Send As SMS

Anything Anywhere

Anything Anywhere...


Text Link Ads
Google
 
Web deproxy.bizhat.com

Thursday, August 31, 2006

Writely.com - Google's answer to Word - This Post - External Link

Seems like Google has released Writely.com which is their answer to Word. Registration is open, and you can sign up. I used my Google account and got a confirmation email - however I was able to use the site before I confirmed.

My first experience was not good - as IE had crashed - well it was running at almost 100% CPU and eating all the resources (click the image to see details). Which meant at the end of the day I could not kill that process and I had to restart the machine. But, since I am running IE 7 (Beta 3), I am not sure if there is an issue with IE itself or if the problem is with writely.

I have not used this for a long time, so these are only the first impressions and so far I am more impressed with the collaboration tools than the editor itself. It has all the basic things you would expect - fonts, spellcheck, etc. There are also other a little more advanced features such as the ability to insert comments, manage bookmarks, table and image support. The image can be a maximum of 2mb in size.

The collaboration features seems to be quite impressive and it would be interesting when MOSS 2007 ships, what impact would it have on SharePoint 2007. I guess it is safe to say that almost all Enterprises will not be using this (you won't want your document out there on someone else's server now would you?). But, for most of us this probably is not too much of an issue. I know my Dad won't have an issue for example. Also, the revisions is interesting - I have not used this. But it seems to be promising and might have helped in the WCF book I have been writing. All the back and forth between myself and the TE's (Technical Editors).

The File > Save As menu is also interesting. As you can see as it allows one to save the document in a number of formats that you would expect such as HTML, Word, OpenOffice, PDF. And in a few that you won't expect such as a RSS feed.

You can also tag the various documents (quite similar to the way you can to blog posts and photographs), and I can see the value in having something like that. This is of course similar to something that will also be in Vista.

Also you can directly publish to you blog. The blogs it supports "out of the box" are blogger.com, blogharbor.com, blogware.com, livejournal.com, squarespaces.com, wordpress.com. But fear not, if whatever blogging thing you use, you can use it as long as it supports one of the following API's: Blogger API, MetaWeblog API or MovableType API.

If security of your document is important, then you will be glad to know they say they take security very seriously. Here is what they have to say about it, about how secure are the documents.

Very! We take security very seriously. A layered security architecture ensures that only people you authorize can view or modify a document.

Of course all this free. You can take a tour here and find out more details here and sign up for this here. I am excited about this, mainly because so many people I know do not have the budget to spend on the likes of Microsoft Office, and OpenOffice is something also a bit of an overkill or just too much hassle to download and install. So, as long as you have a stable and fast Internet connection this might just be a winner.

Having said that, I personally will not be saving any information that is important to me on their servers as I am a bit paranoid. Also the fact I already have licence's for Microsoft Office is also a factor.

One question that does remain, would Adobe go after google now and ask them to remove the save as PDF functionality from this as they have rumored to have forces Microsoft in for Office 2007?

Microsoft and Mozilla To Collaborate for Vista - This Post - External Link

Relations between Microsoft and the open source community may be thawing. The Mozilla Foundation has just welcomed the offer of help to get Firefox working properly in Vista, and Microsoft has also insisted it will help non-IE browsers work with Windows Live. Is this the start of better collaboration, or just a sign the Microsoft has learned its lesson from the antitrust battles?

Futuristic OS - This Post - External Link

Imagine if you will, a world where your ideas and perhaps, even your own creative works became part of the OS of tomorrow. Consider the obvious advantages to an operating system that actually morphed and adapted to the needs of the users instead of the other way around. Not only is there no such OS like this, the very idea goes against much of what we are currently seeing in the current OS options in the market.

It's like my PC loves me. It makes no difference which operating system you choose. With every version of Windows, OS X and Linux, you must use certain given functions to accomplish specific tasks. This has served us well since the very beginning, but perhaps it's time for a change to this perceived "norm"? Now before we start jumping to any conclusions, let's examine this very closely.

Here's an example for you: imagine you are sitting there working away on a video project. After stopping for a break, your OS pops up with a small alert box asking you if you'd like the PC to roll into adaptive mode. You select yes and the OS begins to learn, as you work, what your needs are.

You go to open your video project again after lunch and almost immediately, you find that the program feels more in tune and responsive to your needs. On the second monitor, you discover a virtual palette of all the editing tools you use the most. No longer are you being forced to locate the editing tools you need from some arcane menu. No, instead your PC has done the work for you with no interaction on your part whatsoever. Sounds interesting? Just wait, it gets weirder...

During the course of your editing work, your PC has already learned from previous experiences that you do not like to be bothered with e-mail alerts when working on specific projects. It's not so much the software being used mind you, rather the type of "work" being done at the time.

An important e-mail from your client comes rolling in along with a number of less important messages. Thanks to Brand X OS' new probability engine, the only e-mail you are alerted to is the one the OS knows will be critical. Even though the other less important e-mails are coming from the same person, your OS understands how to handle this just the way you prefer.

Auto-seeding Torrent server - This Post - External Link

It's easy to download files with BitTorrent, but sharing your files over BitTorrent is somewhat complicated. You have to generate torrents for each file you want to share, run a tracker, and run a seeder. Most people don't even know what any of that means. It's much more complicated to share files using BitTorrent than with a webserver. To put your files on the web, you just drop them in the correct folder and then webserver does the rest.

Now we have Snakebite, which provides all of the power of BitTorrent with the ease of use of a webserver. Simply install snakebite, launch it, and drop files in the correct folder. They are then shared over BitTorrent with no additional effort. Additionally, snakebite automatically generates a user-customizable page with links to all of your torrents. That way you can just point people to your links page and they can download anything that you have. Even cooler is that if you enter a username and password into the snakebite config file it will automatically create an account for you on the ACTLab TV (sponsors of snakebite) redirect servers. Then you have an easy to remember link to paste to your friends, even if your IP address changes. For instance, if your username was "actlabtv" (sorry, already taken) then going to http://actlab.tv/snakebite/redirect/actlabtv will redirect you to the currently running snakebite server we have here at ACTLab TV. Check it out and download some movies.

"No Spoking" to be replaced by "No Cell Phone" - This Post - External Link

Overhead "no smoking" signs will be replaced by "no cell phone" signs on some planes next year when technology is introduced to make it safe for passengers to use mobile phones midflight.

Airlines are seeking ways to police potentially annoying on-board phone chat via symbols of a mobile phone crossed out, forcing passengers to switch off during take-off and designated "night" periods.

The company developing the satellite technology for Airbus planes also said cabin crew would be able to remotely switch off phones or disable their voice function, allowing travelers to just use text messaging and e-mail during quiet times.

"It is envisaged that airlines will turn the voice capability off, for example on long-haul flight during the plane's night'," a spokesman for communications joint venture OnAir said.

"Each airline is likely to develop different protocols for the use of mobile devices, in much the same way that different protocols have developed in different countries for the public use of mobile phones."

Airbus said it was pushing ahead with plans for trials of mobiles, blackberries and other devices on planes next year, despite heightened security following a suspected bomb plot in Britain and setbacks for on-board communications in the United States.

OnAir is a joint venture with Airbus and information technology systems provider Sita.

Air France KLM is expected to lead the way when it takes deliveries of planes doing the trials with the service in 2007, while low-cost carrier Ryanair is also close to ringing up extra revenue from mobile phones. However, other carriers said they might limit the service to text messages or ban it altogether, amid fears it will put passengers off traveling unless it can be policed properly.

British Airways said it was interested in the technology but was surveying its passengers to see what level of mobile phone use would be acceptable or "downright annoying."

Germany's Lufthansa was also cautious, saying it had not decided whether to allow mobile phone use on planes yet.

"The issue is how you would get around the problem of disturbing other passengers," a Lufthansa spokesman said.

An Air France spokesman said the first phase of its trials would only involve data services such as text messages with a second phase covering voice. TAP Portugal and Britain's BMI also plan trial the technology.

In a consultation paper on the subject in April, British regulator Ofcom warned: "The potential for increased levels of agitation from passengers is a factor to be noted."

But asked about the social cost of midair mobiles, the outspoken chief of low-cost carrier Ryanair Michael O'Leary said: "Why should I care if it is generating some money?

"People are in a confined space. People tend to not want to get into long and involved mobile phone discussions with people sitting around them. I think it will be more people sending texts," he told reporters.

Advancements in airline communications have been slow to take off, particularly in the U.S..

Boeing said last week it would shut its loss-making Connexion unit, which allowed airlines to provide high-speed internet service to passengers. The satellite-based service, for which Boeing failed to find a buyer, was too costly and few airlines signed on.

In June, Verizon Communications said it was canceling its onboard phone service by the end of the year.

Windows Vista release dates and pricing - This Post - External Link

Prices and the release date for Windows Vista have leaked online. Ed Bott's Microsoft Report has information on pricing, and the release date is currently January 30th, 2007. Are they really going to make the deadline this time?

Google and eBay Partner for Click-to-Call Ads - This Post - External Link

A new joint venture between Google and Ebay will expand the advertising reach of both companies and integrate free phone service with web ads. The partnership also puts rumors of a Yahoo/eBay merger to rest. From the article: 'A deal announced Aug. 28 by eBay and Google now appears to put the kibosh on the notion of an "ehoo" or "Ybay" to challenge Google. Instead, eBay signed up Google to provide Web search advertising outside the U.S. And the pair will cooperate on developing so-called click-to-call ads — which let potential buyers click on a link and talk directly to sellers or their call centers — throughout the world. Tests of the ads in the multiyear agreement will begin in early 2007, though neither side revealed specific terms.

Touring the space - This Post - External Link

An American space-tourist agency is courting the Chinese for cheap rockets and nouveau riche passengers to fly in them.

Space Adventures of Vienna, Virginia, is opening its first office in Beijing to introduce space tourism to well-heeled space tourists in the biggest and fastest-growing economy on the planet.

"Space Adventures' objective is to open the space frontier to all," including citizens of China, said Stacey Tearne, vice president of communications at Space Adventures.

A Chinese astro-preneur, Jiang Fang, is helping Space Adventures get a foothold in the Chinese market. Jiang, who heads Hong Kong Space Travel, said humanity's expanding space endeavors, somewhat paradoxically, are creating a more globalized planet.

"Right now, most of us still think of the Earth as split into China, the United States, the European Union and the smaller countries," Jiang said. "But viewed from space, we perceive an undivided, spinning blue globe."

In 2001, Space Adventures helped spark the space tourism industry by booking American tycoon Dennis Tito a seat on a Russian Soyuz spacecraft for a trip to the International Space Station.

Russia's post-communist, market-minded Federal Space Agency has since formed an alliance with Space Adventures and sent two more tourists to the ISS.

While Japan's first would-be space tourist, tech tycoon Daisuke Enomoto, was this week bumped from a Soyuz spaceflight bound for the ISS in mid-September, he could be replaced by X Prize sponsor Anousheh Ansari, who has been training at Russia's Star City cosmonaut center as a possible backup candidate for the upcoming ISS tour.

The major barrier to space is becoming cost, rather than an individual's national or political identity.

A 10-day trip to the ISS, orbiting the Earth at almost 17,000 mph, is currently priced at $20 million. An 18-day ISS mission, which will include a cosmonaut-guided spacewalk outside the station, is being advertised at $35 million.

But tickets for suborbital tours, rocketing passengers to the 62-mile-high edge of space, will be much cheaper. About two dozen private spacecraft designers -- bankrolled by luminaries like Virgin's Richard Branson and Amazon.com's Jeff Bezos -- are racing to test reusable launch vehicles for hour-long space treks.

Meanwhile, more than 200 future astro-tourists have already reserved seats on suborbital spacecraft now being developed by the Space Adventures consortium.

Space Adventures plans to start building a fleet of five-person Explorer spacecraft that will blast tourists into suborbital space for a $100,000 fare. It is also channeling more than $250 million into plans to develop, with its Russian partners, space centers in the United Arab Emirates, Singapore and other points East and West.

"Space Adventures will fly tens of thousands of people in space over the next 10 to 15 years and beyond," said Tearne.

Space Adventures recently outlined its next goal: For a cool $200 million, the company and the Russian space agency will send two private passengers on a flyby around the far side of the moon, with an optional ISS stopover.

And that mission, scheduled for around 2010, is a mere stepping stone into the space future, said Eric Anderson, president and CEO of Space Adventures: "Follow-on missions will lead to lunar orbit and an eventual moon landing."

Space Adventures' charting out of a series of lunar missions, and China's increasingly ambitious schedule to send robot rovers and then humans to the moon, could eventually dovetail in a match made in the heavens and worth hundreds of millions of dollars, Anderson said.

Anderson said he foresees an era when Chinese spacecraft could be used to shuttle tourists to orbiting space stations or to the craters of the moon.

"We plan to initiate and develop a relationship with the China National Space Administration," he said.

Anderson said China's Shenzhou spacecraft, which has already completed two manned missions, could be integrated into the planet's emerging space tourism industry.

"Space Adventures will consider the Chinese Shenzhou vehicle once it has proven its reliability," Anderson said. "The Russian Soyuz has an escape system at every phase of the launch and it is necessary that the same standards of safety be implemented and tested in any alternative vehicles."

First Quantum Cryptographic Data Network - This Post - External Link

From the article:

Kumar's research team recently demonstrated a new way of encrypting data that relies on both traditional algorithms and on physical principles. This QDE method, called AlphaEta, makes use of the inherent and irreducible quantum noise in laser light to enhance the security of the system and makes eavesdropping much more difficult. Unlike most other physical encryption methods, AlphaEta maintains performance on par with traditional optical communications links and is compatible with standard fiber optical networks.

Kerala Encourages Microsoft Removal - This Post - External Link

The New York Times reports that the communist government in the Indian state of Kerala is trying to remove Microsoft from its public institutions, as part of a campaign against monopolistic corporations. From the article: 'schools and public offices across the state are being encouraged to install free software systems instead of purchasing Microsoft's Windows programs. "It is well-known that Microsoft wants to have a monopoly in the field of computer technology. Naturally, being a democratic and progressive government, we want to encourage the spread of free software," M. A. Baby, the state's education minister, said by telephone.' The government is not banning Microsoft, but it is actively encouraging all 12,500 public schools in the state to install Linux.

New York to L.A. in Two Hours - This Post - External Link

A new generation of supersonic private jets could trigger a boom in luxury high-speed flight -- without the sonic boom normally associated with breaking the sound barrier.

Lockheed Martin's advanced Skunk Works unit is designing a small, 12-seat passenger jet that would travel at 1,200 mph (Mach 1.8) but which would produce only a whisper of the annoying crack once emitted by the retired Concorde.


Click here for images of these supersonic jets.
The sleek, 130-foot-long QSST (for "quiet supersonic travel") aircraft is being designed for a Nevada consortium called Supersonic Aerospace International, or SAI, at an estimated cost of $2.5 billion.

Aimed at business executives and diplomats, the QSST will fly at nearly twice the speed of conventional business jets and have a range of 4,600 miles nonstop -- Los Angeles to New York in just over two hours.

It could be ready for boarding by 2013, according to the company.

"Our design uses innovative aerodynamic shaping and employs a patented inverted V-tail that is instrumental to the radical reduction in sonic boom," said Frank Cappuccio, Skunk Works' executive vice president.

Designers expect the QSST to make a sonic boom less than a hundredth that of the Concorde's aural impact. Concorde was barred from flying at supersonic speeds over the United States when it debuted in the 1970s because excessive noise was produced by pressure waves colliding in the plane's wake.

Now, using modern computer-aided design software to model quieter "boom reshaping" techniques pioneered by military test fighters, SAI hopes to use a smaller craft to fill a gap left by the collapse of the Concorde's service following a fatal 2003 crash in Paris.

SAI revealed new details to aerospace analysts at the Farnborough International Airshow in England last month, claiming to have received interest in creating a scheduled supersonic service linking the world's financial centers.

But QSST is not the only group scrambling to create a superfast executive commuter network.

Rival Aerion, also of Nevada, is designing a slower 12-seat supersonic business jet, or SSBJ, that would reduce aerodynamic drag using straight, natural laminar flow wings. The SSBJ would produce a quieter, Mach-1.6 boom over water and fly at near-supersonic speeds over land. The wings will be tested at Albuquerque, New Mexico, this month.

Both companies have identified a market for up to 300 jets in little over a decade, each craft costing around $80 million, and are looking for investors and development consortia.

But engineers will have to carefully navigate laws restricting overland supersonic flight if they're ever to take off, said Bill Dane, senior aviation analyst with aerospace research firm Forecast International.

"The two major obstacles are available engines and the need to significantly reduce or to outright eliminate the sonic boom phenomena," he told Wired News. "If such an aircraft is to be a commercial success, it will have to fly over land and not just oceans."

Dane said there also needs to be an international set of rules regarding the noise issue.

"Several company spokespersons have said flat out that they do not want to invest millions or more in SSBJ research only to find that the aircraft cannot be operated in some regions or countries," he said.

Dane added that teams in France, Italy and Russia are also pursuing supersonic passenger jet designs. Delaying half the sonic waves so they do not reach the ground at the same time and create the unwelcome boom is one concept being explored, he said.

Some of the designs look into a crystal ball and assume the laws prohibiting sonic booms from civilian aircraft, first introduced in 1968, will be redrafted to take account of newer, quieter technologies.

"Over the next several years, regulations for low sonic boom will be developed and low-boom technology will be improved," says Aerion's promotional material. "Aerion will then develop low-boom aircraft to operate under the new regulations."

Star Burst Caught in Real Time - This Post - External Link

For the first time, scientists have observed the spectacular death of a massive star in real time.

Because the supernova lasted for nearly 40 minutes, NASA's Swift satellite was able to turn its lens towards the explosion to observe the star's slow death.

"Usually these gamma ray bursts last fractions of a second to a couple hundred seconds," said Alex Filippenko, professor of astronomy at the University of California, Berkeley. "This lasted many thousands of seconds.

"The Swift satellite finds these things as soon as they go off, but the longer they last the more we can watch in real time, and others can turn their telescopes to it in real time. This is a weird object (that has generated) four papers in Nature." The papers appear in the Aug. 31 issue.

The event may have lasted so long because the explosion ejected tons of debris that later interacted with gas in the vicinity of the star, said Filippenko, who authored two of the papers. He added that theorists have a puzzle on their hands because this type of behavior was not predicted.

Swift was able to engage all three of its instruments. Its Burst Alert Telescope detected the explosion and relayed its location within 20 seconds. An Ultraviolet Optical Telescope recorded high-resolution imagery, and an X-ray telescope measured radiation emission.

The burst occurred in February when a massive star, located 440 million light years away in the Aries constellation, collapsed. The radiation burst was relatively wimpy compared to most gamma-ray bursts, and the scientists are calling it an X-ray flash. It was also the second closest gamma-ray burst ever observed -- most are billions of light-years away.

The unique properties of the star's demise lead scientists to believe they've discovered a new class of stellar explosion that falls somewhere between gamma-ray bursts and more common supernovae.

"People used the think gamma-ray bursts had a standard energy, almost like cosmic candles," said Alicia Soderberg, a graduate student at the California Institute of Technology in Pasadena, California, and lead author of one the Nature papers. "This event lies between those two distributions. It shows that it's more of a continuum."

No matter where it lands in the continuum, the death of a star creates an amazingly powerful eruption that momentarily outshines an entire galaxy.

This star had a solar mass of 20, meaning it was about 20 times larger than the sun. That's about half the size of other massive stars that produce gamma rays as they die.

When the burning hydrogen that fuels a massive stars runs out, its core collapses into a compact object -- usually a neutron star or occasionally a black hole.

Scientists previously thought that all gamma-ray bursts were associated with black holes. But this recent explosion maybe have instead resulted in a neutron star.

"If that's the case, this suggests that even the formation of a neurtron star in a stellar explosion can in some cases be associated with the emission of very high-level radiation," Filippenko said. "That may well be the case but my own team and I will continue do investigation to gain confidence in that conclusion."

A similarly wimpy gamma-ray explosion was detected as recently as 1998, which suggests that these bursts could be 10 to 100 times more common than the more massive gamma-ray bursts, which are only detected every 10 to 20 years, Soderberg said. Until now, the less powerful events likely went undetected because they are wimpier than expected, and therefore not detected by gamma-ray satellites.

If the fact that these starbursts are so common sounds a bit scary -- and it should since one near the Milky Way could be quite destructive -- another new study could lend comfort, Soderberg said. A paper soon-to-be published in the Journal of Astrophysics and Astronomy speculates that the properties of our galaxy are not conducive to gamma ray bursts.

Soderberg had been focusing on this new type of explosion for four years while completing her graduate work. She said it's a relief to finally confirm the theory that these unique events exist, which astronomers took up after the 1998 stellar explosion. That burst was the closest gamma-ray burst ever observed, but it was surprisingly faint.

"We didn't know if it was real or maybe not real for many years," Soderberg said. "And now we know these events are true and not all gamma-ray bursts have the same energy."

Marketting Mozilla - This Post - External Link

Despite a 10% market share, Firefox isn't quite mainstream, especially with fairly flat growth after its initial explosion. With the approaching October release of Firefox 2, the team is looking for ways to gain greater mainstream acceptance — and adoption. This article and slideshow look at some of the company's unusual marketing efforts to date and speculate on the future. From the article: '[T]o widen its current user base, Mozilla will need more than elaborate marketing events. Because the new version of Internet Explorer is expected to be more competitive with Firefox, Firefox may need to evolve into more than just a browser. Seth Godin, author of several books on the Internet, including Small Is the New Big, says Mozilla needs to incorporate tools like tagging or... [linking] to eBay's Skype calling service that will help keep friends connected. The idea being, the browser becomes more valuable the more your friends use it, so you've got a reason to become a Firefox evangelist. Mozilla isn't giving many details on the soon-to-be-launched Firefox 2, but... there will be new features not found in current browsers.

DeProxy launches Folder Security - a folder locking utility - This Post - External Link

DeProxy Solutions (http://www.deproxysolutions.tk) has just launched a folder locking utility - Folder Security. The software is able to lock folders effectively based on passwords. It has many features. To know more visit the official blog at:

http://deproxy.bizhat.com/2006/08/lock-your-folders-thru-folder-security.html

Wednesday, August 23, 2006

Google Code Jam Registration Opens Today - This Post - External Link

Registration for Google Code Jam 2006 opens today. The event consists of 3 online rounds (September 5-6, September 14 and September 19,) in which participants compete to solve three coding problems faster and more accurately than their competitors. If you've got what it takes, and more of it than anyone else, then you can take home up to $10k for your code-fu

First Phase of AIDS Vaccine Trials Successful - This Post - External Link

At least 800 volunteers will be needed for China's second and third phases of AIDS vaccine trials, health officials said Friday.

The second phase of clinical trials of China's AIDS vaccine would need at least 300 volunteers and the third phase at least 500, said Sang Guowei, director of the National Institute for the Control of Pharmaceutical and Biological Products.

Sang revealed the plan at a press conference held jointly by the State Food and Drug Administration (SFDA) and Ministry of Science and Technology.

The later trials would involve the participation of high-risk groups, said Chen Jie, deputy director of the Guangxi Regional Center for Disease Control and Prevention (CDC).

The first phase of clinical trials indicates China's first AIDS vaccine is safe and possibly effective, government officials announced at the press conference after a two-month-odd assessment.

"Forty-nine healthy people who received the injection showed no severe adverse reactions after 180 days, proving the vaccine was safe," said Zhang Wei, head of the pharmaceutical registration department of the SFDA.

"The recipients appeared immune to the HIV-1 virus 15 days after the injection, indicating the vaccine worked well in stimulating the body's immunity," he told the press conference.

The results mark the end of the first phase of the clinical trials of the AIDS vaccine, which focused on the vaccine's safety.

The first phase was launched in Nanning, capital of Guangxi Zhuang Autonomous Region, on March 12 last year. The volunteers, 33 men and 16 women aged between 18 and 50, had received the vaccine by Oct. 20.

They were divided into eight groups. Six groups received a single AIDS vaccine and two other groups were injected with a combined AIDS vaccine, according to the Guangxi CDC.

Some recipients' cells and body fluids in the combined group appeared immune to the HIV-1 virus, said Sang Guowei.

"The HIV-1 specific cells injected into the recipients were the DNA fragments of the virus which don't cause infection," he told Xinhua.

A total of 344 blood samples were taken from the volunteers with each one donating five to ten samples, said Kong Wei, leader of the research team and a professor at Jilin University.

By June, all the volunteers had completed 180 days of observation and showed no serious ill effect, the Guangxi CDC announced on June 11.

The volunteers were paid 2,000 yuan (250 U.S. dollars) for their participation, which was set by the Chinese Medicine and Ethnics Society.

They signed an agreement with the Guangxi CDC for getting the injection, which is responsible for future possible adverse reactions from the vaccine, said one of the volunteers Peng Zhi.

"We were told the vaccine contains no live HIV virus and we wouldn't be infected by getting the injection, and only partial inflammation or pain might occur due to individual differences," said Peng, a student from the Guangxi Medical University.

Half of the volunteers are from the university. Others include government employees.

The scientists were analyzing the results of the first phase and the SFDA would approve the second phase after a stringent assessment, SFDA officials said.

"It is a breakthrough in China's AIDS vaccine development, which was achieved by joint support from the central and local governments, scientific researchers, the public and international partners," said Liu Yanhua, vice minister of science and technology.

The State Food and Drug Administration approved the first phase of clinical trials of the new AIDS vaccine in November 2004.

Before that, China had participated in several human trials of AIDS vaccines, but they were all carried out in other countries.

The new vaccine must undergo three phases of clinical trials before going into production. The second phase will assess both safety and immunity nature of the vaccine while the third will target the protection it offers for high-risk groups.

By the end of 2005, China had recorded more than 140,000 people infected with HIV. Officials estimate that China has approximately650,000 people living with HIV, including approximately 75,000 AIDS patients.

A group of scientists and experts have advised the State Council, the Chinese cabinet, to raise funding for and encourage innovation and cooperation in research, warning the disease is spreading quickly to ordinary people.

According to the report disclosed at Friday's press conference, there have been 120 AIDS vaccine tests on humans throughout the world. The ongoing tests in China include 29 in phase I, four in phase I and II, three in phase II and one in phase III.

The phase-III tests on the first-generation vaccine failed, the report said.

China's research into AIDS vaccines has been going on for 15 years but the country does not have the intellectual property rights over its AIDS vaccines in trial and the research has limited global influence, the report said.

The total infections of HIV in the world had exceeded 40 million and more than 30 million AIDS patients had died by the end of 2005, according to figures released by the World Health Organization (WHO) and the Joint United Nations Programme on HIV/AIDS (UNAIDS). Enditem

Tomorrow's Cellphones - This Post - External Link

It's likely to evoke the children's song inquiring, "Where's the button?" On Aug. 21, designer Pilotfish and sensor maker Synaptics are releasing a prototype of a cell phone, and the funny thing is, it doesn't have any buttons.

Instead, the Onyx device understands signs and gestures, thanks to the sensitive touch pad covering most of its surface. It opens and closes applications when swiped by one or two fingers. The phone recognizes shapes and body parts. Lift Onyx to your cheek and it will pick up a call. "The goal of this concept was to show people a completely different way of designing and making a phone," says Mariel Vantatenhove, senior product line director at Synaptics (SYNA). "We think that the market is ready for some sort of change." A sea change is more like it.

The cell phone as we know it—mostly those snap-shut clamshell types or the flat, rectangular candy bar devices—are in for a major makeover. Or so it seems from the barrage of prototypes from individual designers, boutique firms, and even large technology companies in recent months.

SLAVE TO FASHION. Earlier this year, Nokia (NOK), the world's No. 1 cell-phone maker, worked with 25 British college students to prototype their cell-phone visions. Among them: a cell-phone necklace whose beads light up to signal an incoming call and an origami-like cell phone. Then there are the outlandish designs already on the market. For instance, consumers in Japan carry mobiles reminiscent of macaroons and cakes.

Mobile-phone makers are increasingly having to take cues from peers in the fashion industry. In mid-2005, the average person bought a new cell phone every 18 months. But by May of this year, the cycle had shortened to 17.6 months, according to a J.D. Power & Associates survey of 18,740 consumers. "Cell phones [are becoming] so increasingly personal, they tend to be a slave to fashion," says Richard Doherty, director of consultancy the Envisioneering Group. "And the fashion cycle for clothes is one season."

Recognizing this trend, CTIA, an association of wireless companies, has come to host "Fashion in Motion," a runway show for fashion couture, at its annual conference. The winner of this year's first-ever $10,000 CTIA scholarship for a ""Fashion in Motion" product, Manon Maneenawa, designed the Triple Watch Cell Phone, a mobile that can be reassembled into a wristwatch or an alarm clock.

PURPLE POWER. Indeed, future cell phones may be closely linked to users' lifestyles and interests, such as gaming, politics, and college sports, says Doherty. Japanese consumers can already buy waterproof phones for use in the shower. And Motorola (MOT) designers are looking to "humanize" phones by letting the devices read users' emotions, says Jim Caruso, senior director of operations for consumer experience designs for Motorola phones. For instance, the phone might light up in a purple color when a loved one calls (see BusinessWeek.com, 7/26/06, "Motorola Shows Its Mojo").

These shifts in cell-phone usage are forcing handset makers to rev up their design engines. In 2005, up-and-coming cell phone manufacturer Pantech hired 11 renowned industrial design firms, including San Francisco-based Lunar Design, to brainstorm some 80 cell-phone concepts to inspire its internal designers. Each firm was flown to Korea for presentations. What kinds of designs did Pantech get? Lunar developed a handset that can swivel around into an easel-like position. The easel's front is taken up almost entirely by a display, used for watching video or for typing via an accessory keyboard.

The coming revolution is likely to engulf industry giants and boutiques alike. One outfit, Switzerland-based GoldVish, will debut its mobiles for the über-rich on Sept. 1 at the Millionaire Fair, a lavish event showcasing luxury goods like Rolls-Royce cars. GoldVish's cell phones were created by Emmanuel Gueit, a watch and jewelry designer whose credits include items for Harry Winston. The phones start at $24,500 and go to $1.26 million apiece. The company's most expensive device, fittingly named "Piece Unique," is handmade of solid gold and studded with diamonds. Press a precious stone to open a secret compartment that can be used to hold medicine or other valuables. "It's a jewel you can communicate with," explains GoldVish CEO Michel Morren.

NIFTY NICHES. GoldVish and many other niche makers believe that as phones become an integral part of fashion, limited-edition designers will carve out a slice of a market dominated by Nokia, Motorola, and Samsung (see BusinessWeek.com, 8/3/06, "Nokia's Magnificent Mobile-Phone Manufacturing Machine").

GoldVish's research indicates that more than 15% of cell-phone users would like to have a more luxurious phone. In the next few years, the upstart hopes to grab 2% of the $134 billion cell-phone market, Morren says. GoldVish is already ramping up operations in Europe and Asia, and by the end of 2006, expects to open offices in New York, Miami, and Los Angeles. Even Nokia has come out with a gold-plated model.

For a phone that's unique but won't deplete your Swiss bank account, Spark Fun Electronics last August introduced cell phones that look deceptively like old-fashioned rotary-dial phones (they even emit the same loud ring). So far, the Boulder (Colo.) company has sold 30 units. "You can take them to bars, they are so much fun to show people," says Nathan Seidle, the company's 24-year-old CEO. "A lot of people have put them into old, retro cars. People have gotten them for seniors, who don't really like cell phones because they can't see the numbers."

"NOT A CELL PHONE ANYMORE." New technologies drive many of the new designs. One example: Synaptics ClearPad, a new type of touch screen that will become commercially available later this year. Unlike today's touch screens, which aren't entirely transparent and often not very sensitive—we've all had to endlessly tap one with a stylus to get a response—ClearPad is clear, so it can be used as a sensitive overlay to a cell-phone display. Another innovation likely to change the cell-phone's appearance: flexible displays. An electronic ink screen prototype, developed by Koninklijke Philips Electronics and startup E-Ink, is thin and flexible like paper so it can be worn wrapped around a cell phone. Users can unwrap it to view a map on a larger screen. Eventually, the display could be used to watch video.

These designs are just the tip of the iceberg of the ideas floating around for a cell-phone makeover. As Brian Conner, a designer at Munich-based Pilotfish, says, "You can either design a chair, or an object to sit on. You can design a communications device, or a cell phone." Looking at Onyx, he says, "It's not a cell phone anymore."

Teen invents device to catch Speeders - This Post - External Link

Parents who warn their teenagers about the dangers of speeding will have another tool at their disposal when a product that monitors car speed hits the market this fall.

The palm-sized device was developed by a Lunenburg High School student entering his senior year. Jonathan Fischer, 18, hopes his invention will facilitate communication between parents and teenagers and prevent young drivers from speeding and swerving on treacherous rural roads.

The device, which plugs into the electrical outlet in a car and sits on the dashboard, will monitor a car’s speed only when the driver exceeds a specified limit.

Speed-Demon is not the first speed monitor, but it is the first product that tracks speed only when drivers exceed a limit that parents or someone else can set, instead of tracking speed and location all the time.

Mr. Fischer, who started developing Speed-Demon before he received his own driver’s license in February 2005, wrote a software program for the device that uses global positioning technology to log the time and location of every speeding incident.

He is developing two models. One uses a Secure Digital card that can be inserted into a computer after a teenager comes back from a drive; the other would use wireless technology to send mobile phone or e-mail messages to parents immediately after a speeding incident.

“Whoever owns it will be able to customize the speeding alerts to be however strict they want to be,” Mr. Fischer said.

His program will let Speed-Demon users view a Google map of the time, location and path of the car when the speeding occurred. If no speeding occurs, parents will not be able to see the path of the car at any time.

This is what Mr. Fischer is most proud of. His program weeds out extra information from the GPS, protecting teens’ privacy. Their parents can see what they’re doing only if they break the rules set by the parents.

“Some people think (my plan) is bad, and I’m on the parents’ side,” he said. “Teens should still be able to have their privacy — and they’ll get it if they drive safely. It’s not so much to get kids in trouble as it is to open lines of communication with parents.”

State Rep. Karyn E. Polito, R-Shrewsbury, an advocate of increasing parental involvement for junior operators applying for a driver’s license, said devices such as Speed-Demon are “on the right track.”

Any tool that that can help parents to promote safe driving is a good thing, Ms. Polito said. “I do think parental involvement is an essential component to making better young drivers,” she said.

Glenn Greenberg, a spokesman for Liberty Mutual Research Institute for Safety, said it is important for parents and teenagers to talk about driving patterns.

“Environments in which parents and teenagers openly discuss driving — just like they talk about other social behaviors, like drinking and drugs — are situations where teens are more likely to exhibit safe driving habits,” Mr. Greenberg said.

Teenage drivers are the age group proven most likely to be in automobile accidents. And in rural towns such as Lunenburg, narrow, winding roads are less forgiving to speeding drivers than broad highways.

According to research earlier this year by the University of Massachusetts Traffic Safety Research Program in Amherst, drivers from 16 to 19 have the highest crash rates per licensed driver in Massachusetts, while 16- and 17-year-old drivers have a crash involvement rate four times higher than that of drivers 18 and older.

The rate of speeding violations was four times higher for 16-year-olds than for drivers of all other ages.

“There have been a lot of car accidents in our town involving high school students,” Mr. Fischer said. “A lot of them have gotten hurt or killed. I know kids who’ve gotten killed.”

The young inventor said he has always had a mind for business. So he put his business mind and technology skills together to prevent more of his peers from dying in crashes caused by recklessness and speeding.

Some private companies use GPS devices to track workers such as couriers, garbage truck or snowplow operators. Mr. Fischer’s device is targeted specifically at parents of teenage drivers.

Mr. Fischer presented the Speed-Demon project as a nervous teenager at the Worcester Regional Science & Engineering Fair in spring 2005. Then he entered the Mount Wachusett Community College Business Plan Competition last fall.

One of the youngest applicants in the competition, he came away with first place, winning $6,000 cash, plus services valued at about $5,000 to help him develop his idea into a marketable product.

After his success at MWCC, Mr. Fischer applied to the Plan for the Future competition sponsored by the National Federation of Independent Business. In June, he went to Washington, D.C., to collect $7,500 — the grand prize.

Christopher C. Bowman, a civil service commissioner for Massachusetts, was one of the judges at the MWCC competition who applauded Mr. Fischer’s business plan.

Mr. Bowman said he was impressed by Mr. Fischer’s creativity and his ability to compete with older, more experienced entrepreneurs. He said the business plan for the Speed-Demon stood out from the pool of applicants because it was a product designed to help people and encourage public safety.

Mr. Bowman, who at the time of the competition was chief of staff to Ranch C. Kimball, state secretary of economic development, helped set up a meeting between Mr. Fischer and Lt. Gov. Kerry Healey.

Mr. Fischer said Ms. Healey seemed genuinely interested in the Speed-Demon.

“I got to talk to her for 10 minutes,” he said. “One of her aides said she couldn’t believe (Ms. Healey) talked to me for so long.”

Coached by his father, small business owner Richard Fischer, Jon Fischer, now a confident young adult, is focusing all the time he can spare on this business venture.

Richard Fischer said Speed-Demon has always been a family effort. While Richard provides Jon with business advice, Jon’s sister, Julie, 21, helped coin the device’s name, and Jon’s uncle, Kurt Lanza, helped with the computer programming.

“I remember some of those nights in the dark with that thing flying around,” Richard Fischer said, laughing and pointing to their oldest prototype of the Speed-Demon. “Those nights were ugly.”

Two years after Speed-Demon was born, the situation is different.

“A lot of people have said they want one for their kids,” Richard Fischer said. “They like the sound of it.”

Brett N. Dorny, Jon Fischer’s patent lawyer, who works in Northboro, said Speed-Demon is “the first design modeled to monitor specific driving conditions.”

Mr. Dorny helped Mr. Fischer file a patent application for his design. The U.S. Patent and Trademark Office should approve the patent by next summer, Mr. Dorny said.

With the patent pending, the Fischers are working with three partners — Sine-Wave Technologies Inc. of Hopkinton, of which Richard Fischer is an owner; Innovatech Associates Inc. of Westford; and Fastrax Ltd. of Vantaa, Finland — to provide them with the hardware to develop the Speed-Demon.

They plan to sell the device on Mr. Fischer’s Web site, www.speed-demon.com, which is in development.

Pricing is expected to be about $150 for the original model, and about $200 to $250 for the wireless model, plus a $10 monthly fee for the wireless technology.

Mr. Fischer has had to balance his business venture with schoolwork and frequent practice as a member of a competitive freestyle skiing team. Speed-Demon is important to him but, he admitted, “it got in the way of skiing.”

Mr. Fischer hopes Speed-Demon is the start of a career of business ventures.

He will graduate from high school in 2007 and wants to study business administration in college. But he might take a year off to work on Speed-Demon.

“I’ve always been more interested in the business side of things than the engineering side. I’ve always been interested in money,” Mr. Fischer said, perhaps a tribute to his father.

His father wants Jon to attend college, but he is also encouraging him to work independently on his business ideas.

“He can learn a lot more about business by developing a business than by going to college,” Richard Fischer said.

Tuesday, August 22, 2006

India's Cut-Price Space Program - This Post - External Link

Twelve-foot-high electric fences and fortified machine gun posts surround the administrative headquarters of India's space agency.

Although the space program is a civilian effort, it is a symbol of national excellence -- and that makes it an ideal target. But behind the several layers of security, the Indian Space Research Organisation, or ISRO, is abuzz with new projects and excitement.

And Indians pride themselves on their success in space.

Every launch resonates deeply in patriotic nerve centers and causes celebrations throughout the country. Some cities fire off so many fireworks the sky stays thick with smoke for hours. In other places, people pray for the success of the mission in temples and mosques. They may not know what's on board the rocket, but its liftoff certainly lends credibility to India.

Still, India's rocket scientists are humble about their work. Launching missiles with massive payloads into space is a tricky business and things can go wrong at any stage.

After 11 consecutive successful launches, the most recent launch of India's Geosynchronous Satellite Launch Vehicle on July 10 had to be aborted when one of the engines failed. But these sorts of setbacks are par for the course in the space business -- and aren't confined to India. In 2003, a similar satellite launch by Brazil's space agency resulted in disaster when the rocket exploded on the launch pad, killing 21 technicians and briefly forcing the country to suspend its space program.

To keep the odds in their favor, some scientists make pilgrimages to the famous Venkateswara temple in Tirupati, Andhra Pradesh, with a small bronze replica of the payload. The model is sprinkled with holy water and placed in front of an idol of Vishnu to be blessed for success.

"Once you are airborne there is not time to make changes," said Rajeev Lochan, assistant science secretary of ISRO. "Maybe it helps to have the divine in your corner."

India has had a 30-year run in mastering space telecommunications and Earth reconnaissance, but the moon mission would be the first for purely scientific ends. And it could be the beginning of a new era for the program.

3-D TV that actually works - This Post - External Link

From Wired News:

I entered a conference room in Manhattan and a woman on the TV tossed a handful of rose petals out of the screen, where they floated in the air before my eyes.

At least, that's what I saw. In truth, the image resided on a perfectly flat, 42-inch LCD screen. But the 3-D illusion was fully believable, and I didn't have to wear a dorky set of polarizing glasses.

A new line of 3-D televisions by Philips uses the familiar trick of sending slightly different images to the left and right eyes -- mimicking our stereoscopic view of the real world. But where old-fashioned 3-D movies rely on the special glasses to block images meant for the other eye, Philips' WOWvx technology places tiny lenses over each of the millions of red, green and blue sub pixels that make up an LCD or plasma screen. The lenses cause each sub pixel to project light at one of nine angles fanning out in front of the display.

A processor in the TV generates nine slightly different views corresponding to the different angles. From almost any location, a viewer catches a different image in each eye.

Providing so many views is key to the dramatic results. Sharp Electronics makes an LCD display that projects just two views, requiring an audience to sit perfectly still in front of the screen. With the Philips technology, viewers can move around without losing much of the effect -- one set of left/right views slips into another, with just a slight double-vision effect in the transitions.

The TV can also display standard two-dimensional images, close to HD quality.

The uncanny 3-D illusion stops people in their tracks, as it's meant to. Philips is initially selling the 42-inch screens -- which debuted at the Society for Information Displays conference in June -- to retailers who will create 3-D ads to grab the attention of passing shoppers.

Casinos are interesting in the screens -- the mesmerizing effects may help patrons part with more of their money. Holland Casino just announced plans to install the screens throughout its locations in the Netherlands.

Finding content for home users is more of a challenge.

One nearly ready-made source of content is modern video games, which actually generate three-dimensional objects internally, then flatten the images into 2-D representations for standard monitors. Philips has developed hardware and software that can extract the original depth information from the game engine and use it to create 3-D images on a WOWvx display.

In New York, the company demonstrated the technique with the first-person shooter Call of Duty. It looked almost perfect, except for a little shimmering around the edges of objects, which Philips says will be fixed in the coming months.

The company also has plans for video. The ultimate hope is that studios will produce more 3-D content, like the recent 3-D version of Sony Pictures' Monster House that screened in 162 U.S. theaters. But Philips is developing software to convert standard video to 3-D by analyzing movement to determine the original depth position of people and objects.

A standard laptop running Philips' software was able to convert the DVD The Lord of the Rings: The Return of the King into 3-D in real time and display it on Philips's new 20-inch "3D 4YOU" LCD monitor -- a retail-kiosk implementation of the 3-D screen.

The result looked vaguely 3-D, though it was marred by some blurriness and double images.

"I think for consumers this is simply not good enough," said Philips executive Rob de Vogel. "But the progress in the past year is amazing." He expects the company to show a better version of the conversion software to the public in the coming months -- possibly at the next Consumer Electronics Show in January 2007.

Friday, August 18, 2006

Java gong open-source - This Post - External Link

Sun Microsystems plans to publish the first open source Java code by October this year, the company has revealed.

Laurie Tolson, vice president of developer programmes and products at Sun, said at a company event that the first components include Java C and the Hotspot VM. The remainder of the code will be open sourced by the end of 2007.

Sun first announced that it would release the Java source code under an open source licence at JavaOne in May.

The company is still considering the licence under which it will release the technology, and has launched a special website, Open Sourcing the JDK, soliciting feedback from developers.

"Our primary focus is to be compatible, putting programmes in place that people can rely on for compatible implementations of Java," said Tolson.

Sun has also expanded its open source Java initiative with the Java ME technology that allows mobile phones to run Java code. It has not been made clear whether the mobile version of Java would be included in the open source initiative.

There is, however, a clear trend towards the use of open source software on mobile phones, according to Alan Brenner, vice president of mobile and embedded devices at Sun.

Brenner pointed at the consortium set up in June by Motorola, NEC, Panasonic, Samsung, NTT DoCoMo and Vodafone which seeks to create a standard version of mobile Linux.

"So far we have clearly seen that going in an OS direction for Java ME is the right and logical choice at this point. We really do want to lead and establish that direction in the market," said Brenner.

He added that "most" of Java ME will be released under an open source licence by the end of 2006.

Microsoft Insists IE7 is Standards Compliant - This Post - External Link

Microsoft's Chris Wilson, the Group Program Manager for IE addresses the issue of whether IE7 is CSS and Web standards compliant. Last week a Slashdot post claimed that IE7 was basically non-compliant with CSS standards. But Chris Wilson says that isn't true and that standards improvements is a big part of IE7. He admits that there were a ton of bugs from IE6 that have caused web developers a lot of pain, but says that IE7 will address those and be standards compliant. He goes as far to say that IE7 supports Web standards even at the expense of more backwards compatibility.

New Blogger Beta - This Post - External Link

Blogger went live with a beta version of their new blogging tool this morning. This is the first major upgrade for the DIY-publishing site since Pyra Labs, the creator of Blogger, was purchased by Google in 2003.

The new Blogger is only available to new users and a select group of existing users right now. A full roll-out will happen "eventually," according to Blogger's Buzz news blog. Blogger users who want to try out the new tools can sign up for a new user account under a different name, then merge their accounts later.

New features include the addition of tags, which Blogger calls "labels," to posts and photos. The new beta also has updated privacy and user management options which allow for private posts, tiered user permissions and multi-author blogging. Blog owners can define whitelists of "blog authors" and "blog readers" who have access to publish and read blog content. Steve Rubel of Micro Persuasion has already found some problems with some of the new privacy settings.

Blogger also added some new optional page elements, new blog templates and new color themes. Also, new drag-and-drop layout tool lets users futz with sidebars, margins and other interface elements just by moving them around with the mouse. The layout interface substantially improves Blogger's usability across the board. This is good news for people who want to blog, but who lack the intimate knowledge of HTML that some tools require. Safari still has limited support, but the new layout tool works in Firefox and IE.

The new tool comes with a new dashboard. Here's the dashboard for my (admittedly rather barren) account:



Also added to the new Blogger: more feed delivery options and support for both RSS 2.0 and Atom 1.0.


The news of Blogger's re-up comes just days after the announcement that the publishing service will begin using Google Accounts for user management. Also, Sunday's release of Microsoft's Windows Live Writer desktop blogging client point to a quickening of the pace in the blog publishing industry. Not to mention Six Apart's new Vox service that will be launching in October 2006. The site promises to be sort of a MySpace for twenty/thirty-somethings, and it will feature both social networking and blogging components.

Free internet from Google - This Post - External Link

Google has begun offering free, high-speed internet access to everyone in its Silicon Valley home town — a hospitable gesture that the online search leader hopes to see spread to other parts of the country.

The new Wi-Fi network is believed to establish Mountain View, California, as the largest U.S. city with totally free internet access available throughout the entire community, according to both Google and city officials.

St. Cloud, Florida, a suburb of Orlando with a population of about 28,000, had claimed that mantle earlier this year after it launched a free Wi-Fi network.

About 72,000 people reside in Mountain View, an 11.5-square-mile city located about 35 miles south of San Francisco. As the home to major companies like Google and VeriSign, Mountain View's daytime population can swell above 100,000.

"We aren't concerned about being able to handle the load," said Chris Sacca, a Google executive who oversaw the Mountain View project. "We think we have built a pretty cool, robust network."

Similar Wi-Fi networks are under development in many other cities, including Philadelphia and Chicago, but most of those envision charging for internet access.

Small pockets of free Wi-Fi access have become increasingly common throughout the United States, often cropping up in downtown districts or by coffee shops and fast-foot restaurants hoping to lure customers.

Google's community-wide network has had Mountain View buzzing in anticipation, said City Manager Kevin Duggan.

"There's a lot of excitement," he said. "It's something we could have never anticipated a few years ago when we were just excited to be able to pay for dial-up access to the internet. Now our entire town is a hot spot."

Google invested about $1 million to build the Mountain View network and expects to have to spend far less than that each year to keep it running. The financial commitment represents a pittance for Google, which has nearly $10 billion in cash.

Powered by 380 radio antennae, the Mountain View network is supposed to surf the web at speeds comparable to the internet connections delivered by DSL. It will be slightly slower than a high-speed cable connection.

Still, Google believes the free service will be fast enough to prompt some Mountain View residents to stop paying DSL and cable providers for internet access. People who take that step will probably want to spend $30 to $170 for a Wi-Fi modem to improve the connection to Google's free service, Sacca said.

Surfers using the Google service will have to log on, but once they're connected they will be able to sign off without losing access, Sacca said. The network is "very naive," so it won't track people's online activities when they aren't on a Google site, Sacca said.

Like many internet companies, Google has an incentive to ensure people have easy and cheap access to the internet because its profits depend on surfers navigating through waves of online ads.

Toward that end, Google last year decided to help develop free Wi-Fi networks in Mountain View, the company's home since 1999, and San Francisco, where many of its employees live. Google doesn't expect to undertake similar projects elsewhere, partly because so many other companies are angling to build Wi-Fi networks in hundreds of other cities, Sacca said.

In contrast to the Mountain View network, Google decided to team up with another company, EarthLink, to build San Francisco's Wi-Fi network. The San Francisco plan envisions EarthLink charging roughly $20 per month to surf at the top available speed while Google will offer a free service that transmits data at a much slower rate.

Negotiations on the San Francisco network still haven't been completed, making it unlikely it will be switched on until next year.

Where is my CAPS LOCK key? - This Post - External Link

Is it time to permanently retire the Caps Lock key? Pieter Hintjens thinks so.

Hintjens, the CEO of iMatix, has launched the Capsoff organization in a campaign urging hardware manufacturers to ditch the oft-abused and misused key. Hintjens' plan is to build the entire infrastructure for the movement using only freely available tools from Google. He's already set up a Blogger Capsoff blog and a forum at Google Groups.

"The Caps key is an abomination," Hintjens writes on his blog. "It's a huge key, stuck right there where the Ctrl used to be, and as far as I know, it's only used by 419 scammers and Fortran programmers."

Zealous net newbies have also subjected the Caps Lock key to overuse, composing e-mails and newsgroup posts entirely in capital letters, an ugly and inelegant style of communication akin to screaming. In fact, the Capsoff organization's slogan is "STOP SHOUTING!"

The antagonism toward the Caps Lock key extends beyond its misuse by 13-year-old trolls and naive users. Caps Lock is also responsible for failed entries of passwords and other case-sensitive phrases. Users of word processors are forced to retype any text that was entered with Caps Lock accidentally turned on.

The Capsoff movement's primary target is the device manufacturer. "Obviously the keyboard producers have been so indoctrinated that they don't even inspect their own products any longer," Hintjens writes. "Listen, dudes: No one wants that crummy Caps key. It's history."

Discussion on the Capsoff Google Group took off Wednesday when the protest was picked up by tech news site Slashdot. Group membership has swelled to more than 200 members, and debate has been heated. Many users have been quick to offer alternative uses for the possible gaping hole left between Tab and Shift. Some advocate moving the Esc or Ctrl keys to the empty slot. Others have asked for volume controls to be inserted into the valuable piece of keyboard real estate.

Even though Hintjens' idea is quickly gaining momentum, some find the movement rather pointless.

"I don't see it being a problem at all," says Joel East, a technical designer at Ikey, a company that manufactures custom keyboards and pointing devices for industrial applications. "The Caps Lock key is there, and people can choose to use it or not."

Ikey has been creating input devices since 1989, and the company's designers have never encountered a single customer complaint about the existence or location of the Caps Lock key. In fact, East says it's highly unlikely that the Caps Lock key will go the way of the ghost any time soon since it is used frequently in data entry and inventory management.

"It would make more sense for (Capsoff) to concentrate on educating and training the general population about etiquette and proper use of the keyboard," he says.

Short of taking a penknife to your keyboard and prying the darned thing off, here's how you can eradicate the Caps Lock key from your keyboard of choice.

Windows users should check out the custom keyboard-mapping utilities offered at Shareware Connection. Advanced users can try the input scan-code techniques outlined at Windows Hardware Developer Central. Warning: Attempt scan-code remapping at your own risk.

Mac OS X users have it much easier. Open System Preferences and click on the Keyboard & Mouse icon. Under the Keyboard tab, click on the Modifier Keys button. In the dropdown list next to Caps Lock, choose No Action or set the key to one of the other options.

Of course, anyone with enough money and determination can always commission their own custom keyboard -- sans Caps Lock.

Super fast transistors on the way - This Post - External Link

A simple tweak to the way common silicon transistors are made could allow faster, cheaper mobile phones and digital cameras, say UK researchers.

Devices with the modification have already set a new world record for the fastest transistor of its type.

To achieve the speed gain, researchers at the University of Southampton added fluorine to the silicon devices.

The technique uses existing silicon manufacturing technology meaning it should be quick and easy to deploy.

"It just takes a standard technology and adds one extra step," said Professor Peter Ashburn at the University of Southampton, who carried out the work. "This is a really cheap method."

Silicon sandwich

The research was carried out using a simple type of transistor known as a silicon bipolar transistor.

Transistors are the tiny building blocks of most microchips and millions are found in desktop computers, mobile phones and MP3 players.

It's atomic engineering really, even smaller than nanotechnology
Professor Peter Ashburn

They are used to regulate electronic currents in microchips, and depending on the type may be used to amplify a signal or open and close a circuit.

Combinations of transistors can be used to do calculations or useful computational work.

Bipolar transistors are made of three layers of semi-conducting material arranged in a sandwich structure, with two layers of one material with a filling of a different sort.

A thinner filling in the transistor means electrons can flow through the device more quickly, increasing the overall speed of a circuit or chip.

Alternative approaches for building fast transistors exist but they use other materials, such as gallium arsenide or a silicon germanium mix, which require more expensive manufacturing techniques.

The silicon industry would like to continue to squeeze greater speeds out of smaller chip using existing manufacturing processes which are cheap and reliable.

The work from the University of Southampton offers one solution.

Atomic scales

Professor Ashburn and colleagues at STC Microelectronics used a simple transistor made of silicon with a boron filling for the research.

To make transistors of this type requires high temperature manufacturing processes which cause the boron layer to diffuse, creating a thicker and hence slower layer.

A man looks at the latest mobile phones
The new chips could be used in mobile phones

To get round this problem, the researchers added fluorine implants to the silicon layers using a common manufacturing process, known as ion implantation.

Ion implantation involves firing atoms of one element, in this case fluorine, at a target of silicon.

At an atomic level, the fluorine creates small clusters of vacancies, areas of missing silicon atoms. These voids suppress boron diffusion, creating a thinner layer and therefore speeding up the transistor.

"It's atomic engineering really, even smaller than nanotechnology," said Professor Ashburn.

World record

When the researchers tested the new device it clocked a speed of 110 GHz.

Complete circuits usually operate at about a tenth of the speed of the component transistors meaning the new devices could allow engineers to build chips that operate at a speed of about 11GHz.

There's no Guinness Record for this but it is the fastest in the published literature
Professor Ashburn

The previous world record, held by electronic giant Philips, created transistors that operate at speeds of up to 70GHz, allowing operating circuit speeds of 7GHz.

"There's no Guinness Record for this but it is the fastest in the published literature," said Prof Ashburn.

At present, mobile phone circuits operate at speeds of about 1GHz.

Working circuits using the new design of transistor are currently being developed by Professor Ashburn's research partner STC Microelectronics in Italy.

Although a product has not been built using the new devices, Prof Ashburn says they could be used to amplify the signal in mobile phones or to improve the way that handsets convert speech into digital signals.

Complete circuits are also used in digital cameras or scanners to improve the way they convert information from the real world into pixels.

"There are many applications," said Professor Ashburn.

Source: http://news.bbc.co.uk/1/hi/technology/5259594.stm

Monday, August 14, 2006

We Can Detect Liquid Explosives - This Post - External Link

While the process isn't perfect, scanning machines do exist to detect liquid explosives like the ones purportedly at the heart of the terrorist plot broken up this week.

But don't expect the machines to be rushed into airports soon. Cost and logistical issues present challenges for these devices.

Consider work that's been done at Rapiscan Systems, part of OSI Systems. Rapiscan is developing four kinds of devices -- some based on technologies more than 10 years old -- that can detect liquid or gel-based explosives. Two that would work on carry-on bags already have been tested by the Transportation Security Administration and "could be deployed this afternoon," said Peter Kant, the company's vice president for government affairs.

But none are being used in the United States. Some are in place overseas, though Kant said those aren't in airports.

One big reason is that it is not easy to integrate the explosive-detecting machines, some of which can cost $250,000, into existing security checkpoints. Because each briefcase, purse or other carry-on bag has to be put in a special drawer for analysis, using the detectors could significantly bog down passenger screening.

Homeland security analyst Brian Ruttenbur of Morgan Keegan also points out that the technology still produces a relatively high number of false alarms.

For those reasons -- and because there still has not been a successful attack using liquid explosives -- Ruttenbur believes the TSA won't be pressed to overhaul the current screening regimen.

That would mean a continued reliance on systems not designed to stop liquid explosives. Metal detectors figure to remain the primary method, with the main secondary screening coming from "puffer" technology that blows air on people and sniffs the particles that emerge for suspicious materials.

For a machine to detect explosives in liquid or solid form, it bombards an object with energy -- such as radio waves or neutrons -- and in seconds measures the reaction, a response that differs depending on the material's chemical properties. Software in the machine is programmed to alert screeners if it detects chemical signatures known to match those of dangerous materials.

A key question, though, is whether this kind of detection system can realistically block terrorists from bringing seemingly innocuous liquids past security and combining them later to deadly effect.

Certainly, some common ingredients in liquid explosives can be programmed into the detector. But Kant, at Rapiscan, said he would not discuss the vulnerabilities of that approach. "Whether it detects the components of explosives and which ones, there's no way I'm putting that in print," he said.

Sean Moore, vice president of sales at a rival maker of explosive-detection systems, HiEnergy Technologies, said future screening machines could be linked so that they might let a person through with one kind of liquid -- but stop another traveler carrying another type of liquid that reacts explosively with what the previous person was carrying.

This list of liquids to watch for, he acknowledged, would have to be constantly updated as "terrorists become more ingenious."

That scenario, however, remains a ways off. Not only are security checkpoints not networked, but HiEnergy has not sold a single device for U.S. airports. Its main project so far involves field tests on unattended packages in Philadelphia with the Southeastern Pennsylvania Transportation Authority.

A different kind of scanning technology that already has begun to emerge -- backscatter screening -- has no automated ability to detect explosives. But its backers say it nonetheless could go a long way to halting plots like the one apparently thwarted this week.

Backscatter screening is much like traditional X-rays, except that the system sends more, but weaker, X-rays at an object. It can't penetrate skin, but it can reveal items under someone's clothes -- such as a hidden bottle of liquid.

A major problem is that the view is so powerful that an individual's private parts can be seen, which forced the TSA to delay tests while vendors tweaked the machines' programming to distort or mask bodily images. And backscatter systems still leave it up to a human screener to recognize a suspicious item.

But Joe Reiss, vice president of marketing for backscatter vendor American Science and Engineering, says it makes more sense to invest in $50,000 systems like his -- which might help catch a wide variety of suspicious behavior -- than to zero in on liquid explosives, the technique of the moment.

"The name of the game is to provide enhanced methods of detecting what people want to conceal," he said. "If you get too focused on a perfect solution for yesterday's problem, you might be missing the bigger picture."

Saturday, August 12, 2006

Blogging all the way to jail - This Post - External Link

Before there was YouTube's crush of do-it-yourself video online, Josh Wolf was busy taking media into his own hands. As one of the Internet's earliest videobloggers, Wolf thrust himself onto the front lines of citizen journalism, uploading his politically spiked, home-grown content onto www.joshwolf.net. While bypassing old media gatekeepers — like editors and programming schedules — Wolf, 24, gained unprecedented access to the Web's global stage, but he also fast won notoriety for his attempts to democratize the media. Last year, Wolf earned the wrath of Al Gore's youth cable channel, Current TV, when he criticized the new station's hiring practices along with its video submission policies on his blog. In protest, he started the Rise Up! Network, a non-profit alternative media site, where anyone can feature his or her own video work and retain exclusive rights.

Now the videoblogger is enmeshed in a new digital media controversy. On Tuesday, Wolf was thrown into federal prison for refusing to testify before a U.S. grand jury and for failing to hand over unpublished video footage he shot during a raucous clash on the streets between San Francisco police officers and anti-G8 protesters last year. Wolf posted some of the video on his blog, and some clips were aired on TV newscasts that later paid Wolf for the footage. But the feds are demanding to see everything that wasn't made public. They allege that the unused portion of Wolf's video may show the patrol car being set afire — part of a federal crime, the government asserts. Wolf denies there is an attempted arson on his videotape. The feds say they have jurisdiction over the case because the police car is partly U.S. government property since the S.F.P.D. receives federal anti-terrorism money.

"Not only does this logic seem silly," Wolf told TIME in June after receiving his final subpoena, "but if unchallenged it will have a deleterious effect on the state protections afforded to many journalists, both independent and those that are part of the established media." Judge William Alsup of Federal District Court rejected Wolf's arguments, and declared him in contempt of court. So he is now being held in a detention center in Dublin, Calif., where he could remain until next July when the grand jury expires, or earlier if his attorneys can convince the court his custody becomes punitive because he won't turn over the court-ordered materials. Wolf maintains that as a freelance videographer and blogger, he is an independent journalist protected under the state's generous shield law, which protects journalists' confidential, unpublished material obtained while reporting. He adamantly resists what he sees as the government's attempt to force him to identify various activists captured in his tapes. "It goes against every moral fiber in my body to sit back and out people for their political beliefs," he said, adding that if this interpretation stands, it could "kill politically contentious journalism in America."

This could also be a landmark case, since Wolf is the first blogger to be targeted by federal authorities for refusing to cooperate with a grand jury. "The courts have sent a clear message to journalists, bloggers, vloggers, and all citizens that the U.S. government will and can with the help of the federal courts make every person in the U.S. an investigative arm of the government," according to Jose Luis Fuentes, Wolf's attorney. When asked if do-it-yourself media creators should be afforded the same legal protections that conventional journalists have, Fuentes replied, "All newsgatherers are theoretically protected by the federal and state First Amendment. In the context of free speech and newsgathering, all journalists are working for a democratic society whose very existence depends upon the free flow of information without government intrusion. Any attempt to draw a distinction is divisive."

The legal musing has a tinge of irony since Wolf and other do-it-yourself content creators are typically disdainful of corporate-controlled media. Yet Wolf is now voluntarily taking the legal heat for amateurs and professional scribes alike. And he might be wishing he could benefit from mainstream media's deep pockets. His legal bills exceed $75,000, according to his attorney. Fees from other lawyers are piling up, too. His mother is keeping up his blog, where donations are being solicited to offset his escalating legal costs. Mainstream civic and media interests like the Society for Professional Journalists, the American Civil Liberties Union, the National Lawyer's Guild, the San Francisco Chronicle's editorial board, and San Francisco's Board of Supervisors have all voiced support for Wolf. The blogosphere, by contrast, hasn't yet elicited a rousing cheer for Wolf, with a few exceptions like the Huffington Post and Silicon Valley Watcher. Neither the popular political blog The Daily Kos nor ourmedia.org, a site for the participatory media movement, covered Wolf's jailing.

Fuentes, Wolf's attorney, advises citizen journalists and new media creators to guard their privacy by developing protocols to protect their unedited material and sources. He suggests using paper shredders and having record-retention policies, and dissuades grassroots content creators from talking to law officials. The Electronic Frontier Foundation (EFF), a non-profit that advocates for the public interest and digital rights, is more pointed by suggesting that do-it-yourself media creators should use technology to help conceal their real identities online. EFF encourages the use of anonymous blogging tools like "invisiblog.com" and "anonymize.com," which do just that. Other digital privacy tips can be found on the EFF website — under the title: "How to Blog Safely." One can only wonder what the jailed videoblogger would think of such a lack of transparency.

Computer Manages Restaurant Workers - This Post - External Link

Hyperactive Bob, the kitchen production management computer system from Hyperactive Technologies, is now being licensed to Zaxby's, a fast-food restaurant chain with locations in the Southern states. Zaxby's has 330 counter-service chicken specialty restaurants. This artificially intelligent computer system not only takes orders, it gives them as well.

Hyperactive Bob makes use of different forms of robotics technology to help manage fast food restaurants:

  • Sensing the environment:
    The system uses robotic vision to count the cars in the parking lot, gathers feedback from employees and collects point-of-sale information in real time.
  • Artificial Intelligence:
    Hyperactive Bob analyzes historical and real-time data to learn about each restaurant individually. Hyperactive Technologies claims that HB is more accurate than most seasoned employees.
  • Taking Charge:
    Hyperactive Bob uses touch screens to tell employees what to do. Employees are instructed how much of which foods to cook; when the food is ready, they tell HB.
Hyperactive Bob operates on practical PC hardware and Windows .Net, Winnov Videum 4400 VO (4 channel video capture card), ELO Touch Screen Displays and Color 380 TV Line Cameras . According to the company, HB "leverages existing QSR infrastructure to offer a very low total cost of ownership, with little maintenance or support, and provides an accelerated return-on-investment that is realized in less than one year."

Hyperactive Bob is frighteningly close to Manna, a science-fictional system proposed by Marshall Brain in his novella-length story of the same name. In the story, Manna is a PC-based system that makes use of sensors around the restaurant to gain information; it then instructs employees.

Manna was connected to the cash registers, so it knew how many people were flowing through the restaurant. The software could therefore predict with uncanny accuracy when the trash cans would fill up, the toilets would get dirty and the tables needed wiping down. The software was also attached to the time clock, so it knew who was working in the restaurant...

Manna told employees what to do simply by talking to them. Employees each put on a headset when they punched in...
(Read more about Marshall Brain's Manna)

If you think that going through your day with a computer telling you what to do every minute sounds creepy, it gets much worse. In the story, human workers are really just the remote "manipulators" and "sensors" of the system. Hopefully, no one will tell the makers of Hyperactive Bob about the Manna story; it has too many practical suggestions for the enslavement of humans. Visit Hyperactive Technologies.

Next could be Stack Computing!! - This Post - External Link

It seems that stack computers might be the next big thing. Expert Eric Laforest talks about stack computers and why they are better than register-based computers. Apparently NASA uses stack computers in some of their probes. He also claims that a kernel would only be a few kilobytes large! I wonder if Windows will be supported on a stack computer in the future?

Microsoft Bracing for Worm Attack - This Post - External Link

A network worm attack exploiting a critical Microsoft Windows vulnerability appears inevitable, security experts warned Aug. 10.

Just days after the Redmond, Wash., software maker issued the MS06-040 bulletin with patches for a "critical" Server Service flaw, Microsoft's security response unit is bracing for the worst after exploit code that offers a blueprint for attacks began circulating on the Internet.

Even before the release of Microsoft's patch, the US-CERT (Computer Emergency Readiness Team) warned that the flaw was being used in targeted attacks and that the appearance of public exploits is a sure sign that a worm attack is imminent.

An exploit module was added to the HD Moore's Metasploit Framework that could launch attacks against all unpatched Windows 2000 systems and some versions of Windows XP.

Two penetration testing companies, Immunity and Core Security Technologies, have already created and released "reliable exploits" for the flaw, which was deemed wormable on all Windows versions, including Windows XP SP2 and Windows Server 2003 SP1.

Homeland Security tells Windows users to apply MS06-040 patch. Click here to read more.

Dave Aitel, a researcher at Immunity, said his exploits are capable of launching attacks against firewall-protected Windows XP SP2. "A worm is coming. This bug is just too easy to exploit," Aitel said in an interview with eWEEK.

Aitel's company was able to reverse-engineer Microsoft's patch and create a working exploit in less than 24 hours.

Gartner Research security analyst John Pescatore said businesses should prepare for the worst.

"The nature of the vulnerability itself is something that should be taken very seriously. The fact that exploits were out even before Patch Day and now that public code is available for anyone to download and use, that's enough to treat this as a high-priority issue," Pescatore said.

In most enterprises, Pescatore said the use of firewalls and the automatic blocking of TCP ports 139 and 445 should help mitigate the risk. However, he cautioned against IT administrators letting their guards down.

"I think we'll definitely see exploits. It might not be as big as Blaster [in 2003] but it could still be disruptive. Although this vulnerability smells like Blaster, a lot has changed over the years," he said, citing increased use of Automatic Updates among home users and layered defense mechanisms at the enterprise level.

"If we see something, I think it will be more along the lines of Zotob," Pescatore said, referring to the Windows Plug and Play network worm that squirmed through Windows 2000 systems in August 2005.

Microsoft ships fixes for 23 security flaws. Click here to read more.

A spokesperson for Microsoft said it is difficult to predict the motives and actions of attackers but insisted the company is "watching round-the-clock" and actively encouraging customers to download the update immediately.

"We will mobilize if something does happen," the spokesperson said.

In the first 30 hours since the security updates were released, Microsoft program manager Christopher Budd said there were more than 100 million downloads of the MS06-040 patch.

"That's nearly 3.5 million per hour," Budd said, stressing that the company's Emergency Response process teams are "watching for any possible malicious activity."

eEye Digital Security, a research outfit in Aliso Viejo, Calif., has released a free scanning utility to help IT administrators find potentially vulnerable machines on a network.

The eEye tool can be used to scan multiple addresses at once to determine if any are vulnerable to the Server Service flaw. If an IP address is found to be vulnerable, the scanner will flag that IP address.

Foiling the would-be hijacker! - This Post - External Link

A plane that can't be hijacked?

By 2008, European researchers hope to bring that vision closer to reality through an ambitious security program to combat on-board threats in an industry left reeling this week by a security scare that raised the specter of Sept. 11.

On Thursday, British police said they had foiled a plot to blow up aircraft mid-flight between Britain and the United States in what Washington said might have been an attempted al-Qaida operation.

Since Sept. 11, the idea that civilian planes can be used as weapons has taken hold globally, spawning increased security measures in airports around the world.

The researchers aim to create a "last barrier to attacks" on planes in flight.

Among the non-hijackable plane's features: computer systems designed to spot suspicious passenger behavior, and a collision avoidance system that will correct the plane's trajectory to prevent it from being steered into a building or mountain.

The researchers are also investigating the possibility -- although they say it is probably some 15 years away -- of developing an on-board computer that could guide the plane automatically to the nearest airport, in the event of a hijack.

"You never reach zero level of threat, no risk," said program coordinator Daniel Gaultier of SAGEM Defense Securite, a French technology group. "But if you equip planes with on-board electronics, it will make them very, very difficult to hijack."

The four-year, 35.8 million euro ($45.7 million) project, called SAFEE or Security of Aircraft in the Future European Environment, was launched in February 2004.

Among those taking part are aircraft maker Airbus, its parents EADS and BAE Systems, as well as Thales and Siemens AG. The European Commission is contributing 19.5 million euros ($25 million). Omer Laviv of Athena GS3, an Israeli company taking part in the project, said the system might be commercially available as early as 2010.

SAFEE goes beyond the limited on-board improvements made since Sept. 11 -- like reinforced cockpit doors and the deployment of sky marshals. Proposed enhancements include:

  • A chip-based system to allocate matching tags to passengers and their luggage, ensuring both are on board and removing the need for stewards to count passengers manually.
  • Cameras at check-in desks and at the entrance to the plane, in order to verify with biometric imaging that the person getting on board is the same as the one who checked in.
  • An "electronic nose" to check passengers for traces of explosives at the final ground check before boarding.
  • An Onboard Threat Detection System to process information from video and audio sensors throughout the cabin and detect any erratic passenger behavior.
  • A Threat Assessment and Response Management System, or TARMS, to assemble all information and propose an appropriate response to the pilot via a computer screen located at his side.
  • A data protection system to secure all communications, including conversations between the cockpit and ground control.
  • A secure cockpit door with a biometric system that recognizes authorized crew by their fingerprints, together with a camera to check they are not opening it under duress.
  • An automatic collision avoidance system to correct the plane's course if it strays from a permitted trajectory.

In a Sept. 11-style hijack scenario, for example, the TARMS system would detect that the plane was on course to plow into buildings and use biometric fingerprint sensors to check whether the pilot or an intruder was at the controls.

"If there is a terrorist in control or the pilot is not aware of this (false) trajectory, the TARMS decides to avoid the obstacle so there is an automatic control of the plane," Gaultier said. The avoidance system would also kick in if the pilot, despite verifying his identity, persisted in the false course.

Given its complexity, the SAFEE project raises legal and ethical issues which are themselves a key part of the research.

They include whether people will find it acceptable to be minutely observed by sensors throughout their flight, recording everything from their conversations to their toilet visits.

With help from sources including security agencies and behavioral psychologists, researchers are building a database of potentially suspicious traits for computers to detect.

"It could be someone who's using their mobile phone when they shouldn't be, or trying to light up a cigarette. But it could also be something much more extreme, it could be a potential terrorist," said James Ferryman, a scientist at Britain's Reading University who is working on SAFEE.

The sensitivity of the system could be adjusted depending on factors like the general threat level, he said.

Program coordinator Gaultier conceded the system could generate false alarms, but said the crew and pilot would remain in ultimate control, deciding if the threat was real.

The improved passenger surveillance, researchers say, will be an important advantage on larger planes such as the Airbus A380, capable of carrying 550 people. They believe passengers will be ready to accept the trade-off of less privacy for the sake of greater safety.

"We have to show it's not Big Brother watching you, it's Big Brother looking after you," Ferryman said.

Researchers say it is too early to judge the price of kitting out a plane with SAFEE, but they are working closely with a user group, including airlines like Air France and KLM. The issue is part of a wider debate within the industry, with airlines calling on governments to underwrite security costs.

"Suicide terrorism is not an issue for the airlines, it shouldn't be their responsibility," said Philip Baum, editor of Aviation Security International magazine.

"It is an attack, actually, against the state and it's part of a national defense, and therefore we need to fund this accordingly."

Bomb Threat Posed by Pants, Belts - This Post - External Link

Could the next airline terrorist be wearing cargo pants?

At U.S. airports, passengers are inspected, tested and searched, and in the wake of the bomb plot foiled Thursday by British police, they can't even bring a latte on board. But terrorists armed with liquid or plastic explosives can still make it onto planes because there's little technology to stop them from smuggling bombs on their bodies or in their clothes, experts say.

"When you travel, you are not protected against terrorists who bring explosives on their person or in carry-on luggage," said Hans Weber, a San Diego aviation security consultant. "It's a bigger problem than liquids."

To make detection even more challenging, there are more than 100 types of explosives, and the actual number is higher because many come in different varieties, said James O'Bryon, an aviation security consultant in Maryland who formerly served as an official in the Department of Defense.

Why can't bombs be stopped? For one thing, ordinary metal detectors are designed to detect weapons, not explosives, and X-ray machines that expose what people are carrying aren't used because of radiation concerns.

That means someone wearing cargo pants could easily smuggle in a bottle of an explosive ingredient without being detected, Weber said.

The alleged British smugglers were reportedly planning to blow up planes by using a combination of acetone and hydrogen peroxide to create a high explosive. Scientists first figured out their explosive potential in the 19th century and both are easy to obtain from chemical supply stores, although a third chemical like an acid might be needed, said Walter Rowe, professor of forensic science at the George Washington University.

The chemicals could be mixed on board in a kind of "al fresco chemistry" and then detonated using a spark generated by a battery-powered device like an iPod or cell phone, Rowe said. Or the ingredients might have blown up when mixed without an electric detonator.

The terrorists would have faced challenges, like adding water and keeping the chemicals cold, Rowe said. But not much of liquid would have been needed, perhaps not more than a few ounces of each.

Plastic explosives -- like C-4 or RDX -- are another airborne threat, and they could be carried aboard a plane easily too, Weber said.

"You could put them in slabs under your clothing, or you could wear a belt," he said. "Some people have money belts; you could have an explosive belt." And in a jacket, a packet of plastic explosives might look like a sandwich to a screener at an X-ray machine, he said.

There are also problems with the rarely used devices specifically designed to detect bombs or bomb makers.

At some airports, passengers must pass through "trace portal" chambers where puffs of air knock off molecules that are instantly tested for telltale particles left over from bomb-making.

More frome the actual report»

Chipped Passports Coming Monday - This Post - External Link

Despite ongoing privacy concerns and legal disputes involving companies bidding on the project, the U.S. State Department plans to begin issuing smart chip-embedded passports to Americans as planned Monday.

Not even the foiled terror plot that heightened security checks at airports nationwide threatens to delay the rollout, the agency said. Any hitches in getting the technology to work properly could add even longer waits to travelers already facing lengthy security lines at airports.

The new U.S. passports will include a chip that contains all the data contained in the paper version -- name, birth date, gender, for example -- and can be read by electronic scanners at equipped airports. The State Department says they will speed up going through customs and help enhance border security.

Privacy groups continue to raise concerns about the security of the electronic information and a German computer security expert earlier this month demonstrated in Las Vegas how personal information stored on the documents could be copied and transferred to another device.

But electronic cloning does not constitute a threat because the information on the chips, including the photograph, is encrypted and cannot be changed, according to the Smart Card Alliance, a New Jersey-based nonprofit group made up of government agencies and industry players.

"It's no different than someone stealing your passport and trying to use it," Randy Vanderhoof, executive director of the alliance, said in a statement. "No one else can use it because your photo is on the chip and they're not you."

Yet the ability to clone the information on the chips may not be the sole threat, privacy advocates argue. A major concern is that hackers could pick up the electronic signal when the passport is being scanned, said Sherwin Siy, staff counsel at the Washington-based Electronic Privacy Information Center, a leading privacy group.

"Many of the advantages the industry is touting are eliminated by security concerns," Siy said.

After testing the passports in a pilot project over the past year, the government insists they're safe.

Numerous companies competed the last two years to provide the technology. One winner was San Jose, California-based Infineon Technologies North America, a subsidiary of Germany's Infineon AG. Another was French firm Gemalto, which earlier this month announced that it had received its first production order from the Government Printing Office. It is producing the passports for the State Department, using the Infineon technology.

Another company, On Track Innovations, was notified July 31 that it had been eliminated from consideration and is appealing the decision, a spokeswoman for the Fort Lee, New Jersey, company said this week. On Track previously had been eliminated but appealed that decision in the U.S. Court of Federal Claims in Washington, D.C., which found in favor of the company and ordered it be reinstated.

Infineon has been approved for production-quantity orders but hasn't received any because of the unresolved legal dispute, said Veronica Meter, a spokeswoman for the Government Printing Office. The rollout that begins Monday will use technology built up during the pilot project.

Neville Pattinson, director of technology and government affairs for Gemalto in Austin, Texas, would not discuss financial terms of the contract. He acknowledged the economic potential is massive, noting that the State Department issued 10 million passports in 2005 and expects that to increase to 13 million this year.

Citizens who get new passports can expect to pay a lot more. New ones issued under this program will cost $97, which includes a $12 security surcharge added last year. Not all new passports will contain the technology until it's fully rolled out -- a process expected to take a year. Existing passports without the electronic chips will remain valid until their normal expiration date.

American Depository Shares of Infineon fell 12 cents to $10.65 Friday on the New York Stock Exchange.

Friday, August 11, 2006

Another WGA failure - This Post - External Link

Ed Bott says in his blog:

I just experienced a Windows Genuine Advantage failure. Only it’s not a false positive, like the horror stories I’ve been hearing for nearly two months now. No, this one was a false negative. The whole story says a lot about how Microsoft is approaching the WGA issue.

A few weeks ago, I spoke to some of the folks on the WGA team and asked them to send me a pirated version of Windows XP. I'm reluctantly running a pirated version of Windows and can't get caught no matter how hard I try. According to Microsoft, 80 percent of the 60 million people who have been nabbed by the WGA validation tool are running versions of Windows with stolen or pirated volume license keys. These versions of Windows are supposed to be available only to corporate customers and only as upgrades. Unlike retail versions, they don’t require activation, which makes them an ideal target of pirates and bootleggers.

According to Microsoft, many of the people who end up with these “non-genuine” copies of Windows are themselves victims. The unauthorized OS might have been installed by a repair shop, or they might have purchased what they thought was a legitimate copy of Windows from an unscrupulous reseller. I wanted to install a pirated copy so I could experience exactly what these customers go through and report the results to you. I still can’t quite believe how difficult it’s been. Here’s the story so far.

On July 18, Microsoft's WGA team promised to send me a disk with a product key from their blocked list. It was supposed to arrive via overnight service, but it was never sent. After several follow-up messages, I was assured on July 26 I would have something by the end of that week. The package finally arrived the next week, on August 1. It contained a CD-R with a handwritten label that read “Windows XP SP2 – VLK,” and a 25-character product key on a small slip of paper.

Over the weekend, I hoisted the Jolly Roger, cleared a partition on a test machine, slid the CD into the drive, and prepared to join the ranks of Windows pirates. Unfortunately, the product key that Microsoft had sent me didn’t work. Instead of a smooth installation, I got an error message: "The Product ID which you entered is invalid. Please try again." I fired off a request for assistance to my contacts at Microsoft. Nearly 72 hours later, I still haven’t received a response other than a note that confirms my message was forwarded to the correct person.

No problem, I thought. I’ll just do what any red-blooded pirate would do and Google for a working product key. It took me about 15 minutes to find a web page containing five volume license keys that had reportedly been posted on September 9 2004. Surely if I can find a leaked VL key on a search engine, Microsoft can too, right? If these keys have been floating around the Internet for two years, surely they’ve been tagged as stolen by Microsoft, and I’ll get a WGA failure that I can show the world.

I restarted the installation using the VL media Microsoft had supplied me and entered one of the bootleg keys I found. It worked. After installation completed, I set up an Internet connection and downloaded a slew of updates, including the WGA Validation tool and the WGA Notifications utility. I then restarted, fully expecting to see a series of stern messages telling me I’d been busted.

Only that’s not how it worked out.

My bootleg key worked perfectly. I went back to Windows Update and downloaded a series of Optional Updates and drivers that are only available to Genuine Windows users. I went over to the Internet Explorer homepage and downloaded the latest beta of IE7, passing a validation test twice – once on the download and again on the installation. And five minutes ago I went over to the Windows Defender page – this is another free utility that’s only available to Genuine Windows users – and the validation check waved me right through.

That’s where I stand right now. The folks who are running the WGA program are having troubles getting the little stuff right, like putting a CD in the mail and proofreading the product key they sent with it. They haven’t managed to identify a stolen product key that’s been floating around the Internet for nearly two years. I'm reluctantly running a pirated version of Windows and can't get caught no matter how hard I try.

But these same people want us to believe that the WGA software they’ve developed is nearly foolproof. They claim that all but “a fraction of a percent” of those 60 million people who’ve been denied access to Microsoft updates and downloads are guilty, guilty, guilty.

Right.

Intel Open Sources Graphics Drivers - This Post - External Link

Intel's Keith Packard announced earlier today that Intel was open sourcing graphics drivers for their new 965 Express Chipset family graphics controllers. From the announcement: 'Designed to support advanced rendering features in modern graphics APIs, this chipset family includes support for programmable vertex, geometry, and fragment shaders. By open sourcing the drivers for this new technology, Intel enables the open source community to experiment, develop, and contribute to the continuing advancement of open source 3D graphics.' The new drivers, available from the Linux Graphics Drivers from Intel website, are licensed under the GPL for Linux kernel drivers, and MIT license for XOrg 2D & 3D rendering subsystems.

Has Anyone Seen the Moon Pictures? - This Post - External Link

NASA has received a lot of bad press in the last few years. Now in a stunning move to prove how much they have learned from past mistakes, it appears they have lost the magnetic tapes that recorded the first moon walk. They also seem to have misplaced the original recordings of the other five Apollo moon landings. Hopefully nobody has taped an episode of "The OC" over them yet.

Cray Wins $52 Million Supercomputer Contract - This Post - External Link

Cray and the U.S. Department of Energy (DOE) Office of Science announced today that Cray has won the contract to install a next-generation supercomputer at the DOE's National Energy Research Scientific Computing Center (NERSC). The systems and multi-year services contract, valued at over $52 million, includes delivery of a Cray massively parallel processor supercomputer, code-named "Hood."

The contract also provides options for future upgrades that would quadruple the size of the system and eventually boost performance to one petaflops (1,000 trillion floating point operations per second) and beyond.

A successor to the massively parallel Cray XT3 supercomputer, the Hood system installed at NERSC will be among the world's fastest general-purpose systems. It will deliver sustained performance of at least 16 trillion calculations per second -- with a theoretical peak speed of 100 trillion calculations per second -- when running a suite of diverse scientific applications at scale. The system uses thousands of AMD Opteron processors running tuned, light-weight operating system kernels and interfaced to Cray's unique SeaStar network.

Cray will begin shipping the new supercomputer to the NERSC facility at the Lawrence Berkeley National Laboratory later this year, with completion of the installation anticipated in the first half of 2007 and acceptance in mid-2007.

As part of a competitive procurement process, NERSC evaluated systems from a number of vendors using the NERSC Sustained System Performance (SSP) metric. The SSP metric, developed by NERSC, measures sustained performance on a set of codes designed to accurately represent the challenging computing environment at the Center.

"While the theoretical peak speed of supercomputers may be good for bragging rights, it's not an accurate indicator of how the machine will perform when running actual research codes," said Horst Simon, director of the NERSC Division at Berkeley Lab. "To better gauge how well a system will meet the needs of our 2,500 users, we developed SSP. According to this test, the new system will deliver over 16 teraflops on a sustained basis."

"The Cray proposal was selected because its price/performance was substantially better than other proposals we received, as determined by NERSC's comprehensive evaluation criteria of more than 40 measures," said Bill Kramer, general manager of the NERSC Center.

"We are excited that NERSC will again be home to a large Cray supercomputer," said Cray President and CEO Peter Ungaro. "We are proud to have been selected by NERSC in a challenging and competitive evaluation process using a measurement that emulates real-world conditions, rather than a simplistic peak-performance measurement. NERSC joins a growing number of major high-performance computing centers that have selected Cray systems which exemplify our vision of Adaptive Supercomputing by handling scientific applications of ever-increasing complexity and scaling to the highest performance levels."

The Hood supercomputer at NERSC will consist of over 19,000 AMD Opteron 2.6-gigahertz processor cores, with two cores per socket making up one node. Each node has 4 gigabytes (4 billion bytes) of memory and a dedicated SeaStar connection to the internal network. The full system will consist of over 100 cabinets with 39 terabytes (39 trillion bytes) of aggregate memory capacity.

"AMD and Cray continue to collaborate on innovative ways to leverage Direct Connect Architecture and HyperTransport™ technology," said Marty Seyer, senior vice president, Commercial Segment, AMD. "This innovation, along with Cray's supercomputing expertise and focus on scalable system architectures, has yet again resulted in a significant win. This is confirmation that customers believe that the design and performance of the AMD Opteron processor combined with Cray's superior system architecture provides a winning combination."

In keeping with NERSC's tradition of naming supercomputers after world-class scientists, the new system will be called "Franklin" in honor of Benjamin Franklin, America's first scientist. This year is the 300th anniversary of Franklin's birth.

"Ben Franklin's scientific achievements included fundamental advances in electricity, thermodynamics, energy efficiency, material science, geophysics, climate, ocean currents, weather, materials science, population growth, medicine and health, and many other areas," said NERSC's Bill Kramer. "In the tradition of Franklin, we expect this system to make contributions to science of the same high order."

Tracking Your Cell Phone for Traffic Reports - This Post - External Link

A new service that measures radio signals beamed between your cell phone and cell phone towers could soon help speed up your commute.

IntelliOne Technologies, a company that specializes in using mobile phone network usage to measure roadway speeds, has launched a real-world test of its technology along the streets, freeways and highways of Tampa, Florida. Called Need4Speed, the test will run from Aug. 7 to 18.

The company's technology takes advantage of the fact that wireless devices in motion communicate constantly with multiple cell towers. Wireless carriers use this data to maintain and optimize their networks, but this information can also be converted into speed and travel time information for any roadway that has cell phone coverage.

The new service isn't the only example of a creative use for cell phone towers. In another recent study, scientists used dips in cell phone signals during storms to measure rainfall.

Updated every second

IntelliOne says its results are accurate to within 3 mph and updated every second, allowing more accurate readings than current collection methods—such as in-road detectors, cameras and helicopters.

"Most traffic reports today can be as much as 20 minutes old," said IntelliOne CEO Ronald Herman. "With live speed and travel times, you always have the best information and the best chance of getting to your destination on time and with the least amount of traffic stress."

The traffic-monitoring technology will be licensed to third-party vendors who will then make it available to the public, said IntelliOne spokesman John Brimelow.

"This would feed into a plethora of devices, from heads-up displays in cars, to cell phones and websites and media reports on traffic," Brimelow told LiveScience.

Privacy concerns

To address privacy concerns, the Atlanta-based company says the personal identification data of users will be stripped from cell phone signals before they are processed by IntelliOne's software.

However, users will have the choice of "opting-in," meaning their personal identification will be recorded by the system. This will allow the technology to function like tracking services that rely on global positioning satellites.

"If someone opts in, then they're saying 'I want you to know where I am and who I am,'" Brimelow said.

The company says their service could become available to the public in as soon as three months.

It's estimated that there are more than 190 million cell phone users in the United States.

Wednesday, August 09, 2006

Web Turns Fifteen (again?) - This Post - External Link

2006-August-06

Depending which point of view you prefer, the World Wide Web either is or isn't quietly celebrating its 15th birthday.

As per the Wikipedia article on the web, on 6 August 1991 Tim Berners-Lee "posted a short summary of the World Wide Web project on the alt.hypertext newsgroup. This date also marked the debut of the Web as a publicly available service on the Internet."

However, as a medium, the web was developed over a period, and others have celebrated other birthdays for it. Some are listed below.
6 August 1991

The following are some of the sites celebrating 6 August as the 15th birthday of the web:

* BBC News - How the Web went Worldwide
* The Guardian - Happy 15th birthday, World Wide Web

More from the BBC:

* Fifteen years of the web
* BBC News Readers Panel

November 2005

* The Financial Times
* Ars Technica
* OS News

The Ars article had me confused for a little while when researching his post, because of the American formating of the date. It also seems to be the basis of a lot of the subsequent reports.
Other Dates

December 2005 - CNN - this seems to be just a late report based on the Nov 2005 date. MacWorld also reported in December 2005.

I also found a reference from December 2004 - I've not yet done any digging to see the basis for that date.

The Black Hat Wi-Fi Exploit - This Post - External Link

While many have heard that an Apple was exploited in order to install a rootkit at the recent BlackHat security conference, most people don't know the details of how it works. This is no mistake, it seems that the researchers who demonstrated the flaw were intentionally vague. Some theorize that this is in response to the real or perceived threat of legal action similar to the situation with previous Blackhat presenter, Michael Lynn.

Future of flash - This Post - External Link

Adobe is celebrating the 10th anniversary of Flash, and News.com has an article looking at the company's plans for the future of the technology. No longer just a choice for 'innovative' web designers, Adobe is positioning Flash as an application development platform, with special emphasis on video delivery and mobile device applications.

On Tuesday, the company intends to launch a microsite showing the evolution of Flash over the past 10 years, including video interviews with developers. Those videos will no doubt be played with the Flash Video Player, something many high-profile Web sites, including YouTube, have chosen to use as well. The success of Flash in the next 10 years rides largely on whether leading-edge customers like YouTube will design their Web sites with Flash, Lynch said. Adobe, which gained the Flash technology when it bought Macromedia, is trying to build an 'ecosystem' of developers and partners, he said.

Piracy is Killing PC Gaming - This Post - External Link

During a QuakeCon Q&A panel, Kevin Cloud, co-owner of Id and exec producer on Enemy Territory: Quake Wars, responded to a question about PC games disappearing from retailer's shelves by saying that piracy was "killing PC games."

"It's the primary reason retailers are moving to the console," Cloud said, continuing on to say that ways to reduce piracy are in the forefront of every PC developer's mind, and citing World of Warcraft's subscription-based nature as an example of a possible solution to the problem.

Id CEO Todd Hollenshead went on to theorize that "&about seventy percent of the landmass in the world where you can't sell games in a legitimate market, because pirates will beat you to the shelves with your own game."

"Nobody knows," said Hollenshead, "but you may literally have more games being played illegitimately than being played legitimately." Hollenshead explained how this his the PC devs by explaining that retailers would rather give up their valuable shelf space to product that can't easily be downloaded elsewhere: namely console games.

Monday, August 07, 2006

The Ad-Supported Operating System - This Post - External Link

Advertising is a very interesting thing. Whether you like it or not (probably not) it is a force to be reckoned with and has formed the backbone of today's media. While it can be annoying, advertising is the foundation of today's free content media, something which includes much of the internet.

One of the more interesting aspects of advertising is how it tends to pop up when we least expect it. For example, at a casual glance Google is a search company, but much of their profit is derived from their advertising business. While this is an obvious example, is not the only case of a powerful company running off of advertising revenue, despite the fact that this is not necessarily what they are known for.

Another example of this is Microsoft. This company makes most of its money off of software but has made it clear that they want a piece of the advertising game. It seems that some of their reasoning comes from a desire to compete with Google, just like their revamping of MSN Search not too long ago, but advertising offers a lot more than just a chance to take some money from Google.

Advertising is a very interesting thing. Whether you like it or not (probably not) it is a force to be reckoned with and has formed the backbone of today's media. While it can be annoying, advertising is the foundation of today's free content media, something which includes much of the internet.

One of the more interesting aspects of advertising is how it tends to pop up when we least expect it. For example, at a casual glance Google is a search company, but much of their profit is derived from their advertising business. While this is an obvious example, is not the only case of a powerful company running off of advertising revenue, despite the fact that this is not necessarily what they are known for.

Another example of this is Microsoft. This company makes most of its money off of software but has made it clear that they want a piece of the advertising game. It seems that some of their reasoning comes from a desire to compete with Google, just like their revamping of MSN Search not too long ago, but advertising offers a lot more than just a chance to take some money from Google.

An interesting issue which comes up in this discussion is if Microsoft would be able to get the advertisements to make up for the company's loss of the licensing fees, which could be into the hundreds of dollars per computer. Though, amortized over the life of each sytem, Microsoft would only have to bring in a few cents a day from each version of Windows.

It would be a constant effort to get advertisers and keep them happy because each would want to see performance in addition to penetration. Any advertisement which comes up during use of the OS would most likely be ignored, especially because Microsoft would hopefully not resort to something as annoying as pop-ups. The advertisements would probably take place in the periphery, such as on a Vista-style sidebar or a banner in the header and side toolbar areas of Explorer. These would inevitably lead to extremely low click-through rates and more than a few unhappy advertisers. That said, the penetration of this advertising along with its impact would be tremendous so there is little doubt that advertisers would be lining up to give it a try.

A major hurdle is the very real possibility of a hack which either prevents the advertisements or blocks them altogether. Any OS which resides on a local computer is going to be subject, at least to some extent, to the administrator so the chance of a hack is extremely good, almost certain if hackers are given enough time. This is no doubt why there was news about MSFT buying a adware company, probably so the operating system could essentially be infected with the most permanent adware possible, though at this point the term "adware" would not really be appropriate.

It seems that this sort of advertising would most likely be implemented through some sort of web-based operating system, where users only have so much control over the backend files but can still do what they need to do. Windows Live seems like it is the harbinger of something along these lines. The possibility of a web-based operating system is really not that far off, and using some sort of ramped up Active X or a rootkit to interact with local files this could be the future of the ad-supported operating system.

The possibility of an ad-supported Windows will of course lead people to consider the existence of an ad-supported Linux distribution. While this is a fun thought to entertain it seems like it would be extremely unlikely due to the number of free versions of Linux available. It is not impossible that a commercial version, like Linspire, would consider this, but with so many great free versions available it seems unlikely that this would ever get off the ground. It is more probable that certain applications or special services may become ad-supported, but due to the nature of open source, the feasibility of even this is quite limited.

The next logical question is, how will a free version of Windows affect desktop Linux? This is hard to speculate on, but at this time it would seem that the effect would be limited. The potential users of an ad-supported Windows would most likely be using Windows under any circumstances so this would just be a way to save some money. To people who are moving to Linux the cost of the OS is normally only a secondary reason, they tend to be fed up with Windows' problems and tired of paying for software. So it really does not seem like the desktop Linux community will have any problem dealing with a free version of Windows, though in certain cases, such as Linspire, there might be some cause for concern.

While ad-supported software is something which is here to stay, it is not clear when and how it will be put to use in an operating system. Microsoft is positioning itself to be able to put out an ad-supported operating system but it looks like it will be some time before this idea is a reality.

Mozilla VP Talks the State of Firefox - This Post - External Link

lisah writes "As Firefox downloads pass the 200 million mark, people are talking about how its security features stack up against IE7 and protect against malware. Mozilla VP Mike Schroepfer told NewsForge's Joe 'Zonker' Brockmeier that security will continue to be an issue 'for anything written in native code' but Mozilla intends to meet the challenge by including JavaScript 1.7 with the browser's 2.0 release. Schroepfer also talked about the timeline of future releases and offered just enough information to wet our whistles for 3.0."

Apple Partners with Ford - This Post - External Link

BusinessWeek reports on Apple's latest partnership with Ford. This new accessory will be available in all Ford, GM and Mazda 2007 models allowing users to control thei iPod through the car's stereo controls. From the article: 'Currently, most MP3 players connect to vehicles via tape-deck or FM radio adapters. The devices are relatively cheap, ranging from $20 to $90, but are often difficult to operate while driving and can distort sound quality. But the iPod jacks, situated in glove compartments, let drivers easily operate players with existing stereo controls and charge a device's battery without an additional adapter.

Holographic Storage a Reality in 2006? - This Post - External Link

vitaly.friedman writes "What do you do when you're getting close to the limits of 2-dimensional optical technology? Well, how many dimensions do we have to work with?" From the Ars Technica article: "How much greater data density? In the Hitachi Maxell device, a single disc about 1 cm larger in diameter than a CD will buy you 300GB. By way of contrast, HD-DVD currently offers a maximum of 30GB on a 2-layer disc, and Blu-ray tops out at 50GB. Although upgrades are in the works that promise to increase the capacity of both of those formats, even the most pie-in-the-sky predictions fall short of what is planned for merely the first commercial generation of holographic storage. Future plans for that medium include boosting the capacity to 800GB in two years, and 1.6TB per disc by 2010."

Proxy Sites Offer Secret Passage to Myspace - This Post - External Link

As sites like MySpace.com gain popularity in young adults, schools all over are finding that taking measures to keep kids blocked out of these websites is becoming increasingly difficult. As this hype continues, proxy servers such as "Box of Prox" are springing up like wildfire. While system admins furiously work to diminish the strain placed on their school's local networks from sites like MySpace, these proxy sites are enabling easy access to restricted areas. However, schools aren't the only places that are feeling the heat. Proxies have also been becoming a bit of a complication in the workplace. To the more advanced user, the proxy server can become a tool for malicious intent as this article, delivering an anecdote with the termination of an employee, so poignantly details.

RSS and Web Feeds a Risk? - This Post - External Link

Reading blogs via popular RSS or Atom feeds may expose computer users to hacker attacks, a security expert warned.

Attackers could insert malicious JavaScript in content that is transferred to subscribers of data feeds that use the popular RSS (Really Simple Syndication) or Atom formats, Bob Auger, a security engineer with Web security company SPI Dynamics said in a presentation at the Black Hat security event here Thursday.

The problem doesn't affect only blogs—any kind of information feed using any kind of format could potentially be used to transmit malicious content to a subscriber, Auger said. Users, for example, could subscribe to mailing lists or news websites via RSS, he said, noting "this is about the entire concept of Web feeds."

SPI Dynamics examined a number of online and offline applications used to read RSS and Atom feeds. In many cases any JavaScript code delivered on the feed would run on the user's PC, meaning it could be vulnerable to attack, Auger said. JavaScript is a scripting language that experts say is increasingly causing security concerns.

Attackers could exploit the problem by setting up a malicious blog and enticing a user to subscribe to the RSS feed. More likely, however, they would add malicious JavaScript to the comments on a trusted blog, Auger said. "A lot of blogs will take user comments and stick them into their own RSS feeds," he said.

Also, attackers could send malicious code to mailing lists that offer RSS or Atom feeds and commandeer vulnerable systems that way, Auger said. Feeds are popular because they let people consolidate information streams from multiple sites, such as blogs, in one application, called a feed reader, removing the need to surf to multiple sites.

Many of the popular feed reading applications are faulted because the designers failed to add valuable security checks, Auger said. In particular, the applications should not allow JavaScript that is included in feeds to run. Instead, it should be filtered out, he said.

Additionally, some reader software on Windows systems uses Internet Explorer to display feed content, but doesn't use basic security settings that isolate the content. Instead, the JavaScript is downloaded to the PC and has full access, which can fully expose a user's PC, Auger said.

"A large percentage of the readers I tested had some kind of an issue," he said. In his presentation Auger listed Bloglines, RSS Reader, RSS Owl, Feed Demon, and Sharp Reader as vulnerable.

As protection, users could switch to a non-vulnerable reader. Also, feed publishers could ensure that their feeds don't include any malicious JavaScript or any script at all, Auger said. Some services, however, rely on JavaScript to deliver ads in feeds, he noted.

Friday, August 04, 2006

Man Diagnosed As Pregnant In Beijing - This Post - External Link

A Beijing hospital tested a man surnamed Yin for pregnancy as the patient underwent a urine test, the Star Daily reported Thursday.


A man surnamed Yin displays a urine test report, which shows that he tested negative for pregnancy.

Yin, 24, had a urine test and physical exam on July 26 at the Beijing Haidian Hospital. He was diagnosed as having an inflammation and started the corresponding treatment, the report said.

However, when he received his urine test reports several days later, he was astonished. On the paper was a bright red stamp that indicated he tested negative for early pregnancy.

"How can the hospital test a man for pregnancy?" Yin was quoted as saying.

He raised questions about the work ethics of the lab staff, as well as the reliability of early test results.

The official in charge of the testing department attributed the errors to his staff's failure to see the gender and test item when conducting the test.

The official apologized to Yin and offered him a free urine test.

But Yin demanded a refund for the test and treatment fees and compensation for missing work for a day to deal with the issue.

The hospital official said she would report the matter to her boss for a final decision.

Oops! Robber Leaves Check Book In Bank - This Post - External Link

A robbery suspect gave authorities a bit of help when he fled the scene of a noon holdup at People's Bank of North Alabama: He left his personal bankbook.

James Danny Lancaster, 64, of Cullman, was charged with first-degree robbery and remained in Morgan County Jail Tuesday on a $10,000 bond.

Information in the bankbook put investigators on Lancaster's trail. He was arrested less than 90 minutes after the holdup.

When an officer stopped Lancaster's car, police could see money bound by "Peoples Bank" bands inside it, officers said.

Chief Deputy Mike Corley said Lancaster took between $6,000 and $7,000 from a teller. Lancaster allegedly told tellers he had a gun, but he did not brandish a weapon and deputies said they did not find one during the traffic stop.

UK ISP PlusNet Accidentally Deletes 700GB of Email - This Post - External Link

UK ISP PlusNet Accidentally Deletes 700GB of Email. This is what they said in their official email:

This is a final update on the attempts to recover data following the major email platform issue on the 9th July 2006. For reference previous reports can be found at:
http://usertools.plus.net/status/archive/1152433794.htm
http://usertools.plus.net/status/archive/1153851234.htm

On the 9th July around 700GB of email was deleted. We have carried out further investigations in to the type of data that was contained in the emails. This investigation indicated that approximately 50% of these emails were identified as spam email, approximately 48% was email that had already been read, downloaded and a copy left on our servers with the remaining 1-2% of the email deleted being unread.

We have been working closely with the data recovery specialists who have been trying to recover the data on our behalf.

Due to the complexity of the task we have been unable to provide a reliable update on when recovery of data could be expected.

Our data recovery specialists have been able to provide a partial file list of the email data, but it has since become clear that we will not be able to recover the directory structure. Without the directory structure we cannot recover any meaningful data, due to complexity of associating the data with the relevant customer accounts.

I would like to take this opportunity to once again extend our sincerest apologies for the inconvenience caused by the loss of any customer emails and in particular the unread emails. This has been taken very seriously within PlusNet. An extensive analysis of how this happened has been carried out and working practices implemented to prevent it happening again.

A detailed technical account of the incident from our Network Services department can be read here:
http://usergroup.plus.net/forum/index.php/topic,2753.0.html

Kind regards,

Alistair Wyse
Technical Director.

Thursday, August 03, 2006

On To Goooooooooooooooooooooogle - This Post

Hello Readers,

I am a great fan of Google. I plan to blog on Google Services from today onwards. So keep reading for my reviews.

--
:)

x86 Days - This Post

Today, tomorrow and the next day are the only days we'll get dates like this: 2/8/6 3/8/6 4/8/6 like the x86 computers :-)


And that is true :)

Tomorrow you could be Invisible :) - This Post - External Link

It's unlikely to occur by swallowing a pill or donning a special cloak, but invisibility could be possible in the not too distant future, according to research published on Monday.

Harry Potter accomplished it with his magic cloak. H.G. Wells' Invisible Man swallowed a substance that made him transparent.

But Dr Ulf Leonhardt, a theoretical physicist at St Andrews University in Scotland, believes the most plausible example is the Invisible Woman, one of the Marvel Comics superheroes in the "Fantastic Four".

"She guides light around her using a force field in this cartoon. This is what could be done in practice," Leonhardt told Reuters in an interview. "That comes closest to what engineers will probably be able to do in the future."

Invisibility is an optical illusion that the object or person is not there. Leonhardt uses the example of water circling around a stone. The water flows in, swirls around the stone and then leaves as if nothing was there.

"If you replace the water with light then you would not see that there was something present because the light is guided around the person or object. You would see the light coming from the scenery behind as if there was nothing in front," he said.

In the research published in the New Journal of Physics, Leonhardt described the physics of theoretical devices that could create invisibility. It is a follow-up paper to an earlier study published in the journal Science.

"What the Invisible Woman does is curve space around herself to bend light. What these devices would do is to mimic that curved space," he said.

Courtesy: Reatures

Search Companies Team Up Against Click Fraud - This Post - External Link

The top three search companies, Google, Microsoft, and Yahoo, have teamed up to create an alliance to combat click fraud. The fact that these three bitter rivals can team up shows just how serious the industry has become about preserving the current online advertising boom that is currently underway. From the article:
"Click fraud has attracted an increasing amount of attention amid class-action lawsuits and industry studies asserting advertisers have been collectively overcharged by more than $1 billion for bogus sales leads during the past four years. Google and Yahoo contend that those estimates are gross exaggerations generated by opportunistic lawyers and online advertising consultants hoping to cash in on the anxieties triggered by their calculations."

Courtesy: Slashdot.

Hackers Clone E-Passports - This Post - External Link

A German computer security consultant has shown that he can clone the electronic passports that the United States and other countries are beginning to distribute this year.

The controversial e-passports contain radio frequency ID, or RFID, chips that the U.S. State Department and others say will help thwart document forgery. But Lukas Grunwald, a security consultant with DN-Systems in Germany and an RFID expert, says the data in the chips is easy to copy.

"The whole passport design is totally brain damaged," Grunwald says. "From my point of view all of these RFID passports are a huge waste of money. They're not increasing security at all."

Grunwald plans to demonstrate the cloning technique Thursday at the Black Hat security conference in Las Vegas.

The United States has led the charge for global e-passports because authorities say the chip, which is digitally signed by the issuing country, will help them distinguish between official documents and forged ones. The United States plans to begin issuing e-passports to U.S. citizens beginning in October. Germany has already started issuing the documents.

Although countries have talked about encrypting data that's stored on passport chips, this would require that a complicated infrastructure be built first, so currently the data is not encrypted.

"And of course if you can read the data, you can clone the data and put it in a new tag," Grunwald says.

The cloning news is confirmation for many e-passport critics that RFID chips won't make the documents more secure.

"Either this guy is incredible or this technology is unbelievably stupid," says Gus Hosein, a visiting fellow in information systems at the London School of Economics and Political Science and senior fellow at Privacy International, a U.K.-based group that opposes the use of RFID chips in passports.

"I think it's a combination of the two," Hosein says. "Is this what the best and the brightest of the world could come up with? Or is this what happens when you do policy laundering and you get a bunch of bureaucrats making decisions about technologies they don't understand?"

Grunwald says it took him only two weeks to figure out how to clone the passport chip. Most of that time he spent reading the standards for e-passports that are posted on a website for the International Civil Aviation Organization, a United Nations body that developed the standard. He tested the attack on a new European Union German passport, but the method would work on any country's e-passport, since all of them will be adhering to the same ICAO standard.

In a demonstration for Wired News, Grunwald placed his passport on top of an official passport-inspection RFID reader used for border control. He obtained the reader by ordering it from the maker -- Walluf, Germany-based ACG Identification Technologies -- but says someone could easily make their own for about $200 just by adding an antenna to a standard RFID reader.

He then launched a program that border patrol stations use to read the passports -- called Golden Reader Tool and made by secunet Security Networks -- and within four seconds, the data from the passport chip appeared on screen in the Golden Reader template.

Grunwald then prepared a sample blank passport page embedded with an RFID tag by placing it on the reader -- which can also act as a writer -- and burning in the ICAO layout, so that the basic structure of the chip matched that of an official passport.

As the final step, he used a program that he and a partner designed two years ago, called RFDump, to program the new chip with the copied information.

The result was a blank document that looks, to electronic passport readers, like the original passport.

Although he can clone the tag, Grunwald says it's not possible, as far as he can tell, to change data on the chip, such as the name or birth date, without being detected. That's because the passport uses cryptographic hashes to authenticate the data.

When he was done, he went on to clone the same passport data onto an ordinary smartcard -- such as the kind used by corporations for access keys -- after formatting the card's chip to the ICAO standard. He then showed how he could trick a reader into reading the cloned chip instead of a passport chip by placing the smartcard inside the passport between the reader and the passport chip. Because the reader is designed to read only one chip at a time, it read the chip nearest to it -- in the smartcard -- rather than the one embedded in the passport.

The demonstration means a terrorist whose name is on a watch list could carry a passport with his real name and photo printed on the pages, but with an RFID chip that contains different information cloned from someone else's passport. Any border-screening computers that rely on the electronic information -- instead of what's printed on the passport -- would wind up checking the wrong name.

Grunwald acknowledges, however, that such a plot could be easily thwarted by a screener who physically examines the passport to make sure the name and picture printed on it match the data read from the chip. Machine-readable OCR text printed at the bottom of the passport would also fail to match the RFID data.

Frank Moss, deputy assistant secretary of state for passport services at the State Department, says that designers of the e-passport have long known that the chips can be cloned and that other security safeguards in the passport design -- such as a digital photograph of the passport holder embedded in the data page -- would still prevent someone from using a forged or modified passport to gain entry into the United States and other countries.

"What this person has done is neither unexpected nor really all that remarkable," Moss says. "(T)he chip is not in and of itself a silver bullet.... It's an additional means of verifying that the person who is carrying the passport is the person to whom that passport was issued by the relevant government."

Moss also said that the United States has no plans to use fully automated inspection systems; therefore, a physical inspection of the passport against the data stored on the RFID chip would catch any discrepancies between the two.

There are other countries, however, that are considering taking human inspectors out of the loop. Australia, for one, has talked about using automated passport inspection for selected groups of travelers, Moss says.

In addition to the danger of counterfeiting, Grunwald says that the ability to tamper with e-passports opens up the possibility that someone could write corrupt data to the passport RFID tag that would crash an unprepared inspection system, or even introduce malicious code into the backend border-screening computers. This would work, however, only if the backend system suffers from the kind of built-in software vulnerabilities that have made other systems so receptive to viruses and Trojan-horse attacks.

"I want to say to people that if you're using RFID passports, then please make it secure," Grunwald says. "This is in your own interest and it's also in my interest. If you think about cyberterrorists and nasty, black-hat type of guys, it's a high risk.... From my point of view, it should not be possible to clone the passport at all."

Hosein agrees. "Is this going to be the massive flaw that makes the whole house of cards fall apart? Probably not. But I'm not entirely sure how confident we should feel about these new passports."

Grunwald's technique requires a counterfeiter to have physical possession of the original passport for a time. A forger could not surreptitiously clone a passport in a traveler's pocket or purse because of a built-in privacy feature called Basic Access Control that requires officials to unlock a passport's RFID chip before reading it. The chip can only be unlocked with a unique key derived from the machine-readable data printed on the passport's page.

To produce a clone, Grunwald has to program his copycat chip to answer to the key printed on the new passport. Alternatively, he can program the clone to dispense with Basic Access Control, which is an optional feature in the specification.

Grunwald's isn't the only research on e-passport problems circulating at Black Hat. Kevin Mahaffey and John Hering of Flexilis released a video Wednesday demonstrating that a privacy feature slated for the new passports may not work as designed.

As planned, U.S. e-passports will contain a web of metal fiber embedded in the front cover of the documents to shield them from unauthorized readers. Though Basic Access Control would keep the chip from yielding useful information to attackers, it would still announce its presence to anyone with the right equipment. The government added the shielding after privacy activists expressed worries that a terrorist could simply point a reader at a crowd and identify foreign travelers.

In theory, with metal fibers in the front cover, nobody can sniff out the presence of an e-passport that's closed. But Mahaffey and Hering demonstrated in their video how even if a passport opens only half an inch -- such as it might if placed in a purse or backpack -- it can reveal itself to a reader at least two feet away.

Using a mockup e-passport modeled on the U.S. design, they showed how an attacker could connect a hidden, improvised bomb to a reader such that it triggers an explosion when a passport-holder comes within range.

In addition to cloning passport chips, Grunwald has been able to clone RFID ticket cards used by students at universities to buy cafeteria meals and add money to the balance on the cards.

He and his partners were also able to crash RFID-enabled alarm systems designed to sound when an intruder breaks a window or door to gain entry. Such systems require workers to pass an RFID card over a reader to turn the system on and off. Grunwald found that by manipulating data on the RFID chip he could crash the system, opening the way for a thief to break into the building through a window or door.

And they were able to clone and manipulate RFID tags used in hotel room key cards and corporate access cards and create a master key card to open every room in a hotel, office or other facility. He was able, for example, to clone Mifare, the most commonly used key-access system, designed by Philips Electronics. To create a master key he simply needed two or three key cards for different rooms to determine the structure of the cards. Of the 10 different types of RFID systems he examined that were being used in hotels, none used encryption.

Many of the card systems that did use encryption failed to change the default key that manufacturers program into the access card system before shipping, or they used sample keys that the manufacturer includes in instructions sent with the cards. Grunwald and his partners created a dictionary database of all the sample keys they found in such literature (much of which they found accidentally published on purchasers' websites) to conduct what's known as a dictionary attack. When attacking a new access card system, their RFDump program would search the list until it found the key that unlocked a card's encryption.

"I was really surprised we were able to open about 75 percent of all the cards we collected," he says.


Courtesy: The Wired News

Tuesday, August 01, 2006

Sausage dog nearly hot dog - This Post - External Link

Fire fighters saved a daschund from a burning flat and kept him alive with first aid and an oxygen mask on Monday.

The daschund-cross puppy was overwhelmed by smoke when a fire broke out at 10:00 in the Aliwal block of flats on the corner of Nelson Mandela Drive and Aliwal Street in Bloemfontein.

Residents found the unconscious dog when they broke open the front door of the burning flat.

Firemen from the Mangaung fire brigade picked up the unconscious dog and carried it to safety, applying first aid in view of a small crowd of onlookers.

Fireman Paulus Mosia said they found the puppy lying in a passage on the eighth floor.

Mosia and another fire fighter carried the dog to safety and put an oxygen mask on the struggling dog while it kicked and gasped for breath.

They then raced the puppy to an animal clinic in the city.

Fichardt Park animal clinic veterinarian Dr V Metz said the daschund-cross ought to be fine in a few days.

The fire presumably started in a bedroom when a blanket fell over a heater and ignited. No one was injured and the damage to the flat was minimal.