, and was buried in Ohlsdorf, Hamburg.

Wednesday, 15 February 2012

An update for Adobe's Flash Media Server

Adobe has released a new update for its "Flash Media Server", version 4.5. It was an opportunity for AEG Digital Media, a specialist in webcast and media services for live streaming events, to team up with Adobe for its promotional campaign. In a mini-reportage, we see their technical teams working at full tilt; we clearly appreciate the levels of stress inherent in their work!

The vice president of AEG Digital Media admitted that his company was pulling out all the stops to ensure reliable and high quality production across all new media. To achieve this, it is obviously essential to be able to rely on technology as robust as that offered by Adobe's "Flash Media Server".

And the cherry on the cake: this update means content in Flash format will be viewable on iPhones and iPads. About time too!Provided by YC/ATC-TCL.com

Yahoo! net income dives on sinking revenue

Struggling Internet pioneer Yahoo! reported Tuesday that third quarter net profit dove 26 percent from a year earlier as revenue sank.
Yahoo! had net earnings of $293 million on revenue of $ 1.072 billion in the quarter to September 30, compared with $396 million in profit on $1.124 billion in revenue in the same period last year.
"We're pleased that revenue, operating income and EPS (earnings per share) were all above consensus this quarter," said interim Yahoo! chief executive Tim Morse.
"My focus, and that of the whole company, is to move the business forward with new technology, partnerships, products, and premium personalized content -- all with an eye toward growing monetization," he said.
Yahoo!'s stock price climbed more than three percent to $15.97 per share in after-hours trade following the report, which beat Wall Street expectations.

Tuesday, 14 February 2012

Vodafone 'considers' offer for Cable & Wireless

Mobile phone giant Vodafone said on Monday it was considering an offer for Cable & Wireless Worldwide, the global telecoms company set up in the 1860s to run the British empire's communications network.

In a regulatory statement issued in response to press speculation about a deal, Vodafone said it "regularly reviews opportunities in the sector and confirms that it is in the very early stages of evaluating the merits of a potential offer for CWW".

Vodafone, with operations around the world, said there was "no certainty that an offer will be made nor as to the terms on which any offer might be made".

"Any offer, if made, will be in cash but Vodafone reserves the right to change the (terms) ... A further announcement will be made in due course, if appropriate."

Under British regulations, Vodafone must make its intentions clear as to an offer by March 13.
Press reports at the weekend said the deal could be worth some £700 million (836 million euros, $1.14 billion).

Cable & Wireless was involved from the start in the laying of submarine cables around the world which linked the outposts of the British empire as it expanded in the 19th century.

Friday, 27 January 2012

5 Storage Predictions for 2012

2011 was quite a year for the storage industry. From the billion dollar acquisitions to the disruptive flooding in Thailand, it was a year to remember. As we look forward, here are 5 storage predictions for the new year.

1. Users continue to generate piles of unstructured dataBack in 2009, Gartner estimated that data growth would happen at a rate of 650% over the next 5 years with 80% of this growth coming from unstructured data. We can get lost in the weeds with facts and figures but most IT managers I’ve spoken with have all said the same thing: their users are storing more and deleting less. The cloud will play an important role in offering an easy to deploy tier for this growing primary data. Deduplication will also help curb some of this data growth as will the perpetual move of core applications to the “datacenter in the sky”. Ultimately, strategies involving multiple technologies will help IT relieve the pressure felt by skyrocketing data growth.

2. Consumerization of IT generates massive headaches for ITThe use of smartphones, tablets, and consumer cloud storage services will cause even bigger headaches for IT. Employees are using more technology and cloud services at home than ever before – and now they expect them to work on the corporate network. Not only does this introduce headaches in trying to support these rogue devices, but major security challenges as well. IT will spend much of this year trying to determine how best to handle this onslaught of personal devices and consumer cloud services.

3. Flash, flash and more flashFlash production in the consumer market has been ramping up since the first iPhone rolled off the assembly line. However, over the past 18 months it has been gaining significant traction in the enterprise storage space, and for good reason. The SSD brings a unique component to the enterprise storage controller and with it IOPS that were previously unthinkable. Like the traditional hard disk drive and the cloud, SSD fills another piece of the puzzle toward creating the most effective enterprise storage controller. Costs will continue to fall, endurance/reliability will improve, and the proliferation of the SSD in the enterprise will spiral upward.

4. The cloud is used as a component inside the storage controllerSending off data directly to a public or private cloud has never been a practical solution for primary storage. Issues with latency, eventual consistency and overall access speeds have held the cloud back from all but the smallest of backups. However, put the cloud inside the storage controller and you have something special. Functioning alongside traditional enterprise hard disk drives, the cloud brings unique functionality to the storage controller and makes storage as a service possible. The hassle of backups is rendered a non-issue, consistent, pain-free access to data across multiple locations is made possible and the ability to recover from a complete disaster in less than 15-minutes becomes a reality.

5. Cloud SLAs get seriousCloud providers have been backing their services with service level agreements since the very beginning. But did they even matter? The actual numbers associated with downtime are astronomical. Let’s say 100 of your users lose access to their data for a mere 5 minutes - you’ve just lost an entire days worth of productivity. A few pennies from a service provider aren’t going to begin to make up for that loss. In order for the enterprise to take cloud services seriously (and sell the decision makers) the service level agreements will shed their meaningless penalties and grow some teeth.

Thursday, 26 January 2012

Google and Bing accused of directing users to illegal copies of music

Josh Halliday

Entertainment groups want Google to 'effectively screen' mobile apps on Android smartphones in an effort to combat illicit sharing. Photograph: Robert Galbraith/Reuters

Google and other search engines "overwhelmingly" direct music fans to illegal copies of copyrighted tracks online, a coalition of entertainment industry groups has told the government.

In a confidential document obtained under the Freedom of Information Act, lobbying groups for the major rights holders claimed Google and Microsoft's Bing are making it "much more difficult" for people to find legal music and films online.

The private document, obtained by the free speech campaigners Open Rights Group and shared with the Guardian, urges the government to introduce a voluntary body that would remove rogue websites from internet search results.

The proposals were made to the culture minister Ed Vaizey as part of a series of consultations on internet piracy between rights holders, search giants and the government in November last year. The nine-page document was submitted on behalf of the British Phonographic Industry (BPI), the UK body for the music majors, the Motion Picture Association (MPA), the Premier League, the Publishers Association and the Pact, the film and TV independent producers' trade body.

Privately, rights holders said there is a "spirit of optimism" between the entertainment groups and search engines as they attempt to usher in more legal media sites, including Google's own fledgling music service.
Google has in the past year stepped up efforts to remove copyright-infringing content, launching a fast-track removal requests form and filtering terms "associated with infringement". However, the rights holders claim in the document that "as time goes on, the situation is getting worse rather than better".

"Consumers rely on search engines to find and access entertainment content and they play a vital role in the UK digital economy," the rights holders state.

"At present, consumer searching for digital copies of copyright entertainment content are directed overwhelmingly to illegal sites and services."

The entertainment groups want Google to "continuously review key search words" and "effectively screen" mobile apps on Android smartphones in an effort to combat illicit sharing.

The document claims that 16 of the first 20 Google search results for chart singles link to "known illegal sites", according to searches by the BPI in September. In an attempt to persuade the government to clamp down on search engines, the groups claim that 41% of Google's first-page results for bestselling books in April last year were "non-legal links" to websites.

"Much of the illegal activity in the digital economy is facilitated and encouraged by money-making rogue sites," the document claimed.

"Intermediaries, unwittingly or by wilfully turning a blind eye (or in some cases, by encouraging such activity), play a key role in enabling content theft and often even profit from it. Only a comprehensive approach can address this issue."

The entertainment bodies call for search engines to:

• Assign lower rankings to sites that "repeatedly" make available copyright-infringing material
• Prioritise sites that "obtain certification as a licensed site" for music and film downloading
• Stop indexing sites that are subject to court orders
• Stop indexing "substantially infringing websites"
• Improve "notice and takedown" system
• Ensure that users are not directed to illicit filesharing sites through suggested search
• Ensure search engines do not advertise around unlawful sites or sell keywords associated with piracy or sell mobile apps "which facilitate infringement"

The chief executive of BPI, Geoff Taylor, said on Thursday: "The vast majority of consumers want search engines to direct them to legal sources of entertainment rather than the online black market.
"As search engines roll out high-quality content services, like Google Music, we want to build a constructive partnership that supports a legal online economy. We hope that Google and other search engines will respond positively."

A spokeswoman for the Motion Picture Association added: "If you look for film or music via a search engine you usually find websites providing access to pirated films or music at the top of the list of results.

"This is confusing for consumers, damages the legal market and legitimises copyright theft. We are in dialogue with search engines, ISPs [internet service providers], advertising networks and payment processors about a code to deal with the escalating problem of online copyright theft which threatens the growth of the entire creative industries sector. This paper is a result of that dialogue and we appreciate government's continuing efforts to help bring about a more responsible internet".

A spokesman for Google said: "Google takes the fight against online piracy very seriously. Last year, we removed over five million infringing items from Google Search. We have made industry-leading efforts in this field, investing over $50m (£32m) in fighting bad advertisements and over $30m on Content ID software, giving rights holders control over their YouTube content.

"We continue to work in close partnership with rights holders to help them combat piracy and protect their property."

Peter Bradwell, campaigner for the Open Rights Group, said the proposal contained "some dangerous ideas". He said: "It's another plan to take on far too much power over what we're allowed to look at and do online."

Major rights holders claim search engines make it 'difficult' for people to find legal music and films online

The major rights holders' document obtained under the Freedom of Information Act

Wednesday, 25 January 2012

IBM partners with NEC for OpenFlow switch, software-defined networking

Shamus McGillicuddy, News Director

IBM announced a new OpenFlow switch that it is co-marketing with NEC’s OpenFlow controller. The combined products represent the first end-to-end software-defined networking solution from a leading North American IT vendor and could establish IBM  as a major competitor to Cisco Systems, Juniper Networks and other vendors in the hotly contested data center networking market.

To date, OpenFlow and software-defined networking have been the provenance of startups and smaller vendors like NEC, which released its ProgrammableFlow OpenFlow products last summer. The major networking vendors have dabbled in OpenFlow, making it available on some select switches, but none have stepped forward and embraced the technology fully. While IBM is not a dominant networking vendor, but it is one of the largest IT vendors in the world and has a long networking history.

“With the brand and marketing of IBM and NEC, it’s going to make customers take a second look at OpenFlow and say, ‘Hey if IBM is behind this, then I can almost take the leap.’ You know IBM isn’t going to leave you stranded,” said Lucinda Borovick, program vice president for enterprise and data center networks at IDC.

The IBM/NEC solution consists of NEC’s ProgrammableFlow controller and IBM’s 1.28 Tbps RackSwitch G8264 top-of-rack switch. The switch features 48 SFP/SFP+ 10 GbE ports and four QSFP 40 GbE ports that can be split out to an additional 16 10 GbE ports. It supports OpenFlow 1.0.0 and it can handle a maximum of 97,000 flow entries.

Theoretically an enterprise can build an entire data center network with IBM’s OpenFlow switches and NEC’s controllers.

“With OpenFlow you don’t need core and aggregation equipment anymore,” said Jon Oltsik, principal analyst with Enterprise Strategy Group. “You can create a fabric out of access switches.”

With OpenFlow switches will hype turn into reality?

Network engineers remain intrigued by OpenFlow and software-defined networking, but the technology is still emerging from its “science project” status.

OpenFlow is an open source protocol that allows enterprises to transform their networks from a distributed system where switches and routers make individual forwarding decisions to a centrally controlled system where an OpenFlow controller makes forwarding decisions.

OpenFlow controllers can also host applications that make networks more programmable. By using the centralized view of the network, developers can write applications that replace  functionality on advanced switches and routers or specialized network appliances like firewalls and load balancers.

Enterprises can also use the OpenFlow controller to make rapid configuration changes to their networks and to provision and dedicate network resources quickly for specific applications and services. This is especially important as enterprises consolidate into larger data centers and start to build private and hyrbid clouds.

IBM’s OpenFlow switch intrigues engineers, but not for rip and replace

Selerity, a provider of low-latency, real-time financial data to financial services companies, has been trialing the IBM/NEC OpenFlow network, according to Andrew Brook, Selerity’s CTO. His company uses proprietary algorithms to extract financial information from unstructured data, such as press releases, and send that data to its clients via a dedicated networks collocated with trading venues in Chicago, New Jersey and Frankfurt.

“Competition in this space is measured at the sub-microsecond level. Our clients are making trading decisions on a scale of 1 to 10 microseconds after getting data delivered by us.”

What's more, Selerity’s customers don’t receive uniform sets of data. Based on the services they pay for, Selerity customers are entitled to receive certain subsets of the data. The best way to meet these dual requirements is by multicasting over a low-latency switch. But in a multicast environment , Selerity struggles to send selective data sets to customers in real time. The programmability and rapid configurability of an OpenFlow network offers some promising solutions to this problem. Brook has determined that the IBM OpenFlow switches and the NEC controllers enable low-latency and real-time policy-driven content distribution.

“I don’t want to send that data out in separately addressed datagrams because it has to be sequenced and someone gets it first and someone gets it last,” he said. “I want to send it out as multicast, but what I want to change is which of the outgoing switch ports are going to participate in a particular multicast.”

Engineers can direct the forwarding on traditional switches but not in real time.

“There are some things we can do with OpenFlow to change the rules implemented on the switches in close to real time and get very nice, deterministic behavior by the switch. Right now, we are looking to do that functionality in the controller, but the speed at which we can do that is an open question. For what we’re doing today it’s acceptable.”

Brook is still evaluating IBM’s OpenFlow switch and NEC’s controller and if he adopts them, it won’t be a wholesale replacement of his existing network.

“In the short-term, it would be us identifying specific applications,” he said. “For example the edge switch that sits between our content delivery network and our clients.”

Tervela Corp., a provider of distributed data fabric appliances for global trading, risk analysis and ecommerce, is also evaluating the technology. Tervela customers typically deploy the company’s products on their own local network; however, Tervela engineers often consult with customers on the best network configurations to support its technology.

Michael Matatia, director of Software Engineering for Tervela, said his engineers are trialing the IBM/NEC OpenFlow network because he anticipates that customers will start using OpenFlow as an alternative to their traditional Layer 2 and Layer 3 networks.
“As OpenFlow has more traction, I anticipate that our customers will have OpenFlow deployments,” he said. “We need to be up and ready with the technology so we can talk intelligently about the advantages of OpenFlow and when to use it.”

Despite IBM’s involvement, OpenFlow doubts remain

IBM's involvement in OpenFlow has its appeal, but some question whether OpenFlow will really change networking

An ecosystem of developers will need to emerge to offer enterprises that programmability. OpenFlow startup Big Switch Networks recently made its OpenFlow controller available as an open source project expressly to promote the growth of such a developer community.

Selerity’s Brook is mindful of OpenFlow’s place on the adoption curve.

“It’s still not clear to me that pure OpenFlow allows them to do anything differently. Most of the things you can do with software-defined networking, there are other ways to do it. Cisco lets you do it [with FabricPath], Arista lets you do it. I haven’t been convinced that OpenFlow is the right way to solve this problem,” said Zeus Kerravala, principal analyst of ZK Research.

Brook said his company has specific niche needs or “severe technical requirements” that require the adoption of emerging technologies like OpenFlow, but in other parts of his infrastructure he still prefers to use established industry standards.

“OpenFlow seems to have some mindshare and some motion behind it. We’ll have to watch and see how rapidly it gets adopted before we assess how much we deploy it. This particular solution that IBM and NEC have put forward is nice, because the actual switching devices from IBM, even if you ignore the OpenFlow capabilities, are very nice switches. I’m not too worried about making investments because even if OpenFlow doesn’t catch on, it’s still very capable switch,” he said.

Sunday, 22 January 2012

T-Mobile's 'secret menu': Extra goodies you need to ask for

T-Mobile USA's stores may not offer the Double-Double burger, but they do have their own secret menu a la In-N-Out.

Starting January 25, existing and new customers who sign up for a T-Mobile premium data plan--which consists of signing up for 5 gigabytes to 10GB of data each month--can get the mobile hot-spot capability for free--as long as they ask for it. TMoNews first reported the news, noting that customers could also ask for a mobile album feature, which provides 10GB of cloud storage for media.

That's $19.98 in additional value for signing up for the higher end plans. The features, however, won't be widely promoted in the store, so customers will need to ask for them, just as customers have had to learn from word of mouth about the items on In-N-Out's now not-so-secret menu. The offer is only available for a limited time.

The promotions are just the latest move for T-Mobile, which is attempting to win back customers and re-establish itself as an independent competitor after its deal with AT&T fell through. At the Consumer Electronics Show, T-Mobile USA CEO Philipp Humm struck a defiant tone, gleefully pointing out the "gifts" that AT&T had left it ($3 billion in a break-up fee, plus roaming agreements and spectrum), and declaring that it was back on course as the industry's disruptive force.

Indeed, the window appears to be opening for T-Mobile to potentially nab some market share from the bigger players. AT&T, despite its push for more affordable service, decided to hike the prices for its data plans, which some believe could lead to a defection to lower priced options. Over the past few months, the company has stepped up its aggressive offers in an effort to win over new customers. It is also offering more affordable phones such as the well-reviewed Nokia Lumia 710 for $50.

T-Mobile still has an uphill battle. It's now the only major carrier without the iPhone, a gap it hopes to fill eventually, but hasn't had much luck with yet. The carrier said recently, however, that it could technically happen with the next version of Apple's smartphone. It's also the only major carrier not yet moving to LTE, instead relying on its HSPA+ network, which it calls 4G.

Still, these special discounts and promotions help. A T-Mobile representative said the carrier will offer such promotions from time to time without any national advertising, but will get the word out through digital advertising, its Web site, or in-store posters or brochures. Many are available when you call into customer care lines too.

T-Mobile's mobile hot spot and album offer comes with the purchase of a 5GB plan, which costs $89.99 a month, or a 10GB plan, which costs $119.99 a month.

For prepaid customers, T-Mobile plans to offer a $50 mail-in rebate card for the Samsung Exhibit II or the Sidekick with the purchase of two months on a $50 Monthly4G plan. The offer starts on February 1.
A T-Mobile representative said the company plans to offer more promotions throughout the year.

Thursday, 19 January 2012

Windows revenue falls 6%

Microsoft Q2 2012 by the numbers: Windows revenue falls 6%
By
Late this afternoon, Microsoft answered a question oft-asked by investors this month: What about Windows?   Near the end of his Consumer Electronics Show keynote last week, Microsoft CEO Steve Ballmer boomed: "There's nothing more important at Microsoft than Windows".  But at the same event, Tami Reller, Windows & Windows Live  CFO,  warned that the division's fourth-quarter results could fall below analysts' estimates, because of weak PC sales. Today's fiscal second quarter 2012 earnings results answered by just how much.

For Q2, ended December 31, Microsoft revenue was $20.89 billion, up 5 percent year over year. Operating income: $7.99 billion, a 2 percent decrease. Net income was $6.62 billion, or 78 cents a share. Both were flat year over year.

Average analyst consensus was $20.93 billion revenue and 76 cents earnings per share, for the quarter. Revenue estimates ranged from $20.20 billion to $21.35 billion, with estimated year-over-year growth of 4.9 percent -- modest for a holiday quarter.

"We delivered solid financial results, even as we prepare for a launch year that will accelerate many of our key products and services", Ballmer contends. "Coming out of the Consumer Electronics Show, we’re seeing very positive reviews for our new phones and PCs, and a strong response to our new Metro style design that will unify consumer experiences across our phones, PCs, tablets and television in 2012".

Microsoft's PC Problem
Because Windows is so important to Microsoft -- it's not just Ballmer boasting -- slowing PC sales's effects reach far beyond the operating system. But nowhere are they more apparent than the Windows & Windows Live division, which dragged down Microsoft operating and net profits. The division's revenue fell 6 percent year over year.

Last week, Gartner and IDC released preliminary calendar fourth-quarter and all-2011 PC shipments; growth was tepid globally and retracted in the United States. IDC called 2011 the "second worst year in history" for US PC shipments - with 2001 claiming the unwanted crown. Despite a global, temporary hard drive shortage, Gartner and IDC say the declines they observed -- 1.4 percent and 0.2 percent globally, respectively -- were in line with their forecasts. US declines were substantially greater, 5.9 percent by Gartner's reckoning and 6.71 percent by IDC's.

Besides the hard drive shortage, several troubling trends have emerged. Simply put: Consumers aren't buying Windows PCs like they used to. Their spending goes to other stuff, with tablets -- and that really means iPad -- ripping away sales. We just finished the holiday quarter, one of the two seasons of typically strong sales (back to school is the other). "Continuously low consumer PC demand resulted in weak holiday PC shipments", Mikako Kitagawa, Gartner principal analyst, says.

This consumer infection -- infatuation with iPad, some other tablets and smartphones -- is spreading. According to an IDG Connect study released this week, IT and business professionals are rapidly adopting iPads as partial or complement laptop replacements; remember these people make technology purchase decisions for entire corporations -- Microsoft's core market. Sixteen percent have replaced their laptop with an iPad and 54 percent supplement it. The data suggests that iPads are significantly starting to cannibalize PC sales -- and not just among consumers -- and it's consistent with recent global PC buying trends.

Earth to Windows & Windows Live president Steven Sinofksy: You can't ship Windows 8 soon enough. The new operating system, which runs on ARM as well as x86 processors, is optimized for tablets as well as PCs. Microsoft can fill an important niche in the PC sales-cannibalizing tablet marketing -- offer a truly desktop operating system that runs the same applications and supports enterprise services as those on PCs. Windows 8 public beta is currently slated to be available late next month, which, based on previous versions, puts public availability around October.

Q2 2012 Revenue by Division
 •Windows & Windows Live: $4.74 billion, down 6 percent from $5.06 billion a year earlier.
 •Server & Tools: $4.77 billion, up 11 percent from $4.29  billion a year earlier.
 •Business: $6.28 billion, up 3 percent from $6.11 billion a year earlier.
 •Online Services Business: $784 million, up 10 percent from $713 million a year earlier.
 •Entertainment & Devices: $4.24 billion, up 15 percent from $3.7 billion a year earlier.

Q2 2012 Income by Division •Windows & Windows Live: $2.85 billion, down 11 percent from $3.21 billion a year earlier.
 •Server & Tools: $1.97 billion, up 17 percent from $1.7 billion a year earlier.
 •Business: $4.15 billion, up 2 percent from $4.09 billion a year earlier.
 •Online Services Business: Loss of $458 million, up 18 percent from $559 million loss a year earlier.
 •Entertainment & Devices: $528 million, down 21 percent from $666 million a year earlier.

Division Highlights

Microsoft reports revenue and earnings results for five divisons: Windows & Windows Live, Server & Tools, Business, Online Services and Entertainment & Devices.

Windows & Windows Live. Weaker than-expected PC demand hurt the division during fiscal second quarter. Revenue fell 6 percent year over year, which is simply stunning during the holiday quarter. Worse: Operating income declined by 11 percent.

Microsoft estimates that global PC sales fell between 2 percent and 4 percent, greatly contributing to Windows revenue decline. Consumer PC sales fell by 6 percent, while those to businesses actually rose -- by 2 percent. Netbooks fell 2 percent.

OEM revenue fell by 7 percent, which reflects weakness in PC shipments identified by Gartner and IDC. Three-quarters of Windows divisional revenues comes from OEM sales.

To date, Microsoft has sold 525 million Windows 7 licenses. One-third of enterprise desktops run Windows 7, the company claims.

Server & Tools. Revenue rose 11 percent year over year and operating income by 17 percent. The division is insulated against economic maladies, because about 50 percent of revenues come from contractual volume-licensing agreements.

"Product revenue increased $328 million or 10%, driven primarily by growth in SQL Server, Windows Server, Enterprise CAL Suites, and System Center, reflecting continued adoption of Windows platform applications", according to the company.

Business. The division was the quarter's big overall performer (again), but grew modestly, with revenue up 3 percent and income each up 2 percent year over year. However, adjusting for the tech-revenue guarantee a year earlier, related to the Office 2010 launch, revenue grew by 7 percent. Revenue topped a whopping $6.2 billion.

Annuity licensing grew a stunning 12 percent. Lync revenue grew by 30 percent.  "Microsoft Office system. Business revenue increased $420 million or 9 percent, primarily reflecting growth in multi-year volume licensing revenue, licensing of the 2010 Microsoft Office system to transactional business customers, and an 11 percent increase in Microsoft Dynamics revenue", according to the company.

Like Server & Tools, Business division is largely insulated against sluggish PC sales. Sixty percent of revenue comes from annuity licensing to businesses.

Online Services Business. Online services revenue rose by 10 percent. Search and display ads drove up online advertising revenue by 13 percent -- $81 million to $713 million. "OSD operating loss decreased due primarily to higher revenue and lower sales and marketing expenses, offset in part by increased cost of revenue", according to Microsoft's financial release. The change: 18 percent.

Entertainment & Devices.  Revenue rose by 15 percent, but losses increased by 21 percent year over year. Microsoft shipped 8.2 million Xboxes during the quarter. Xbox Live subscriptions rose 33 percent to 40 million. Kinect install base: 18 million.

"Xbox 360 platform revenue grew $322 million or 9%, led by increased volumes of Xbox 360 consoles sold and higher Xbox Live revenue, offset in part by lower volumes of standalone Kinect sensors sold", according to the company.

Microsoft now reports on Skype, which has 200 million active users globally.

Wednesday, 18 January 2012

Cooking tablet

Some 70 companies were selected to take part in the "sneak peek" preview ahead of the show's official launch.

Among them is Qooq - a French company that has designed a tablet computer for the kitchen.
The Linux-based device is splash-proof, is held off the ground by feet that allow spilled liquids to run underneath, and can shrug off temperatures of up to 60C (140F).

Qooq - pronounced like cook - is designed to be messy kitchen-friendly
For a subscription fee users are offered access to a multimedia library of thousands of recipes by French chefs which can be customised to suit the user's kitchen skills and dietary habits.

The device is already on sale in France and the firm is at CES to announce an English language version due for release in September.

"We know that people bring hi-tech devices to the kitchen - with ours there is no risk," says Hubert Bloch, the firm's chief marketing officer.

"In the future we think people will have multiple tablets. The Qooq can be splashed, used with dirty hands and it's not a problem - just sponge it and it's clean again."

Tuesday, 17 January 2012

Physical Security of Digital Equipment

When we talk about human security basically we are talking about physical security. Human security is not firewall not patches and software. Physical security means to secure environment around your computer installations, your networks your information technology facilities.

First impact of the physical security on our brains is gun, gates and guards. Yes, off course it is also part of that physical security which we are going to discus. Physical security protects systems and people from various threats, including natural threats and man made threats.
First we talk about natural threats; we have many examples of natural disasters happen in last decade which make billion of physical installation of computers. For example in Haiti last year earthquake and that earthquake destroy government data centers. Second example is flood in Australia which destroy billion if physical network installations. Fire, tornadoes, hurricanes, earthquake and floods could destroy Information
Technology setups on large scales. Man made threats are common but can’t cause of big scale disasters like terrorist attacks, hackers, and car or plane crash. Power failure by a person also is threat.

Physical security includes visitor’s log file which manage all information about the people who visit your premises, Fence will protect and keep away unauthorized person far from your building, we can see fences in government agencies building where high protected data stored, badges can allow only the authorized persons into building. Badges are normally with pictures, name and department, now a day RF identity cards also use on digital door locks, guards are very important for physical security because they are trained for terrorist attacks and can keep safe from unauthorized persons. Closed Circuit Television (CCTV) is very popular for physical security. Normally they installed with recording option and can be playback if any problem found in security.

Alarm systems are also part of security systems and are very effective in some situations. Door locks off course primary level security. Door locks are in different kinds and access methods like proximity cards, door combinations and radio frequency door openers. Physical security equipments installed on the base of value of computers and data. If it is high level security required the equipment must be high cost and dedicated.

With security it is also required some other controls like administrative and managerial controls, technical and logical controls. Security should be applied as appropriate to degree of sensitivity of assets you are protecting. Must be a proper physical security policy and that policy applies to confidentially and available aspects of systems and data.

Monday, 16 January 2012

Keep Your Kids Safe Online

Internet is the widest term we use in last 2 decades. It connects people and organizations and you can easily spread and access information you like. Internet can provide you almost all kind of information and contents like text, pictures and videos from religion to science but biggest internet contribution from various people and organizations is sexual explicit content. In whole world people spend 3765$ per hour to see sexual contents on internet. You can imagine it is a multimillion dollar industry and that also affect all kind of users. 78% of kids age 8-15 have internet access in developed countries.

Internet access to user under age of 18 for academic purposes is necessary but threat of child abuse and explicit sexual material is also there. Not only sexual material there is a world of explicit material of religion, politics, critical science material is also open for your kids. For a safer internet children interaction we have to check and balance internet usage. I think the most necessary is the awareness and training of parents. Because of a generation gap 60-70% parents did not know how to control and audit child access for internet. Even if you are not an IT guy you can read following guidelines and manage your home PC for a restricted and parental locked internet.

Let’s have look on method that how we can control the access of internet for kids. Here we are talking about the most popular operating systems like Windows vista and Windows 7.

Physical Placement of your Computer

Always place computer for your kids in main lobby or living room and you can keep an eye of usage of that computer. Placement of computers in personal rooms of kids under 18 years can change their sleeping habits because you cannot restrict their usage timings.

Parental Control in Windows Vista and Windows 7

You can found parental control in both Microsoft Windows Vista and Windows 7. Enable it and read the option carefully, you can easily setup parental controls. Make a user name for your kid with less permissions and privileges and you can track that user name easily. Never give admin account to kid under age of 18.

Time limits for Internet and Computer Usage

You can easily restrict timing of your child for using computer and internet. Option for time management for a specific user name is available in user menu in control panel.

Online Game Freak

Online gaming is very significant issue for parents these days. Kids spend hours online and that can be harmful for studies. You can restrict games and online hours of your children. In control panel –user menu option you can easily set which game runs and which not.

Application and Programs Restriction

You can restrict user from installing and uninstalling and use any application or program. This can keep safe your computer from viruses and Trojans. In user option you have application allow and block option.

Activity Reporting and Audit

This is very important for parents to activity report and audit user account, this may be effect the privacy of your kid but it is better than an abuse of your kid. Activity report can give an idea that what kind of websites your kid likes to visit and what kind of content downloaded and explored. Keep eye on your child online friends and never allow your kid to be a friend of stranger who is with age difference. If you found any problem in chat logs or websites explored by your kid be calm and friendly with kid and take your kid to a consular for safe internet for kids. Don’t be rigid with your kids in this matter.

Sunday, 15 January 2012

How You Can Secure a Wi-Fi Network

Wi-Fi is the latest technology and the ease of Wi-Fi networks make it very popular among people in no time. In last decade Wi-Fi become most popular term for who uses computers. Wireless Networks rapidly marketed, adopted and deployed by organizations and individuals

Wireless Network allows freedom from cables and you can roam round in house and your office and especially in big work spaces you can easily use wireless network. As far as wireless security concerns, wireless does not offer protection of wired network by default. In wire network you can easily trace out any kind of interference but in wireless network you did not know who is in your network paradigm and is very easy for hacker to access networks because wireless radio wave signals are all over your premises and can easily tap, a person tap your signal of your wireless device nearby your building or car parking lot or in any hidden building part.

This technology popular very rapidly so no one thinks about security issue because people think functionality first and security second. Awareness and installation expertise are not very high and this is the main cause of un-secured networks. People buy a wireless router and establish a network, did not use encryption and make their network an un-secured network.

Wireless network device signal are easily identified by any mobile or computer device and if your network have no encryption, your network is on stake. Without encryption every one can see and get the data you are sending and receiving.

Biggest reasons of hacking wireless networks are the default setting and physical installation of wireless routers. Default settings can easily accessible by any person, people left same user name and passwords as like company default. If your network router is physically accessible by any person, it is possible any one could reset its setting to default and can access your network. Never left your Identifiers (SSID’s) left as default device settings and allow it to broadcast signals. Lack of implemented security means easy network access by unauthorized persons.

Let’s see how we can fix un-secured network access.

1. If you are new to wireless networking then go for WEP security settings and these setting your can found in your wireless router setup. You can easily access router setup by typing default IP address of router. Mostly router uses IP address “192.168.0.1”, after router shall ask you a user name and password. Write default username and password and now you are in security settings. First of all change your user name and password and keep write them on a safe place. Now you can setup your WEP setting and write a phrase in WEP setting. Make it 128bit and save your settings and logout. Restart your router and now your router is ready and secured. When you access your network it will ask you the WEP key or phrase, enter key or phrase you have given in router setup and your PC/Laptop/Mobile shall connect your wireless router. Keep save your phrase and key don’t share it with other people.

2. WEP is a primary level security and be break easily by any expert wireless hacker but it is better than nothing. If you are implementing wireless network in your professional environment you must choose WPA/WPA2 network encryption. These are much better encryption algorithms and not easy to break and sniff.

3. SSID rename and hiding is good for network security. If you hide your SSID it will not discoverable by ordinary discovering devices. If you rename and hide your SSID it will need to configure manually and that will be difficult for hack by unknown person.

4. Mac Address filtering is good if you have not guests in your networks. You can add Mac Addresses of your all network devices which are part of network and then you can block any other Mac address.

5. Advance Measures include 802.1X and device authentication also can make possible network security.
All of the above security measure did not guarantee you a 100% hack proof wireless network but it is always better than nothing.