Tuesday, October 7, 2008

Analysis: How will Android compare to the iPhone?


The G1, the first Android-based smart phone, has a lot to prove.


Nutilus Science & Technology News
By: Marco Ayllon
Dallas October 7,2008

Google’s Android is as an open-source operating system meant to give smart phone manufacturers a powerful platform on which to base their phones. It’s even been touted as a challenger to Apple’s iPhone OS.

But iPhone users have grown accustomed to thinking about phone hardware and software as part of a unified whole. So the first Android-running smart phone bears the burden of representing Android to the world. The Google-backed G1’s user experience will be a function of the HTC hardware, the Google Android platform, and service provider (T-Mobile) combined. How will the G1 (introduced last month and scheduled for release later this month) stack up next to the Apple gold standard?

“Apple’s business is to be three steps ahead of everyone else. Apple is still two steps ahead,” said Gene Munster, senior research analyst at investment bank Piper Jaffray, on the launch of the G1.

The hardware
The philosophy of the G1 device is straightforward. Begin with an iPhone-like touch screen-based smart phone, then add all the features that critics wish the iPhone had. And knock $20 off the 8GB iPhone 3G’s $199 price.

A trackball and flip-out QWERTY keyboard may appeal to business people used to typing on their BlackBerries. A memory slot will let you swap microSD memory cards, and a removable battery means you can carry a spare. And the G1’s 3-megapixel camera should be an improvement over the iPhone’s 2-megapixel camera.

Of course, all these extra slots, keys, and buttons carry a cost. At .62 inches thick and 5.6 ounces in weight, the G1 is more than 25 percent thicker and nearly 20 percent heavier than the iPhone 3G. If you’re a fan of the iPhone’s sleek, single-button approach, you could find the G1 a tad chunky and inelegant.

And then there are limitations. The G1’s touch screen doesn’t support multi-touch, and the unit’s accelerometer won’t recognize that you want to use the screen in landscape mode unless you open the keyboard. Also conspicuously absent from the G1 is a standard headset jack. So if you want to listen to music or watch video, you’ll need a special headphone adapter to connect to its proprietary design. (The original iPhone had a recessed headphone jack requiring an adapter for many third-party headphones; Apple ditched that design in the iPhone 3G.) Finally, the G1’s memory slot will only support expansion up to a maximum of 8GB—not very impressive when you consider that the iPhone 3G ships with 8GB standard for $199, or 16GB for $299. (You can, of course, buy multiple expansion cards for a G1.)

The service provider
Thankfully, T-Mobile has already backed off on a planned 1GB monthly data cap for G1 service. This should let users take better advantage of the smart phone’s capabilities. Unfortunately, when the G1 launches on October 22, T-Mobile’s 3G network will only cover 22 markets in the U.S., jumping to 27 in November. In comparison, AT&T’s 3G network covers more than 275 markets, with up to 350 covered by year’s end. (Like the iPhone, G1 users will have the option of using T-Mobile’s slower EDGE network, or existing Wi-Fi networks.)

The software platform
As you would expect from a Google-based smart phone, the G1 appears to do a very solid job integrating Google applications including Gmail, Google Talk, and most impressively, Maps. Google Maps’ Street View, coupled with the G1’s GPS capabilities, will actually pan the first-person perspective screen image as you pivot the phone, helping you orient yourself with photographic landmarks. (It is rumored that the next update to the iPhone software will include Street View as well.)

Buyers may be surprised to discover that the G1 does not ship with an extensive library of pre-installed software or games. It does come with a few neat apps such as ShopSavvy, which allows you to comparison-shop online by scanning product barcodes using the built-incamera. Ecorio will help you track your carbon footprint, and, unlike iPhone apps, it can actually run in the background. The Amazon MP3 store will let you browse millions of songs using the 3G network, but Wi-Fi is required to purchase and download music.

But don’t expect to be able to sync your G1 with iTunes. In fact, don’t expect to sync your G1 with your desktop computer at all. That could make life tough for Outlook users, and may scare away potential business users attracted by the device’s added keyboard.

New software will be available for download using the beta version of the Android Market, Google’s answer to Apple’s App Store. But analyst Gene Munster warns that users could find the process of downloading and installing Android apps significantly less straightforward than they have come to expect based on experience with Apple’s App Store.

Developer perspective
Apple has come under fire by iPhone developers for restrictive nondisclosure requirements (since lifted) and arbitrariness when it comes to selecting which applications to include in its App Store. Will frustrated developers jump eagerly to Google Android’s open-source approach? Carl Howe, enterprise research director for technology research and consulting firm Yankee Group, speculates that the opposite may be the case.

“From a developer’s point of view, [Android’s] openness is trumped by having a consistent platform,” said Howe. “With the iPhone, there’s one screen size. There’s one interface. The SDK is designed to make it really easy to develop software. But most importantly they have a way to monetize that software quickly.”

That said, Google Android’s open-source, free market approach means that canny developers could build in device functionality that service providers might now want—and that Apple may not allow to see the light of day.

So why are handset providers so fond of Google Android? By opting for Google’s open OS, manufacturers save $2 to $10 per unit, said Howe. “Android is for handset makers, and the iPhone is for users.”

The possibilities of Google Android’s open approach may be endless, but whether and when such possibilities are realized remains to be seen. For the foreseeable future, Apple’s seamless user experience gives iPhone the clear edge.

MySpace Agrees To Integrate HP Printing Services


Nautilus Science & Technology News
By: Marco Ayllon
Dallas October 7, 2008

The partnership allows MySpace users to print photos stored on their profiles; there are about 4 billion images posted on the social network.

Hewlett-Packard (NYSE: HPQ) on Tuesday said it has made a deal with MySpace to have HP printing services integrated across multiple areas of the online social network, including all photo sections. Financial terms were not disclosed.
The agreement, unveiled at HP's Annual Imaging and Printing Conference in San Diego, opens up MySpace's millions of users to HP, which can offer to print photos stored on MySpace profiles. About 4 billion images are posted on the social network.

"Sharing and storing photos online is integral to the social networking experience and one of the most popular activities on MySpace," Chris DeWolfe, chief executive and co-founder of MySpace, said in a statement.
The first stage of the partnership will have an HP-branded print button that enables MySpace users to preview and print photos directly from their profiles. That service will launch in November in the United States, Australia, Western Europe, and Canada. In the future, the companies plan to add the option of buying personalized merchandise with photos from MySpace.

MySpace, which is owned by News Corp., has more than 120 million users worldwide, including 76 million in the United States, according to ComScore.

MySpace has multiple partnerships with companies to bring services to users. Last month, the company launched a digital music service that enables users to stream music free or buy songs through a partnership with Amazon (NSDQ: AMZN).com. Since Amazon sells MP3s without digital rights management technology, users can play the songs on most devices, create their own playlists with up to 100 songs, and share their playlists with people who visit their profile pages.

Saturday, May 24, 2008

OLPC spinoff in talks with four laptop makers


Nautilus Sci/Tech News
May 24, 2008

The broad influence of the One Laptop Per Child initiative continues to expand its sphere.

Not long ago it was unclear whether the PC--originally conceived as a $100 laptop for children in developing countries--would ever become a reality after a long series of delays. Now the XO laptop seems on the verge of becoming a hot item, and all the research that went into it is leading down divergent paths.

Case in point: Walter Bender, who just left the OLPC initiative to start up its open-source software spinoff, is reportedly in "informal discussions" to get its Linux operating system on low-cost laptops made by four manufacturers. The nonprofit spinoff, Sugar Laboratories, is having discussions with Pixel Qi and is interesting in pursuing a relationship with Intel, Bender told BetaNews. No other companies were named, though he mentioned Asus on Sugar Labs' Web site last week.

It's only the latest permutation in a long-running saga that has seen infighting, resignations, and other controversy since the project's inception. Last month OLPC founder Nicholas Negroponte said the XO might switch from Linux to Windows XP, but that change remains to be seen. Stay tuned.

LifeLock Identity Fraud Service Finds Skeptics



Nautilus Sci/Tech News
May 24, 2008
It is, without a doubt, one of the great marketing stunts in recent memory.

Two years ago, Todd Davis decided to put his Social Security number in the television commercials and print advertisements for LifeLock, the company he helped found. For a fee of about $10 a month, LifeLock offers what it calls a “proven solution” that prevents its customers from becoming victims of identity theft and fraud.

By putting those nine digits on public display, Mr. Davis was trying to show the world how confident he was in LifeLock’s service. And it worked. Today, he has just over one million customers. In January, Goldman Sachs led a $25 million round of financing for the company. Last week, Google’s chief financial officer joined its board.

But Mr. Davis’s stunt also amounted to a dare, and one man in Texas has already succeeded in getting a payday loan in his name.

Regulators and lawyers have the company in their sights, too. The state of Oklahoma accused LifeLock of selling insurance without proper certification. New York City has announced its intention to sue the company. Class-action lawyers have filed federal and state lawsuits, charging deceptive business practices and fraudulent advertising, among other things.

All this raises a couple of basic questions: What are the chances that an identity thief can do you real harm? And if you feel vulnerable, do you need to spend $100 or more a year to protect yourself?

First, let’s check the odds. The latest Federal Trade Commission statistical survey about identity theft found that 8.3 million American adults, or 3.7 percent of the adult population, were victims in 2005.

But the majority of those people ran into problems as minor as having a thief use their credit card numbers. This type of fraud is annoying, but it rarely costs any money as long you notice it and let the card company know.

The scarier situation is something called new account fraud. Thieves steal your personal information and open credit card and other accounts in your name. When they don’t pay the bills, it is your credit history that is wrecked.

Thankfully, new account fraud is much less common. The Federal Trade Commission survey showed only 1.8 million people, or 0.8 percent of the adult population, had fallen victim to that kind of fraud or to other crimes such as criminals giving an innocent person’s name to an arresting officer or using it to rent an apartment.

As for the trend, the overall number of identity theft crimes appears to be falling. An annual survey by Javelin Strategy and Research shows the number of incidents falling 20.6 percent in the last four years. The research company does expect the incidence of new account fraud to rise in the next five years, but it predicts that the annual dollar amounts will fall.

With the risk fairly low but the pain of falling victim quite high, it is best to think of identity theft and fraud as an illness that you do not want to contract. Early detection is good, but prevention is much better.

That is where LifeLock wants to play. One significant service it offers places a 90-day fraud alert on your credit files with Equifax, Experian and TransUnion, the three biggest companies that track credit histories. You can do this yourself at no charge, though LifeLock renews the alert every 90 days, which is convenient.

If your credit file contains this type of fraud alert, any credit card company, bank or other entity so alerted is supposed to hit the pause button when reviewing most types of credit applications in your name. Then, the company is required to use “reasonable” procedures to make sure the applicant is really you.

And therein lies the hitch. A fraud alert is not a lock for your life at all. “It’s not a red flag, it’s a yellow flag,” says Steve Ely, president of personal information solutions for Equifax. “Fraud alerts do not prevent new account fraud, and it’s a shame that lots of competitors are suggesting that to the public and getting away with it.”

Instead, a fraud alert is more like a burglar alarm. And if the alert repeatedly fires off false alarms, forcing creditors to constantly double-check the identities of LifeLock customers who have never been victims of fraud, it is possible that those credit issuers will pay less attention to them. Experian is so worried about this, along with other issues, that it has filed suit against LifeLock.

Mr. Davis of LifeLock says he does not believe his company is contributing to the degradation of fraud alerts. The deterrent effect of so many alerts, he said, will cause thieves to find some other way to make a living. Sure, he said, fraud alerts make the application process more time-consuming and expensive for creditors. But it would make no sense for them to start ignoring the warning flags. “Go figure that costly expense versus the write-off for laptops and plasmas” that thieves would buy if the alerts did not stop them, he said.

LifeLock also offers a $1 million service guarantee. This sounds like insurance, but it is really just a warranty. LifeLock promises that if there is a defect in its own performance — say, it fails to initiate or reset a fraud alert — it will pay up to $1 million to restore your good name. In practice, Mr. Davis said, the company helps customers who run into trouble even when LifeLock is not at fault. There is no guarantee it will continue to do that, though Mr. Davis says the company’s good name depends on it.

But it is unlikely that LifeLock will ever pay anything near $1 million. It won’t, for instance, cover the difference between the interest rate you will pay if a thief’s activities destroy your credit score and the lower rate you should be getting. It will not pay for lost wages or reimburse you for the time you may need to deal with the issue, though it may hire people to help you. The guarantee, as the company states in its own terms and conditions, is “limited.”

Though LifeLock offers a few other services, they are not enough to make me a buyer, not at this price. I do count myself among the paranoid and prevention-minded, which is why I have a freeze on my credit files. This is one (big) step beyond fraud alerts, since credit freezes lock your files so that no new creditor can get to them. It’s the closest thing to a silver bullet against new account fraud that exists at the moment — unless you live off the grid.

It is also a mild pain. You usually have to pay a small fee to each credit bureau for the freeze and pay for temporary thaws whenever somebody needs to look at your files. And you have to call the agencies with passwords in advance when you do want to grant access. You may need to do this a few times each year.

If you don’t want to spend anything, there is plenty you can do to drop your risk far below the 0.8 percent that the government figures suggest.

Lock your mailbox. Switch from paper bills. Shred confidential mail and credit card pitches. Secure your paper files. Do not carry paper checks or a Social Security card every day, lest you lose them. Be especially meticulous if a relative or others close to you are having financial or substance abuse problems.

Sunday, May 11, 2008

Windows XP SP3 Is Not Bug-Free


Nautilus Sci/Tech
May 11, 2008

With just a few days from its official release, the Windows XP Service Pack 3 is already receiving a large numer of post-instalation complaints.

Apparently, the up-date causes a series of problems, from random blue-screens to continuous reboots.

Jesper Johanson, a former program manager for security policy at Microsoft, who now runs a Windows blog, explained the situation in one of his recent blog posts:
"At this point, I want to clarify that the endless rebooting is not at all related to SP3 per se. The problem is that with some configurations, SP3 causes the computer to crash during boot, and Windows XP, by default, is set up to automatically reboot when it crashes. That is why you end up in the endless rebooting scenario."

According to Mr. Johanson, the easiest solution is to disable the "automatic restart on system failure" option, while operating in safe mode.

Errors and system failure are quite common with Microsoft’s service packs and usually, answers and solutions become available on a very short term.

Microsoft also announced that the installation of the XP SP3 will not allow users to downgrade from Internet Explorer 7 to IE 6.

The company stated that a series of tests and investigations are being conducted and as soon as results will show, the customers will be immediately informed. Also, through one of it’s officials, Microsoft asked its buyers to contact the Microsoft Customer Support Service on any issues concerning the Windows XP SP3 installation.

Google Gains on Microsoft With Hosted Security Offering




Nautilus Sci/Tech
May 11, 2008

With every Google enterprise announcement Microsoft must hear the war drums beating.

Sure, Google owns the search market. And, as a result, the company is the online advertising leader. But Microsoft has all those Windows desktops out there, and owns the corporate market, right?

Well, maybe not for long.

Sure, software as a service and cloud computing don't sound as sexy as free e-mail and pay-per-click, but they are the wave of the future, experts say.

On Thursday, Google unveiled a re-branded Web Security for Enterprise based on the Postini technology it acquired last year. The Web-hosted service protects corporate Web and e-mail users from viruses, spyware, and malicious Web sites, and extends protection directly to remote workers if needed.

This is all part of Google's hosted apps business, but targeted at corporate customers instead of consumers who expect--and get--hosted services for free, at least for now.

By putting traditional desktop applications, e-mail, word processing, and calendars into the cloud, Google relieves corporations of the administrative burden of having to buy hardware, install software, and hire people to maintain it.

This greatly reduces the costs for corporations and allows them to focus on their core businesses. And by beefing up the security of its hosted offerings, Google has removed a large impediment to widespread corporate adoption of its hosted services.

"Securing the current enterprise environment is futile," Philippe Courtot, chief executive of Qualys, which offers security as a service to corporations, said in an interview on Friday. "This is a problem Microsoft should have fixed a long time ago."

With an arsenal of search, Web-hosted apps and the advertising-supported "money-making machine...Google is going to kill Microsoft," he predicted.

Google's offering is compelling for corporations because of the ease with which they can be up and running without any IT headaches, says Nitesh Dhanjani, senior manager and leader of application security services at Ernst & Young.

"Microsoft says 'here's the software.' Google says 'it's already there; we just create the accounts and you can start today,'" Dhanjani says. "We're seeing, from an IT perspective, that in the next couple of years services will move into the cloud, even security services, so Google is really thinking ahead."

Microsoft certainly recognizes this trend. The company turned its FrontBridge acquisition into Microsoft Exchange Hosted Services, which includes security. But the software giant doesn't have a pure, software-as-a-service-based messaging security platform like Google or MessageLabs, says Paul Roberts, senior analyst for enterprise security at The 451 Group.

"Microsoft clearly sees the light that the Web and the Internet are the OS (operating system) of the future and that selling shrink-wrapped software isn't going to be feasible," Roberts says.

Peter Firstbrook, a program director at Gartner, summed it up this way: "I wouldn't ring the bells yet, but it is another feather in Google's cap; another service they can offer so that they become more strategic to their customers."

Stolen Laptop, Knowledge & Software Helps Turn Tables on Suspects

White Plains Police Department,
Edmon Shahikian, top, and Ian Frias were arrested.

Nautilus Sci/Tech
May 10, 2008

WHITE PLAINS — The thieves were voracious, filching flat-screen televisions and computer games, purloining iPods and DVDs, even making off with a box of liquor and a set of car rims in a burglary two weeks ago at an apartment three young people shared here. Luckily, they also took two laptop computers.


One of the laptops was a Macintosh belonging to Kait Duplaga, who works at the Apple store in the Westchester mall and thus knows how to use all its bells and whistles. While the police were coming up dry, Ms. Duplaga exploited the latest software applications installed on her laptop to track down the culprits and even get their photographs.

On Wednesday, the police arrested Edmon Shahikian, 23, of Katonah, and Ian Frias, 20, who lives in the Bronx. Virtually all of the property stolen from the apartment was recovered at the two men’s homes. They face charges of burglary and possession of stolen property; Mr. Shahikian was released on $3,500 bail, while Mr. Frias was at the Westchester County Jail, held in $7,500 bail.

“It doesn’t get much better than their bringing us a picture of the guy actually using the stolen property,” Daniel Jackson, the deputy commissioner of public safety in White Plains, said in a telephone interview on Friday. “It certainly made our job easier. The fact that they knew who these guys were certainly added solvability.”

The high-tech solving of the White Plains burglary, which was reported Friday in The Journal News, is one of several recent cases in which the police and crime victims have turned the keyboards on their adversaries, so to speak, taking advantage of computer software and other high-tech tools.

In March in Modesto, Calif., for example, the police recovered a stolen computer containing vital personal information, including Social Security numbers, belonging to the public school system’s 3,500 employees. Detectives used tracking software on the computer to apprehend a suspect, who had a long criminal record. The police said he had stolen the computer from a data processing firm, perhaps with the intention of committing identity theft.

Here in White Plains, a break in the case came on Tuesday when a friend of Ms. Duplaga’s sent her a congratulatory text message on the return of her stolen computer. “She said, ‘I don’t know what you’re talking about,’ and her friend said, ‘Well, you popped up as being online,’ ” Mr. Jackson said.

He said that Ms. Duplaga immediately signed on to another Macintosh computer and, using a feature called “Back to My Mac,” was able to gain access to her missing laptop remotely. She could see that that the person who had her computer was shopping for beds, Mr. Jackson said. Then it occurred to her that she could activate a camera on her laptop and watch the thief live.

At first, the photo application revealed only a smoky room and an empty chair, Mr. Jackson said, but then a man sat down. Ms. Duplaga, again using remote technology, typed in the command to snap a photo. “When you take a picture with that computer, it shows a countdown, and when it does, this guy figures out what’s going on,” Mr. Jackson said. “It all clicks for him, and he puts his hand up to cover the lens, but it was too late. She had already taken the picture.”

Had the suspect been a complete stranger, the photographic evidence would have been a “great lead,” but not the decisive clue, Mr. Jackson said. He said that when Ms. Duplaga described the tattooed subject of the picture to one of her roommates, the roommate replied: “Oh, I know exactly who that is — it’s Ian,” referring to Mr. Frias.

Mr. Frias and Mr. Shahikian, it turns out, had been among the guests at a party at the apartment weeks before, and were friends of friends of the victims, as Mr. Jackson put it. Ms. Duplaga was able to retrieve a photograph of Mr. Shahikian from the laptop as well, but Mr. Jackson was not aware of the circumstances. Mr. Jackson said that Mr. Frias and Mr. Shahikian were arrested last year on a felony marijuana possession charge, but are not career criminals. The disposition of their cases was not known.

Mr. Jackson said that Ms. Duplaga did not wish to be interviewed. On Friday, no one answered the door at the beige colonial-style house on Ridgeview Avenue where she rents an apartment diagonally opposite a church. The neighborhood is on the edge of the city’s downtown; in recent years, many of the prewar homes have been renovated.

An Apple spokesman declined to comment on the case or on the phenomenon of tracking criminals through computer software.

“Back to My Mac” is part of an online service that costs $99 per year and allows users to gain access to their personal computer from any connected Macintosh computer with the operating system Leopard. The software that Ms. Duplaga used to take a picture of the thief, called PhotoBooth, is standard on all newer Apple laptop models, perhaps an unintended new frontier in crime-fighting.

“It’s certainly a great use of what was probably meant as a business product,” Mr. Jackson said. “But if she had taken the picture and didn’t know who he was, we wouldn’t be in the same place as far as the investigation goes.”