Thursday, April 30, 2009

Goldman Sells $2 bln in Notes Not Govt-Guaranteed

Goldman Sachs Group Wednesday sold $2 billion of notes not backed by a government guarantee in a sign of an incipient thaw in credit markets, analysts said.

"That's a good sign for the banking sector," said William Larkin, portfolio manager with Cabot Money Management in Boston. Both Goldman and JPMorgan are starting to issue bonds that are not backed by the U.S. government after a virtual drought of such issues, he added.

Even so, with investors still wary about the fragile banking system, it is much more expensive for banks to issue debt outside the umbrella of government protection.

Goldman sold the five-year, dollar-denominated global issue at about 410 basis points over comparable government Treasury yields, according to IFR, a Thomson Reuters service. That was broadly in line with initial price talk earlier Wednesday of 412.5 basis points over Treasuries, IFR said.

Soon after the issue was priced, it was trading about 30 basis points tighter, or about 380 basis points over equivalent Treasuries, said Bob Gorham, managing director and head of investment-grade bond trading at Broadpoint Capital in New York. Gorham said demand was quite brisk for new corporate bond issues on Wednesday as the market's tone firmed.

An uptick in new debt sales after a two-week lull for earnings season is also lending support to the strong sentiment in the market, analysts said.

However, Goldman had to offer investors much higher compensation for the risk of holding its stand-alone debt by selling the Wednesday issue for much higher yields than its government-backed notes.

Goldman's FDIC-backed notes maturing in December 2012 were trading at a spread of about 47 basis points over equivalent Treasuries according to Tradeweb data, compared with about 410 basis points for the bank's Wednesday issue when it was first sold.

Since the panic in the financial markets in the fourth quarter of 2008, investors have generally shunned U.S. bank bonds that are not backed by government regulator the Federal Deposit Insurance Corp.

Goldman's five-year senior global notes were the bank's first issue since January that were not backed by the government.

On April 16, JPMorgan made a stand-alone issue, selling $3 billion in debt without U.S. government backing for the first time since August.

Goldman's issue represents the latest inroad into a sector of the corporate bond market that investors have mostly avoided for months, hinting the market for this type of debt is starting to open up again, analysts said.

However, bond investors generally view Goldman and JPMorgan as among the strongest major U.S. banks.

Both have signaled they now have the resources to repay bailout funds which the government injected into the banking system late last year to save it from implosion. (Additional reporting by Tom Ryan, Caryn Trokie and Dan Wilchins in New York and Natalie Harrison in London; Editing by James Dalgleish)

IBM Adds Social Networking To DeveloperWorks Portal

Just as IBM's popular developerWorks site for IT professionals turns 10 years old in September, the company is sprucing it up with new social networking capabilities.

The new features being unveiled on Thursday will allow developerWorks members to create personal profiles, helping them promote their technical expertise, expand their professional networking, and create online groups for shared projects and interests.

Approximately 8 million people worldwide, including enterprise software developers and other IT professionals, are registered members of developerWorks, and about 4 million of them visit the portal at least monthly, said Stephanie Martin, IBM director of developerWorks.

DeveloperWorks is a free, online portal providing IT professionals with access to skills development and technical resources related to open standard technologies, including Linux, Java, XML, and cloud computing.

The new MydeveloperWorks site has been "retooled" by IBM on Lotus Connections enterprise networking and collaboration technology, which enables members to create "vertically" focused groups related to their interests, said Martin.

For instance, if MydeveloperWorks members are interested in beefing up their skills and knowledge related to emerging technologies that are supported by the U.S. government's stimulus programs, like electronic medical records, they can tailor their homepage to receive real time feeds and other content about healthcare IT standards. The members can also create new groups related to the subject and invite others to join.

Users can search MydeveloperWorks personal profiles by keyword, tag, location, or name, allowing users to find other individuals with shared interest or specific expertise. Members can also check out the credentials of individuals commenting on forums or participating in online groups -- as well as promote their own expertise, said Martin.

In coming months, MydeveloperWorks users will also be able to connect with their social networking profiles on Twitter, Facebook, and LinkedIn.

When existing developerWorks members visit the site now, they'll be requested -- but not required -- to create a personal profile for the new MydeveloperWorks functionality, said Martin.

Apple May Be Prepping For Blu-Ray

The next version of iTunes, which has been released to developers, indicates that Apple may add support for the Blu-ray high-definition format.

ITunes version 8.2 was included with the latest update of the iPhone 3.0 beta software shipped to developers late Tuesday. Within the "About iTunes" section of the pre-release version of the software was a reference suggesting the Apple media player would support Blu-ray disc playback, according to reports.

How far Apple will take Blu-ray support is not known. As a matter of company policy, Apple does not comment on future products.

However, supporting the HD format in any of its products would be a first for Apple, which does not offer Blu-ray disc players as an option for its Mac computers. Apple chief executive Steve Jobs has implied in comments that Blu-ray licensing fees are too high.

Growing adoption of Blu-ray by consumers may force Apple to change its stance. From January through March, Americans bought 9 million Blu-ray movies, nearly double the number sold in the same period a year ago, according to Adams Media Research. Helping to drive sales are lower prices for Blu-ray disc players, which are currently available for less than $150.

Apple last month started offering high-definition movies for rent or purchase on the iTunes stores. HD titles are more expensive to buy and cost a dollar more to rent. Movies and TV shows downloaded from iTunes can be played on an Apple Mac, iPhone, and some iPod models, as well as a Windows PC. The films also can be played on a digital TV through the Apple TV set-top box.

Apple isn't alone in trying to entice people with HD content. Netflix and Blockbuster also offer HD movies online.

Wednesday, April 29, 2009

Google Flu Tracking System Suggests Flu Is Spreading

Google has released an experimental version of Google Flu Trends to track the spread of the swine flu in Mexico. Google on Monday said flu activity remained low, as seen by its flu tracking system, but the country-specific version published on Wednesday shows a spike in flu activity.

Google said that its system detected increases in flu-related queries in Mexico City and several other Mexican states during the April 19-25 time period.

At the same time, Google cautions that Experimental Flu Trends for Mexico is, as the name suggests, an experiment and that the data should be viewed as such.

"While we would prefer to validate this data and improve its accuracy, we decided to release an early version today so that it might help public health officials and concerned individuals get an up-to-date picture of the ongoing swine flu outbreak," explained Google engineers Jeremy Ginsberg and Matt Mohebbi in a blog post. "As with our existing Flu Trends system, estimates are provided across many of Mexico's states and updated every day."

Ginsberg and Mohebbi say that flu activity in the United States remains low, as might be expected given the relatively few cases reported in the country. But Google plans to continue its monitoring to look for rising infection.

Google introduced Google Flu Trends in November 2008 as a way to visualize the correlation between flu infections and flu-related search activity. Google maintains that searches provide an early warning about the spread of the flu because search data can be gathered and analyzed almost instantly, unlike traditional epidemiological reporting methods.

Ginsberg and Mohebbi explain that Google's "model tries to filter out search queries that are more likely associated with topical searches rather than searches by those who may be experiencing symptoms." Thus the spike shown in the graph on the Experimental Flu Trends for Mexico Web page should correlate with actual flu activity rather than searches prompted by worry.

As of 11 a.m. EDT, April 29, data from the Centers for Disease Control and Prevention indicates that 91 confirmed swine flu cases have been detected in the U.S. and that 1 person -- a child in Texas -- has died as a result of the outbreak.

Google planned to hold a media call at 11 a.m. PDT on Wednesday to field questions about its flu tracking project.

Saturday, April 25, 2009

5 Things To Do With Dead PC Hardware


Sooner or later, the PC I'm typing this on is bound to drop dead. One day I'll walk in here, push the power button, and hear a scrape and a clunk that tells me my hard drive is out of commission. Or, worse, I'll get nothing at all. Failing that, it's going to end up dying a different kind of death, although one that's every bit as ignominious -- it'll be yanked out and replaced with something a little more cutting-edge, because time and technology have moved on.

Whatever my PC's exact fate, there's one thing I know won't happen: This machine will not sit at the curbside and wait to be heaved into a garbage truck. In this piece I'll talk about four possible fates for dead hardware. "Dumped into a landfill" is not one of them. That's a fate worth working to avoid, especially since so many of the electronic goods that come into our hands can still be reclaimed, no matter what they're like when we're done with them.

What's A "Dead" PC?

Let's start with a definition or three. The most common definition of "dead" is "I can't use this thing anymore." Sometimes dead means too slow or clunky for your chosen use; time and utility have passed it by.

That Pentium III 650 that used to run Windows 2000 but barely boots anymore, the range of software (and hardware) it can support has narrowed drastically? It might be useful to someone who has fewer expectations from their PC, but to you, it's dead.

Sometimes dead means you've simply outgrown what you have. The system runs fine, but you've moved on to bigger and better things. For example: my 1GB single-core Centrino notebook, which I replaced with a 4GB dual-core 64-bit model -- one which, irony of ironies, cost less than half what I paid for the previous one; such is the march of technology. (Keep reading to find out the fate of the old machine.)

And sometimes dead is just dead. Billy Crystal's character Miracle Max in The Princess Bride put it best: "There's a big difference between mostly dead and all dead. Mostly dead is slightly alive." In other words, even a machine that doesn't boot or power on may still be good for something -- even if it's something you can't think of.


1. Revival

Let's start with hardware that hasn't died, but has outlived its current use. Rather than deep-sixing it completely, perhaps it's worth putting that device to use in another context. The most common version of this is to give the hardware in question to another family member or a friend. Usually you'll do this after cleaning it up and making sure it's a) marginally functional and b) not likely to break in a way that will stump its new owner.

Cleaning up and resetting an existing system for re-use has gotten a lot easier in recent years, thanks to most systems shipping with either a restore / recovery partition, a set of recovery disks, or both. Sometimes the former are used to build the latter, when you first uncrate the machine.

That said, unless you're about as organized as my mom or as big a packrat as my dad, the odds of those tools surviving any number of office straighten-ups, household spring cleanings, and I-think-I-threw-out-the-wrong-thing shocks goes way down with time.

If you don't have the disks or the recovery partition anymore, call the PC manufacturer (they're still around, one hopes) and ask them for a recovery CD/DVD. They should be able to sell you one if you have the original OS license key sticker. Note that if you bought your system as a "whitebox" from a local, independent reseller, they probably gave you the CD. Lose that and you're generally out of luck.

Even if you haven't lost the original OS, you might do well to install a new one --Linux or Windows, depending on what's within your budget and what seems to work best. Bear in mind that Linux is no longer a one-size-fits-all proposition and hasn't been for some time; you want a variety of Linux distros that will complement your hardware well.

Linux Installation Guidelines

  • 1-2 Years Old / Multi-Core: Any of the recent, big-name Linux distributions will do fine -- e.g., Ubuntu, Fedora, OpenSUSE, CentOS, etc.

  • 2-3 Years Old / Single-Core: Generally the same as the above, but if performance turns out to be an issue, you can go with a scaled-down build designed for economy of space and speed. Xubuntu is the most common example.

  • Anything Older: Go with a distribution built to be minimal. Puppy Linux is a good one, but the still-in-progress Moblin is worth a look even at this stage of its development.

2. Repurposing

Another option with an older machine is to set it up as a file / print / media server -- a way to offload duties that you don't want to foist upon your existing PC. Since a file server generally doesn't need to be the fastest machine in the world as far as user interaction goes -- it just needs to have a decent network pipe -- you can get away with surprisingly minimal hardware to make this work. For my own file/print setup I used a four-year-old notebook with a USB-attached hard drive in an external cage (a 320GB drive from another machine, which I'd replaced with a 1TB drive). Streamed HD video is probably out of the question, but MP3s and print jobs all work fine.

3. Cannibalization
This means, of course, salvaging what pieces you can and using them elsewhere. Your average "dead" PC has at least two or three parts which by themselves are probably fine. They can generally be cycled over into another PC without trouble, especially if you're buying a new machine and want to save a few dollars here and there. Still, as with anything else, caveats apply.

Peripherals Keyboards, mice, headsets, USB hubs, removable-storage bays (such as those used for memory cards), and so on are the most common things that can be cycled over are.

If they're still in good shape, there's no reason to dump them as long as they still do what you need and will work with future hardware. One exception is PS/2-connected mice or keyboards, which can be connected to USB-only machines but only through specially-designed connectors. If you're hanging onto an older PS/2 keyboard for dear life (some people get very attached to their hardware -- me included!), the cost of an input dongle is negligible.

Hard Drives Any type of storage device is well worth keeping and re-using. Obviously anything with sensitive data on it needs to be wiped down first; see Darik's Boot and Nuke, for more on how to do this easily.

TIP: Always use new cabling, both data and power, when moving an old device. The cables you used with the hardware in its original setup may have developed crimps or bends that turn into full-blown shorts when moved into another machine. I've had this happen to me more than a few times; a hard drive that was working fine in one machine was "dead" in another—actually, just mostly dead, since all it took was a new SATA cable to bring it back to life.

Memory Modules These can usually move between machines that support them with little difficulty. There are two caveats here, though:

  1. You might not always be getting the best possible performance on the target system.
  2. Two, you may run into finicky behaviors you didn't see before. Systems that use server memory -- i.e., registered or ECC memory -- are a lot fussier with memory than regular machines.

The last computer I had in this regard refused to work reliably with two separate sets of DIMMs and finally only worked with a Compaq-branded set.

Video Cards These are worth pulling and saving, since what's old or outdated for one user is more than cutting-edge for another -- provided, of course, it's the right bus type. Also bear in mind that video cards can be a source of unexpected power consumption, something I discovered and wrote about here

Notebooks are tougher to cannibalize, since they tend to be all of a piece. About the only things that can be reliably reused are power supplies (best used in either the same variety of notebook or one with the same wattage requirements) and hard drives.

As an aside, a good many types of hardware can go bad for no visible reason, even after years of perfectly reliable service. A lot of this depends on how it was used. If the user smoked, had a dusty office or ran everything off unfiltered wall current, any one of those alone is going to shorten the lifespan of the device in question.

Sometimes it's not possible to know whether or not these things have happened, although there are giveaways: musty odors, encrustations of dust or dirt on the fan or air intakes, etc. Rule of thumb: if it looks (or smells) like it's been through a war, it probably has been.

4. Donation

If space is more important to you than anything else, take the hardware you have and donate it. The good news is that there are dozens of non-profit organizations, both local and national, that will take used computer equipment of almost every conceivable variety and make good with it.

The best place to start -- if you have working hardware in good condition -- is the Cristina Foundation, dedicated to putting computers into the hands of "people with disabilities, students at risk and economically disadvantaged persons". They may take in hardware that can be repaired and put to use, but you're best off making sure whatever they get is in decent working order (if not always cutting-edge).

Other groups have similar demands but different aims:

For a massive rundown of just about every charitable group out there looking for PC hardware, check out the TechSoup site, which you can search based on needs and location.

No discussion of donations and reuse would be complete without some mention of both Freecycle and Craigslist. Craigslist we all know about, but Freecycle is less well-known; it's an aggregate of local groups, each dedicated to providing a place for people to provide things for re-use; computer hardware is just one thing they cover.

Subscribe to a local Freecycle mailing list and pay close attention to the rules about posting and soliciting, as the etiquette on these lists is crucial to getting good results. The disadvantage of both Freecycle and Craigslist is that you typically know very little about the pedigree of the people at the other end of the transaction.

5. Recycling

An old superstition goes, "Never throw away a key!" Never throw out a computer, either. There are better things to do with all that metal, copper, plastic and lead than put it into a landfill. If there doesn't seem to be any other fate left than the trash for a piece of hardware, by all means dispose of it -- but do it the right way.

Many major electronics retailers now offer programs above and beyond the usual recycling of cellphones, used CFLs, or dead batteries. Best Buy (http://www.bbycommunications.com/crnew/recycling.asp) does this routinely for appliances and TVs, and furniture-retailer IKEA regularly hosts e-cycling events albeit only in California at the moment. Many Staples outlets now also accept computer parts for recycling, albeit for a fee of $10 per system (peripherals can be thrown in for free).

On a more upscale, professional level, IBM has its own IT buyback program, and east-coast based data-erasure experts Guardian Data Destruction also offers e-cycling as an adjunct to its more conventional drive-wiping and document-shredding services. Network Liquidators is an outfit that deal specifically with used telecom and networking hardware, a lot of which can be resold fairly easily since it tends to be in strong demand, even if it's not up-to-the-second new.

A fairly comprehensive and regularly-updated list of recycling programs by U.S. region is maintained by the Telecommunications Industry Association at EIAE.org. The EPA's resource page is here. And Earth 911 also maintains similar lists, and supplies detailed information about who takes what.

Whichever one you pick, be sure the recycler can show documented proof of compliance with the EPA's R2 practices ,which minimizes the chance they're dumping waste on the sly or shipping it overseas.


InformationWeek has published an in-depth report on Windows 7. Download the report here (registration required).


Friday, April 24, 2009

Analyze Your Computer Configuration with WinAudit Analyze Your Computer Configuration with WinAudit


If you want to know about each and every component of your computer, WinAudit can do it for you and that too without any special knowledge on how to use it. WinAudit is an easy to use application and even a newbie can use it without any fuss. Continue reading ‘Analyze Your Computer Configuration with WinAudit’

Download RichCopy to Pause and Resume Copying of Files


I always wanted to resume and pause the copying of files in Windows like we do when we download any files from Internet. If we are copying large files and folders from one location to another, it certainly takes a bit of time especially if you are copying them to some external storage device. Continue reading ‘Download RichCopy to Pause and Resume Copying of Files’

Wednesday, April 22, 2009

Authorities in Nainital install CCTV Cameras as a Security Measure


Authorities in Nainital have decided to install Closed-Circuit Television (CCTV) cameras at several crowded places as precautionary measure and to prevent untoward incidents.

About five CCTV cameras have been installed across the hill resort for keeping a watch on the everyday incidents and also to solve problems like traffic jams and pick-pocketing.

“These cameras have been really beneficial for us. We have placed the cameras in the crowded place to avoid any incident like pick pocketing or scuffle. These cameras have been very beneficial in finding out if people are facing any problem especially in crowded places,” said K S Hayanki, inspector in charge, Nainital.

Residents are also happy with the security measure taken as they believe any incident can happen anytime.

“Nainital, is a tourist town and lakhs of tourist come here, so there was requirement of such cameras. With the help of these cameras, police can keep a watch on the movement happening. We have to be vigilant always because any untoward incident can take place anytime,” said Rajesh Shah, a resident.

Deriving its name from the Naini lake around which the town is located, Nainital is a major tourist destination in the Kumaon Himalayan region of Uttarakhand.

Microsoft’s netbook-tailored Windows 7 Starter Edition a ‘gamble’, WSJ


The Wall Street Journal Monday has described Microsoft’s netbook-tailored Windows 7 Starter Edition as a ‘gamble,’ saying that the company was trying to hook netbook customers to upgrade to the new version, sans Linux-based alternatives.

Apparently, Microsoft is trying hard for Windows to remain the netbook OS of preference, more so as it is involved in a tough competition with the recent netbook-favorite operating system - Linux.

The limiting factor of the new version is that it can only run three simultaneous applications, implying that users can only keep two applications open, along with an antivirus program; and its graphical interface is also less robust than the complete version of Windows 7.

According to critics, the noticeable limitations of Windows Starter can spell problems for Microsoft, that too at a time when the Windows Vista fiasco not so far back in the past!

Nonetheless, in the opinion of John Kistler, of St. Louis-based system builder J&B Technologies, with the kind of speed and performance boosts that Microsoft has woven into Windows 7, it might entice customers to upgrade. Kistler said: “I think people will accept the application limitation. Windows 7 looks like Vista, but it runs 10 times faster, and that’s going to be a big deal for a lot of people.”

Tuesday, April 21, 2009

How To Completely Remove Anti-Virus Software

Which is your favorite Anti Virus application? As far as I am concerned it’s ESET NOD32 but if you had asked me this question few months back, definitely I would have been in a state of dilemma while answering it. It took me quite a bit of time to figure which Anti-virus is best suited to me. During this whole process of identifying the best, I ran across hell lot of antivirus applications, tried each one of those and finally ended up with frequent install-uninstall process. But then I found that even though you have uninstalled your antivirus through Windows Add/Remove utitlity, yet there are few files and registry entries that remain and are left untouched. Now the question is how to remove those? Continue reading ‘How To Completely Remove Anti-Virus Software’

Organize Your Windows 7 Desktop with BumpTop


Are you in a habit of keeping your desktop so clustered that at the time of need you couldn’t find the right thing at the right moment? It can happen with anybody. If you are downloading many things from the Internet or if you are installing so many softwares everyday, in a long run your desktop will look like a graveyard - a common place for many (dead) files that are seldom used. Desktop is meant to keep shortcuts of all the files that you frequently use but people use their desktop like a dustbin, when you don’t know where to keep files, just ram them into desktop. Real bad way to use your computer. But let’s not go deep into what is good or bad instead just concentrate on how to organize and reinvent your desktop. Continue reading ‘Organize Your Windows 7 Desktop with BumpTop’

Monday, April 20, 2009

Hide All Opened Windows with ClickyGone Portable


Everybody wants to have privacy when they are doing some important and personal work. But that level of privacy may not be achieved when someone suddenly knock up the door and enter your room without permission. Or, there are times when at work you do all sorts of things, except work and suddenly you get caught by your boss. So there are times when you want to hide all your windows application so that no one else can see what you are actually doing. Continue reading ‘Hide All Opened Windows with ClickyGone Portable’

Convert DVD Files to 3gp Format for FREE


If you have a mobile phone with extended memory and a good battery backup then that’s for sure you are not going to use it just like any other cell phone. It will be used as a music player and if you are a movie freak like me you can even watch movie on your mobile phone anytime when you’re free. Almost all mobile phones support video files of 3gp format and if you have DVDs of many good movies, you can easily convert them to 3gp format. Continue reading ‘Convert DVD Files to 3gp Format for FREE’

Sunday, April 19, 2009

SnagIt Screen Capture Plugin for Windows Live Writer


SnagIt Screen Capture for Windows Live Writer comes to your rescue. It just adds more functionality to Writer by integrating SnagIt directly into your blogging client. Now don’t tell me you don’t know about SnagIt?

After installation a link will appear under the” Insert” section of your Writer by the name “Insert SnagIt Screen Capture…”. Clicking on that link will popup a windows wherein you can configure various SnagIt Capture options. Once you click on Capture button, it can optionally open SnagIt Preview Window where you can edit the captured image just like you do in normal SnagIt utility.

The best part about this plugin is that you need not to safe the captured image to your disk. Windows Live Writer will pick up the image and then it will be deleted automatically.

So if you like to blog frequently and love to combine articles with images, SnagIt Screen Capture plugin will come in very handy that’s for sure.


Wednesday, April 15, 2009

EC takes UK and Phorm to task over privacy


The European Commission has sent an infringement notice to the United Kingdom Government over privacy oversights related to the use of Internet snooping technology from UK-based Phorm.

Phorm runs a behavioural marketing service used by several UK ISP's to serve contextual advertisements to ISP subscribers based on their surfing habits.

The service has been the subject of several complaints from privacy groups which claim Phorm's interception of user web surfing traffic is unlawful.

The European Commission says it has been in "extensive" consultations with the UK authorities over the complaints. Concerns remain, its said, around "structural problems in the way the UK has implemented EU rules ensuring the confidentiality of communications."

European Union privacy rules insist its member countries ensure "the confidentiality of communications by prohibiting interception and surveillance without the user's consent."

The Commission wishes the UK to establish an 'independent national supervisory authority' to deal with communications interceptions.

"Technologies like internet behavioural advertising can be useful for businesses and consumers but they must be used in a way that complies with EU rules," said EU Telecoms Commissioner Viviane Reding in a statement.

"These rules are there to protect the privacy of citizens and must be rigorously enforced by all Member States.

"We have been following the Phorm case for some time and have concluded that there are problems in the way the UK has implemented parts of EU rules on the confidentiality of communications.

"I call on the UK authorities to change their national laws and ensure that national authorities are duly empowered and have proper sanctions at their disposal to enforce EU legislation on the confidentiality of communications."

Controversy over Phorm erupted in April 2008 after BT revealed it had tested the service in 2006 and 2007 without informing its users. UK authorities also recieved a significant number of complaints after the ISP launched an invitation-based trial late last year.

The EC says it has the right to commence infringement proceedings against member states under the EC Treaty, and if unresolved can refer cases to the European Union's Court of Justice.

The UK Government has two months to respond to the infringement notice.

Bottle Domains dumped by auDA over security breach


The Australian domain name administrator has ruled out a review of its registrar agreements in the wake of its decision to terminate Bottle Domains accreditation today over a security breach.

auDA took the action after it emerged Bottle may have hidden the hacking of its database for almost two years.

A spokesperson for Bottle was "not available" for comment.

The termination has left Bottle resellers such as Melbourne-based Cove "between a rock and a hard place" - with Cove, Bottle's largest reseller, now making a play to become a registrar in its own right.

Bottle, which counts some 11,000 registrants as customers, is the subject of an ongoing investigation by the Australian Federal Police after it was revealed in February that usernames and passwords had been compromised in a ‘security breach'.

It has now emerged, however, that the February ‘breach' may not have been the first.

In a statement today, auDA said it "has since discovered that Bottle Domains was the subject of an earlier security incident in April 2007, which auDA believes may have caused or contributed to the security incident in February 2009."

iTnews understands that the hack reported in February this year may actually have taken place back in April 2007 - some two years earlier than first thought.

This could mean data over the range of 2007 to 2009 may have been compromised, although the extent of the breach is still under police investigation.

auDA said in a statement that Bottle's failure to notify it at the time of the April 2007 security incident breached its obligations under the Registrar Agreement.

"Information recently provided to auDA by Bottle Domains about the April 2007 incident revealed that it did not reset customer passwords or alert its customers to the possibility that their account information had been accessed by third parties," auDA said.

"Bottle Domains also failed to conduct an independent security audit to verify that the security vulnerability had been fixed, and that there was no other unauthorised access to its systems."

aUDA chief Chris Disspain told iTnews that although the definitions for what does and doesn't constitute a security breach under current guidelines "is a matter for discussion", he expected all Australian registrars "to err on the side of caution".

He did not believe the Bottle case warranted a review or tightening of the agreement.

"You can argue that tighter rules are more dangerous because it's easier to argue a breach that doesn't fit into a tighter ‘box' of rules," Disspain said.

Disspain also said he had ‘absolutely no idea' whether Bottle would turn to legal action over the decision.

"They're entitled to take whatever action they deem appropriate," he said.

"We're very comfortable the action we've taken is appropriate. We believe we simply didn't have a choice."

Bottle resellers are now faced with a choice of forming a relationship with another registrar or - depending on their size and lobbying power - becoming a registrar in their own right.

Cove's national sales manager, Cheyne Jonstone, told iTnews that since news of the termination leaked out of auDA, Cove had been approached "by just about every [other] registrar in Australia".

But few offers had been able to offer flexibility in the API and pricing that Cove had received from Bottle.

"Our entire system has been built around Bottle's," Jonstone said.

"The problem for us is that no other registrar offers the comprehensiveness in their API as Bottle did."

Jonstone revealed that Cove is in the process of making an approach to auDA to reopen its registration process - which has been offline for approximately 18 months - to admit Cove as a registrar in its own right.

"We've been trying since March last year," he revealed.

"We have 3000 dot AU domains with Bottle now. We're large enough to be accredited anyway and for us that would be ideal because our system is already built to interact with auDA."

He said the phones "had been ringing off the hook" with domain owners seeking next steps. All customers had been notified of auDA's decision by email.

auDA has released its own set of guidelines [PDF] for both customers and resellers. While Disspain said there was no risk for either customers or resellers, he urged the latter to contact him directly to resolve any potential issues.

Skype to spin off in early 2010 IPO


Skype parent company eBay plans to spin off consumer voice-over-IP company Skype in an initial public offering in 2010.

Skype, which boasts over 400 million users, US$551 million in annual revenues and a claim to being the world's largest long distance communications carrier, has been an uneasy fit with parent company, auction house eBay.

eBay purchased Skype for close to US$4 billion in September 2005.

eBay representatives today said Skype will be spun off to standalone on the stockmarket at some stage in early 2010 - pending market conditions.

"Skype is a great stand-alone business with strong fundamentals and accelerating momentum," said eBay president and CEO, John Donahoe.

"But it's clear that Skype has limited synergies with eBay and PayPal. We believe operating Skype as a stand-alone publicly traded company is the best path for maximising its potential.

"This will give Skype the focus and resources required to continue its growth and effectively compete in online voice and video communications."

Donahue has been reviewing eBay's investment in Skype since his appointment as eBay CEO in April 2008.

Donahue installed a new management team at the VoIP company, led by CEO Josh Silverman - with whom the eBay CEO credits as the driver for much of Skype's growth.

Earlier this week it was revealed that Skype's founders were in discussions with private equity firms to make their own bid for the company.

eBay also revealed that two million people have downloaded the Skype for iPhone application within a week of it being made available -making it the number one free download for the iPhone in 40 (national) markets at the time.

The company claims this saw half a million new users register for the Skype service.

More giants buckle in CSIRO Wi-Fi patent case


Microsoft and Asus have settled with Australia's CSIRO over its claim to Wi-Fi patents, following similar moves by HP and Fujitsu to bail out of a continuing court battle contesting CSIRO's claims.

The Commonwealth Scientific and Industrial Research Organisation (CSIRO), currently fighting a patent case against over a dozen technology companies in the US District Court in Texas, is slowly managing to solicit royalties out of some of the world's biggest technology companies via out-of-court settlements.

CSIRO spokesperson Huw Morgan has confirmed CSIRO settled with software giant Microsoft and PC manufacturer Asus early this week, after settling with Fujitsu last week and HP the week prior.

CSIRO claims to have patented core elements of the technology used in 802.11a and 802.11g wireless devices.

Its US patent for Wireless LAN technology (US Patent 5487069) was granted in January 1996 and has since been appealed by several of the world's largest technology companies.

There are still nine technology companies battling CSIRO in the Texas court.

Morgan said CSIRO will not make any comment on the research organisation's prospects until the case concludes.

Monday, April 13, 2009

Business intelligence, business smart?


Pratima Harigunani of CyberMedia News checks it out with Dr. Mukund Deshpande, head - BI and Analytics Practice, Persistent Systems who has spent eight years of action in BI that also covers heuristic driven algorithms, classification and prediction algorithms after PhD in Computer Science from the University of Minnesota, Minneapolis, USA with a thesis on 'Data Mining Techniques for Sequences and Graphs'. He talks on a range of issues flanking BI today.

When it comes to day-to-day business, what role does or can BI play? How much information derived in BI is indeed actionable?

BI is important because the company wants to know about the customer, wants to analyse the competition, wants to study customer churn properly for corrective action, specially in context to today's scenario and the crowded marketplace wherein competition has become more fierce.

Churn identification, for instance, helps at the decision-making level directly for customer or campaign management. It's done by churning out reports, dashboards, predictive analysis etc from data warehouses.

How best can BI be applied to broader issues like national security?

Security is a hard management problem. It's all about how best to identify and focus on the priority areas. It's all about expanding relationships. Information in security incidents is mostly divided and scattered, but it's there. You have to find how best to link them.

The inference part is where the human comes in. But linking and tracing information is where technology can play a role. Today terror attacks are planned and managed often on Internet. What can be done better is that in reflection, one can connect the dots and we can have a frame of reference.

If we take a frank look at BI's evolution so far, how successfully has the reactive to proactive gap been covered?

Yes, EPA (Enterprise Performance Management) is where we are doing proactive work. Unlike the earlier report-generating work and focus on time-cutting, there is need for proactive work. A lot of BI is still reactive but EPM is a new breed. BI is trying to look at decisions the other way round with stuff like 'what-if' questions and scenario-based analysis.

What's the connection status, between BI and higher realms like human intelligence, artificial intelligence, robotics, cybernetics etc?

These are advanced analytics areas whereas BI is an analytics area focusing specifically on data and business problems. Its focus is mainly on decision-making.

With new scenarios like clouds and grids redefining computing and data, how does BI realign itself?

BI may go to cloud or Grid if privacy and security are taken care of. That's a challenge. But for that big leap in mindset is required. More so on areas like support and control. Guys like Google and Amazon can afford the infrastructure to do it.

What's your take on future trends and the status of BI in India?

As we move ahead, BI would graduate to real-time BI. The quicker, the better. DWA (Data Warehousing Applications) is another area that helps in how to deal in hardware to solve big data problems.

Apart from that, open source BI would be something to watch out for. The way open source has made inroads in areas of OS, Internet browser etc with Linux or Firefox, we have to see what happens in BI space.

Talking of India, the problem here is that unlike in the West, there is no unique identifier for data like the SSN in the US. I heard it's about to come in India too, and if that happens, it will take away the identification problem for BI. Not all data is captured here. Industry is still tactical in its approach towards BI.

What has been Persistent's ground of action so far in BI?

It's been traditionally an area of database. We have focused on building tools. Our work happens around BI tool vendors, and product development for some major DB and DWH vendors, which is the OPD flavour. We also build lots of applications and tools. The spectrum so far covers product engineering for leading ETL vendors where we have data cleaning, de-duping.

We also cover predictive analysis consulting area with churn analysis, targeted advertising, risk-modeling and cross-selling as some constituents. Apart from this, we have various domain-specific practices in industries like telecom, retail etc for reporting, dashboards.

Industry says cheers to Tech Mahindra, Satyam bid

Tech Mahindra and Satyam: a cake worth the bite

PUNE, INDIA: Tech Mahindra has emerged as the winning bidder in the Satyam fray. This could bring the much-awaited turning point in the Satyam saga. But more than that, it could be a big wise step that could redefine Tech Mahindra's future.

As analysts see it, for a telco-domain specialist like Tech Mahindra, going forward for a broad spectrum services major, could change the game a lot and be the slingshot to the top bracket of IT global biggies.

With about 95 per cent of revenues coming from telco space, quite a niche business area, this deal is the only way, Tech Mahindra could have put its tents pitched well inside verticals beyond telecom.

As Girish Trivedi, deputy director, ICT Practice, Frost & Sullivan, South Asia & Middle East views it, "This is very good strategic move by the company and a quick smart way to be in a league where thanks to Satyam, it would have good visibility, revenues, good Fortune class customer base and stellar clients like GE. It will also help it move away from the image of a BT-Driven vendor and look out for other multi-year plum global contracts."

According to some analysts, "this deal would establish Tech Mahindra as a serious player among the Top Five global vendors and make it rub shoulders with the likes of IBM, HP as well as be in the Top 3 consideration list for multi-million contracts. If it can take the deal ahead smartly."

Now the 'if' part could indeed be the clincher. Integration, blending the 50,000 employee base of Satyam with about 25,000 of its own, integrating the people and process areas successfully and handling the legal and image baggage of Satyam would add a lot to that 'if'.

Schooner, IBM partner on data access appliances

Schooner Information Technology Inc., a provider of data access appliances for Web 2.0 and cloud computing data centers, said Monday it is collaborating with IBM Corp. (NYSE: IBM) on fully integrated data access appliances.

Menlo Park, Calif-based Schooner said the first two products in a family of data access appliances with Armonk, N.Y.-based IBM (NYSE:IBM) are for MySQL enterprise and for Memcached and are built on IBM System x server technology.

“It was natural that we aligned with IBM,” said Michael Pray, vice president of sales and marketing for Schooner. “Each party brings significant benefits to the relationship. By leveraging IBM’s proven server platform, global reach and world-class sales and support resources, Schooner can bring its breakthrough technology to customers worldwide who are trying to solve scale-out data center challenges.”

Under the guidance of the IBM Venture Capital Group, Schooner partnered with the IBM System x group for server technology, co-branded sales and after-market support.

Financial terms of the collaboration were not disclosed.

IBM has about 11,000 employees in Research Triangle Park.

Tech Mahindra Buys India's Scandal Tainted Information Technology Company


India's scandal-tainted Information Technology company, Satyam Computer Services, has been bought by a telecommunication firm, Tech Mahindra. The sale is expected to restore confidence in India's I-T services sector.

Three months after Satyam Computer Services was hit by a massive accounting fraud, Tech Mahindra won an auction for a controlling stake in the high tech giant.

On Monday, Tech Mahindra agreed to buy a 31 percent stake in Satyam for $351 million, edging out other bidders. The bid has to be approved by the government.

In January, Satyam's founder, B. Ramalinga Raju, shocked investors by admitting the company's profits had been overstated by more than $1 billion. The fraud had been going on for years, and it raised doubts about the survival of the I.T. giant, at that time India's fourth largest outsourcing company.

The country was rocked by its biggest corporate scandal, and the government moved quickly to protect the image of its booming Information Technology sector. It sacked the board of directors and appointed a new one, which set out to find a customer for the company.

Satyam Chairman, Kiran Karnik says the sale signals a new stage, and will restore customer confidence in the outsourcing company.

"We are very pleased," he said. "We think it is a very valuable company, we view this as a very successful event today."

The Satyam scandal has also raised questions whether accounting standards and corporate governance are adequate in India.

After Satyam's sale was announced, Indian Prime Minister Manmohan Singh gave assurances that a similar scandal will not be repeated.

"I am confident that our regulatory system has the resilience and the strength to ensure that no such "Satyam" will ever take place," he said.

Satyam has about 53,000 employees and operates in nearly 70 countries. Its clients include some of the world's largest corporations like U.S.-based General Electric. Satyam is listed on the New York Stock Exchange, and faces several lawsuits in the United States.

In recent months, India's I.T. sector has been reassuring customers that Satyam represents a "stand-alone" case. The $50 billion I.T. industry has grown massively in the last two decades.

Saturday, April 11, 2009

Complete protection with the help of Small Body Worn Spy Cams

f we want to fulfill our prospects , it has become very easy for us these days because there are not only extraordinary innovations at our aid but also new techniques to make use of them sensibly as much as possible so that we can get flawlessness for whatever we are using the product for. Manufacturers are widely introducing many more equipments and procedures for us so that our working patterns can be altered where we can not only save our time and energy but also money to a great extent. They are promising to give us many products such as Spy Nanny Cams so that we can use them the way we like. There are several types of cameras which are not only innovative but also affordable . In the earlier days cameras were supposed to be used only by the wealthy people because they were considered to be luxurious products. The professionals used them to capture the images of particular events like weddings or anybody’s birthday or so on. They were also used to capture the images of the celebrities’ who worked in the movies or the models who worked for the commercial agencies. But these days’ cameras are assumed as some of the significant products which can be used by one and all. They can be used by college going children to protect themselves from any untoward incidents while they are alone on their way home, working moms can use them to capture the photographs of the baby sitters while they are away from home leaving their children behind with them. The business men are opting to install them in their office so that they can keep an eye on their staff when they are busy with some other work. So, there are several reasons to why it has become compulsory to make use of the innovative cameras these days. There are several pioneering cameras in the market and they are being used for various purposes including surveillance and other benefits. These cameras are popular and are being used worldwide for several reasons by all. They are available in number of colors, shapes and designs. All are well-built with tremendous technique and they all are planned to give accuracy while making use of it.

When there are several hidden andSpy Nanny Cams, the Video Camcorder are some of the latest and easy to use cameras. These types of cameras are planned in small objects like the neck tie, the wrist watch, the gum stick, a pen and so many other objects which can be carried with no trouble and used according to our convenience. Surveillance becomes easy using these objects and cameras.

This is a useful spy cam which has the capacity to record the videos for approximate 6 hours even prior to the recharging is needed. If this Small Body Worn Spy Cams has to be used indoor then also it can be easily used and recharged with the help of the DC 5V adapter. The grasping speed of this Small body worn spy cams is up to 15 frames in one second. It also offers 320×240 lines of resolution. These cameras appear with a hauling clip so that the Video Camcorder w/IR LED - KB-DV250 [C6000 MG] very easily can be fastened with the belt and carry it along where ever it has to be. The Portable Camcorder W/IR LED - KB-DV250 [C6000 MG] is indeed the best gift I could present it to my wife.

Hands Free Devices for Refurbished Cell Phones

It is becoming more and more common for states to pass laws that make it illegal for drivers to talk on their cellphones while driving if they do not use a hands-free device. People caught without a hands-free device are issued a ticket and are forced to pay a fine for their first offense. Repeat offenders face harsher penalties with each repeat offense. The theory behind these new laws is that they allow drivers to keep both hands free to steer, shift, etc. and allow the driver to focus more on driving instead of holding a phone against their ear.

The most common hands free device is a Bluetooth earpiece. This wireless solution simply clips over the ear, allowing you to speak without holding the phone. To use a Bluetooth device, just associate it with any Bluetooth capable cell phone. Today, most new cell phones, as well as many used cell phones, are Bluetooth capable.

If you own an older used cell phone, it may lack Bluetooth technology. Do not worry, however, as there are still hands-free solutions that will work with any kind of phone. The most common is a wired headset that resembles ear buds and connects to your phone with via a headphone-like jack. These devices perform the same function as a Bluetooth headset except they use a wire to transfer data to and from your phone and are also generally cheaper. They are available for nearly any model of phone made in the past 10 years, so even if you’re still using an older refurbished Sprint cell phone, you will be able to find a hands-free solution.

A hands free accessory is not just beneficial for driving. Even if you live in a state that does not require hands-free devices for driving, chances are you will find some benefit from being able to talk on your phone without using your hands, such as being able to type while on the phone (not while you’re driving!).

Another choice if you are looking for a way to make your used Blackberry hands free is to use a plug and play kit for your car, which usually draws power from your cigarette lighter. This tiny attachment contains a microphone and speaker, and can be attached to your dashboard, air conditioning vent, or another area in your car. Unlike a Bluetooth headset, you need not attach anything to your ear when using a car kit. While some of these are wireless and rely on Bluetooth technology, others can be attached with a wire to your cell phone.

The bottom line is that there are numerous options for hands free devices for all phones and they should not prevent you from taking advantage of the great deals you can get on used phones. Hands-free devices can be found for nearly any phone with a headphone jack and/or Bluetooth. Even if you live in a state that does not currently have a hands-free law, they probably will eventually, and the other benefits are often worth it.

4 New Models Launch by Czech Automaker Skoda in 2010


With the aim to strengthen its presence in the Indian market, Skoda, a Czech automobile maker and part of the fourth most established automotive company in the world, has decided to launch four new models by the coming year.

The company said that it will make foray into the small car, MPV and SUV segments with its new launchings.

Moreover, Skoda plans to increase local content in its cars to bring down their cost of production by 2010.

It is also looking to terminate the Octavia by the next few years.

On the sidelines of the launch of the diesel version of the Skoda Superb, Thomas Kuehl, board member (sales and marketing), Skoda Auto India, said, “We will be introducing the small car at a little over Rs 3 lakh.”

Mr. Kuehl said that the country will be the initial market where this car will be launched.

An estate/variant of the Skoda Fabia is also being tested for the Indian market.

Mr. Ashutosh Dixit, GM, sales and dealer development said, “Feasibility studies are on for that, and also for the Roomster, which is an MPV.”

He said that Skoda is planning to launch a small sized SUV Skoda Yeti in India by next year. The Yeti model will be launched to woo the buyers who want to buy a SUV but don’t want to spend too much money on it.

Later this year, the Skoda Yeti will be unveiled at the Geneva Auto Show, and Skoda plans to launch it in India in the first half of next year.

With the introduction of the diesel edition of Skoda Superb, and the V6 petrol version launch earlier, the Czech auto manufacturer is getting high in the D-segment that has posted 55% growth during the last quarter.

The company will enter into the mid-market segment with the revamp of the 7-year old Octavia model.

Mr. Kuehl added that the new Octavia, to be revealed later this year, will be moved back to this segment from the current C+ entry segment.

“The model will eventually be phased out and replaced by another model in the next couple of years or so,” Mr. Kuehl said.

Digital Camcorder Features - A - Z Significant Information Concerning on Features

When choosing to buy a particular digital camcorder you have got to consider the digital camcorder features to meet your needs. Each model of camcorder will have different digital camcorder features. In consequence, you have to choose the one which have digital camcorder features as your need and without making you broke after buying it. The following are several digital camcorder features you can notice.

Todays, technology of digital camcorder alters fast. On the other hand, there are still more than a few digital camcorder features that every purchaser requires to be familiar with and requires to recognize how to rate before you can get the best deal possible.

There are so several dissimilar digital camcorder features. If the digital camcorder is going to be used for professional goals for example, then you should be willing to spend some extra buck and get a top of the line digital camcorder. On the other hand, if it is merely going to be used at home, you will commonly be okay with a more basic, less expensive model. In consequence, the features to choose is as you need.

One of the bigger alterations in the digital camcorder market is the form factor you will hunt for a digital camcorder in. Numerous consumer level digital cameras now come with digital camcorder features that let you to make movies and take extremely clear pictures.

Those movies are in full color and sound and are brilliant quality. In consequence, prior to invest in something that is just a digital camcorder, you may initially wish to explore the thought of a digital camera that has digital camcorder features built in to it. You can have everything you require in one unit. This condition can not merely save you buck but also make your life much easier.

When There is No Film

Memory is another of the extremely central digital camcorder features. Since you are no longer utilizing film, you require being able to without difficulty manage the memory of your digital camcorder. It does so that you get the most out of it. With a camcorder it is not always the most excellent idea to have all of the memory built in to the camera.

In several cases you can buy a memory card the size of a postage stamp. The memory card can hold hours worthwhile of video. Furthermore you can keep a collection using these cheap memory cards.

At last, after choosing the most excellent and most suitable digital camcorder features, you can bring your camcorder home. Then you could utilize the camcorder best after reading the guidance of the camcorder. Hopefully, you could record all the most excellent moment in your life best by using the camcorder. Have fun!

So, are you now willing to know more about digital camcorder features? Visit the links here, and these guidelines will make you smarter about it!

Friday, April 10, 2009

Microsoft ordered to pay US$388m in patent case


Microsoft has been ordered to pay US$388 million in damages for infringing a patent held by anti-piracy software maker Uniloc.

Microsoft, the world's largest software maker, said it was disappointed in the verdict, and plans to appeal.

The verdict was reached by a jury in a long-running case in federal court in Rhode Island, which found that Microsoft infringed Uniloc's patent on software that generates unique identities for licensed users and prevents unauthorized use or copying of programs.

"We believe that we do not infringe, that the patent is invalid and that this award of damages is legally and factually unsupported," said a Microsoft spokesman. "We will ask the court to overturn the verdict."

Uniloc USA and its Singapore-based parent originally filed suit against Microsoft in 2003, claiming that Microsoft infringed its patent with security software it was using to prevent unlicensed use of its Windows XP operating system and parts of its Office suite of products.

After six years of legal wrangling, the jury trial started in March. The damages award is one of the largest on record in patent law disputes.

The case: Uniloc USA, Inc., et al v. Microsoft Corp., et al, U.S. District Court District of Rhode Island (Providence), 1:03-cv-00440-S-DLM.

KPMG embarks on global IT consolidation project


EXCLUSIVE The Australian operations of KPMG will be an international test bed for the firm's global plan to consolidate IT services from 130 countries into 14 regional service clusters.

The Integrated Business Systems (IBS) project will see KPMG consolidate the data centres and associated infrastructure that runs four key systems from 130 countries into 14 regional service clusters.

The professional services firm is a federation of partnerships around the globe, with its head office serving the IT needs of 30 small countries and 100 other partnerships catering for their own needs.

KPMG will consolidate Exchange e-mail systems, Interwoven document management systems, portals running SharePoint 2007 and a SAP practice management system into regional clusters over the next four to five years.

KPMG Australia CIO Ian McBride said Australia will host one of the clusters, supporting systems for four to five countries and 7000 to 8000 users.

Regional clusters vs global consolidation

It will take applications such as an Australian-developed practice management system to some countries for the first time.

But for applications used across KPMG globally, the consolidation is driven by savings.

"You could imagine that going from 100 systems down to 14 would have to result in raw savings," McBride told iTnews. "Each of these 130 countries has their own Exchange system, their own support staff, policies and operations and infrastructure."

But more importantly, McBride said the arrangement will enable the financial services firm to be "more agile and nimble" in its service delivery while gaining the savings of consolidation.

It was a far more appropriate arrangement than sending operations offshore to the cheapest countries, he said.

"I have a view that there are certain physical limitations to where you provisioning services versus where you consume them," he said.

"With a system like Exchange, it is fundamentally store-and-forward - there is no real-time requirement. But applications that require a real-time experience need to operate relatively close to where they are being used.

"When you are serving hefty applications like SAP to users, there are limitations in terms of distance, latency and network capacity. You can't make the distance between India and Australia get any shorter."

Australia as test bed

McBride confirmed KPMG Australia will be a test bed for the Integrated Business Systems (IBS) project.

"Australia has a great size and scale to get a sense of what issues might occur," he said. "We have good skills locally that can contribute to KPMG's global thinking."

He said the business here is "driving ahead faster than the global project plan" to exploit unified communications.

The Australian office kicked off a unified communications project in January 2009, integrating a Nortel-powered Voice-over-IP system with Microsoft's Office Communications Server (OCS).

OCS is an enterprise software system that integrates instant messaging, VoIP and video conferencing into the popular Microsoft Exchange/Outlook messaging system.

KPMG's "trigger event" to adopt a national approach to unified communications came when the professional services firm moved its Perth office to a new facility last month.

With the Perth office now running on the new OCS and VoIP system, the rest of the country's KPMG offices will abandon their old PABX systems and roll out unified communications in June and July of 2009.

The local office is also trialling the upcoming Exchange 14 platform, currently under beta release, to deploy by June 2010.

Greg Patten, senior manager of infrastructure at KPMG Australia told iTnews the upcoming Exchange 14 "tightens up on Exchange 2007" in some areas, while there are "surprising gaps" in others.

"Holistically, it starts to pull together an Instant Messaging, mail and SMS capability - blending all of these into one window," he said.

IT department escapes green policy setting


IT managers are waiting on a corporate directive or more resources in order to implement practices to reduce energy consumption, a Fujitsu survey has found.

The survey of 310 CIOs and IT managers commissioned by Fujitsu Australia found 60 per cent of respondents didn't have a green IT policy in place.

Of those that did, however, 95 per cent reported cost savings and other efficiencies from having it.

But the survey seemed to dispel the idea that having a green IT policy would increase customers attracted because of it.

Only 21 per cent of respondents reported this to be the case.

One reason IT is lagging on green IT is the idea that green policies are seen as enterprise-wide initiatives that incorporate IT.

This is backed by the finding that less than 10 per cent of the CIOs surveyed said they were directly responsible for setting their company's sustainability policy.

The survey also claimed that IT managers didn't understand the specific environmental metrics of relevance to their work - despite them reporting "higher levels of understanding of green issues than the general public does", the report said.

"This low level of understanding calls into question how equipped IT managers are to make environmental-related decisions," the report said.

Most IT managers were looking at things like server consolidation, virtualisation or setting power shutdown policies, but these initiatives were designed to save money rather than contribute directly to a green IT policy setting.

French Internet piracy law defeated in parliament


The French parliament rejected a bill on Thursday that proposed disconnecting internet users if they download music or films illegally, with the ruling UMP party failing to turn out in force to approve the law.

Backed by President Nicolas Sarkozy's government, the legislation was meant to quell the flow of free songs and films on the internet, that has hurt the revenues of artists and production companies.

However, opposition politicians managed to defeat it at a final vote in the National Assembly on Thursday when only a small number of UMP lawmakers turned up for the session, handing the centre-right government an embarrassing defeat.

Socialist parliamentarians broke out in applause after the vote went their way.

Under the proposed law, users caught illegally downloading files would have received two warnings and then, after a third infraction, disconnected from the Internet for up to a year.

Some consumer groups warned that it might have hit the wrong people, saying honest users risked being unfairly punished and forced to prove their innocence if hackers had hijacked their computers' identity.

Socialist parliamentarian Patrick Bloche described the bill as "dangerous, useless, inefficient, and very risky for us citizens".

Under pressure from a struggling music industry, governments have long been trying to crack down on online file-swapping.

"It's a balanced bill for a legal and civilised internet," said Culture Minister Christine Albanel.

The government has the right to demand that the bill is re-introduced to parliament later this year.

In January, Irish internet provider Eircom agreed to disconnect users who download music illegally in a settlement with four major record companies. Irish media said it was the first deal of its kind in the world.

Microsoft virtual machine 'mythbusting' backfires


A Microsoft marketing video designed to "bust myths" around the lack of virtualisation functionality in its products has only served to remind users of how far it has to catch up.

The video features David Greshler, director of virtualisation strategy at Microsoft, and Edwin Yuen, technical project manager at Microsoft, taking apart ten "myths" they said were perpetuated by virtualisation technology rival VMware.

Titled "Microsoft Mythbusters: Top 10 VMware Myths", the duo attacked what they saw as misinformation as presented on the "Why Choose VMware" section of their rival's web site.

Number one in their 'top ten myths' was that "Microsoft offers no live migration" as VMware does with its VMotion technology. Second was the "myth" that Microsoft offered no Clustered File Systems in Windows.

The best the two Microsoft employees could do to de-bunk these assertions was to suggest that their next version of Windows 2008 will feature similar technologies to VMware.

"In our Windows 2008 R2 release, our next release, coming up very soon, we have migration built right in, the same way VMotion works," said Yuen. "It allows you to move a virtual machine from one host to another, without any perceptible downtime."

"Myth one, gone!" said Greshler, smacking his hands together.

Comments on the Microsoft site, even from posters purporting to be Microsoft Gold partners, were highly critical of the duo's attempt to suggest Microsoft has these features commercially available.

"Of course you don't have stuff like Live Migration and such. Sure, you will have it in the future, but right now you don't, and that is the current truth," said one comment.

"So you are busting the myths of not having a VMotion/VMFS equivalent by stating your next product will have them," said another. "When is that expected out again...2010?"

Other assertions the duo attempted to discredit included that Microsoft's Hyper-V was only at version 1.0 and therefore less likely to be reliable or scalable.

"We're running a lot of Hyper V internally," said Yuen, "...on sites like TechNet, and Microsoft.com."

The duo said Hyper V had the same performance benchmarks as VMware's ESX server, better device driver support, the same memory footprint, and a better pricing model.

Greshler also accused VMware of being selective about what management tools of Microsoft it chooses to compare with its own.

"They only talk about VM manager," he said, rather than the complete suite of Windows System Center - which he believed to be an "apples and oranges comparison."

The 10th supposed 'myth' was that IT shops "need VMware."

"We've built virtualisation into Windows Server," said Yuen. "You don't have to pay what equates to a virtualisation tax. You can leverage and use virtualisation with what you have now."

Greshler said VMware added an extra layer of "cost, complexity and security" on top of the hardware, operating system and applications stack Microsoft is known for.

His take on virtualisation has become the subject of ridicule.

"You might be wondering where the hypervisor is in this model - I know I am. Frankly, that is a problem," was the response from blogger Eric Gray, a VMware employee. "To get [to Microsoft's] "three layers" you'd need to forgo virtualisation."

"As a long time Gold Partner, I find the video embarrassing," said another comment underneath Microsoft's video. "Come on guys, if you are going to release something like this, at least wait until you have a real released solution. You're ten years too late and hundreds of features short."

"We deserve better than this," said Mike Laverick, a Microsoft-certified Instructor.

Thursday, April 9, 2009

Hackers breach US electric grid


News of a recent security breach in the US electrical grid is prompting new security worries and calls for better protections.

A Tuesday report by the Wall Street Journal claimed that spies from China and Russia had breached security protections on American electrical grids and had installed software which could have been used to cripple systems such as water treatment centres and power plants through the compromised grids.

The report noted that no malicious activity had taken place. However, given the severity of such an attack, security experts are issuing dire warnings that protections must be improved.

Phyllis Schneck, vice president of threat intelligence for McAfee said the incidents show just how deep our dependence on IT has become, and how vulnerable populations can be when electrical grids are compromised.

"The very high level of this is that a cyber event can cause a catastrophic physical event," Schneck explained.

"As humans it tends to be our habit to build for availability before we put security in, this is awake up call in building sec into every layer of our infrastructure."

The possibility of a cyber attack on public utilities is not new. Last year, the US government released the findings of its Cyber Storm 2 exercise which simulated an attack on both corporate and government IT systems across a number of countries.

At the time, the groups admitted that all sides needed to improve, particularly regarding communication and interaction in the event of an attack.

To Schneck, today's events only reaffirm the need to improve understanding and protection of those government and private infrastructure systems.

"Today's story is not the first, it won't be the last and it's not new," said Schneck.

"This really should be a wakeup call, because we have not yet made securing these systems the priority that it needs to be."