Tuesday, September 17, 2013

Google Street View Car Gets in Fender-Bender or 3 in Indonesia

Today in international tech news: A Google Street View car reportedly plays bumper cars in Indonesia. Also: A 17-year-old uses Daddy's eBay account to buy a $33,000 server once used by Wikileaks; a Saudi prince vows to keep his Twitter shares after IPO; and China parades an online critic who says he has now seen the light.

A Google Street View car dinged a pair of public transport buses and a truck in Bogor, Indonesia.


The Google driver hit one bus and then tried to skedaddle when the driver got angry, police reported.


Alas, the getaway was thwarted when the Street View vehicle hit a second bus -- and then a truck, according to local media.


There are no reports of injuries.


Google confirmed the incident -- or at least that an incident took place, if not the ping-pong scene described by police -- and said it was working with local authorities to address the situation.


There were reports in January that a Street View car killed a donkey. Google denied such a mishap took place.


[Source: BBC]


A 17-year-old used his dad's eBay account to bid, successfully, on a server that once hosted Wikileaks.


The dad, as you can imagine, isn't pleased.


Bahnhof, a Swedish ISP that hosted Wikileaks for about eight months starting in 2010, put the server on eBay to raise money for a pair of charities (Reporters Without Borders and the 5th of July Foundation, a digital rights group).


The winning bid was $33,000, but the father in question reportedly contacted Bahnhof to nix the transaction. The "winner" of the server reportedly lives outside Lisbon, Portugal. He says his son is crazy about conspiracy theories, and that a stern talking-to was in the offing.


The kid originally bid $10,200, but followed that up with seven more bids as the price went north.


The server, whose real value is in the neighborhood of $4,000, had been sitting in the bar of a Bahnhof data center in Stockholm. Bahnhof has cleansed the server of information and sold it as a sort of souvenir.


Wikileaks, for its part, said it did not support the sale.


[Source: Wired]


Prince Alwaleed bin Talal, a billionaire from Saudi Arabia, plans to hang on to his shares of Twitter as the company prepares to go public.


Bin Talal, who is the owner of international investment firm Kingdom Holding and the nephew of Saudi Arabia's King Abdullah, invested $300 million in Twitter in 2011. Twitter is "a very strategic investment," the prince said, and has plenty of room to grow.


Twitter confirmed last week that it has filed for an initial public offering with U.S. regulators.


Although it is banned in some Arab nations, Twitter is available in Saudi Arabia -- and its Saudi user base has been growing rapidly.


[Source: 00000Reuters]


Charles Xue, a Chinese-American venture capitalist known for making controversial remarks online, appeared on Chinese state media Sunday to fess up to spreading irresponsible Internet posts.


Xue, who has 12 million followers on Twitter-ish Sina Weibo, dubbed himself irresponsible and said his musings were "a vent of negative mood." He added that "freedom of speech cannot override the law."


Xue was detained last month and accused of visiting prostitutes.


China recently stiffened penalties for those who meet Beijing's definition of rumormonger. The Supreme Court ruled that any "rumor" that was seen at least 5,000 times, or reposted at least 500 times, would subject the original poster to three years in jail.


[Source: The Guardian]

Gogo to Bring In-Flight Internet Up to Speed

One of the things that makes air travel bearable is being able to log onto the Internet, but the available services are costly, unpredictable and often slow -- way too slow to stream video. Gogo aims to change that with a ramp-up in service that will appeal not only to business travelers but also to passengers who might like to expand their entertainment possibilities while strapped in.

Gogo on Wednesday announced plans to roll out faster and more reliable in-flight Internet access to passengers, allowing them to stream digital entertainment while cruising miles above Earth.


The new Ground to Orbit service will use satellites for reception and Gogo's ground-based cellular network for the return link.


The end result will be a more robust and reliable network that will reach peak speeds of 60 Mbps, according to the company.


That's a 20-fold increase from the 3 Mbps Gogo managed upon its launch in 2008. The company has since upped its speed to 9.8 Mbps, but Gogo users are still unable to stream video and may experience slowdowns depending on how many passengers aboard an aircraft are logging on at the same time.


Virgin America will be the first airline to launch the new service, which is expected to debut during the second half of 2014.


Even just a decade ago, the thought of being able to email from above the clouds seemed like a distant dream, said industry analyst Jeff Kagan. Now that in-flight WiFi capability has become commonplace, consumer demand for faster, more reliable and affordable service is rising.


"A Gogo-type service is needed today in our Internet-centric world," Kagan told TechNewsWorld.


Airlines are recognizing the growing demand. JetBlue recently announced FAA approval of its plan to offer satellite-based in-flight connectivity by the end of the year. It partnered with ViaSat to build out the service, which will allow users to stream entertainment faster than any other WiFi option currently in the air, according to JetBlue.


United Airlines offers WiFi service on some of its flights and plans to add it to more.


That's all the more reason that Gogo needs to improve its service, said Kagan.


"Speeds are slower than we are used to," he noted. "Consistency of service is another problem. Costs have risen and are now roughly (US)$15 to $20 per day. This is still acceptable if you can use this single connection on all your devices -- however, they do not always let you do that. Paying for multiple connections is too expensive for what you get."


Faster and more reliable connections could grow Gogo's user base, said Joel Espelien, senior analyst at TDG Research.


Gogo and other in-flight wireless services largely target business travelers who need to get some work done on the plane, he noted. With more wireless capabilities, though, consumers might latch onto the entertainment possibilities.


The desire for in-flight video currently is satisfied primarily by people side-loading it onto their personal devices at home before heading to the airport, Espelien told TechNewsWorld, "but a blazing fast Internet connection might entice some Netflix customers to start using their subscriptions en route."


Providing that blazing fast connection is just one of many steps that Gogo needs to take if it wants to stay ahead in an increasingly competitive market, said Kagan. "This is still a new service with lots of room for improvement."

Web App Firewalls Blunt Attacks

Web Application Firewalls can be an effective defense against hack attacks on popular programs. "If a firewall administrator puts the time in to locking down and precisely protecting the app it's in front of, it can be very secure," said Barracuda Networks' Daniel Peck. "It's a good fail-safe midway, but eventually, if someone beats on it hard enough, they're likely to find some way around it."

Web applications have become attractive targets for hackers because they allow bad actors to maximize the reach of their mischief with a minimum of effort.


That's what originally attracted the Internet underworld to programs like Windows and Adobe Acrobat, and it's what continues to attract them to Java. A vulnerability in one of those programs can be exploited in millions of machines because those programs are so popular.


In the same way, flaws in popular Web platforms can be used to infect millions of websites with malware or malicious links. It's a problem common not only to content systems -- WordPress and Joomla, for example -- but also to programming languages like Java and PHP.


"They have vulnerabilities that need to be fixed, and they're out there everywhere so they're easy to target," NSS Labs Research Director Chris Morales told TechNewsWorld.


One way to blunt attacks leveraging flaws in Web apps is with a Web Application Firewall. Typically deployed as a net appliance, WAFs are a relatively new technology.


"They're geared toward Web apps and not network-based attacks," Mat Gangwer, an information security analyst with Rook Consulting, told TechNewsWorld. "A WAF gives you more functionality and control over the requests going to and from them."


As in any firewall, effectiveness can vary from one product to another.


"Generally, though, every WAF is going to have functionality to detect attacks on widespread Web applications," Daniel Peck, a research scientist with Barracuda Networks, told TechNewsWorld.


"If a firewall administrator puts the time in to locking down and precisely protecting the app it's in front of, it can be very secure," he continued.


WAFs are best used to stop an attack and alert a developer to a problem so it can be fixed.


"It's a good fail-safe midway," Peck said, "but eventually, if someone beats on it hard enough, they're likely to find some way around it, unless the WAF is incredibly well-tuned."


If you live in Florida, Texas or California, chances are you're receiving more mobile spam than if you live in most other states, according to an analysis released by Cloudmark last week.


Of the top 25 area codes that are mobile spam magnets, four are in the Sunshine State (954, 786, 305 and 904), four in Texas (214, 210, 512 and 817) and six in California (310, 415, 408, 510, 714 and 818).


The Florida spam is concentrated in the southern part of the state, Cloudmark's Tom Landesman noted in a company blog, and primarily comes from outfits looking for junk cars.


"The messages have been flooding mobile phones for over a year now," Landesman wrote. "The senders, looking to tow off junk vehicles, are relatively locked in to their immediate area. After a certain distance, potential leads are no longer economically viable due to the cost of towing."


Banking scams appear to be a favorite of SMS spammers. Every phishing message sent to area code 210 (Greater San Antonio), for example, claimed to be from Generations Federal Credit Union, which is based in that Texas city.


North Carolina was a hotbed for another SMS banking scam, Cloudmark noted. Those junk messages pretended to be from smiONE, a provider of prepaid payment cards.


However, the state's most densely populated city, Charlotte -- ironically a center for banking activity on the East Coast -- was spared from the smiONE campaigns. All of it was directed at less densely populated area codes 828, 910 and 919.


Why concentrate on those area codes? Apparently the phishers were looking to take food out of the mouths of babes. In North Carolina, you see, smiONE makes a prepaid debit card that's used for child support payments.

Sept. 7. ICS Collection Services, based in Chicago, in compliance with federal and state law, discloses that information on 1,344 patient claims were viewed by an unauthorized party due to glitch at the debt collector's website.Sept. 9. University of South Florida reveals it is investigating a custodial employee connected with a data breach that compromised personal data of 140 patients at Tampa General Hospital being treated by USF physicians.Sept. 10. Kaiser Permanente begins notifying patients that data containing personal information belonging to them was accidentally emailed to a person outside the company. The recipient of the data did not view it, Kaiser said, and the information has been deleted from the recipient's system.Sept. 11. Symantec and Ponemon Institute report that the average cost of data breaches to business has declined over the last year. The average cost to a company was US$188 per customer, compared to $194 last year. Average total cost to a business declined to $5.4 million from $5.5 million last year. The researchers also saw a drop of 13 percent in the number of consumers who said they'd bolt from a company that notified them their personal data had been compromised.Sept. 11. Natural Provisions, a natural foods store in Williston, Vt., cuts deal with state attorney general to spend $15,000 to upgrade its computer system in response to complaints that it failed to promptly notify customers of a data breach last year.Sept. 12. Vodaphone Germany reveals that personal information for more than 2 million mobile customers was stolen from its systems. Information stolen included customer names, addresses, bank account numbers and birth dates.Sept. 12. David Patton, executive director of the Utah Department of Health, tells state legislative committee that no cases of identity theft have been linked to a data breach at his agency last year that compromised personal information on some 780,000 people serviced by the department.Sept. 16-18. eCrime 2013. Argonaut Hotel, 495 Jefferson Street, San Francisco. Sponsored by Anti-Phishing Work Group. Registration: $475.Sept. 17. Cyber Security Think Tank. 10 a.m-3 p.m. ET. Live panel discussion sponsored Dell SecureWorks. Free.Sept. 17. The Size and Shape of Online Piracy. 9 a.m.-10:30 a.m. Room 485, Russell Senate Office Building, Constitution Ave. NE and 1st Street NE, Washington, D.C. Sponsored by The Information Technology & Innovation Foundation. Free with registration.Sept. 18-20. Gartner Security & Risk Management Summit 2013. London. Registration: 2,325 euros + VAT; government, 1,800 euros + VAT.Sept. 19. Better Security Without the Risk. 1 p.m. ET. Webinar sponsored by WatchGuard. Free with registration.Sept. 24-27. ASIS International 59th Annual Conference. McCormick Place, Chicago. Registration: Before Aug. 21, $895 member, $1,150 non-member. After Aug. 20, $995 member, $1,295 non-member.Sept. 25. Cyber Sticks and Carrots: How the NIST Cybersecurity Framework, Incentives, and the SAFETY Act Affect You. 12 noon-2 p.m. ET. Offices of Venable, 575 7th Street, NW Washington, D.C. Presentation with former Deputy Secretary of Homeland Security Jane Holl Lute. Free with registration.Sept. 25. Cyber Security Summit 2013. Hilton, New York City. Admission: $199; government, $99.Sept. 30-Oct. 4. INTEROP 2013. Javits Center, New York City. Registration: all access pass, US$3,099 (Mon.-Fri.); conference pass, $2,199 (Wed.-Fri.); Mac & iOS IT, $1,899 (Mon.-Tue.)Oct. 1-3. McAfee Focus 13 Security Conference. The Venetian/The Palazzo Resort-Hotel-Casino, 3325-3355 Las Vegas Blvd., South Las Vegas. Registration: Early Bird to July 31, $875/$775 government; Standard to Oct. 3, $995/$875 government.Oct. 2.Visa Global Security Summit -- Responsible Innovation: Building Trust in a Connected World. Ronald Reagan Building and International Trade Center, Washington, D.C. Free with registration.Oct. 5. Suits and Spooks. SOHO House, New York City. Registration: Early Bird, $395 (July 5-Aug. 31); $625 (Sept. 1 and after).Oct. 8-9. Cyber Maryland 2013. Baltimore Convention Center., Baltimore, Md. Registration: $495; government, free; academic faculty, $295; student, $55.Oct. 9. Induction Ceremonies at Cyber Security Hall of Fame for James Bidzos, David Bell, Eugene Spafford, James Anderson and Willis H. Ware. 6 p.m.-10 p.m. Hilton Baltimore, 401 W. Pratt Street, Baltimore. Dinner Admission (Black Tie Optional): $250.Oct. 17-18. 2013 Cryptologic History Symposium. Johns Hopkins Applied Physics Laboratory's Kossiakoff Conference Center, Laurel, Md. Registration information to be announced.Oct. 29-31. RSA Conference Europe. Amsterdam RAI. Registration: Early Bird to July 26, 895 euros + VAT delegate/495 euros + VAT one day pass; Discount from July 27 -Sept. 27, 995 euros + VAT delegate/595 euros + VAT one day pass; Standard from Sept. 27-Oct.27, 1,095 euros + VAT delegate/695 euros + VAT one day pass; On site from Oct. 28-31, 1,295 euros + VAT.Nov. 6. FedCyber.com Government-Industry Security Summit. Crystal Gateway Marriott, 1700 Jefferson Davis Highway, Arlington, Va. Registration: government, free; academic, $100; industry, $599.Nov. 18-20. Gartner Identity & Access Management Summit. JW Marriott at L.A. Live, 900 West Olympic Boulevard, Los Angeles, Calif. Registration: Early Bird to Sept. 27, $2,075; Standard, $2,375; Public Sector, $1,975.Dec. 4-5. MENA Business Infrastructure Protection 2013 Summit (Risk Management and Security Intelligence for companies in the Middle East and North Africa). Dubai.Dec. 9-13. Annual Computer Security Applications Conference (ACSAC). Hyatt French Quarter, New Orleans.

Goodbye, Encryption; Hello, FOSS

"For years Linux has had a false sense of security, mainly because of the 'many eyes make bugs shallow' myth," Slashdot blogger hairyfeet suggested. "Seriously, show of hands: How many have done a code audit of LibreOffice? Firefox? Chromium? The networking stack? Heck, how many here have done an extensive code audit on those bazillion little programs like screensavers and widgets and weather apps?"

Few would deny that the world has changed since the National Security Agency's PRISM surveillance program was revealed, and not for the better.


Here in the Linux blogosphere, FOSS fans have been mulling the implications ever since the unsettling news broke back in June, but just recently things have taken on an even darker cast.


Turns out not even encryption techniques can hold the NSA at bay, at least in general, leaving users of without much to defend them.


Now, vulnerability is -- or should be -- a familiar feeling to users of Windows, in particular. For those of us in Linux land, however, it comes as something of a shock. No wonder Slashdot blogger deepdive recently sought some clarification.


'Can One Still Sleep Soundly'?


"I have a basic question: What is the privacy/security health of the Linux kernel (and indeed other FOSS OSes) given all the recent stories about the NSA going in and deliberately subverting various parts of the privacy/security sub-systems?" deepdive wrote.


"Basically, can one still sleep soundly thinking that the most recent latest/greatest Ubuntu/OpenSUSE/what-have-you distro she/he downloaded is still pretty safe?" deepdive added.


Translation: Are we still relatively safe on Linux, or has the NSA blown that advantage away? Does Linux still stand tall on security?


Linux bloggers have had no shortage of opinions to share.


"That begs the question, did Linux ever stand tall on security?" offered Hyperlogos blogger Martin Espinoza, for example. "I'd argue that only OpenBSD really makes it the leading priority, but I'll still take Linux over anything closed source any day, and Linux definitely has the benefit of many eyes."


Indeed, the NSA has not cracked good crypto; what it has done is inserted backdoors and such in closed software," Google+ blogger Kevin O'Brien pointed out. "The key word here is 'closed.' That makes Linux even more important since anyone can view the code.


"I think that more people will be moving to Linux once this becomes clear," O'Brien added.


To wit: "I am sure the code makers are doing their best to revise the code and improve it -- I can't say anything like this for any other OS," agreed Google+ blogger Gonzalo Velasco C.


"You have to give them credit: The NSA has put a lot of work into spying on us night and day," began Linux Rants blogger Mike Stone. "If you want to be completely sure you're not being spied on, sell everything you own and move into a shack in the woods with a heavy canopy, because they're monitoring you if you don't. If you're not willing to go to that extreme, then you may have to just settle for reducing their field of view."


Using a secure VPN and TOR will help, "but only if you're not using an operating system that's spying on you before your traffic even leaves your router," Stone suggested. "It's 'known' that Microsoft has worked with government agencies to circumvent their own encryption, so if you're using a Microsoft operating system, you have no expectation of privacy. Microsoft will sell you out at the drop of a hat."


As for Apple, "the NSA has mocked Apple customers and even referred to Steve Jobs as 'Big Brother,'" he pointed out. "Even if both companies deny it to the ends of the Earth, how can you know for certain? The fact is, you can't. That's why open source is your best option."


It's "infinitely more difficult to hide your spy code when the code is open for everybody to read," Stone said.


"You still have to be diligent about what you use," he concluded. "If you want to be as sure as you can, I'd suggest the LFS Project, but many other Linux distributions can get you close. You may want to avoid the ones based in the United States, though."


Chris Travers, a blogger who works on the LedgerSMB project, took a similar view.


"On one hand, for now, I think we are doomed to a lack of privacy in things like email," Travers told Linux Girl. "There is too much information that is necessarily disclosed when emails are sent; same with social networking sites and the rest."


In the NSA era, however, "open source and auditable systems are more important than ever," Travers opined. "If we are to regain some semblance of privacy, we will not only need protocols designed to thwart these efforts, but we will need systems we can audit to ensure they haven't been heavily compromised.


"This means that open source operating systems like Linux, BSD and so forth will be necessary for any environment that users wish to trust," he concluded.


The NSA has contributed a lot to the Linux kernel, such as through SELinux, Google+ blogger Alessandro Ebersol pointed out, "so, yes, I'm afraid they have put a hole in our beloved OS.


"Sure, when the community can watch and examine the code, it is always better, and even a needle can be spotted," Ebersol added.


Windows, on the other hand, "phones home every week and spits its guts out to that company (and NSA)," he said.


"Oh well, we'll have to be extra careful now and watch the logs closely," Ebersol concluded.


"I really think people are overreacting, or rather reacting in the wrong way," consultant and Slashdot blogger Gerhard Mack opined. "Everything we know tells us that the NSA works around encryption by demanding the information directly from service providers or finding a way to get their hands on the encryption key.


"The only person really saying otherwise is John Gilmore, but most of his arguments are that the IPSEC standard is terrible (nothing new), but there is no actual proof the NSA was behind it behind a bad standard or that they even needed to sabotage it in the first place," Mack told Linux Girl. "His whining about NULL encryption was misplaced, since SSL has it too and any halfway-competent admin will disable weak ciphers."


Meanwhile, "if the NSA did backdoor Linux, an expert from a nonaligned country would notice and take action," he said. "It's highly unlikely that a given conspiracy would include Russian and Chinese programmers as well."


Bottom line? "If you are really worried about the NSA, the solution isn't to avoid Linux, it's to avoid hosting or using services based in the U.S. or the UK."


In fact, "Linux remains as secure as it ever was, which is to say that the security of any operating platform ultimately rests in the hands of the end user and his or her habits," Google+ blogger Brett Legree pointed out. "Similarly, your privacy is dictated by your own habits and the habits of those with whom you share any and all information, be it verbally, in print, or by any digital means."


The weakest link, in other words, "remains the human element," he suggested.


"So, while Linux may continue to offer advantages for some people to assist with security and privacy, it is not a panacea," Legree concluded.


"The weakest link is always the USER, not the OS!" Slashdot blogger hairyfeet told Linux Girl.


"For years Linux has had a false sense of security, mainly because of the 'many eyes make bugs shallow' myth, which a little common sense will invalidate easily," hairyfeet suggested.


"Seriously, show of hands: How many have done a code audit of LibreOffice? Firefox? Chromium? The networking stack?" he asked. "Heck, how many here have done an extensive code audit on those bazillion little programs like screensavers and widgets and weather apps that always end up being packed into most desktop distros?


"I bet if we looked at all the distros and found what the 100 most common programs are and then look at how many of them have their source downloaded, not audited, just downloaded, with every release you MIGHT have 10 out of 100 -- MAYBE," hairyfeet predicted.


Meanwhile, "how do you think the NSA would get backdoors in?" he added. "What volunteer project is gonna turn down a great coder with years of exp that is willing to work for free and writes great code?"


At the end of the day, "it would be no harder for the NSA to stick a backdoor in Linux than it would be for any other OS, as having source doesn't magically make the bad guys go away nor does it qualify Joe average programmer to do a security audit of the entire Linux OS, which just FYI, thanks to the insane release schedules, I seriously doubt you'd even get halfway through a single code audit before what you were auditing had been replaced by 3 new versions!" hairyfeet concluded.


Last but not least, "the NSA problem is bigger than */Linux," Robert Pogson suggested.


"The NSA probably has ways to tap into communications on the Web right in the chips of our Ethernet and Wifi ports, routers and almost any Web or cloud services," Pogson explained. "There isn't much */Linux or FLOSS can do about such corruption of the infrastructure of the Web except to pull the plug or set up a FLOSS Web vertically integrated from ARMed chips and RAM to a private network for the non-USAian world.


"I don't see that as feasible, but it just might be possible for the world to shun the USA and keep it off the Internet until human rights are respected globally by the USA," he added. "We aren't anywhere close to that, but already I and many others are doing our best to use as little of the Web controlled by USA as possible."


In short, "if enough of us shun U.S. businesses to affect the GDP," Pogson concluded, "the government of the USA may get a message from its lobbyists from big business."

Oh Quark: Intel Just Changed the Technology Market

Error in deserializing body of reply message for operation 'Translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 2, position 1735. Look around the room. Compared to the number of phones and PCs you have, how many light switches, light fixtures, chairs, tables windows, thermostats, doors with locks, and floors do you have? Each is a possible home for a Quark-enabled sensor, and each could be made smarter as a result. The future that Quark will enable will be very, very different.

This year, Intel held its IDF during the same week as Apple's iPhone launch, and it's not the first time these events have coincided. However, I could count the number of times Intel has had something more interesting to present than Apple on one hand -- and have five fingers left over.


That was true until last week, when Intel surprised the market with an obscure technology codenamed "Quark," which promises to change dramatically the world we live in.


Apple, in contrast, launched a slightly revised iPhone, which will now come in the color "gold," along with a minor iOS change -- and it apparently discovered colors in a cheaper offering. Mostly, Apple's big announcement was biometric fingerprint readers on its high-end iPhone, a technology PCs have had for more than a decade. For once, the Intel keynote was more interesting than Apple's.


However you need to know where Quark is going to fully understand how revolutionary it can be. I'll go into that and close with my product of the week: Dell's amazing new Venue tablet.


If I were to sum up the biggest problem with the computer industry since its inception, it is that smart devices have actually been pretty stupid. From the beginning, computers knew very little about the world they lived in and we had to adapt to them. In short, while the perception was that they were created to be our servants, the reality is we serve them -- and they don't even know that much about us.


Quark, a very small-scale embedded technology, is supposed to address the second part of that -- enabling the computerized world to better adapt to our needs automatically. It anticipates a future when most everything we touch will be computerized, sensor equipped, and able to determine automatically what it is we need to be more comfortable.


This is potentially a massive market, because it includes pretty much everything we touch that isn't currently computerized and instrumented. It also includes many of the dumb devices -- like security cameras and thermostats -- that we think are intelligent and computerized, but really are not either.


Look around the room. Compared to the number of phones and PCs you have, how many light switches, light fixtures, chairs, tables windows, thermostats, doors with locks, and floors do you have? Each is a possible home for a Quark-enabled sensor, and each could be made smarter as a result.


So this is the future that Quark will enable, and you'll see it is very, very different. Think of beds that can monitor your comfort level and heat or cool, harden or soften, and even pulse (the return of magic fingers!) in order to ensure a good night's sleep.


Imagine security systems that can not only identify you with a high degree of accuracy but also alert a medical service if it looks like you may experience a heart attack in the near future or if your child has fallen in the pool, or if anyone in your family has fallen and can't get up.


You could have lights that not only turn on when you are near but also apply ideal levels of illumination based on whether you're reading or watching TV, for example. Wearable devices will not only help you exercise by alerting you when your heart is in its target range, but also let you know if you're getting angry or impaired to assist you in avoiding road rage -- or rage in general -- or a DUI conviction.


Windows could automatically shade themselves when you're dressing or otherwise have a need for privacy and become transparent if there is something going on outside you actually want or need to see. Heating and cooling systems could adjust to accommodate the persons in the room and even target the furniture they're sitting on.


Think of entertainment systems that could adjust their sound levels and speaker coverage based not only on what you're watching or listening to, but also on specific preferences, automatically directing its efforts to please multiple listeners.


Imagine drones that auto launch when a noise is heard inside the house and report back what they have found -- auto locking the intervening doors and alerting the authorities if necessary. Imagine drones that could auto launch and guide you out of a burning house, or alert you that your small child was attempting to escape the crib or otherwise about to do something dangerous. Imagine cribs that could alter themselves to keep your child entertained and less able to climb out.


In this world, you could just say what you want, and a screen or a device near you would automatically respond and fulfill that want.


This is the instrumented, vastly smarter world that Intel will try to create with Quark -- and it makes PCs and smartphones seem so last century by comparison.


This amazing effort, or at least the focus of it, is largely the result of one of the most influential people in the world: Intel Fellow Genevieve Bell. Bell's team aims to drive Intel and the technology industry toward creating solutions like those I've described above, in the process transforming the world from one in which the humans are slaves to one in which we are the masters.


Bell is known as Intel's secret weapon, and she is its most visible human competitive advantage. Through the efforts of Bell and her team, our future will be amazing and our technology far more focused on making us happy. This is so much more powerful than a new OS, gold phone or cheap, colorful phones -- which is why I think Intel massively eclipsed Apple this year. Quark is a world changer.


Back when Windows 8 launched, you had an ugly choice of tablets. You could get a light, inexpensive, thin one with great battery life that didn't run much in the way of software but came with Office -- with the exception of the most critical app, Outlook -- or you could get a much more capable tablet that cost twice as much, had less than half the battery life and was nearly twice as heavy. Steve Jobs' ghost must have been smiling as folks bought more iPads.


Well Intel's Bay Trail processor just fixed the last part, and coupled with Windows 8.1, it promises to provide a thin, light and inexpensive tablet. I'm thinking Jobs' ghost isn't smiling anymore.


The most interesting of the products showcased on the main stage at IDF was Dell's 8-inch Venue tablet, because it pushed the limits on sexy.


This is the first Windows Tablet I might actually give up my beloved Kindle Fire for -- and over the years, I've actually started to do more email, shopping and movie viewing on my Fire and not on my phone or even my laptop.


Any product that can get me to consider an alternative to my beloved Kindle is worth being named the product of the week. This class of system will define the success or failure of Windows 8.1. We'll get more details on the Venue next month, when Windows 8.1 launches and the tablet officially becomes available, but I'm making it product of the week early. Thanks to Dell and Intel's Bay Trail processor, it is just damned sexy.

Needle in a Haystack: Harnessing Big Data for Security

Error in deserializing body of reply message for operation 'Translate'. The maximum string content length quota (8192) has been exceeded while reading XML data. This quota may be increased by changing the MaxStringContentLength property on the XmlDictionaryReaderQuotas object used when creating the XML reader. Line 1, position 8653. The process of validating suspicious hosts can be cost- and resource-prohibitive. To validate threats across the entire Internet would require an army of analysts. The good news is that there are thousands of potential analysts in the security community, including security-savvy customers. The bad news is that security vendors typically keep their threat intelligence to themselves.

The combination of the polymorphic nature of malware, failure of signature-based security tools, and massive amounts of data and traffic flowing in and out of enterprise networks is making threat management using traditional approaches virtually impossible.


Until now, security has been based largely on the opinions of researchers who investigate attacks through reverse engineering, homegrown tools and general hacking. In contrast, the Big Data movement makes it possible to analyze an enormous volume of widely varied data to prevent and contain zero-day attacks without details of the exploits themselves. The four-step process outlined below illustrates how Big Data techniques lead to next-generation security intelligence.


Malware is transmitted between hosts (e.g. server, desktop, laptop, tablet, phone) only after an Internet connection is established. Every Internet connection begins with the three Rs: Request, Route and Resolve. The contextual details of the three Rs reveal how malware, botnets and phishing sites relate at the Internet-layer, not simply the network- or endpoint-layer.


Before users can publish a tweet or update a status, their device must resolve the IP address currently linked to a particular domain name (e.g., www.facebook.com) within a Domain Name System record. With extremely few exceptions, every application, whether benign or malicious, performs this step.


Multiple networks then route this request over the Internet, but any two hosts never connect directly. Internet Service Providers connect the hosts and route data using the Border Gateway Protocol. Once the connection is established, content is transmitted.


If researchers can continuously store, process, and query data gathered from BGP routing tables, they can identify associations for nearly every Internet host and publicly routable network. If they can do the same for data gathered from DNS traffic, they can learn both current and historical Host IP Address/Host Name associations across nearly the entire Internet.


By combining these two Big Data sets, researchers can relate any host's name, address, or network to another host's name, address, or network. In other words, the data describes the current and historical topology of the entire Internet -- regardless of device, application, protocol, or port used to transmit content.


While storing contextual details on a massive volume of Internet connections in real-time is no easy task, processing this data in order to extract useful information about an ever-changing threat landscape might be nearly impossible. There is an art to querying these giant data sets in order to find the needles in the haystack.


First, start with known threats. It's possible to learn about these from multiple sources, such as security technology partners or security community members that publicly share discoveries on a blog or other media site.


Second, form a hypothesis. Analyze known threats to develop theories on how criminals will continue to exploit the Internet's infrastructure to get users or their infected devices to connect to malware, botnets and phishing sites. Observing patterns and statistical variances regarding the requests, routes and resolutions for malicious hosts is one of the keys to predicting the presence and behavior of malicious hosts in the future.


Spatial patterns can reveal malicious hosts, since they often share a publicly routable network (aka ASN) with other malicious websites -- for example, same geographic location, same domain name, same IP address, same name server host storing the DNS record or other objects. Infected devices connect with these hosts more often than clean devices do.


Temporal patterns can be used to identify malicious hosts by showing evidence of irregular connection request volume or new domains with sudden high spikes in volume immediately after domain registration. Statistical variances, such as a domain name with abnormal entropy (gibberish), can also reveal malicious hosts.


Third, process the data -- repeatedly. On the Internet, threats are always changing. Processing a constant flow of new data calls for a real-time adaptable machine-learning system. It needs classifiers that are based on a hypothesis. Alternatively, the data can be clustered based on general objects and elements, and training algorithms can collect a positive set of known malicious hosts as well as a negative set of known benign hosts.


Fourth, run educated queries to reveal patterns and test hypotheses. After processing, the data becomes actionable, but there may be too much information to effectively validate hypotheses. At this stage, visualization tools can help to organize the data and bring meaning to the surface.


For instance, a researcher may query one host attribute, such as its domain name, but receive multiple scored features outputted by each classifier. Each score or score combination can be categorized as malicious, suspicious or benign and then fed back into the machine-learning system to improve threat predictions.


When a host is categorized as "suspicious," there is a possibility of a false positive, which could result in employee downtime for customers of Internet security vendors. Therefore, continuous training and retraining of the machine-learning system is required to positively determine whether a host is malicious or benign.


The process of determining whether suspicious hosts are malicious or benign can be cost- and resource-prohibitive. To validate threats across the entire Internet would require an army of analysts. The good news is that there are thousands of potential analysts in the security community, including security-savvy customers. The bad news is that security vendors typically keep their threat intelligence to themselves and guard it as core intellectual property.


A different approach is to move from unidirectional relationships with customers to multidirectional communication and communities. Crowdsourcing threat intelligence requires an extension of trust to customers, partners and other members of a security vendor's ecosystem, so the vendor must provide dedicated support to train and certify the crowdsourced researchers.


However, the upside potential is significant. Given an anointed team of researchers across the globe, the reach and visibility into real-time threats will expand, along with the ability to quickly and accurately respond, minute by minute, day by day, to evolving threats.


As for tactical requirements, the community needs access to query tools similar to those used by the vendor's own expert researchers. The simpler interface would display threat predictions with all the relevant security information, related meta-scores and data visualizations, and allow the volunteer to confirm or reject a host as malicious.


Threat intelligence derived from Big Data can prevent device infections, network breaches and data loss. As advanced threats continue to proliferate at an uncontrollable rate, it becomes vital that the security industry evolve to stay one step ahead of criminals.


The marriage of Big Data analytics, science and crowdsourcing is making it possible to achieve near real-time detection and even prediction of attacks. Big Data will continue to transform Internet security, and it's up to vendors to build products that effectively harness its power.

Monday, September 16, 2013

Bring On the Pineapple and Bone-In Ham

By Chris Maxcer
MacNewsWorld
Part of the ECT News Network
09/16/13 5:00 AM PT

We're not all born to be fancy chefs, and Kitchen Knife Skills knows it. It's designed for newbies and is therefore realistic. I appreciate that. While I thought I knew how to cut open an avocado, it turns out you can deftly whack your knife into the pit, then twist the knife to loosen and remove it. A couple of previous girlfriends might have swooned had they seen me nonchalantly use that move.

Kitchen Knife Skills: Essentials for the Confident Cook by Open Air Publishing is available in the iTunes App Store for US$4.99.

Kitchen Knife Skills app

You've got to admire a person who knows how to wield a knife with confidence -- especially a chef's knife. If you're anything like me, you've stumbled upon some sort of food in the kitchen that needed to be cut up, and because you didn't know what you were doing, you just started hacking away. You probably used the wrong sort of knife, and the technique? Likely messy, even dangerous.

I remember my first pineapple. I cut off the hard skin then hacked the hulk of yellow fruit into slices, which unfortunately kept the tough center rind. How to cut that out? I ended up with a juicy mess all over the counter, and the only saving grace of the endeavor was that I learned you can throw fresh pineapple chunks at most anyone -- and they'll love it because it tastes so much better than anything from a can.

For our meat-eating friends, the same goes for a whole ham or turkey -- while you can hack it up with a caveman-like rock, there's a better way, and the Kitchen Knife Skills app will show you how through words, photos and video.

First of all, Kitchen Knife Skills: Essentials for a Confident Cook, is part app and part book -- it's more app-like than book-like, and if I have any quibbles at all, it's that the navigation is harder than I expected.

There's a mini tutorial on how to use the app; still, I must admit, sometimes I'd try to swipe left and right to turn pages when I should have been scrolling up and down. Then, when I would get to the end of a chapter, I could tap a rectangle at the bottom to continue on -- but I'd lose track of where I was, physically, within the book. Or app.

The point? You'll likely get a bit confused, too. Get over it. I did -- right after I realized that I could swipe hard from left to right multiple times to expose the chapters and their subtopic pages. So under Fruit, there's a section for Fruit in general. It's followed by Avocado; Citrus; Mango; Papaya; Pears and Apples; Pineapple; Stone Fruit: Peaches, Nectarines and Plums; and Tomato.

Similarly, there are sections on Vegetables, Poultry, Seafood and Red Meat. Each kind of food has a handy tip that shows you how best to cut or chop it up, as well as make sure you're using the right equipment.

You actually need just three kinds of knives in your kitchen -- a chef's knife, paring knife and bread knife -- according to the authors. This is covered in the Go-To Gear section, which also defines and identifies different sorts of specialty knives you may want to use, too -- like a boning knife, fillet knife, or cheese knife.

The app also covers cutting boards -- wood or plastic? -- and handy extra gear like kitchen shears (scissors to me) and a box grater -- because sometimes chopping is just not as efficient as grating.

Even though the app shows you proper cutting skills, it's designed for newbies and is therefore practical too. Realistic. We're not all born to be fancy chefs, and the tone of this app knows it. I appreciate that.

Meanwhile, how does the app actually teach you kitchen knife skills?

After showing you photos of different kinds of knives -- it turns out that my go-to chef's knife is a Japanese style that was actually made by Germans -- the app walks you through different kinds of foods and shows you a key method for cutting each.

First, you can watch a high-quality video that shows you how to say, cut up a whole raw chicken. In the app, your video instructor is Sarah Copeland, a food expert and former recipe developer for the Food Network.

In addition to walking you through a process, she will impart handy tips. For instance, you probably understand that buying a chicken whole is more economical than buying it already cut up. Cool. But, once you know what you're doing, it also means that you'll have more control over the size and shape of all the pieces and parts. Nice. I used to think a leg was just a leg. Not any more.

If you don't like a video or just want a quick reference, you can scroll down past the video section and get into the author-bookish section of the app. In the case of the chicken, you could take a guided tour of the anatomy of a raw chicken, check out the kinds of knives and tools you'll want to use, or dive into the illustrated written instructions, like separating the breast from the back. Queasy? Sorry.

You can avoid the meat sections and focus on the fruit and vegetables. For instance, while I thought I knew how to cut open an avocado, it turns out you can deftly whack your knife into the pit, then twist the knife to loosen and remove it. A couple of previous girlfriends might have swooned had they seen me nonchalantly use that move.

The best thing about Kitchen Knife Skills: Essentials for the Confident Cook is that it is thorough with excellent, high-quality photo and video. You learn a few extra tidbits here and there, and you always get just enough detail to keep you moving quickly to clearly learn a new technique.

In that sense, the app is a 100 percent success -- despite initial difficulty learning my way around the app, I have come away with new skills. For instance, I no longer fear the artichoke, much less the Thanksgiving Turkey.

Is there an app you'd like to suggest for review? Please send your iOS picks to me, and I'll consider giving them a whirl.

And use the Talkback feature below to add your comments!

MacNewsWorld columnist Chris Maxcer has been writing about the tech industry since the birth of the email newsletter, and he still remembers the clacking Mac keyboards from high school -- Apple's seed-planting strategy at work. While he enjoys elegant gear and sublime tech, there's something to be said for turning it all off -- or most of it -- to go outside. To catch him, take a "firstnamelastname" guess at WickedCoolBite.com.

Voyager's Intrepid Flight a Reminder of Human Audacity

Voyager 1, now sailing through interstellar space, is both a triumph of human ambition and a poignant reminder of it's decline in recent decades -- at least when it comes to space exploration. Voyager's success "is bittersweet," said Jonathan Lunine, director of the Center for Radiophysics and Space Research. It's "a sign of what we could do and become -- yet we are choosing not to."

NASA has confirmed that after 36 years of journeying, Voyager 1 has reached interstellar space.


Voyager 1 has been traveling for about a year through a transitional plasma region in the space between the influence of Earth's sun and other stars.

The Space Between: This artist's concept shows the Voyager 1 spacecraft entering the space between stars. Interstellar space is dominated by plasma -- ionized gas, illustrated here as brownish haze -- that was thrown off by giant stars millions of years ago. (Credit: NASA/JPL-Caltech)

A team of scientists led by University of Iowa space physicist Don Gurnett has been tracking the Voyager 1's journey.


Earlier this year, the researchers realized that the craft's plasma wave instrument was picking up on electron plasma oscillations about 40 times greater than those inside the heliosphere. Those oscillations had been sparked by a burst of solar wind and magnetic fields that had erupted from the sun in March of 2012. They made their way to the Voyager 1 on April 9, causing the plasma around the spacecraft to vibrate like a violin string, according to NASA.


The pitch of those waves corresponded to an electron density that is to be expected in interstellar space, prompting NASA to confirm the Voyager 1's arrival there.


"Voyager 1 is the first true stellar explorer from Earth," James R. Webb, Ph.D., professor of physics and director of the SARA Observatory at Florida International University, told TechNewsWorld. "Nothing else we are in contact with has ever gone that far. ... So it is a significant step in what Carl Sagan called 'a cosmic civilization.'"


Voyager 1 launched in 1977, about two weeks after its twin, Voyager 2, took off. The crafts were designed to gather information about the outer solar system.


On board Voyager 1 is a gold record of Earth sounds including the music of Mozart and greetings from humans, among them Carl Sagan's then-young son.


Since its launch, Voyager 1 has traveled an estimated 12 billion miles away from the sun. Along the way, it has provided NASA scientists with valuable information, including the surprising discovery of volcanic activity on Jupiter's moon.


It was Voyager that snapped the famous "Pale Blue Dot" image of Earth, turning around to take the shot before it left the Solar System.


Interstellar space likely will provide new and intriguing information about the Milky Way galaxy, said Jonathan Lunine, Ph.D., director of the Center for Radiophysics and Space Research at Cornell University.


"The in site monitoring of the interstellar medium is a really exciting prospect," he told TechNewsWorld. "Material from the interstellar medium makes it into the solar system, but the sun's magnetosphere and plasma environment mix the interstellar material with other particles -- a kind of cosmic Cuisinart. So being able to sample the interstellar winds, if you will, in pure form is a precious opportunity."


Eventually, that opportunity will run out, as the Voyager 1 doesn't have enough power to keep going forever, Lunine added.


"Its next steps are keep on keepin' on -- until its nuclear power source fades to the point where not even a single instrument can be operated, maybe a decade or more from now," he noted. "Then it's time for the big sleep in the cosmic void."


Voyager 1's accomplishment is a reminder that some of today's most valuable space information is coming from initiatives that began decades ago.


"We are overjoyed at the same successes our fathers achieved in 1960," Lunine pointed out. "We are content to celebrate the successes of a spaceship launched in 1977. It is up to the next generation to take us back, to build more voyagers and send people to the Moon and Mars. The success is bittersweet, a sign of what we could do and become -- yet we are choosing not to."

Saturday, September 14, 2013

Reinventing Play With Augmented Reality Toys

Augmented reality is transforming the way toys work and how kids play with them. Twenty-first century kids live and play at the intersection of the digital and physical worlds, and their toys are beginning to meet them where they live. "Augmented reality allows for a nonlinear way of learning and exploring," said Popar Toys CEO Scott Jochim. "It's a great kinesthetic way of learning."

Augmented reality and other interactive technologies are changing what it means to play, read and interact.


"For decades we have aspired to the holodeck as featured in Star Trek, whereby we can fully immerse ourselves in simulated surroundings," toy consultant Steven Reece told TechNewsWorld. "There are numerous examples [of toys that use] augmented reality, but virtual reality will also deliver some amazing experiences within the next five to 10 years."


This new breed of toys offers a kind of magic that kids -- and adults -- crave.


"Augmented reality lets kids role-play but adds that element of magic," The Toy Insider's Laurie Schacht told TechNewsWorld.


Storming the Castle


Mattel'sDisney Princess Ultimate Dream Castle, for example, isn't just any old castle. Using the Disney Princess Magic Mirror app, children can scan specially marked areas with an iOS device camera and trigger activities in the princesses' rooms and around the outside of the fortress.


"Together, physical play is extended to interactive play," Yves Saada, vice president of digital media with Disney Publishing Worldwide, told TechNewsWorld. "The app can also be downloaded without the castle, and kids will have access to the activities in the app. However, with the castle, the experience is enhanced and offers hours of diversified play."


The augmented reality app provides a high-tech dimension to the world of Disney princesses, bringing their castle alive and allowing children to interact with it and the princesses in creative ways.


"It allows them to bring play to life and offers more opportunities for interactive and immersive experiences," explained Saada. "With the castle, the enhanced experiences are extended to kids' family and friends. AR apps provide kids with opportunities for diversified play and immersion with their toys."


Popar Toys is another company at the forefront of augmented reality play, with books, toys, games and posters that come to life through apps.


"There are certain play patterns that we're all familiar with," Popar Toys CEO Scott Jochim told TechNewsWorld. "These play patterns are ingrained in our heads. What we're doing is enhancing those play patterns with an added level of digital."


The company's toys have both physical and digital elements, and though they can stand alone, they're at their best when used together.


"Each product has to stand on its own," said Jochim. "Someone can play with it without the physical entity or the digital entity, but combined it makes a much more immersive experience."


Kids can read Popar Toys' books just as books, for instance, and at the same time use them as launchpads for exploring stories, space, chemistry or history. They can put together its puzzles, point an iPad at them, and enter into video games. They can don virtual space helmets, film Vines of themselves as astronauts, and share the experiences with their friends.


"We're taking digital and physical play and putting them together," explained Jochim. "Augmented reality allows for a nonlinear way of learning and exploring. It's a great kinesthetic way of learning."


Toy retailers, in turn, are changing the way they display and market such toys, with Popar providing iPads that people can point at their toys to get the interactive, immersive experience right in the toy aisle.


"We've had to re-invent point-of-purchase displays of our products in the stores," said Jochim. "We found that we would tell customers to download an app, but they wouldn't. They want to go in store and have an instant experience."


Kids are already using the Web, social media and mobile devices for playing and learning, and these augmented reality toys help to channel and shape those impulses.


"They're going to YouTube to find out how to make slime in their backyard," said Jochim. "Why not create toys that have that same interactivity?"


Cortana: Windows Phone's Answer to Siri?

Apple's iPhone has Siri and Android has Google Now, but it looks like Microsoft is developing its own counterpart: a virtual assistant based on the Halo character "Cortana." In fact, "she has the potential to be a star for Microsoft," said analyst Rob Enderle. "Xbox is Microsoft's strongest platform and Halo is the strongest brand, with Cortana being the cutest character."

For players of Microsoft's Halo video game series, the computer AI character known as "Cortana" can do much more than just provide directions and plot advances in the game. Soon, however, Cortana could become part of Windows Phone users' real lives as well.


Specifically, rumor has it that a Cortana app is in the works and could arrive on Windows Phone early next year. Much like the artificial-intelligence character from the Halo series, Cortana in app form is meant to be a virtual assistant that can learn and adapt similar in many ways to Apple's Siri and Android's Google Now. It will likely rely on machine-learning technology as well as the "Satori" knowledge repository that powers Microsoft's Bing search engine.


Microsoft CEO Steve Ballmer, in fact, alluded to such a feature back in July when he announced the company's reorganization.


"Our UI will be deeply personalized, based on the advanced, almost magical, intelligence in our cloud that learns more and more over time about people and the world," Ballmer wrote at the time. "Our shell will natively support all of our essential services, and will be great at responding seamlessly to what people ask for, and even anticipating what they need before they ask for it."


Microsoft did not respond to our request for further details.


More Than a Pleasing Voice


Cortana is much more than just a voice-recognition system with a recognizable and arguably pleasing voice. While it is based on a popular character, Cortana is also meant to become an integrated component of the new interface for Windows across its various platforms.


Why a gaming character?


"In itself it doesn't bring something that crucial to the table," said Mike Morgan, senior analyst for mobile devices at ABI Research. "Having this functionality brings something, and that is a step forward towards being able to have greater interaction with a device.


"Microsoft has quite a bit of experience with speech recognition technology," Morgan told TechNewsWorld. "Using the Halo character is just the packaging, and is just the voice. There is the likelihood that the voice could be changed."


Yet while Microsoft has created quite the franchise with Halo, Cortana isn't exactly the face of the game.


"It is a bit 'inside baseball,'" Billy Pidgeon, independent video game and social media analyst, told TechNewsWorld, referring to the popular metaphor. "However, the target audience is clearly wider than gamers, and this could work as long as the voice is properly implemented.


"It could actually be great for marketing as well," Pidgeon added. "It won't put people off that it is based on a game character, and those who do know the character will likely enjoy it. There aren't really any negatives to using the character."


Throughout the Halo series, Cortana helps direct Master Chief -- the persona the player takes on -- and serves to aid him. If anything, Cortana acts very much as reliable and trusted assistant.


"What this really comes down to is how well the system works," Pidgeon noted. "It certainly is a lot more than the voice."


Cortana is clearly intended as Microsoft's answer to Siri, the voice assistant for the iPhone. However, users' results with Siri have seemed to vary widely.


"No speech recognition is perfect," Morgan noted. "We're brainwashed by things like Star Trek, where someone merely says, 'computer' and it works to complete the task.


"That is the ideal goal, and we're getting closer to it," Morgan added, "but even Watson -- the IBM supercomputer that competed on Jeopardy -- wasn't technically relying on voice recognition."


Instead, questions were provided to Watson via text strings.


"The assistant capabilities are layered on top of the recognition technology," explained Morgan. "The tasks are handled either on a device itself or performed in the cloud, and Microsoft is in a good position because it can do either."


More importantly than its current capabilities on the technical front, however, may be Cortana's ability to tie tougher the various Microsoft ecosystems.


"In a greater sense, using this Halo voice allows Microsoft to extend the various pieces beyond their Xbox family and into their mobile device family, Morgan suggested.


There is also little denying that Microsoft's Windows Phone could benefit from a "hot" character, and Cortana is arguably hot in more ways than one.


"She is an attractive character, and she has the potential to be a star for Microsoft," said Rob Enderle, principal analyst at the Enderle Group. "Xbox is Microsoft's strongest platform and Halo is the strongest brand, with Cortana being the cutest character. The Marine [Master Chief] wouldn't have the same impact."


In short, Cortana could appeal beyond gamers, Enderle told TechNewsWorld.


"Microsoft could show that Siri is out of date," he said, "and Cortana is the hot and current AI assistant that you can trust."

How to Make Your PC Restart Automatically After a Power Outage

It's a rare office indeed that doesn't suffer power outages from time to time -- weather-related or otherwise -- but such events don't have to be as disruptive as they once were. Enter the trusty uninterruptible power supply, which today can not only shut your computers down safely, they can also start them back up again once power has returned. Mother Nature: 0; Tech: 1.

The 2013 Atlantic hurricane season is quietly underway. Kit is available, however, that can help mitigate potential office disruption as weather ramps up.


Uninterruptible power supplies are sophisticated battery-containing devices that supply backup power to desktop PCs during grid electricity outages, like in storms. You can pick up a UPS at office supply retailers, among other places. They're great to have because the battery lets you keep working during short outages, and they let you shut down a desktop computer normally in the event of a longer outage without losing data.


They also protect the PC from brown-outs and spikes through circuitry.


Much of this power management can be accomplished with software that comes included with the UPS, so even when the PC is unattended, like over lunch, the UPS will sense any outage and shut down the PC safely and automatically using the available battery power, thus saving your files.


If you have a UPS, or are considering buying one for this year's storm season, you should also know about a little-known trick available on newer PCs, and that is to get the PC to start up again -- with no intervention by you -- when the power comes back on.


This is useful when taking advantage of remote PC access services like GoToMyPC and file-syncing with SugarSync-like services. Otherwise, you'd have to physically switch the PC back on again, which might be inconvenient or impossible at the time.


Getting your PC to restart automatically after a power outage involves getting the computer to "see" the power returning by making some changes to the PC's BIOS settings and installing the UPS-included software. Here's how to go about it.


Step 1: Open your computer's BIOS settings menu. Do this by restarting the computer and observing the first flash-screen that appears. This will be the black screen with white text that shows before Windows loads -- assuming you're using Microsoft's operating system.


Look for the Setup function key description. It will be "Setup F2" or F12, or something similar. Restart the computer and at the same time press the appropriate function key. Tap the key repeatedly during this initial startup period and the BIOS Settings menu will appear.


Step 2: Look for the Power Settings menu item within the BIOS and change the AC Power Recovery, or similar, setting to "On." You are looking for a power-based setting that affirms that the PC will power on when power becomes available.


Some older PCs don't have this setting and so aren't capable.


Step 3: Save the configuration and reboot the computer.


Step 1: Plug the PC and monitor into available controlled AC outlets on the UPS. I've been using a Schneider Electric APC Back-UPS Pro 1500 (about US$190 at Amazon), which ships with PowerChute Personal Edition power management software that's compatible with unattended shutdown and restart.


Step 2: Connect the included USB cable between UPS and PC. It's used for communications.


Tip: Don't use a powered USB hub between UPS and PC, or the lack of power during an outage will cause communications to fail.


Step 3: Plug the UPS into the wall power supply and allow it to charge. My APC takes about four hours to do this.


Step 1: Install the PowerChute or similar software.


Step 2: Navigate to the Energy Management tab or similar within the Configuration setting.


Step 3: Check the Enable Energy Management checkbox and choose the Default settings in PowerChute. Look for any "Turn On Again" settings in any other power management software and check as appropriate.


Now smile, because your computer will gracefully shut down during a power outage and start up again when power is restored.


Is there a piece of tech you'd like to know how to operate properly? Is there a gadget that's got you confounded? Please send your tech questions to me, and I'll try to answer as many as possible in this column.

NSA Backdoors Could Cost US Companies Billions in Business Abroad

Today in international tech news: NSA "backdoors" could hurt U.S. telecommunications firms abroad. Also: Europe vows to crack down on roaming fees; Facebook has a chat in China; North Korea suspected of massive cyberespionage; and almost 25 percent of all UK downloads are pirated.

The National Security Agency's efforts to include "backdoors" in U.S. companies' security products, networks and devices -- thereby making it easier for the NSA to snoop around -- could hurt business abroad.


Specifically, foreign countries could come to view U.S. firms' relationship with Washington much the same way that the U.S. views Chinese companies' relationship with Beijing, Bloomberg said -- that is, too close for comfort. Last year, Congress announced that Huawei and ZTE, two large Chinese telecoms, should not be allowed to build U.S. networks for fear that they would dish secrets to the government.


One of the more alarmist quotes from the Bloomberg article was given by San Jose-based technology analyst Rob Enderle, who said, "The National Security Agency will kill the U.S. technology industry singlehandedly."


Forrester Research hypothesized that NSA disclosures could cost U.S. tech companies US$180 billion by 2016. That amounts to 25 percent of IT services.


[Source: Bloomberg]


In his State of the Union address Wednesday, European Commission president Jos? Manuel Barroso said he wants to put an end to high fees for making mobile calls across national borders.


As antipathy toward the European Union heightens in the Netherlands, France, the UK and elsewhere, lower mobile fees are almost unanimously supported throughout the 28-nation bloc. Thus did Barroso say he supports a plan that would weed out roaming fees starting in 2014.


Many European companies, however, have spoken out against the EC's proposal, claiming it would erode revenue. Others in the telecom industry have said that the overhaul should come in the form of increased investment, not reduced fees.


[Source: The New York Times]


Facebook's chief operating officer, Sheryl Sandberg, met with Cai Mingzhao, the director of China's State Council Information Office & State Internet Information Office.


The meeting, announced by the Office's website, included talks about how Facebook could be a tool for Chinese enterprises to expand overseas.


Facebook is currently blocked in China, where domestic equivalent Renren rules the day.


[Sources: Chinese Government via TechNode.com and Tech In Asia]


Experts at security outfit Kaspersky Lab are blaming North Korea for a cyberespionage campaign against South Korea.


The campaign reportedly went after highly classified intelligence on defense and security by targeting the ministry of unification and a handful of Seoul thinktanks.


The Korean Information Security Agency reportedly forked over loads of information to Kaspersky, which says this is the first time it has been able to directly link a cyberattack to North Korea.


Seoul has pointed its finger at North Korea for past cyberattacks, even if hard evidence was lacking; in an incident earlier this year, South Korea said that the use of Chinese servers fit North Korea's M.O.


[Source: The Guardian]


Nearly 25 percent of all downloads in the UK infringe copyright, according to a report from Ofcom, an independent regulator for the British communications industry.


A mere 2 percent of UK Internet users downloaded almost 75 percent of all pirated content, the report said, with a small number of individuals qualifying as serial piraters.


Coming in at 35 percent, films were the top form of pirated content.


[Source: BBC]

Friday, September 13, 2013

Huawei Blasts US for Illegal NSA Spying

Today in international tech news: Huawei is disturbed about reports that the NSA spied on it; a notorious online critic is arrested in China; a hacker nabs personal details for 2 million Vodafone Germany users; and NASA confirms that the Voyager 1 has reached interstellar space.

Chinese telecommunications firm Huawei is taking a PR victory lap following reports suggesting that the National Security Agency spied on the company.


Earlier this week, Brazilian TV network Globo revealed a raft of documents that purportedly came from Edward Snowden. The files implicate the NSA, along with its British snooping ally, GCHQ, in spying on numerous targets, including a Saudi bank, the French Ministry of Foreign Affairs and Huawei -- the same Huawei that was vilified last year by Congress and deemed a security threat because it might do something sinister like spy.


Huawei released a statement saying that it was "very disturbed" that the NSA attempted to worm its way into its networks and information. Huawei added that it "utterly object[s] to such illegal practices."


[Source: The Age]


Citing false business records, Chinese authorities arrested a man who just so happened to also be a popular and outspoken critic of the government.


The man, Dong Rubin -- better known by his online pseudonym, bianmin -- has been dissing The Man online since 2009. His dissidence began after what came to be known as the "hide and seek" case, when authorities claimed that a man died in police custody while playing hide and seek with inmates. (A subsequent investigation showed he was beaten to death by other inmates.)


Dong was reportedly snookered into coming out of his Kunming apartment when police told him his car had been hit. Electronic items, including a laptop and other computer equipment, were taken from his home.


Officially, Dong was arrested for inaccurately registering the amount of capital his business had (Dong admitted to making such a misstep). However, netizens are reportedly worried that the capital registration issue is a guise, and that the real offense was spouting off online. China's Supreme Court recently stiffened penalties for online rabble-rousing.


Several high-profile online critics have been arrested in China recently, but not always for being online critics. One such person, Qin Zhihui, was detained for engaging in illegal business operations; another was arrested for soliciting a prostitute.


[Source: Global Times via Tech In Asia]


A hacker is believed to have nabbed personal details, including names, addresses, bank account numbers and birth dates, for more than 2 million Vodafone Germany customers.


The info was stored in a database within the company's internal network.


Customers have been notified and warned to keep their eyes peeled for phishing messages designed to sucker people into revealing personal data.


A suspect was identified and his home was searched, according to Vodafone Germany, which has 36 million mobile customers.


[Source: BBC]


Let's now depart from international tech news to touch on interstellar tech news.


NASA confirmed that its Voyager 1 spacecraft has become the first human-made object to reach interstellar space. The spacecraft, launched in 1977, is believed to be about 12 billion miles from the sun (Earth is a *mere* 93 million miles).


In 2004, Voyager 1 detected increased pressure of interstellar space on the heliosphere, which is the bubble of charged particles surrounding the sun, according to NASA. These charged particles extend beyond the outer planets, which tipped off scientists that the spacecraft's interstellar arrival could be imminent.


Scientists were able to confirm that the spacecraft was in interstellar space after the sun let out a coronal mass ejection -- a huge burst of solar win and magnetic fields -- in March 2012. When this ejection reached the Voyager 1 13 months later, the plasma around the spacecraft reacted in such a way that would only happen in interstellar space.


Working backwards, scientists figured out that the Voyager 1 first went into interstellar space in August 2012.

PanicGuard: Nice Idea but Not Ready for Prime Time

One major part of the app is that you're supposed to be able to track a phone's location if it's lost or stolen. I tested this feature and requested tracking data for my mocked-up lost phone through the website, but I didn't receive any tracking event notifications, even though the website dashboard knew the phone was lost and I had a data connection.

PanicGuard is available for free in the Google Play store.

Here's an app that should bring peace of mind to any late-night solo worker, exerciser or neighborhood watch patroller.


It's an ingenious combination of personal alarm, tracker and alert creator that uses sensor and other components included in the average smartphone, such as the speaker, to sound an alarm. The GPS and other location services are used for tracking; the video camera is key for capturing the bad guy swiping the phone; and a data connection serves to communicate the alert.


All that is instigated by a shake of the device, which is understood by the phone's accelerometer and gyroscope.


How it Works


The idea is that during a threatening situation, you shake the phone. The phone then begins to secretly record video and sound an alarm. At the same time, previously defined emergency contacts are notified. Then, when all is said and done and the phone is no longer in your possession, you are supposed to be able to track the phone's whereabouts via a website and give that information to the police.


I found only part of this package worked.


The Pricing


The PanicGuard Android app is downloadable with limited, 10-second video service at no charge. Service plans start at US$5.99 a month, including unlimited video and alerts.


There is a more expensive Alarm Receiving Center subscription option, but that feature is only available in Europe and Africa at the moment.


The key to getting things to function is to prep the app when you get it. That means setting up the emergency contacts, who should probably be physically reasonably close by, like on the same campus, say.


This is because when the alert is sent out, your position is provided through a breadcrumb map image, and the email or SMS text suggests that that person goes to your aid. Good idea.


One problem I encountered, though, was that you must turn on the app before you enter any potentially sketchy situations. Like before you leave work, because real-time GPS tracking starts at that point -- it's not always on.


I can't help but think that there must be a better, less onerous way to do this than logging into the app with user ID and password credentials whenever you leave work. I'd like to see a one-touch widget or automatic login when the phone starts, or a one-button turn-on.


This leads me to another, more serious issue, which is the shake function only seemed to function for me when the screen was lit. There's obviously some kind of Android Services stay-awake that needs tweaking.


One major part of the app is that you're supposed to be able to track a phone's location if it's lost or stolen. I tested this feature and requested tracking data for my mocked-up lost phone through the website, but I didn't receive any tracking event notifications, even though the website dashboard knew the phone was lost and I had a data connection.


The dashboard just vaguely said, "We have not received any communication from your phone at this time." That was it. No explanation.


The developers have put a lot of imagination into this app, gotten some good police marketing-oriented endorsements and have taken smartphone sensors and the like to the max.


I think they're onto something, but I'd like to see a bit more serious QA in regard to the lack of tracking data delivered by my average smartphone, and the alert-triggering function that needed to be run in the foreground to work. The development isn't completed.


Fix all that and I could see this app augmenting an enterprise-level security system -- like on-campus or in an office park. In fact, the developer is looking to partner and allow re-branding of the app as part of its business model.


Is there an Android app you'd like to suggest for review? Something you think other Android users would love to know about? Something you find intriguing but aren't sure it's worth your time or money?

New iPhone Could Kick Biometrics Into High Gear

When we're routinely relying on fingerprints or other biometric tech instead of -- ugh -- user names and passwords, we may look back on the launch of the iPhone 5s as a groundbreaking day in tech history. Once again, Apple is taking something that's been around for a while but hasn't quite caught on and turning it into something that tech-savvy consumers will soon consider a necessity.

Perhaps the most exciting part of Apple's new iPhone launch is the realization of the long-rumored "Touch ID," the digital digit sensor technology featured in Apple's iPhone 5s. The premium model will sell for $199 with 16 GB of storage and a two-year service contract with wireless carriers in the United States.

 

 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


Touch ID is built into the Home button on the iPhone. It can be used as a substitute for the pass code used to access a handset and to authorize purchases from Apple's iTunes store. In all other aspects of an Apple user's digital lifestyle, user names and passwords will remain the norm.


Fingerprint data for Touch ID remains on the phone.


"I like that the fingerprint information is being stored locally on the device so it's not put out there in the cloud where who knows what can happen," Michael Morgan, a mobile devices analyst with ABI Research, told MacNewsWorld.


Other mobile phone makers have dabbled with fingerprint authentication -- most notably Motorola, now owned by Google -- but the technology has failed to catch on, largely because its hassles have outweighed its benefits. There are indications, though, that Apple may have hit the bull's-eye where others have missed the target.


"It's really fast," Yankee Group Research Director Carl Howe told MacNewsWorld after some hands-on experience with the new iPhone following Apple's announcement. "It's as convenient as unlocking your phone normally."


While fingerprint technology has been around for a while, it hasn't been mainstream.


"I think this will be the first broad use of it," Howe said.


The Touch ID tech could reaffirm Apple's status as an innovator, Analysys Mason Principal Analyst Ronan de Renesse told MacNewsWorld.


"Fingerprint-based identification technology is likely to be introduced by other manufacturers in the near future and may catch on as a mode of payment elsewhere as a result," he added.


If Touch ID were combined with NFC as a payment method, it could create a nice package for mobile payments.


"Unfortunately, there's still no NFC in the iPhone," Morgan said.


Touch ID may give biometric authentication some real market presence in the coming months.


"What putting a fingerprint scanner in the iPhone has done is get millions of people into the biometric conversation, which has been going on for 20 years," Cigital Principal Consultant Paco Hope told MacNewsWorld.


"This whole concept of biometrics is going to mature rapidly, because now it's finally in everyone's hands," he predicted.


While Touch ID may bring biometrics to consumers' attention, it's unlikely to spread without the adoption of common standards, said Michael Barrett, president of the FIDO Alliance.


"It's estimated that Apple iOS penetration is only 17 percent of the total market, while PC and laptop fingerprint sensor penetration is at about 20 percent now and has been thereabouts for years," he told MacNewsWorld.


"Though the PC market is provisioned -- and now so is the Apple iPhone market -- widespread penetration cannot and will not occur without open standards that make authentication methods interoperable," Barrett maintained.


The introduction of Touch ID on the new iPhone 5s is an important milestone, but strong authentication needs to scale outside of the Apple universe, argued Phil Dunkelberger, CEO of Nok Nok Labs.


"Strong Authentication is the bedrock for the continued growth of mobile Internet services," Dunkelberger told MacNewsWorld. "Apple users will benefit when they can securely access all online services with Touch ID."

Intel Puts Its Chips on Internet of Things

Intel isn't sure what the next wave of computing will bring, but it's pretty sure it will mean more chips in more Internet-connected things, and its new Quark SoC is designed to fill the bill. The market is likely to be huge, as manufacturers are increasingly putting sensors and processors into products ranging from electric meters to automobiles to buildings.

Intel on Tuesday announced a new, lower-power family of processors, the Quark, at the Intel Developers Forum being held in San Francisco through Thursday.


This is part of the company's heightened drive into ultra-mobile devices.



 


 


 


 


 


 


 


 


 


 


 


 


"The next wave of computing is still being defined," Intel CEO Brian Krzanich told an audience at IDF. "Wearable computers and sophisticated sensors and robotics are only some of the initial applications."


The Quark family of Systems on a Chip is an example of how Intel will continue to use its manufacturing and architectural leadership to push further into the low-power processor arena, Krzanich said.


"Quark significantly lowers the cost of devices and machines that are smarter," remarked Rob Enderle, principal analyst at the Enderle Group.


Intel's Quark processors will target growing segments, from the industrial Internet of Things to wearable computing.


They are designed for applications in which lower power and size, or the lack of it, take priority over higher performance.


Intel will sample form-factor reference boards based on the first Quark product during Q4 so partners can develop tailored, optimized solutions. These solutions will initially target the industrial, transportation and energy segments.


Krzanich demonstrated a bracelet as an example of a wearable computing concept with reference designs under development.


Intel is actively pursuing opportunities with partners in this area, he said.


The Quark processors are open system, have an open architecture, and are fully synthesizable, noted Krzanich.


What Intel means by the terms "open architecture" and "open system" is not clear, Jim McGregor, principal analyst at Tirias Research, told the E-Commerce Times.


"The design, manufacturing, and everything else will still be controlled by Intel, whereas you can license ARM architecture," McGregor continued. "Open can be a very vague term, I guess."


Intel defines one of its markets for the Quark processor family as the industrial Internet of things.


"This will largely be a sensor market, where ever-more-intelligent devices capture information and make decisions based on that information," Enderle said.


The market is likely to be huge, as manufacturers are increasingly putting sensors and processors into products ranging from electric meters to automobiles to buildings. Perhaps the most wide-ranging effort in this area is IBM's Smarter Planet initiative.


Embedded computing, the automobile industry, and smart lighting or power equipment industries "could benefit from technologies that could help prevent downtime by more effectively and accurately alerting about a coming problem -- thus allowing it to be corrected before a catastrophic outage -- or to dynamically change some part of the service to make it more efficient and effective," Enderle told the E-Commerce Times.


Wearable computing is another area expected to see strong growth.


The smartwatch sector, which is the most likely area of wearable computing to take off, could easily move more than 30 million units a year, Canalys analyst Daniel Matte has predicted. Other form factors such as clothing and jewelry are still distant prospects.


"Right now, wearable computing is more a pipe dream than reality," Enderle said. "For anyone to become a real player here there needs to be one big breakthrough product that defines the market like the iPod, iPhone [or] iPad."


Whether Intel will succeed in the wearable tech area is a big unknown.


"Intel says [the Quark processor] is one-fifth the size and has one-tenth the power consumption of the Atom, but first it has to sell the fab, offering people the ability to do custom design," Tirias' McGregor said.


"Intel won't take on custom design unless it's a huge opportunity," McGregor pointed out, "so they're either going to have to license it to smaller clients or third parties, and they haven't given me any indication they'll do that."

Apple's Big Surprise: These Babies Are Going to Sell!

There's something really annoying about kids running around with the latest iPhone -- for starters, the idea of so much money being stuffed into a teenager's pocket. However, because kids having iPhones is inevitable, the 5c will take off like crazy with this market segment. The lower price point, plasticky polycarbonate, and differentiation from the 5s will lower the bar to entry with kids and their parents. It will sell.

Apple's iPhone 5s and iPhone 5c launch event Tuesday was a small evolutionary step in its already proven game plan for product lines: Create something excellent and new one year, beef up the feature set the second year, and maybe -- just maybe -- rethink the overall design and start again in the third year.


There is also the option to throw some new paint and tires on the product to buy another year of sales. The iPhone 5c just happens to have the fanciest new paint job Apple has delivered yet.



 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


 


If Apple seems to be moving too slowly, it's only because the world seems to be spinning faster. Few companies actually crank out as many excellent, successfully selling products at Apple's speed, and even fewer exceed it. You might argue that Samsung is producing more models faster, but not all models are clear successes -- and some are just plain dumb.


So this is business as usual for Apple, and despite the immediate drop in Apple's stock price, there is no consumer market pressure -- or looming competitive innovation -- that will prevent the iPhone 5s and iPhone 5c from breaking new sales records.


In fact, as disappointing as these new units might be to enthusiasts lusting after 5-inch screens and integrated wall projectors, they'll be extremely popular and profitable.


As an Apple enthusiast, I'm sometimes disappointed by a paucity of wow, but pushing for the wow might actually be a dumb business strategy -- just like going for the long bomb touchdown pass in every play would be a dumb strategy for winning a football game.


Most games are won by a series of very smart shorter-gain moves that put the team in a position to win. The same goes for Apple, which is just a bit less interesting to watch on a Sunday afternoon. Here are the new reasons I believe sales will shine:


There are at least two reasons this is important: First, it gets you into your iPhone 5s faster, which makes your experience better. Over the course of a day, this impression, this "boom, I'm in" factor will start making PINs and swipes seem painfully slow. Similarly, you'll be able to buy from Apple (apps, songs, movies, etc.) using the sensor. This is an awesome secure time saver, which will improve your daily experience. If "pear" is your password, you probably don't care, but if your password is even remotely strong, you'll love the fingerprint scanner.


Second, I have a feeling the fingerprint scanner will start appealing to businesses with Bring Your Own Device policies. Many already require employees to use lock codes, and a more secure option has got to be welcome to many enterprises.


I lump these together because they work together. The A7 chip is now 64-bit, which is a big leap forward. While the benefits of a 64-bit processor won't be fully realized until apps are written to take advantage of it, Apple is laying the groundwork for developers to create much more powerful apps.


Similarly, the M7 coprocessor measures motion data from the accelerometer, gyroscope and compass -- without engaging the A7 chip. That means less battery consumption while letting the A7 work harder on other applications.


Right now, not such a big deal. In the future, though, the Apple-focused developer ecosystem is going to be able to build some powerful and cool applications, which will keep the entire iPhone platform moving forward. Besides, when the A7 et al come to the iPad, suddenly it's easy to see a much more powerful tablet, aka Mac/PC replacement, or maybe even Apple processor in some future MacBook Air-like unit. These processors will start being a sales factor later in the iPhone 5s sales lifespan.


While you'll be able to use iTunes Radio on your Mac and on old iPhones and iPads, etc., iTunes Radio will keep Apple selling iPhones for a long time to come. Why? Spotify and Pandora are cross-platform offerings. This is cool but not for Apple. If users can get their music so easily elsewhere, it's very easy to make a (bad) decision to leap over to an Android smartphone.


If iTunes Radio is half as good I think it will be, iPhones will suddenly become even more sticky to regular customers -- more so than through simple iTunes song sales. Old iPhone users who upgrade to iOS 7 will find a new reason to upgrade to a new iPhone 5c or 5s, sticking with Apple.


Speaking of stickiness, right now there's some risk that business users -- and everyday users -- might fall into the clutches of Google or Microsoft for their office-oriented applications. Apple is sliding a big fat knife right between its customers and these other highly used document editing and reading options.


Sure, Apple customers can walk around the knife, but why bother when you can open up Pages, Numbers, Keynote, iPhoto, and iMovie easily and stay in the Apple ecosystem? Besides, if you've been thinking about buying these apps anyway and you apply them to the cost of a new iPhone, there's another reason to upgrade now. Teenagers, take note: This is a nice "homework" tip to help get you into a new iPhone. Just saying.


For parents who try not to spoil their teenagers too badly, there's something really annoying about kids running around with the latest high-end iPhone. It just pushes the bounds of parental common sense for so many reasons: entitlement issues; jealousy among peers at school; even the sheer cost of letting kids run around with so much money in their pockets.


I'm not saying it's a good thing for teenagers to be running around with iPhones -- just that it's inevitable, and the iPhone 5c will take off like crazy with this market segment. The lower price point, plasticky polycarbonate, and differentiation from the 5s will lower the bar to entry with kids and their parents. It will sell.


As for buyers on budgets, both in this country and abroad, the fact is Apple still doesn't seem to feel a strong need to offer hamburgers when its steaks continue to sell in increasingly profitable numbers each year.


Right now, the iPhone 5c is good enough for the entry level for Apple's purposes of profitability. For the next 12 months, Apple will rock and roll with the iPhone product line.

DNA 'Glue' May Someday Repair Damaged Organs

Scientists have found a potential solution for one of the main difficulties in tissue engineering -- creating structures that go beyond two dimensions. "This technology may prove to be critical for the next advance in tissue engineering," said Robert Van Buskirk, professor in biological sciences at SUNY-Binghamton. The method has not yet been tested in the sometimes unpredictable human body.

Researchers at the Wyss Institute at Harvard University have found a way to trigger the self-assembly of tiny water-filled gel-like cubes into larger structures, a discovery that could lead to practical applications in tissue engineering.



 


 


 


 


 


DNA makes glue programmable because one strand of DNA will stick tightly to a matching partner strand, but only if the two strands have chemical "letters," or nucleotides, that are complementary (A to T, C to G). Gel bricks coated with matching strands of DNA adhere specifically to each other.


The scientists developed the self-assembling system by programming DNA to act as a glue that guides the hydrogels into the larger structures. Their results are published in the Sept. 9 issue of Nature Communications.


Researchers have attempted to program hydrogels in the past, but ran into trouble trying to bind them to other biological components, prompting the team at Wyss to devise a new strategy.


Enter DNA. It is made up of four bases -- adenine, guanine, cytosine and thymine, or A, G, C and T. In order to form the coiled, double-helix structure of DNA, those bases have to be linked in a specific order: A with T and C with G. If one side of a strand of DNA should begin with AC, for example, then the corresponding rung would have to begin with TG.


Because snippets of DNA can be synthesized with any sequence of those letters, it is more programmable than other biomaterials, the Wyss researchers found. DNA can be, in effect, a glue. To test their theory, the researchers covered hydrogel cubes with a coat of a specific DNA base molecule.


When those small cubes were placed in a solution with larger cubes, the smaller ones attached only to cubes that were made up of their corresponding DNA base. Therefore, the scientists were able to program the hydrogels to mold into specific shapes, including a square and a T-shaped structure.


Eventually, the same method could potentially be used to create or repair more complex structures, including human tissue.


"This paper is a fundamental study of this capability, and it's not quite ready for application yet, but we think this is a very promising direction for developing applications that could assemble these gel-like bricks into functional tissues," Peng Yin, assistant professor of systems biology at Harvard Medical School and senior co-author of the study, told TechNewsWorld. "My colleagues and I hope to move forward together in this direction."


This research shows a potential solution for one of the main difficulties in tissue engineering -- creating structures that go beyond two dimensions, said Robert Van Buskirk, professor in biological sciences at SUNY-Binghamton.


"This technology may prove to be critical for the next advance in tissue engineering," he told TechNewsWorld.


The next steps in developing this research would be to conduct tests to determine how well the method could hold up in the sometimes unpredictable human body, said George Truskey, Ph.D., professor of biomedical engineering and senior associate dean for research at Duke University.


"The hydrogels will need to be populated with different cell types, and the investigators will need to show that self-assembly can induce different functions that might occur in a tissue," he told TechNewsWorld. "The bigger challenge will be to establish that this approach will work in vivo, given the potential for enzymatic degradation of DNA and immunogenicity."


It might be some time before researchers have answers about those questions, but the discovery is nonetheless a significant step forward in the field, Truskey noted. "This is an important achievement by a talented group that shows the approach is feasible."