View Single Post
Old 13-04-06, 12:10 PM   #1
JackSpratts
 
JackSpratts's Avatar
 
Join Date: May 2001
Location: New England
Posts: 10,016
Default Peer-To-Peer News - The Week In Review - April 15th, ’06


































"I was the longest holdout for the crank being on the laptop. I was wrong. If you're a 10-year-old, maybe you can get your four-year-old to pedal for you." – Nicholas Negroponte


"This case is not about me, it's not about Apple, and it's not about the technology industry. It's about the First Amendment." – Jason D. O'Grady


"(The) fact that trade secrets can be assigned or transferred does not mean that they constitute intellectual property." – European Commission


"save the crank!" – jack spratts
























save the crank!

to: nicholas negroponte, mit

nicholas,

seriously, the cool quotient is way too high to let that one go.

without it looks like just another piece of (very) cheap iron.

the crank captures the imagination and elevates the whole project.

it fires desire. it's 3/4 of the wow factor!

i'm writing this on a thinkpad, but i'd swap it for the crank!

save the crank! :)

cheers,

jack spratts
























April 15th, ’06





Fifteen Arrested In Operation Against Illegal Fire Sharing On The Internet
h.b.

Fifteen people have been arrested in a large scale National Police operation against the sharing of P2P archives over the Internet.

The case is unheard of in Europe but sees 15 arrests after people used the Emule, Bittorent, Edonkey and Asureus file share programs.

They had established domains such as www.emule24horas.com and www.pctorrente.com and are thought to have generated an income of more than 900,000 € by the illegal sharing of films and programs. 17 web pages have now been blocked.

The arrests have been criticised by the Spanish Internet Users Assocaition, who described the case as ‘hardly serious’, while the Spanish copyright organisation SGAE have described the arrests as good news.
http://www.typicallyspanish.com/news...cle_3626.shtml





The Hole

British 'Hacker' Fears Guantanamo

A British man accused of being behind the largest ever hack of US government computer networks could end up at Guantanamo Bay, his lawyer has claimed.

Gary McKinnon, from London, denies causing $700,000 (£400,000) damage to military and Nasa systems in 2001-2.

Bow Street Magistrates' Court was told the 40-year-old feared a prosecution might take place under US anti-terror laws if it agreed to his extradition.

The US said Mr McKinnon had assurances he would be tried in a federal court.

But defence lawyers said his human rights could be breached if he was sent to the US.

Mr McKinnon was remanded on bail until 10 May when District Judge Nicholas Evans will rule whether the extradition will go ahead.

'Administrative revenge'

Much of the hearing was taken up with argument over whether Mr McKinnon would be subject to Military Order Number One - a legal procedure which enables the president to specify that suspects can be detained indefinitely.

Mark Summers, representing the US government, said there was no precedent to suggest the US would breach its promises, and the court should take on "faith" the undertaking.

Defence lawyer Edmund Lawson said the US Embassy in London had provided an "unsigned and anonymous" diplomatic note and said Mr McKinnon was still "vulnerable" to such an order.

He said the US had not given a guarantee he will face a federal court trial.

"The US government wants to extract some kind of species of administrative revenge because he exposed their security systems as weak and helpless as they were," Mr Lawson added.

Mr McKinnon is accused of hacking into computers in 14 states, including at the Pentagon and naval weapon station Earle.

At an earlier hearing his lawyers suggested his actions were not malicious - he had been trying to expose lax computer security and access what he believed was withheld information about UFOs.
http://news.bbc.co.uk/go/pr/fr/-/2/h...ws/4905036.stm





F.B.I. Files Link Big Film Names to a Detective
David M. Halbfinger and Allison Hope Weiner

The chairman of Paramount Pictures and a onetime Hollywood superagent had far more direct dealings than they have acknowledged publicly with the celebrity detective at the center of a rapidly expanding wiretapping scandal, according to government evidence.

Brad Grey, Paramount's chairman, told the F.B.I. that he spoke with Anthony Pellicano about two lawsuits in which Mr. Pellicano, a private detective, was working on Mr. Grey's behalf, and that he learned information about his legal opponents directly from Mr. Pellicano. A former employee of Mr. Pellicano, who was charged in February with wiretapping and conspiracy, separately told the F.B.I. that Mr. Grey had met with the detective at least five times.

Publicly, Mr. Grey has said that he was only "casually acquainted" with Mr. Pellicano, and that his lawyers were responsible for hiring and overseeing the detective.

Michael S. Ovitz, a former talent agent and Hollywood powerhouse who served as the head of the Creative Artists Agency and was once president of the Walt Disney Company, acknowledged to the F.B.I. that he paid Mr. Pellicano in April or May of 2002 to obtain information on 15 to 20 people who were saying negative things about him. They included former business associates and Bernard Weinraub, then a reporter for The New York Times who was reporting on the demise of a company Mr. Ovitz started after he left Disney, and Anita Busch, a freelance reporter who wrote with Mr. Weinraub.

A lawyer for Mr. Ovitz, Bart H. Williams, denied that Mr. Ovitz had given Mr. Pellicano a list of anyone to investigate except the people who were suing him. If Mr. Pellicano "went out and used illegal means to get information that he thought would impress Mr. Ovitz, that was not done with Mr. Ovitz's knowledge and consent," he said.

The federal investigation, set off by a threat against Ms. Busch in June 2002, has since sent shock waves through entertainment and legal circles here. Who, exactly, initiated the threat has not been established. But the government's questioning of the two Hollywood executives — who maintain they are witnesses in the case, not targets — shows authorities circling the heavyweight entertainment lawyer Bert Fields, who worked for both.

Mr. Ovitz has not publicly acknowledged directing Mr. Pellicano to investigate Mr. Weinraub or Ms. Busch. In February, Mr. Ovitz's lawyer, James Ellis, said that Mr. Pellicano's use of law enforcement databases for checks on the two reporters, which prosecutors say was illegal, "wasn't done at our direction."

Mr. Fields, the entertainment lawyer, has acknowledged being a subject of the investigation, but, like Mr. Grey and Mr. Ovitz, has said he had no knowledge of illegal activity.

Summaries of F.B.I. interviews seen by The New York Times — documents that are routinely compiled as the raw material of investigations — give no indication that Mr. Grey or Mr. Ovitz knew Mr. Pellicano had used illegal means. But they paint a picture of their hands-on dealings with the disgraced detective.

Thus far, 14 people have been charged in the case, including the entertainment lawyer Terry N. Christensen, who has pleaded not guilty, and John McTiernan, a film director who has not yet entered a plea to a charge that he lied to the F. B. I. Mr. Grey, who headed the entertainment company Brillstein-Grey until being named chairman of Paramount in January 2005, described his interaction with Mr. Pellicano in two interviews, the second of which, on Jan. 14, 2004, told a story fuller and somewhat different from the first, which occurred on July 17, 2003. Carl H. Moor, a lawyer for Mr. Grey, said Mr. Grey had been able to say more in the second interview because at that point his "lawyers allowed him, at the request of the government, to talk about privileged communications, therefore he was at liberty to provide a more fulsome description of these matters."

Mr. Grey was questioned by the authorities about two lawsuits in which Mr. Pellicano was hired: one by his former client Garry Shandling, the comedian, who accused Mr. Grey of enriching himself at Mr. Shandling's expense, and another by a writer, Bo Zenga, who said Mr. Grey cut him out of the profits from "Scary Movie."

In his first interview, Mr. Grey told F.B.I. agents and prosecutors that he met Mr. Pellicano around 1996 in the Sunset Boulevard office building where Mr. Pellicano's detective agency and Brillstein-Grey then were neighboring tenants. Mr. Grey said he knew Mr. Pellicano enough to say hello in the hallway. Mr. Grey said he could not recall if he knew of Mr. Pellicano's association with Mr. Fields before the Shandling lawsuit, which was filed in 1998.

But Mr. Shandling, in his own F.B.I. interview, said Mr. Grey had urged him to hire Mr. Fields "and a private investigator who worked with Fields by the name of Anthony Pellicano" in 1996, when Mr. Shandling was sued by a former girlfriend and employee, Linda Doucett. Mr. Grey proposed that "Fields and Pellicano would '[dig] up dirt' " on Ms. Doucett, Mr. Shandling told agents.

In his first interview, Mr. Grey, who told investigators he was unaware of Mr. Pellicano's use of any intimidation tactics, repeatedly called Mr. Pellicano a "colorful character," and once called him "warm." Regarding the Shandling lawsuit, which was filed in 1998 and settled in 1999, Mr. Grey said he could not remember why Mr. Pellicano had been hired or any specific instructions Mr. Fields had given him.

But in the second F.B.I. interview, six months later, Mr. Grey said Mr. Fields had hired Mr. Pellicano to investigate an allegation that Mr. Shandling had a drug dependency, and to determine how a draft of a libel lawsuit against Mr. Shandling had been leaked to a magazine.

In November 2003, between Mr. Grey's two interviews, Mr. Fields publicly disclosed that he was a subject of the federal investigation of Mr. Pellicano. In Mr. Grey's subsequent F.B.I. session, he expounded upon Mr. Fields's ties to Mr. Pellicano, saying "Fields and Pellicano shared a 'key relationship,' that Pellicano was frequently used by Mr. Fields, and that Mr. Pellicano was 'part of Fields's team.' "

Mr. Grey told the F.B.I. in July 2003 that he could not recall ever speaking by phone with Mr. Pellicano during the Shandling dispute. But in January 2004, Mr. Grey said Mr. Pellicano called him "from time to time to talk about the case and the Hollywood scene." Mr. Grey said Mr. Pellicano mainly told him to "stay strong and not settle" with Mr. Shandling, and that Mr. Grey conveyed Mr. Pellicano's advice to Mr. Fields, his lawyer, who told him to ignore it.

Mr. Grey — who told agents he had worked with Mr. Pellicano on a proposal for a television series about a private detective — said in the July 2003 interview that he did not recall any face-to-face meetings with Mr. Pellicano about the Shandling case. The F.B.I. summaries do not contain any mention by Mr. Grey of any substantive meetings with Mr. Pellicano over the years.

But a month after the July 2003 interview, when a former employee of Mr. Pellicano, Lilly LeMasters, who said she worked for him from 1996 until April 2001, was asked by the F.B.I. if she recognized Mr. Grey's name, she remembered him as a Pellicano client who was "very arrogant." Ms. LeMasters said she did not know the details of the case but had seen Mr. Grey in Mr. Pellicano's office twice; she also said Mr. Pellicano visited Mr. Grey's office three or four times.

Mr. Moor, the lawyer for Mr. Grey, said: "As Mr. Grey told the government, a prominent agent and director worked with Anthony Pellicano to pitch a television program to Brillstein-Grey, and it was only in connection with that effort that Mr. Pellicano and others on that project met at the offices of Brillstein-Grey. Mr. Grey has never been to Mr. Pellicano's office."

In the January 2004 interview, Mr. Grey also told the authorities he did not recall Mr. Pellicano's ever saying anything indicating that he had inside knowledge from the Shandling camp. But Mr. Grey said he did once hear Mr. Pellicano say Mr. Shandling was driving his lawyers crazy. He said one did not have to be particularly close to Mr. Shandling "and his people to make that observation."

While Mr. Grey minimized his interactions with Mr. Pellicano, Mr. Ovitz told the F.B.I. that "he had expected to be contacted given his prior relationship with Pellicano," the interviewing agents wrote.

Mr. Ovitz said he had heard of Mr. Pellicano for years "around the campus," as he called Hollywood, and that some of his clients had used the detective. Mr. Ovitz said Mr. Pellicano called him a few times a week, presumably to drum up business, but that he did not return the calls.

Mr. Ovitz said he first met Mr. Pellicano in 2001, when Artists Management Group — the vehicle Mr. Ovitz had used to attempt a comeback as a talent manager — was disintegrating. He said he hired Mr. Pellicano to help with lawsuits by a former employee and by a sports agent demanding a commission, and paid Mr. Pellicano $25,000 for each case through the firm handling the lawsuits, Gorry Meyer & Rudd.

Mr. Ovitz said that at Mr. Pellicano's direction, Mr. Ovitz used the code name Gaspar when calling Mr. Pellicano's office. Mr. Ovitz told the F.B.I. he was ignorant of Mr. Pellicano's methods and unaware of any wiretapping, but he said he was impressed by Mr. Pellicano's "initiative and resourcefulness."

Mr. Ovitz said he believed that Mr. Pellicano was also investigating him, to drum up business; he complained of telephone problems and provided the F.B.I. agents his phone numbers.

In April or May 2002, as he was negotiating and completing the sale of Artists Management, Mr. Ovitz learned that a "group of people" were "coming after" him to attack his reputation, he told the F.B.I., and he hired Mr. Pellicano to investigate. He said he asked Mr. Pellicano for embarrassing information about 15 to 20 people who were affecting his plans to sell the business, including Ron Meyer, his former partner at C.A.A. and the current head of Universal Studios; Mr. Weinraub; and the entertainment titan David Geffen, a partner in DreamWorks. Asked if Ms. Busch was on the list, Mr. Ovitz said she was. In May 2002, Mr. Ovitz said, Mr. Pellicano obtained for him an unedited, advance copy of a Vanity Fair article to be published that August in which Mr. Ovitz attributed his problems to a "gay mafia" in Hollywood. The agents noted that Mr. Ovitz "claimed to have never read" the article.

Mr. Ovitz told the F.B.I. that he met three or four times with Mr. Pellicano and spoke "multiple" times with him in June and July of 2002. Mr. Ovitz said he received an oral report about Mr. Weinraub, Ms. Busch and Mr. Geffen, but all Mr. Ovitz said about the report was that Mr. Pellicano called Ms. Busch "boring and not worth [Ovitz's] time." When Mr. Pellicano claimed he had worked for Mr. Geffen in the past, doing "damage control" relating to "Geffen's gay lifestyle," Mr. Ovitz told the F.B.I., he wondered what Mr. Pellicano might say about him.

Mr. Ovitz said he paid Mr. Pellicano $75,000 in cash, the last payment in late June or early July 2002.
http://www.nytimes.com/2006/04/14/bu... tner=homepage





Atom heart mother

IBM Unveiling New Encryption Chip
Brian Bergstein

In an effort to boost the level of data security on portable computers, cell phones and other gadgets, IBM Corp. is unveiling a method for injecting encryption capabilities into the heart of the machines' circuitry.

There are multiple ways to achieve encryption, the mathematical art of encoding data to protect it from spying eyes. Specialized software can do the trick, as can hard-wired chips inside computers.

But IBM researchers contend that unless the encryption function is performed by a computer's central processing unit, a supremely savvy hacker can tap into the pathway between the machine's brain and the separate encryption engine.

To guard against that, IBM is announcing Monday that it has developed "SecureBlue" - a set of encryption circuitry that can be integrated into any processor, regardless of its manufacturer.

"This thing is trying to be one of the most paranoid devices on the planet," said Charles Palmer, IBM's head security researcher.

IBM is not the first to seek to integrate encryption into a computer's central processing functions. Intel Corp.'s upcoming "LaGrande" technology essentially does that, though it requires interaction with a separate chip, known as a trusted platform module.

The IBM researchers say they have developed a way to skip that step.

Richard Doherty, an analyst with the Envisioneering Group, said SecureBlue's design appears flexible enough to bring strong encryption to such new settings as cell phones and music players.

That could mean enhanced security not only for users who keep sensitive data on portable devices, but also for content owners who can use encryption to lock down copyrighted material and prevent it from being freely disseminated.

However, IBM's encryption engine is not simply a module that can be plugged into existing chips. SecureBlue needs to be woven into a processor from scratch, mixed in with other transistors somewhat "like hamburger," in the description of Bernie Meyerson, chief technologist for IBM's systems group.

That means SecureBlue, at least for the time being, likely will end up only in devices made by companies that hire IBM's custom engineering unit. That group's projects include chips for medical and defense systems and video game consoles made by Microsoft Corp., Nintendo Co. and Sony Corp.

IBM researchers said SecureBlue already has made its way into one customer's devices. But they said that company had demanded anonymity.

Considering that software vendors such as PGP Corp. already offer software-based encryption for portable devices such as BlackBerrys, IBM might have to convince skeptics that SecureBlue significantly raises the bar for security.

Bruce Schneier, founder of Counterpane Internet Security Inc., said more fully integrating encryption and processing would likely improve a machine's performance. But he said it was "just stupid" to claim that hackers would otherwise target the transmission between a computer processor and a separate encryption engine.

Far more likely, he said, is for someone to try to steal data when it was unencrypted - such as when it appeared in plain text on a computer screen.

"Security is a chain and it's as strong as its weakest link," he said. "They're talking about taking a very strong link and making it a little bit stronger, at best. Maybe."
http://hosted.ap.org/dynamic/stories...LATE=DEFAUL T





Blow to BitTorrent

Disney to Offer Free Online Shows

A published report says the Disney Company plans to start making some of its most popular programming available free on the Internet.

The Wall Street Journal says shows like "Desperate Housewives" and "Lost" would be available on a revamped Web site the morning after they air. The report says shows would be archived so viewers can eventually watch an entire season of shows from outlets including ABC and Disney Channel.

New technology would be aimed at preventing viewers from fast-forwarding through commercials, in an effort to keep advertisers happy.
http://hosted.ap.org/dynamic/stories...LATE=D EFAULT





Free Net TV Threatens Telecoms And Cable
Marguerite Reardon

Walt Disney's bold move to let people download TV shows for free could spell trouble for cable and satellite providers, but it also throws into question the strategy of telephone companies spending billions to get into the paid TV business.

On Monday, Disney-owned ABC announced plans to put "Lost," "Desperate Housewives," "Alias" and "Commander-in-Chief" on the Internet for free as part of a two-month trial beginning in May. The Net-accessible episodes, which will be available the day after the shows air, will be archived so viewers can watch any shows they miss.

Viewers will access the shows on the ABC Web site where they'll be able fast-forward, pause and rewind entire episodes. Short commercials will be aired with the programs; viewers will not be able to fast-forward through them.

Disney's ABC has been at the forefront of experimenting with new ways to distribute content over the Internet. Last year, it struck a deal with Apple Computer to sell individual episodes of some of its popular shows via the iTunes Music Store for $1.99 per episode. The two other major networks, NBC and CBS, soon followed suit by offering programs of their own on iTunes.

While the iTunes deal may have been a harbinger of bigger things to come in the realm of fee-based content downloads, Disney's move to offer shows for free on the Internet could be viewed as a direct threat to the business model of cable companies, which have been the gatekeepers of television programming in America for the last few decades. The news is equally grim for phone companies, especially Verizon Communications, which is aggressively moving into the TV business.

Over the past two years, Verizon has spent billions of dollars to build a fiber network directly into people's homes that can deliver a triple-play package of services including ultra-fast broadband, phone service and TV. It has bet the farm, so to speak, that the best way to compete against the cable companies, which are now offering phone service, is to try and beat them at their own game. But building and upgrading telecom networks for video is a capital-intensive strategy fraught with risks.

Disney's plans "raise big questions for the phone companies' long-term strategy," said Joe Laszlo, an analyst with JupiterResearch. "To some extent, building a faster network is smart no matter how content delivery evolves. But if we reach a point in five to 10 years when video over the Internet becomes a bigger part of how we consume video, then the phone companies will have to find other ways to make their video services relevant."

No one is expecting Internet television to cannibalize traditional TV models overnight. Despite advancements in streaming technology, video delivered on the Web can still be choppy, with frequent interruptions as data packets buffer and reload on the screen. In fact many viewers who watched the NCAA tournament aired by CBS on the Internet last month complained about the network being overloaded.

No panic among telecoms
A Verizon spokeswoman said the company does not feel threatened by Disney's move to offer some of its shows on the Web. And executives at the National Cable and Telecommunications Association convention in Atlanta this week also said they aren't especially worried about Disney's plans.

"It's speculative to assume people will abandon one model in favor of another," said Sharon Cohen-Hagar, a spokeswoman for Verizon. "That's quite a leap into the future. Given the kind of network we are building, we believe we're well positioned to go wherever the market takes this."

Indeed, Verizon, as well as the entrenched cable operators, are already offering on-demand programming that lets viewers select movies or TV shows and watch them whenever they want. They are also offering consumers digital recording services that let them record programs and watch them at a later time.
But advancements in technology could eventually eliminate the need for consumers to subscribe to a third party such as a cable operator or a telephone company to schedule programming. Companies such as Kontiki and EdgeStream are improving the quality of streaming video on the Net. And others such as Cisco Systems and Microsoft are working on products that will let people watch video downloads from the Net on their TVs.

These advancements, coupled with the fact that broadband penetration continues to grow, makes it possible for millions of people to watch TV directly from the Internet. In 2005, roughly 55 percent of all online users had broadband, according to JupiterResearch. That figure is expected to reach 69 percent by 2010.

A step toward a la carte
If content providers are willing to distribute their shows over the Internet themselves, viewers could simply use a search engine to find what they want to view, and then watch it directly from the Internet anytime they want.

Clearly Disney's move signals that content owners are feeling more comfortable about Internet distribution. Others have also started distributing video over the Net.

Warner Bros., for example, has teamed with AOL to distribute classic sitcoms such as "Growing Pains" and "Welcome Back Kotter." In March, CBS offered free online streaming of the NCAA basketball tournament. In November, NBC started offering its Nightly News broadcast on the Web for free after the newscast airs on TV. MTV's Comedy Central also launched a site called MotherLoad in November that offers clips of existing shows and airs new shows only available on the Web site.

And just last week, a group of Hollywood studios said they will sell digital versions of films such as "Brokeback Mountain" and "King Kong" through Movielink.com and CinemaNow with certain restrictions.

While experts agree that most people will continue to subscribe to a paid TV service for a long time coming, some research indicates there is consumer appetite to watch downloaded content from the Internet.

Parks Associates predicts that roughly 60 percent of broadband users will be downloading some video a la carte from the Web in 2010. These estimates were calculated when it was assumed that people would pay $1.99 an episode to download shows from iTunes, according to Kurt Scherf, vice president and principal analyst with Parks Associates. The figure could be even higher if content is offered for free, as Disney plans to do. Today, only about 3 percent of broadband subscribers download video from the web.

Increased competition in the video market from Internet-based video services could cause network operators to look for other ways to make money, added

"Even though Disney is delivering content independently of the cable operator or the telephone company, it would be interesting to see if network providers respond by blocking content," he said.

The issue referred to as Net neutrality centers on whether carriers should be able to charge different fees to content providers who access their network. For weeks, the topic has been hotly debated in the industry as lawmakers draft legislation that addresses the issue.

"I think Disney's move could open up this debate even more," Laszlo said. "I wouldn't be surprised if we saw large media companies getting into the debate soon."
http://news.com.com/Free+Net+TV+thre...3-6060306.html





Jury Awards TiVo $73 Million in Patent Case

A federal jury awarded TiVo more than $73 million in damages on Thursday in a patent infringement lawsuit against EchoStar Communications over a recording device.

TiVo received most of the $87 million in damages it sought in a case that one lawyer called "life or death" for the company that was among the first to sell devices to pause and rewind live television.

The case in Federal District Court in Marshall was closely watched on Wall Street, with some analysts even dropping in during the two-week trial. They said a victory would help TiVo win other royalty deals involving digital video recorders.

News of the verdict sent TiVo shares soaring nearly 20 percent, or $1.60, to $9.65 in late-session electronic trading. EchoStar shares dropped 27 cents.

The judge could triple the $73.9 million award — which is subject to appeal — since the jury found that EchoStar had "willfully" infringed TiVo's patent.

In a statement, EchoStar called the verdict "the first step in a very long process" and said it considered TiVo's patent overly broad.

The general counsel for TiVo, Matthew Zinn, said the verdict gave the company more leverage to negotiate royalty deals with cable companies that, like Dish, use digital video recorders that function much like a TiVo.

The rivals have taken sales away from TiVo by offering boxes and service at lower prices. Mr. Zinn would not rule out suing cable companies that use other boxes, but he called it a last resort.

James M. Barton, a TiVo co-founder, said, "We're just trying to build products that people use and enjoy, and this gives us more runway to do that."

The 10-member jury deliberated just over two hours after hearing two weeks of highly technical testimony from engineering experts.

The panel agreed with TiVo's nine claims that EchoStar had used its technology without license for its own D.V.R.'s.

"It wasn't unanimous to start with, but we were very close," a jury forewoman, Cathy Lindsey, a school secretary, said.

An electrical engineer paid by TiVo said the EchoStar boxes relied on technology covered by TiVo patent, but two experts hired by EchoStar said the designs were different.

"We just looked at the evidence and tried to maintain the big picture," said a juror, Brenda Dotson, a third-grade teacher.

TiVo claimed EchoStar violated its patent for a "multimedia time warping system" to pause, rewind or fast-forward live TV programs by recording them. EchoStar's original box "didn't work. It was a disaster," a TiVo lawyer Sam Baxter said in closing arguments.

In closing arguments, a lawyer for EchoStar, Harold McElhinny, said TiVo was using EchoStar as a scapegoat for its failure to compete against other makers of set-top boxes. He said TiVo's box was overpriced at a time when Dish and cable companies were giving away recorders to new subscribers.

The $87 million request was based on a financial consultant's estimate of how much TiVo would have earned if EchoStar had not sold more than 4 million of its own recorders using TiVo technology.

The jury awarded $73.99 million instead of $87 million because it was not convinced TiVo had done everything it could to promote its patent, which was approved in 2001, the forewoman said. As a result, jurors based damages starting in January 2004, when TiVo filed the lawsuit.
http://www.nytimes.com/2006/04/14/te...gy/14tivo.html





Read It? Watched It? Swap It
Michel Marriott

For Heather Perlmutter, a 41-year-old investment portfolio manager in Manhattan, the Web site with the whimsical name made perfect sense. Like many Americans, she found herself awash in CD's, DVD's and VHS tapes that were seldom if ever played anymore. They just took up valuable space in the Upper West Side apartment where she lives with her husband and two young children.

Then a friend of a friend told her about Zunafish (www.zunafish.com), a new Web site that matches people with discs and tapes to trade — and video games and paperback books, too.

To the delight of her 7-year-old son, Ms. Perlmutter recently used the site to barter her tape of "Fried Green Tomatoes," the 1991 Kathy Bates drama in which an unhappy housewife befriends an elderly woman in a nursing home, for a tape of Steven Spielberg's digital dinosaur blockbuster, "Jurassic Park."

"You feel like you're getting something special, that you're getting the better part of the deal," Ms. Perlmutter said. "Wow, somebody wants your stuff. I guess it's one man's trash is another man's treasure."

That was certainly the thinking of Dan Elias and Billy Bloom, the unlikely founders of Zunafish.

In a highly competitive era, independent tinkerers who are convinced they have a big idea can face big problems getting the idea to market. Even video games, once famous for whisking their creators from makeshift workshops to fast fortunes and expensive cars, are mostly made today by corporate teams of designers and programmers in sprawling office parks.

But Mr. Elias, a television news anchor in western Massachusetts, and Mr. Bloom, the owner of a volleyball league in New York City, both self-described amateurs at creating a digital service and company, spawned Zunafish, a singularly simple-to-use media trading site.

"We have no background in technology," said Mr. Elias, a 45-year-old native New Yorker who now lives in Northampton, Mass. "I think we always thought from the start that it was a big idea. There are hundreds of billions of dollars of idle media materials sitting in people's homes."

Mr. Bloom, 47, said of the company's humble origins, "If we lived in the country, it would have literally been created in one of our garages."

The site, which looks remarkably similar to a prototype Mr. Bloom sketched on notebook paper four years ago with Mr. Elias, trades only one-for-one items within the same category — CD's, DVD's, VHS tapes, video games, audio books or paperback books. No item (for example, a seven-disc DVD set of the first season of the television series "24") is worth more than any another (say, a DVD of Peter Jackson's "King Kong").

Traders using the site determine the relative value of an item by choosing to swap or not. No one is ever forced to make a trade, Mr. Elias noted.

Each trader pays Zunafish $1 through credit or debit card for each trade. The site then calculates the postage costs and creates addressed mailing labels that can be downloaded and printed out. Each trader, Mr. Bloom said, is responsible for paying the postage and mailing the item promptly.

Like buyers and sellers on eBay, the traders on Zunafish rate each other, providing a confidence index for future transactions.

"We take extremely limited involvement in the transaction," Mr. Elias said. "It is mediated by a user-rating system. Not by us."

Zunafish started on Jan. 1, with no fanfare or publicity. Mr. Bloom and Mr. Elias said that the circle of traders had been limited so far — they did not disclose figures — but that they felt strongly that throngs of prospective users would discover the site.

"It is only as strong as the community that comes to it," Mr. Elias said of Zunafish. "It takes a few minutes to sit down and post all of your stuff. But once you do, you've made an investment that pays off week by week as people come to inquire about things that you own."

Unlocking new value in practically discarded household items is a growing phenomenon. Michael J. Silverstein, a senior vice president of the Boston Consulting Group and co-author of "Treasure Hunt: Inside the Mind of the New Consumer" (Portfolio Hardcover, 2006), says middle-class consumers are becoming more comfortable economizing in some areas so they have more capital to buy premium items in other areas.

He said that if consumers were asked to place all of their CD's and DVD's, for example, in three piles — those they love, those they like well enough to keep and those they would be happy to have taken away — the piles would most likely be equal.

Any system that helps people easily trade away what they do not want for what they do want is "a beautiful synchronicity," Mr. Silverstein said in an interview.

Further, he notes in his book that online companies like eBay owe much of their success to their enormous appeal to the "consumer value calculus."

Mr. Elias said Zunafish played to the same calculus. That is hardly an accident. "We often found ourselves asking, 'How does eBay do it?' given the breadth of its success."

One notable feature is how easy it is to post items on Zunafish to be traded.

Mr. Bloom said Zunafish used a database that was updated weekly. Type in the name of an item or its universal product code (usually found near an item's bar code) — or the I.S.B.N. number for books — and the database pulls up a full description of the item and a digital photograph of its cover. If the match is correct, the user clicks O.K. and the item is posted.

There are other online trading sites, including Peerflix and BarterBee, which started last summer, that offer trading in similar categories. But other sites tend to offer a more limited range of items, or they use more complicated systems, requiring points and memberships to execute trades.

Todd Chanko, an analyst with Jupiter- Research, said he saw limits to the appeal of online trading.

"There's a lot of ways to do this in the real world," he said. "There are flea markets, thrift shops and street corners where people just dump things." As a result, "the real value proposition here is for those who don't have those opportunities, who live in areas far too remote."

And for many of those consumers, he said, Internet access and use tends to be relatively low.

But Zunafish investors, mostly the friends and relatives of Mr. Elias and Mr. Bloom, disagreed. In a matter of weeks, they had investments from 19 of the 21 people they approached. Ultimately they raised $485,000 in capital in two rounds and valued the company at $3.5 million. But the journey from idea to start date took almost four years, including the services of a corporate lawyer, a patent lawyer and a trademark lawyer. Just debugging the Web site itself seemed never-ending, the men said.

So far, they are keeping their day jobs. "None of us has thought about leaving our positions at all," Mr. Bloom said. "In the distant future that this should generate sufficient income to support itself and support us. ..."

He never finished the sentence. But Mr. Bloom pondered the question for a few moments, then borrowed from a "Star Wars" movie to sound a philosophical note. "Always in motion," he said in his best impression of the Jedi sage, Yoda, "is the future."
http://www.nytimes.com/2006/04/13/te...gy/13zuna.html





Startup Called Webaroo Touts 'Web On A Hard Drive'
Paul McNamara

Search the Web from your laptop or handheld -- without an Internet connection of any kind?

This seeming impossibility is what a Bellevue, Wash.-based startup called Webaroo has set out to realize -- they call it "search unplugged" -- and even company president Brad Husick concedes that he found the idea "crazy" at first blush.

Of course, it wasn't that long ago that a laptop with an 80-gigabyte hard drive seemed crazy, too. But ever-more-monstrous drives are common today and they serve as the foundation upon which Webaroo is basing its free, ad-supported search service. The company and service officially emerge from behind their stealth shield tomorrow armed with a flashy bundling agreement from laptop maker Acer. (The site is supposed to go live tonight at 10 p.m. Pacific Time, so you cannot download the software until then.)

"It's not inconceivable that a couple of years from now laptops are going to have 400- or 500-gigabyte drives in them," says Husick, who co-founded Webaroo in 2004 with CEO Rakesh Mathur and CTO Beerud Sheth. "What if you could take that space and it would be enough to carry the Internet with you? If you think about searching the Web without being tied to a connection of some kind -- and then periodically connecting to get refreshed -- that was the kernel of our idea. How do you put the Web on a hard drive? … That's why it was so crazy."

The first thing to acknowledge is that the phrase "put the Web on a hard drive" is not to be taken literally. As Husick explains: “Let's say the HTML Web is 10 billion pages -- it's actually a little less than that -- but at 10K per page that's 1 million gigabytes, also known as a petabyte. It's going to be a long time before notebooks have million-gigabyte hard drives. So how do you get a million gigabytes down to what you need?”

Webaroo does it, he says, through "a server farm that is of Web scale" and a set of proprietary search algorithms that whittle the million gigabytes down to more manageable chunks that will fit on a hard drive: up to 256 megabytes for a growing menu of "Web packs" on specific topics -- your favorite Web sites, city guides, news summaries, Wikipedia and the like -- that make up the service's initial offerings; and something in the neighborhood of 40 gigabytes for the full-Web version the company intends to release later this year.

"We've developed these algorithms that give you a set of meaningful, relevant results for anything on which you search," Husick says. "In effect, we give you the first couple pages of results."

That's all you really need, the company argues, because studies show that most people rarely look beyond the first 10 to 20 results returned by a typical search. With Webaroo you're being returned not just a list of pages, but the pages themselves -- with all graphics intact -- as well as key live links from those pages and the pages to which they lead. They're talking roughly 10,000 pages per "Web pack," or plenty to provide a meaningful search experience for whatever the subject matter at hand, Husick says.

Users must download and install 5 megabytes worth of Webaroo software to get started and then synch up with the Webaroo service site to refresh the content in their topic-specific packs, or, later this year, the full-Web version. Husick insists these pack updates take only minutes, but I’m already seeing corporate network managers wincing at the notion of this application sweeping the workplace.

All in all, though, there's no denying the "wow" factor here.

"It's kind of surprising that nobody else has done something like this," says Rob Enderle, president of the Enderle Analyst Group. "It's one of those things that a lot of folks will download."

Enderle believes the service could be a big hit among those whose jobs regularly take them away from their 'Net connections -- frequent fliers, for example.

"It's going to be a while before hot spots are in all the places we need to have them," he says.

Which isn't to say that ever more ubiquitous 'Net connections won't pose a challenge to the Webaroo business model.

"Long-term their opportunity may have more to do with [search] performance" than the offline capability itself, Enderle says.

Husick tells me that performance benefit was reinforced for the company by a rousing reception their service received from Japanese mobile operators who he says were salivating over Webaroo as a means to siphon search traffic away from their increasingly crowded wireless broadband networks.

Webaroo will also be touting the potential cost savings and convenience of its service.

"Every hotel I go to wants to charge me $10 to $15 a night for Internet. Every airport wants to charge me another $10 to get connected," Husick says. "If I've got five minutes before I have to board my flight, do I want to spend that five minutes connecting or do I want to spend five minutes getting my search answer?"

There's a fine line between crazy and audacious -- we'll know soon enough which side Webaroo falls on.
http://www.networkworld.com/community/?q=node/5388





Do you hear what I hear?

Ad Measurement Is Going High Tech

Explosion of media offerings complicates finding whether message is getting through
Don Clark

Media companies have long searched, with mixed results, for proof that advertising works. Some high-tech help may be on the way.

A number of established audience-measurement companies and industry newcomers are developing tools to better gauge the connection between media exposure and consumer behavior. The audience-measurement job is more complicated these days because of an explosion of media offerings in and outside the home.

A dark horse in the race is Integrated Media Measurement Inc., a start-up led by some prominent technology entrepreneurs that is using specially adapted cellphones to measure what consumers listen to and see. The company has developed software that helps the phones take samples of nearby sounds, which are identified by comparing them against a database.

Besides television and radio, IMMI, as the San Mateo, Calif., company calls itself, says the technology can track exposure to CDs, DVDs, videogames, sporting events, audio and video on portable gadgets and movies in theaters. The closely held company has been testing its system for nine months with about 200 consumers in Sacramento, Calif., and hopes to help answer some tricky questions. They include:

• How often are TV shows watched outside the home?

• Which songs prompt listeners to change radio stations?

• Which movie trailers get viewers to go to the theater?

"For the first time, you may be able to get an answer to one of the holy-grail questions -- is my promo working?" says Alan Wurtzel, president of research for General Electric Co.'s NBC Universal unit, who has been briefed on the IMMI system. "It's a very interesting methodology."

The field has plenty of competition. Another entrant is Media Audit, a unit of Houston's International Demographics Inc., which has collaborated with Paris-based Ipsos SA on a cellphone-based measurement system being tested by such companies as radio-station owner Clear Channel Communications Inc.

Some companies argue that cellphones could lead to distorted research. Survey participants, for example, could change how often they carry or converse on phones or download content to them.

Arbitron Inc. instead proposes a special-purpose gadget called the portable People Meter, which it has been testing in Houston. GfK AG's Mediamark Research Inc. also is developing a pager-size media-measurement device.

Radio and TV exposure has long been measured, respectively, by Arbitron and VNU NV's Nielsen Media Research. Methods include pen-and-paper usage logs filled out by selected panels of consumers, as well as devices that passively measure media usage in the home.

But consumers' media exposure has taken on many new forms, including delayed TV broadcasts with digital video recorders, Internet video, videogames and songs or movies that are downloaded to Apple Computer Inc.'s iPod or other portable devices. The new measuring services aim to better follow consumers as they move among the media types.

IMMI Chief Executive Tom Zito previously led videogame company Digital Pictures and Garageband.com, a Web music start-up. A partner at both ventures was Amanda Welsh, now an IMMI senior vice president. Al Alcorn, IMMI's chief technology officer, co-founded videogame pioneer Atari Corp.

The entrepreneurs, backed by $14 million in venture capital, plan to give survey participants cellphones that can take reliable sound samples, Mr. Zito said. Those snippets -- taken every 30 seconds and altered mathematically so any conversation is made unintelligible -- are transmitted continuously to IMMI. Sounds from headphone devices such as iPods can be transmitted to the cellphones with a wireless accessory. IMMI has been building a database of sound signatures, with help from customers testing the company's services as well as with CD content it has licensed.

Arbitron and some other companies prefer an approach that uses inaudible identifying code, sometimes called a watermark, that can be inserted into broadcast programming. Arbitron spokesman Thom Mocarsky argues that matching audio samples doesn't work, say, if two radio stations are airing the same syndicated program.

But encoding a watermark also has downsides, Mr. Zito says, including requiring time and effort on the part of content providers -- and embedding such identifiers isn't possible on DVDs and CDs that have already been sold.

Dave Harkness, a senior vice president of strategy and business development at Nielsen, said both watermarks and sampling may be needed to provide the most complete exposure ratings. But sampling alone may still provide valuable information to advertisers and media companies, he said.

IMMI's Mr. Zito says there is evidence that sampling provides useful clues about ad effectiveness. Some respondents in the Sacramento test who were exposed to a particular trailer for the movie "King Kong" went to see the film more than twice as often as those who saw an alternate trailer for the movie, IMMI's data show.

With conventional media ratings, "we don't have the opportunity to take a look at cause and effect," said Artie Bulgrin, senior vice president of research and sales development at ESPN, which has been evaluating IMMI's service. "What we see so far is very interesting and very compelling."
http://online.wsj.com/public/article...html?mod=blogs





EFF: AT&T Forwards All Internet Traffic Into NSA

The Electronic Frontier Foundation (EFF) on Wednesday filed the legal briefs and evidence supporting its motion for a preliminary injunction in its class-action lawsuit against AT&T.

After asking EFF to hold back the documents so that it could review them, the Department of Justice consented to EFF's filing them under seal -- a well-established procedure that prohibits public access and permits only the judge and the litigants to see the evidence.

While not a party to the case, the government was concerned that even this procedure would not provide sufficient security and has represented to the Court that it is "presently considering whether and, if so, how it will participate in this case."

"The evidence that we are filing supports our claim that AT&T is diverting Internet traffic into the hands of the NSA wholesale, in violation of federal wiretapping laws and the Fourth Amendment," said EFF Staff Attorney Kevin Bankston.

"More than just threatening individuals' privacy, AT&T's apparent choice to give the government secret, direct access to millions of ordinary Americans' Internet communications is a threat to the Constitution itself. We are asking the Court to put a stop to it now," said Bankston.

EFF's evidence regarding AT&T's dragnet surveillance of its networks includes a declaration by Mark Klein, a retired AT&T telecommunications technician, and several internal AT&T documents. This evidence was bolstered and explained by the expert opinion of J. Scott Marcus, who served as Senior Technical Advisor for Internet Technology to the Federal Communications Commission from July 2001 until July 2005.

The internal AT&T documents and portions of the supporting declarations have been submitted to the Court under a tentative seal, a procedure that allows AT&T five court days to explain to the Court why the information should be kept from the public.

"The public deserves to know about AT&T's illegal program," said EFF Legal Director Cindy Cohn. "In an abundance of caution, we are providing AT&T with an opportunity to explain itself before this material goes on the public docket, but we believe that justice will ultimately require full disclosure."

The NSA program came to light in December, when the New York Times reported that the President had authorized the agency to intercept telephone and Internet communications inside the United States without the authorization of any court.

"Mark Klein is a true American hero," said EFF Staff Attorney Kurt Opsahl. "He has bravely come forward with information critical for proving AT&T's involvement with the government's invasive surveillance program."

In the lawsuit, EFF is representing the class of all AT&T residential customers nationwide. Working with EFF in the lawsuit are the law firms Traber & Voorhees, Lerach Coughlin Stoia Geller Rudman & Robbins LLP and the Law Office of Richard R. Wiebe.
http://www.spamdailynews.com/publish...says_EFF. asp





High-def TV Not Ready For Net's Prime Time
Greg Sandoval

Fans of video upload sites shouldn't expect to enjoy clips of amateur singers, bikini-clad dancing girls or mouse-eating centipedes streamed in high definition anytime soon.

While Hollywood and the consumer electronics industry are gambling on new high-definition video formats and televisions, there may not be enough room in the Net's pipes or in the servers offering video streams to make HD videos, which can require twice as much broadband capacity as traditional videos, a regular part of the Internet viewing experience.

While that's hardly the end of the world for a site like YouTube.com, which is more concerned with streaming user-created content than anything coming out of Hollywood, it does present a dilemma for an organization like Major League Baseball's MLB.com , which already has more than 800,000 subscribers regularly watching games over the Net.

For now, the Internet-viewing public will have to be satisfied with watching live sporting and news events, or homemade movies presented on streaming sites like YouTube in formats offering slightly grainy images and sometimes-jerky motion. In fact, every industry expert interviewed for this story said that the way things stand now there just isn't enough bandwidth going into the home to stream the more expansive HD video.

"HD files tend to be too large to easily stream or download over typical American broadband connections," said Joe Laszlo, senior broadband analyst for Jupiter Research. "Our 1.5 megabyte connections are great for music, OK for lower-quality video but fairly unacceptable for HD video...I don't think we'll see a lot of HD content."

The typical Internet connection is 2 to 3 megabits per second, says Laszlo. The minimum needed to stream HD-quality video is 5mbps. Laszlo added that even if bandwidth were to be increased, computers with lower graphics processing power may be unable to display the richer details that HD provides.

That could mean a missed opportunity. In a report released Wednesday, the research firm IDC predicted Web video will generate $1.7 billion in annual sales by 2010, a 750 percent jump from sales this year. "Internet video services are on the brink of becoming a mainstream phenomenon in the United States," IDC said in the report.

Clogged pipes
The HD streaming problem is simple to understand. Imagine a pipe with liquid running through it. There is only so much room inside the pipe. In the case of broadband, the liquid is bits of information. The more video streaming over the Net, the more that pipe gets filled up--particularly as the pipe narrows on the final leg into the home.

In part, the "clogged pipe" issue is used by big telecommunications companies as they argue for some sort of tiered structure that would allow them to better control traffic on their networks. Internet companies, on the other hand, argue that so-called Net neutrality laws are needed to ensure that all Internet traffic is treated equally.

"There's no denying it," says Michel Billard, president of Itiva, which is working on improving broadband efficiency. "As more video-on-demand companies continue to gobble up bandwidth, there isn't going to be enough to go around."

Few companies are more interested in improving Net video quality than Major League Baseball. The league has been a trendsetter in distributing live events over the Net. Critics showered praise on MLB's technicians for handling the live feeds of this year's NCAA basketball tournament games to more than 268,000 viewers.

Justin Shaffer, MLB.com's chief architect, is more optimistic than many insiders regarding when the Net may be ready for HD.

"Things are really starting to come around," Shaffer said. "Clearly there needs to be upgrades in bandwidth, but there's definitely reason to be encouraged."

He said several companies are working on technology that would allow computers in close proximity to each other to share data. Instead of streaming the same images to multiple people, such technology would send the information once to a hub computer and then use that to distribute it to others.

HD doesn't present as much of a problem to sites such as do CinemaNow and Movielink, which recently unveiled plans to offer downloadable movie services. Apple Computer and Amazon.com are also exploring the possibility of distributing films over the Net, according to a report this month in the New York Times.

Akimbo Systems, which distributes video content over the Web, downloads material that doesn't have to be watched live. Users who leave their computer running can get feeds from Akimbo regardless of any traffic jams on the Web. Once the film or TV content is finished downloading, the viewing will be excellent because the information is already on the user's hard drive.

"You have to get away from the streaming model to distribute high definition," said Josh Goldman, CEO of Akimbo Systems. "It's best to do it as a download."

But even with downloads, there's a big size difference. The movie "Walk the Line," available on Apple's QuickTime site, for example, has a standard and high-definition offering. The file size for standard definition is 36 megabytes and the high definition is 93 megabytes. The HD version packs more than twice the amount of information than the standard.

Will lower quality stymie the nascent Internet video market?

"If HD were to hit, it wouldn't really affect YouTube," said Julie Supan, the company's spokeswoman. "Our service focuses on short format, fast delivery and lower-quality video content uploaded from devices. Our service is more about the entertainment quality of video content versus the 'resolution' of the content."

Josh Martin, an IDC analyst, echoed Supan's comments. He said sites like iFilm, Atom Entertainment and YouTube draw audiences because of the unique entertainment they offer. Martin uses as an example a clip that has crisscrossed the Internet recently of an autistic high-school basketball player who became a national star by hitting six three-point shots in a game.

"Is that story less compelling because it's not high definition?" Martin said. "I don't think so."
http://news.com.com/High-def+TV+not+...3-6058744.html





Every Click You Make, They'll Be Watching You
Bob Tedeschi

WOULD you trust a company enough to let it follow your every click online?

Claria, a company once vilified for raining pop-up advertisements across the Internet through its Gator software, is betting its business that the answer is yes. Claria said it would announce Monday the release of PersonalWeb, a service that will let people download a piece of tracking software and receive a home page filled with news stories and other information tailored to their interests.

If a man, for example, downloaded the software and surfed through stories about the N.C.A.A. basketball tournament and car reviews, his PersonalWeb home page would reflect those interests the next time he clicked to it. In addition to showing newer headlines about cars and college basketball, the page might also feature ads from car companies or for jerseys from the man's favorite team.

Claria says that because those ads are so closely aligned to the user's interests and recent behavior, marketers will be willing to pay more than they might on other sites for the ability to reach PersonalWeb users.

That part of Claria's plan is convincing enough for some analysts, and privacy advocates appear satisfied that Claria will stand by its pledge to track only the computer (whose owner it does not identify), not the personal information of the user. Whether many consumers will use the service anyway — and give marketers an audience worth pursuing — is the big question.

"I'm not convinced that consumers will place enough of a value on personalization that they'll be willing to download a piece of software and change their home page just to try it," said Kenneth Cassar, an analyst with Nielsen/NetRatings, an Internet consultancy. "And it remains to be seen whether Claria's personalization will yield something that much better than the typical home page of today."

Mr. Cassar said that very few people even changed the default home page that came installed with their browser, and relatively few people created personalized home pages on services like Yahoo, MSN and Google. According to ComScore MediaMetrix, another online consulting firm, 14 percent of Yahoo's 27 million visitors in February had a customized home page, and Yahoo's service was by far the most popular of its kind.

The chief executive of Claria, Scott VanDeVelde, argues that because PersonalWeb requires little work and delivers more relevant information than, say, MyYahoo, it should enjoy an advantage over competing services. "The ideal home page is one that always changes with your interests," Mr. VanDeVelde said. "And over time, this gets even smarter about serving you content you're interested in."

PersonalWeb's technology gathers information about all the users on the service, then ranks the pages they read according to how many other people visit those pages and how long they stay, among other things; people can suspend the tracking. Then, when someone surfs or searches for a specific category of information, Claria will identify relevant pages that the user didn't find, and post them on a PersonalWeb home page.

People can seed their home pages by choosing from a list of topics much the same way they might choose from suggestions when they customize their Yahoo home page, for instance. PersonalWeb includes about 600 such topics, from taxidermy to coin collecting.
Those who are not interested in customizing their page can simply wait until the service knows enough about them to serve up similar suggestions. How long they will have to wait is partly a function of how many other users with similar interests join in, since Claria must track people with similar interests before it can make good suggestions.

Mr. VanDeVelde said the company, based in Redwood City, Calif., would advertise the service online starting this month and would also market the service to other online publishers, which could offer it to their readers. For instance, he said, a city-oriented newspaper might let its readers create a home page largely made up of the paper's stories, but let PersonalWeb present other stories on topics outside of the paper's specialty.

Readers would visit the newspaper's Web site more often as a result, Mr. VanDeVelde predicted, thereby generating more advertising for Claria and the publisher to share. So far, Claria has signed no such agreements with United States publishers, but it has set up a joint venture with Yahoo Japan to possibly implement the technology there.

Claria's shift to the PersonalWeb platform culminates a transition that has been several years in the making, starting in 1999, when Claria, then called the Gator Corporation, helped spawn the pop-up advertising trend online. Gator's service tracked people's behavior then displayed pop-up ads for, say, Priceline.com when they visited Expedia.

Gator bundled its eWallet software with other free applications like Kazaa, the music-sharing software, then shared the ad revenues. Privacy advocates complained that Gator didn't clearly tell consumers they were installing tracking and pop-up software or give them and easy way to delete it. The company changed its name to get rid of the Gator stigma, among other reasons.

Companies on whose Web sites the ads appeared, including The New York Times, among many others, sued Gator for copyright and trademark infringement. The cases settled out of court, but even as Claria changed its practices to suit privacy advocates — and built a business that generated $100 million in advertising in 2004 — it could not shake its reputation as an Internet bully.

Last year, when its planned initial public offering failed, the company, still private, put its resources behind PersonalWeb. Online privacy advocates acknowledge that PersonalWeb bears little resemblance to the business that infuriated publishers and users in the past, but they continue to balk at the idea of tracking consumers in any way.

"Claria's likely to make a lot of people uneasy when they realize how much of their personal life is exposed through their Web surfing," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, an advocacy group.

While other companies are stopping short of asking consumers to expose their complete surfing habits, they are considerably more interested in personalizing their sites for consumers than they were a few years ago, said Michael Strickman, chief technology officer of ChoiceStream, which helps companies like Yahoo, America Online and others personalize the products or content they show to consumers.

"Compared to a couple of years ago, we're doing a lot more taking of phone calls than banging on doors," Mr. Strickman said.

Part of the reason is that the technology is more refined than it was during the dot-com boom, when online personalization was more theory than reality. Still, Mr. Strickman said, the technology has limits.

"Getting things right is not easy," he said. "When you're showing an ad, it doesn't really matter if you get it wrong. But if you're saying, 'this is a list of things I recommend,' you'd better make sure there's nothing glaringly off, or the user will tune you out."
http://www.nytimes.com/2006/04/03/business/03ecom.html





Google Aims To Track Users With Wi-Fi
Chris Nuttall and Kevin Allison in San Francisco

Google aims to be able to track its users to within 100-200 feet of their location through new wireless networks in order to serve them with relevant advertising from local businesses.

The leading internet search company, which depends on advertising for 99 per cent of its revenues, was selected on Wednesday by San Francisco as its preferred bidder to provide a basic free wi-fi internet service covering the entire city.

It had partnered in its bid with the internet service provider Earthlink, which intends to charge a fee for a faster internet connection.

Google and Earthlink will now enter final contract negotiations with the city. There were five other bidders including a non-profit group backed by Cisco Systems and IBM.

The company hopes to defray the costs of offering a free service through contextual advertising. Analysts have speculated that the San Francisco bid could be a prelude to Google seeking to extend its reach into localities nationwide.

It is already planning a free wi-fi network by the summer covering the city of Mountain View, where its headquarters is based, and the San Francisco service may be up and running by the end of the year.

Google says users linking up with wi-fi transmitters placed around cities can be located to within a couple of blocks. This would open up a new level of advertising opportunities for the company, allowing it to serve tightly focused ads on its web pages from small businesses in the immediate area.

The bid to blanket-cover San Francisco with cheap internet access is part of a broader move towards municipal wireless networks by big US cities.

Philadelphia became the first major US city to begin construction of a citywide wireless network when it signed a deal with Earthlink earlier this year.

Other big cities such as Chicago, Boston and Austin have announced their own wireless network plans.

Experts have warned, however, that the free wireless model remains unproven and may not offer the best solution for smaller cities and towns addressing the "digital divide" to promote economic development.

In a separate development, Google has launched a local listings service for real estate.

Typing "real estate" or "homes for sale" in its search box prompts users to enter their postal codes and see a map showing properties and their details in their area. The "mash-up" combines Google Maps with its Google Base classifieds service.
http://www.msnbc.msn.com/id/12188577/





Why VOIP Needs Crypto
Bruce Schneier

There are basically four ways to eavesdrop on a telephone call.

One, you can listen in on another phone extension. This is the method preferred by siblings everywhere. If you have the right access, it's the easiest. While it doesn't work for cell phones, cordless phones are vulnerable to a variant of this attack: A radio receiver set to the right frequency can act as another extension.

Two, you can attach some eavesdropping equipment to the wire with a pair of alligator clips. It takes some expertise, but you can do it anywhere along the phone line's path -- even outside the home. This used to be the way the police eavesdropped on your phone line. These days it's probably most often used by criminals. This method doesn't work for cell phones, either.

Three, you can eavesdrop at the telephone switch. Modern phone equipment includes the ability for someone to listen in this way. Currently, this is the preferred police method. It works for both land lines and cell phones. You need the right access, but if you can get it, this is probably the most comfortable way to eavesdrop on a particular person.

Four, you can tap the main trunk lines, eavesdrop on the microwave or satellite phone links, etc. It's hard to eavesdrop on one particular person this way, but it's easy to listen in on a large chunk of telephone calls. This is the sort of big-budget surveillance that organizations like the National Security Agency do best. They've even been known to use submarines to tap undersea phone cables.

That's basically the entire threat model for traditional phone calls. And when most people think about IP telephony -- voice over internet protocol, or VOIP -- that's the threat model they probably have in their heads.

Unfortunately, phone calls from your computer are fundamentally different from phone calls from your telephone. Internet telephony's threat model is much closer to the threat model for IP-networked computers than the threat model for telephony.

And we already know the threat model for IP. Data packets can be eavesdropped on anywhere along the transmission path. Data packets can be intercepted in the corporate network, by the internet service provider and along the backbone. They can be eavesdropped on by the people or organizations that own those computers, and they can be eavesdropped on by anyone who has successfully hacked into those computers. They can be vacuumed up by nosy hackers, criminals, competitors and governments.

It's comparable to threat No. 3 above, but with the scope vastly expanded.

My greatest worry is the criminal attacks. We already have seen how clever criminals have become over the past several years at stealing account information and personal data. I can imagine them eavesdropping on attorneys, looking for information with which to blackmail people. I can imagine them eavesdropping on bankers, looking for inside information with which to make stock purchases. I can imagine them stealing account information, hijacking telephone calls, committing identity theft. On the business side, I can see them engaging in industrial espionage and stealing trade secrets. In short, I can imagine them doing all the things they could never have done with the traditional telephone network.

This is why encryption for VOIP is so important. VOIP calls are vulnerable to a variety of threats that traditional telephone calls are not. Encryption is one of the essential security technologies for computer data, and it will go a long way toward securing VOIP.

The last time this sort of thing came up, the U.S. government tried to sell us something called "key escrow." Basically, the government likes the idea of everyone using encryption, as long as it has a copy of the key. This is an amazingly insecure idea for a number of reasons, mostly boiling down to the fact that when you provide a means of access into a security system, you greatly weaken its security.

A recent case in Greece demonstrated that perfectly: Criminals used a cell-phone eavesdropping mechanism already in place, designed for the police to listen in on phone calls. Had the call system been designed to be secure in the first place, there never would have been a backdoor for the criminals to exploit.

Fortunately, there are many VOIP-encryption products available. Skype has built-in encryption. Phil Zimmermann is releasing Zfone, an easy-to-use open-source product. There's even a VOIP Security Alliance.

Encryption for IP telephony is important, but it's not a panacea. Basically, it takes care of threats No. 2 through No. 4, but not threat No. 1. Unfortunately, that's the biggest threat: eavesdropping at the end points. No amount of IP telephony encryption can prevent a Trojan or worm on your computer -- or just a hacker who managed to get access to your machine -- from eavesdropping on your phone calls, just as no amount of SSL or e-mail encryption can prevent a Trojan on your computer from eavesdropping -- or even modifying -- your data.

So, as always, it boils down to this: We need secure computers and secure operating systems even more than we need secure transmission.
http://www.wired.com/news/columns/0,...rss.technology





Windows on Mac, Simultaneously
Pete Mortensen

Apple Computer's surprise software release allowing the company's newest Intel-based Macs to run Windows has put "virtualization" -- an alternative, and arguably superior, method of achieving the same result -- in the spotlight.

Released Wednesday, Apple's Boot Camp beta installs Microsoft's OS in a partition on the hard drive, thus offering Mac users the option of booting up either with OS X or Windows XP. Virtualization, by contrast, allows Macs to run Windows and Mac OS X not just on the same machine, but at the same time, with only a slight drop in performance.

Although Apple says it has no plans to create a virtualization product for the Mac, the advantages of this approach are strong enough that a number of rivals are rushing to market with Mac virtualization products even as Apple offers its dual-boot option.
On Thursday, Herndon, Virginia-based Parallels released a public beta of its virtualization software package, Parallels Workstation 2.1.

"What's the value of a dual-boot solution? Is there any value? I don't really think so," said Parallels marketing manager Benjamin Rudolph.

Virtualization is heating up in the corporate market, and it's likely only a matter of time before it becomes standard issue on most computers. In a sign of what's to come, VMWare this week announced it would give away a key specification for defining and formatting virtual machine environments. Microsoft fired back by offering up its Virtual Server 2005 R2 Enterprise Edition, also for free.

Virtualization for the Mac has been slower to market, but promises to explode. CodeWeavers, the primary corporate backers of the open-source Wine Project, which allows Windows applications to run in Linux, has said it will release a Mac OS X version of CrossOver Office, a shrink-wrapped version of the technology.

Alexandre Juilliard, who oversees Wine, said Mac users will get to try it themselves in the very near future. "No date is set, but it's probably a matter of a couple of months now," he said.

Microsoft is also evaluating an Intel-native (and presumably much faster) version of its Virtual PC product, although it has not yet committed to the project.

VMWare, the largest vendor of virtualization software, did not return calls seeking comment for this story.

Apple, for its part, has shown no interest in creating its own virtualization software. In the run-up to the release of Boot Camp, many speculated that Apple was working on its own virtualization software, but the company denies it.

"We are not providing a way to run Windows within OS X," Natalie Kerris, an Apple spokeswoman, said Wednesday.

Virtualization makes it possible to install Windows XP, Linux, OS/2 Warp and other Intel-compatible operating systems on Intel-Mac hardware and run the alternate operating systems from the comfy confines of OS X.

The technique fools so-called guest operating systems into believing they are in charge of the computer's hardware. Though similar in appearance to emulators like Microsoft's VirtualPC, virtualization is an entirely different approach that is made possible because OS X, Windows and Linux are now all native to Intel hardware.

Emulators essentially re-create a foreign computer architecture in software, like an Intel machine on top of Apple's older PowerPC platform. Virtualization, by contrast, is like a window that lets the guest operating system burrow through to the underlying hardware. So a guest operating system like Windows, which runs natively on Intel chips, is still executed natively. There is no time-consuming code translation from one architecture to another.

In a virtual environment, Windows runs as a Mac OS X application inside its own window. Safari and iPhoto can happily co-exist with Microsoft Access running on Windows XP. The virtualization software even supports monitor spanning. On a two-monitor system, Mac OS X can be running on one screen, and Windows XP on the other.

The virtualization approach to running multiple operating systems simultaneously differs sharply from Apple's dual-booting Boot Camp software. Boot Camp requires users to reboot each time they wish to switch from Mac OS X to Windows.

Not everyone thinks virtualization trumps the dual-boot approach, however.

For one thing, dual-booting guarantees maximum possible performance. Using Boot Camp methods, a MacBook Pro functions as a native Windows XP laptop; there is no trickery involved.

For the moment, there is one area where dual-booting into Windows is indisputably superior: gaming. The current version of Parallels Workstation has limited support for 3-D graphics. Rudolph said better video will come in the next version. Dual-booting with Boot Camp yields native 3-D driver support under Windows XP.

Analyst Tim Bajarin, president of market research firm Creative Strategies, said he believes most users will prefer dual-booting to virtualization. Years of unsatisfactory experiences with slow emulation software -- though fundamentally different from virtualization -- could make some wary of trying the new technology, he said.

"I think Apple's approach, based on maximizing the role of the processor, is actually the cleanest way to do it," he said.

But Parallels' Rudolph said dual-booting systems are not in tune with the way people work. Having to shut down OS X to boot into Windows wastes time, he said, adding that a Mac running Parallels' virtualization software is almost as fast as a dedicated Windows box.

"If a native Windows machine runs at 100 out of 100 on speed, our version of virtualization runs at a 90 or 95," he said. "It's very fast and very stable."

That said, not all of the new Intel-Macs will handle virtualization equally. Parallels Workstation is expected to run better on the MacBook Pro and iMac than it will on the Mac mini, Rudolph said. That's because the two higher-end machines include chip-level hardware support, known as Intel virtualization technology, or VT, that improves performance to near-native levels, he said.

"We've noticed, between VT-powered machines versus non-VT-powered machines, up to a 150 percent performance increase," Rudolph said.

The initial public beta of Parallels Workstation is good for 30 days. The full release, expected in several weeks, will cost $50. Bring your own operating systems, of course.
http://www.wired.com/news/technology...rss.technology





Bush No Friend To Tech, Say Stanford Panelists
Michael Kanellos

The Bush administration is starving the U.S. tech industry of two crucial ingredients, according to members of a panel of academics and entrepreneurs at Stanford University: foreign students and research grants.

"If you make it difficult for foreign students to come here or work here, you will have a dramatic influence on education in the United States and the quality of industry," said Mark Horowitz, a professor of electrical engineering at the university and the founder of Rambus. "The U.S. is becoming less attractive for graduate students."

Academics often are hostile to politicians, but Stanford has typically not been a hotbed of leftist resentment--former Reagan Secretary of State George Schultz has an office here after all, as does former Defense Secretary William Perry. The engineering faculty is crawling with millionaires who founded companies while climbing up the tenure ladder. Silicon Valley is also a hotbed of limousine libertarianism. In other words, it's the sort of university where you're not going to see massive protests over capital gains cuts or multibillion dollar weapons programs. So hearing such strong statements against a conservative president is slightly novel.

The problem, according to Horowitz and others, is that the U.S. tech industry has thrived by being able to attract the best students from all over the world, who graduate and then start companies. If the pipeline gets squeezed, they will start to attend school in China or Europe.

Funding from the Defense Advanced Research Projects Agency (DARPA) have also declined, according to Mendel Rosenblum, another Stanford professor and founder of VMWare. Grants from the agency in the 60s, 70s and 80s were instrumental in funding the development of technologies that subsequently exploited by companies such as Sun Microsystems. There has been a dramatic decline in funding and the timeline is much shorter, The Internet, for instance, was originally a DARPA program. Horowitz noted that he's had funding from a DARPA project every year, but next year he will not get any grant money.

Netscape founder Jim Clark was the most outspoken.

"We do have a unique environment here and I hope it survives eight years of bad government," Clark said. "Urge all of your friends to vote democratic."
http://news.com.com/2061-11128_3-6052595.html





Humans Evolved Color Vision To See Emotion, Not Food
Michael Kanellos

Your eyes evolved to see rosy cheeks.

The eyes in humans and their closest relatives in the primate world are geared to detect subtle changes in skin tone caused by blood oxygen levels, according to a new study from Caltech.

The spectral sensitivity of color cones in humans and chimps are somewhat unusual. Bees have four color cones that are evenly spread across the visible color spectrum. Birds have three color cones. By contrast, humans have three types of cones that are sensitive to a limited range of wavelengths. The closeness, however, allows for the detection of subtle tone changes. When someone blushes, the skin becomes red from elevated oxygen levels. If you're exhausted, you become pale from the lack of oxygen. When a primate is ready to mate, oxygen levels rise again leading to blushing. The human and chimp eye can capture these different color levels, which can be signals of fitness or heartiness.

Interestingly enough, primates completely covered in hair have different types of color detectors. The parts of skin (the scalp) that are insensitive to color blushing in humans and chips are also covered in hair. Since the skin there can't help express emotion, the theory goes, it might as well help you keep warm.

"For a hundred years, we've thought that color vision was for finding the right fruit to eat when it was ripe," says Mark Changizi, a theoretical neurobiologist and postdoctoral researcher at Caltech. "But if you look at the variety of diets of all the primates having trichromat vision, the evidence is not overwhelming."
http://news.com.com/2061-11128_3-6050019.html





When You Can't Take It With You, a Scan Saves the Pages for a Later Look
Eric A. Taub

The interminable delays now commonplace in doctors' offices have one very minor benefit: the ability to while away the hours reading about Jessica Simpson's latest romance. Yet all too often the call to head off to the examining room seems to come just as one gets to the best part of the article.

Instead of ripping out the page and ruining the magazine for everyone else, readers can scan the article with the new DocuPen RC800 from Planon.

This $300 pen-shaped device can be dragged down the length of a page to create a file that can be transferred to a Mac or PC through a U.S.B. connection. The text can also be edited using character recognition software that comes with the $350 "professional" package.

Unlike previous models of the pen, the RC800 can scan in color, useful for photos and brochures.

The 9½-inch-long DocuPen, available now through the company's Web site (www.planon.com), has eight megabytes of memory, enough to store several hundred pages of black and white text, or one to three color pages at the highest resolution. A microSD memory card can be inserted to increase storage capacity.
http://www.nytimes.com/2006/04/06/te...gy/06scan.html





Study Links Punishment to an Ability to Profit
Benedict Carey

Sociologists have long known that communes and other cooperative groups usually collapse into bickering and disband if they do not have clear methods of punishing members who become selfish or exploitative.

Now an experiment by a team of German economists has found one reason punishment is so important: Groups that allow it can be more profitable than those that do not.

Given a choice, most people playing an investment game created by the researchers initially decided to join a group that did not penalize its members. But almost all of them quickly switched to a punitive community when they saw that the change could profit them personally.

The study, appearing today in the journal Science, suggests that groups with few rules attract many exploitative people who quickly undermine cooperation. By contrast, communities that allow punishment, and in which power is distributed equally, are more likely to draw people who, even at their own cost, are willing to stand up to miscreants.

An expert not involved in the study, Elinor Ostrom, co-director of the Workshop in Political Theory and Policy Analysis at Indiana University, said it helped clarify the conditions under which people will penalize others to promote cooperation.

"I am very pleased to see this experiment being done and published so prominently," Dr. Ostrom said, "because we still have many puzzles to solve when it comes to the effect of punishment on behavior."

Dr. Ostrom has done fieldwork with cooperatives around the world and said she often asked other researchers and students whether they knew of any long-lasting communal group that did not employ a system of punishment. "No one can give me an example," she said.

In the experiment, investigators at the University of Erfurt in Germany enrolled 84 students in the investment game and gave them 20 tokens apiece to start. In each round of the game, every participant decided whether to hold on to the tokens or invest some of them in a fund whose guaranteed profit was distributed equally among all members of the group, including the "free riders" who sat on their money. Because the profit was determined by a multiple of the tokens invested, each participant who contributed to the fund enjoyed less of a return than if the free riders had done so as well.

The tokens could be redeemed for real money at the end of the experiment.

About two-thirds of the students initially chose to play in a group that did not permit punishment. In the other group, the students had the option in each round of penalizing other players; it cost one token to dock another player three tokens. All participants could see who was contributing what as the game progressed, and could choose to switch groups before each round.

By the fifth round, about half of those who began the study in the no-penalty group had switched to the punitive one. A smaller number of students migrated in the other direction, but by Round 20 most had come back and the punishment-free community was a virtual ghost town.

"The bottom line of the paper is that when you have people with shared standards, and some who have the moral courage to sanction others, informally, then this kind of society manages very successfully," said the study's senior author, Bettina Rockenbach, who was joined in the research by Bernd Irlenbusch, now at the London School of Economics, and Ozgur Gurek.

Switching groups frequently prompted remarkable behavioral changes in the students. Many of those who had been free riders in the laissez-faire group eagerly began penalizing other selfish players upon switching. Dr. Rockenbach compares these people to heavy smokers who are insistent on their right to light up, until they quit. "Then they become the most militant of the antismokers," she said.

Being exploited appeared to cause deep frustration and anger in most students, she said.

Other experts said the results were an important demonstration of how self-interest can trump people's aversion to punitive norms, at least in the laboratory. Out in the world, they said, it is not usually so clear who is free-riding, or even whether a given group is encouraging cooperative behavior in most people.

"The mystery, if there is one, is how these institutions evolve in the first place," Duncan J. Watts, a sociologist at Columbia, wrote in an e-mail message, "i.e., before it is apparent to anyone that they can resolve the problem of cooperation."
http://www.nytimes.com/2006/04/07/science/07punish.html





Kaspersky warns of cross-platform virus proof of concept

It Can Infect Both Windows And Linux Systems
Jaikumar Vijayan

Kaspersky Labs is reporting a new proof-of-concept virus capable of infecting both Windows and Linux systems.

The cross-platform virus is relatively simple and appears to have a low impact, according to Kaspersky. Even so, it could be a sign that virus writers are beginning to research ways of writing new code capable of infecting multiple platforms, said Shane Coursen, senior technical consultant at Kaspersky.

In a note on its Web site, the SANS Internet Storm Center (ISC) in Bethesda, Md,. said the new virus “is a sign the cross-platform aspects are becoming important. As the developers of viruses continue to research this, we will see more cross-platform malware come about in the future.”

The new virus, which Kaspersky calls Virus.Linux.Bi.a/Virus.Win32.Bi.a, is written in assembler and infects only those files in the current directory. “However, it is interesting in that it is capable of infecting the different file formats used by Linux and Windows,” Kaspersky said.

“It isn’t surprising that we are seeing a multiplatform virus,” given the growing popularity of Linux on enterprise desktops, Coursen said. “This is simply proof-of-concept code to show this kind of thing can be done.”

The new virus shows that malicious hackers may be exploring ways of getting new systems into bot networks, according to Johannes Ullrich, chief technology officer at the SANS ISC. But crafting such multi-platform malware is not particularly easy, he said.

“Writing a cross-platform worm is difficult because it limits you to functions that are available on both operating systems,” Ullrich said. “You have to also code the virus in assembly to make it work without relying on any OS-specific function,” he said.

The relatively small number of systems running on non-Windows platforms also makes it less appealing for hackers to go to the trouble of crafting cross-platform viruses, he said.

Though rare, this is not the first instance of such a virus appearing in the wild. In 2001, the sadmind/ISS worm exploited a hole in Sun Microsystems Inc.’s Solaris to infect systems running vulnerable versions of the operating system. Infected systems then scanned for and attacked servers running Microsoft Corp.’s IIS Web server software. That same year, another proof-of-concept virus named Winux infected both Windows and Linux systems.

“Even today, Web sites sending exploits to their visitors tend to detect what browser/platform the visitor is using and send a matching exploit to install some malware,” SANS said in its note.

It’s important for enterprises to be aware of such issues and implement anti-virus tools for protecting non-Windows operating systems if they haven’t done so already, Ullrich said.

“For those thinking their “pet” computer is invulnerable to the virus threat -- it’s not,” SANS said.
http://computerworld.com/printthis/2...110330,00.html





Evergreen's $8.50 DN-2000 MP3 Player
Thomas Ricker

Japanese Co. Evergreen is no stranger to the cheap and crap-plasticy product. Now they combine their love of the two and apparent hatred for human-kind in this $8.50 DN-2000 MP3 player targeting the ill-fated shores of Japan, and perhaps, beyond. It runs for 5-hours on a single AAA battery and supports 1GB SD cards. You realize of course, that we are now at the dawn of disposable MP3 players don't you? Gawd save our souls.
http://www.engadget.com/2006/04/07/e...00-mp3-player/





The Watchers

Get ready for Microsoft, cable and phone companies, and quite a few other people to know a lot more about what you do on your computer, thanks to House Bill
Ben Fenwick

It’s supposed to protect you from predators spying on your computer habits, but a bill Microsoft Corp. helped write for Oklahoma will open your personal information to warrantless searches, according to a computer privacy expert and a state representative.

Called the “Computer Spyware Protection Act,” House Bill 2083 would create fines of up to a million dollars for anyone using viruses or surreptitious computer techniques to break on to someone’s computer without that person’s knowledge and acceptance, according to the bill’s state Senate author, Clark Jolley.

“The bill has a clear prohibition on anything going in without your permission. You have to grant permission,” said Jolley, R-Edmond. “You can look at your license agreement. It will say whether they have the ability to take that information or not.”

But therein lies the catch.

If you click that “accept” button on the routine user’s agreement, the proposed law would allow any company from whom you bought upgradable software the freedom to come onto your computer for “detection or prevention of the unauthorized use of or fraudulent or other illegal activities in connection with a network, service, or computer software, including scanning for and removing computer software prescribed under this act.”

That means that Microsoft (or another company with such software) can erase spyware or viruses. But if you have, say, a pirated copy of Excel — Microsoft (or companies with similar software) can erase it, or anything else they want to erase, and not be held liable for it. Additionally, that phrase “fraudulent or other illegal activities” means they can:

—Let the local district attorney know that you wrote a hot check last month.

—Let the attorney general know that you play online poker.

—Let the tax commission know you bought cartons of cigarettes and didn’t pay the state tax on them.

—Read anything on your hard drive, such as your name, home address, personal identification code, passwords, Social Security number … etc., etc., etc.

“I think in broad terms that is still a form of spying,” said Marc Rotenberg, attorney and executive director of the Electronic Privacy Information Center in Washington, D.C. “Some people say, ‘Well, it’s justified.’ I’m not so clear that should be the case. Particularly if the reason you are passing legislation is to cover that activity.”

The bill is scheduled to go back before the House for another vote. Will the Oklahoma House, on behalf of all computer users in the state of Oklahoma, click “accept”?

Where did you go yesterday?

Computer users first accepted updates when anti-virus makers, such as Symantec Corp. or McAfee, began back in the Nineties offering regular updates in an attempt to stay current with the alarming number of viruses introduced over the Internet. This was followed by Windows ME and 2000 allowing updates to their programs via downloads. By the time Windows XP came out, regular online updates became part of the product one purchased.

At around the same time, the Napster phenomenon pushed music corporations, courts and lawmakers into taking action against online file sharing of music. Hip, computer-savvy listeners traded pirated MP3 recordings beyond count, leading to action by the music industry to go on a search and destroy mission against the online music traders, even in Oklahoma. In 2000, Oklahoma State University police seized a student’s computer containing thousands of downloaded songs after he was traced by a recording industry group.

Anti-spyware bill author Jolley said that’s what people like the OSU student get for sharing their information online.

“You have to look at the other side of that issue,” Jolley said. “When they agreed to put their files online, they literally agreed to allow people to come on their computers and search the files online. On a P-to-P (peer-to-peer) network, you are inviting other people to see what you have. That’s a risk you run by participating in file share.”

Jolley said his spyware bill is supposed to stop “phishers” from stealing one’s identity off of one’s computer, is supposed to stop “Trojan horse” viruses from being installed on the computer and is supposed to make illegal a host of other techniques for spying on a user’s personal information.

“It prohibits them from taking things as basic as your home address, your first name, your first initial in combination with your last name, your passwords, any personal identification numbers you have, any biometric information, any Social Security, tax IDs, drivers licenses, account balances, overdraft histories — there is a clear prohibition on that,” Jolley said.

Indeed, Sections 4 and 5 of the act specifically forbid anyone from doing so without the user’s permission.

However, Section 6 of the act says such a prohibition “shall not apply” to “telecommunications carrier, cable operator, computer hardware or software provider or provider of information service” and won’t apply to those companies in cases of “detection or prevention of the unauthorized use of or fraudulent or other illegal activities.”

Which means software companies updating a user’s software or the cable company monitoring that user’s activities on a broadband modem hookup can turn over that user’s history of writing hot checks to the district attorney if the company feels like it, said Rotenberg.

“You go back to the old-fashioned wiretap laws,” Rotenberg said. “There was an exception to allow telephone companies to listen in on telephone calls. The theory was that it was necessary to make sure that the service was working. Part of what’s going on here is to significantly expand that exemption to a whole range of companies that might have reason for looking on your computer. The statute will give them authority to do so. I think it’s too broad. I think the users in the end need to be able to allow that themselves.”

Jolley insists his proposed law would not allow Microsoft, Symantec or Cox Communications to become “Big Brother.”

“The goal of this is not to allow any company to go through and scan your computer,” Jolley said. “If they are, it has to be for a specific purpose. If you don’t want them doing that, don’t agree to (the user’s agreement).”

Which means, when a user accepts Microsoft’s Windows operating system on that new computer, or Norton AntiVirus, or Apple’s operating system or a host of other online-upgradable programs, that user agrees to being watched by the company.

Who on Earth would write such a law? It wasn’t Jolley, or anyone in Oklahoma.
http://www.okgazette.com/news/templa...d=423&zoneid=7





Let’s Buy Some Music: Part 1
Frank Gruber

We’ve analyzed the services that sell digital music (iTunes and its competitors). This Part 1 focuses on the pay-per-download services. In Part 2 we’ll compare the all-you-can-eat subscription services.

While compact disc sales have declined 19 percent since 2001, online music sales have started to boom. According to a recent report by the International Federation of the Phonographic Industry, revenues from digital music sales almost tripled in the last year, to $1.1 billion in 2005. Apple’s iTunes accounted for over 85 percent of the single song downloads, but Apple is not alone in the online music space.

Legal downloads now account for about 6% of record companies’ revenues, up from practically zero two years ago.

We’ve signed up for just about every music download and subscription site out there and prepared a two part feature and pricing comparison of the best. We’ve divided the sites into “rent” v. “buy”. “Rent” sites are subscription based, all-you-can-eat services where you get to listen to all music in the catalog as long as you continue to pay the monthly fee. “Buy” sites are pay-per-download services, like iTunes, where you can also burn the song to a CD, and then rip the CD back to a computer and strip out any digital rights management (DRM) restrictions.

There are eleven total sites that sell downloadable, CD-burnable music. However, two of these sites, AOL Music Now and Virgin Digital, require a paid subscription to their all-you-can-eat service in order to download songs (downloads cost an additional $0.99 each on both services). We’ve therefore left them out of the comparison chart.

Another, eMusic, is focused on independent labels, and we’ve removed it from the comparison even though it offers DRM-free music at an attractive price ($0.25 per song). eMusic is an awesome service - the side by side table comparision didn’t give it the credit it deserves.

The remaining eight services are AllofMP3, BuyMusic, iTunes, MSN Music, Napster Light, Real Rhapsody, Walmart.com and Yahoo Music Unlimited.

All but iTunes use the Windows Media Audio (WMA) file format. iTunes supports the AAC format. The only reason this is important is that Apple iPods won’t play WMA files, and non-iPods can’t play the iTunes AAC format. So your selection may largely be determined by which music player you choose to use.

The choice for best overall service is dead simple. The best service by far is AllofMP3.com. Music costs $0.02 per MB (about 9 cents per song at medium quality levels), and it can be downloaded in any common audio format and quality level. It is so cheap and easy to use that many people choose to download music from AllofMP3 in lieu of ripping their own CD collection.

The problem is that AllofMP3 operates under a different set of rules (Russian copyright law) than the rest of the companies. The service has been around for years and has many loyal users; however, its continued existence is in question. Some people have ethical concerns with using the service since no money makes its way back to the artists or labels.

Of the remaining services, the first question is what music player you will use. If you want to use an iPod, you need to use iTunes (or AllofMP3). If you want to use a non-iPod device, any of the others will work. The clear winner of the non-iTunes services is Real Rhapsody. They have one of the largest selections of music, quickly include new music, and have the cleanest user interface on the store. Rhapsody also has the highest quality downloads, at 192 kbps.

At $0.99 per song, though, Rhapsody is not the cheapest provider. That honor goes to BuyMusic at $0.79 per song. If you are price sensitive, BuyMusic may be the best choice for you.

Additional comparison information for all services is included in the table above.
http://www.techcrunch.com/2006/04/07...-music-part-1/





Internet Calls Untethered From Your PC
David Pogue

WHY does Skype get so much hype? Sure, this software lets you make free "phone calls," computer to computer, anywhere in the world. But it wasn't the first such program, it's not the most feature-laden, and it's still a mystery to most people over 25.

Yet somehow, Skype is changing everything. Twenty-five million people are using it to make free calls, much to the annoyance of the phone companies. College students call home and friends with it. Business travelers keep in touch with the family. Visitors to the United States chit-chat with their buddies in Europe, Japan or wherever. The software — free from skype.com and available for Mac, Windows, Linux and PocketPC — is pitifully easy to use, and the sound quality is more like FM radio than a phone call.

Skype's popularity has caused some impressive ripples in the fabric of business and society. The word is now a verb, ΰ la Google ("Have your people Skype my people"). Last fall, eBay bought Skype for $1.3 billion and 32.4 million shares of eBay stock. And most intriguing of all, an entire industry of Skype accessories has sprung up.

But one niggling footnote continues to dog Skype: to make free calls, you and your conversation partner must both sit there in front of your computers, nerdlike, wearing headsets. You can call regular telephones, but that's not free. (Rates are complicated, but 2.1 cents a minute is typical.) And you still have to sit handcuffed to your computer.

Wouldn't it be nice if you could make and receive Skype calls from your home phone or any ordinary cellphone?

Enter the VoSky Call Center ($60 at actiontec.com), nicknamed the Liberator. (All right, I gave it that nickname, but still.) It's a tiny black box, about the size of a sandwich, that connects to a Windows PC (with a U.S.B. cable), to your phone line and to your telephone. An exceptionally clear instruction sheet walks you through the installation.

As a final preparatory step, you're supposed to install Skype, if you haven't already, fill up its buddy list with the Skype addresses of your pals, and assign a speed-dial number to each one. Then you're ready for the VoSky magic show.

FOR its first trick, the Call Center will let you call Skype buddies using the telephone on your desk. You pick up the handset, dial ## (which means, "This one's for Skype") and listen to a recorded female voice say: "Welcome to the VoSky Call Center. Please enter your contact's speed-dial number." (She pronounces it VOSS-key.)

Fortunately, you don't have to sit through her complete recording; you can interrupt by dialing at any time. She's just a digital audio file, not easily insulted.

There's a quick click, and then the call is placed. Your comrade, perhaps thousands of miles away, hears the familiar Skype ring tone, sits down at the PC, puts on the headset and answers. You, meanwhile, chat cheerily on your cordless phone as you move about, do the laundry or set the table.

The sound quality is excellent. It's not as good as a Skype-to-Skype call, of course, because you're listening on a phone — but it's much better than a regular phone call.

If you've signed up for SkypeOut, that 2.1-cents-a-minute plan that lets you call phone numbers rather than computers, you make calls in exactly the same way. Pick up your phone and touch ##2 (or whatever the speed-dial number is), or even ## plus a standard phone number in international format.

The second magic trick is even more impressive. This time, you can make a Skype call from your cellphone, wherever you happen to be.

To make this work, you tell the Call Center's PC software ahead of time how long it should wait — say, until the fifth ring — before answering incoming calls.

Then, when you're out and about with your cellphone, you dial home. After the designated number of rings, the Call Center's recorded young lady answers. After you plug in your password, she prompts you to touch the desired speed-dial number, and off you go. You're talking free to your aunt in Antigua, from your cellphone, courtesy of your home phone and your PC.

"Free" is a relative term, of course. Just calling your home number may still be using up your cellphone's monthly minutes, depending on the time of day and what kind of cellular plan you have. Even so, you'll save a lot of money if you call internationally.

Trick No. 3 is Skype forwarding. If you're away from home when somebody tries to reach you using Skype, the Call Center rings your cellphone (or any number you specify) so you can take the call.

The Call Center's last trick is call return, and it's pretty neat. Suppose you try to reach Dad in Dallas, but he's not at his desk. In that case, the Call Center's recorded voice offers to call you back when he is online. Sooner or later, when you least expect it, your cellphone rings; it's your Call Center, whose voice lets you know that Dad is online again. She tells you that if you'd like to call him right now (using Skype), press 1.

Incidentally, none of this affects your home phone's ability to make regular phone calls. You place them just as you always do (without dialing ## first), and the phone rings normally when someone calls you. Handy indicator lights on the Call Center box let you know whether you're answering a regular call or an Internet call.

This all sounds pretty complicated on paper, no doubt. But for the most part, each individual function is beautifully done, crisply and simply executed and easily learned.

There are, alas, exceptions.

They begin with the necessity to leave your PC turned on, with Skype running, at all times. That requirement alone may be a show-stopper for anyone concerned about the environment or electric bills.

Another issue is that to make a Skype call from your phone, you have to use the handset to which it's connected. You can't use another extension in the house (unless it's part of a multihandset cordless system).

Then there's the dialing-in problem. You see, the Call Center can, at your option, turn the computer into a digital answering machine; if you've turned it on, calling your home number produces the young woman's voice saying, "Please leave a message" (although if you're calling in so you can make a Skype call, you can just tap out your password instead).

So what's the problem? Incredibly, you can't replace the young woman's answering-machine greeting with a recording of your own voice.

Yet if you don't turn on the answering function, then calling your home number greets you with a recording that says, "Please enter your password." That's great if it's you calling, but it's bound to befuddle anyone else who happens to call. The only way to avoid that problem is to set the Call Center to wait, say, eight rings, long after your traditional answering machine picks up. But then, of course, you sacrifice the entire "call home to call Skype" feature.

And speaking of the recordings: Good heavens, was this the best voice-over talent ActionTec could find? The young lady speaks slowly and self-consciously, like the world's worst actor in a junior high musical. You can just imagine her saying, "Do not look now, Dorothy, but are those flying monkeys I see? Oh dear me."

If those gotchas don't getcha, though, you'd be hard-pressed to find another $60 gadget that works so crisply, reliably and efficiently. If you're among the 25 million existing Skypaholics, the Call Center could magnify the pleasure of making those free calls. And if you're not, the VoSky Call Center is one more reason to see what Skype is all about.
http://www.nytimes.com/2006/04/06/te...919e0f&ei=5087





Old Fashion, High Tech USB Skype Phone

Do you pine for the good old days when things were simpler, even the telephones? Then at the same time hunger for high tech computers and prefer Skype over your grandmothers old rotary phone? This may well be the phone to bring both old fashioned and high tech together in the same odd product.

While it may look like your grandmothers old phone from the 50's, this is actually a USB 1.1 powered Skype phone for use with your PC. Powered entirely by the USB bus, there is no need for an external power supply. Plug this phone in and you can go old school, and new school at the same time. The phone is Windows XP and 2000 compatible.
http://www.everythingusb.com/digital...dc-nctel1.html





Cell Phone Industry Steps Closer to VoIP
Ryan Nakashima

Wojtek Felendzer held a mobile phone to his ear as he walked across the room, the call automatically switching behind the scenes from a Wi-Fi wireless hotspot to the regular cellular network.

"Can you still hear me?" the Nokia Corp. employee asked.

"Yes," the reporter answered.

"That's good," he said. "This is seamless handover. The voice didn't drop. Nothing bad happened."

While Felendzer took only a few steps, his demonstration at the CTIA Wireless 2006 conference here proved that mobile Voice over Internet Protocol, or VoIP, technology has made a meaningful step forward.

For years, Wi-Fi telephones and walkie-talkie-like communicators have been available for hospitals and offices. Now, manufacturers and mobile carriers are preparing to link standard cellular networks to the mishmash of Wi-Fi hotspots, a move that will expand coverage and perhaps make cheaper mobile minutes a reality.

The technology, called Unlicensed Mobile Access, or UMA, will help those who have high-speed Wi-Fi routers overcome any poor coverage in their houses or apartments. It's also a way for mobile carriers to expand their footprint without spending lots of money on new infrastructure.

UMA could enable users of souped-up handsets to wirelessly download content at broadband speeds at home and take that on the road when they leave.

"Everything from multimedia to audio, video - when you look at the capabilities of phones now, the options expand pretty quickly," Nokia spokesman Eric Estroff said.

At the conference in Las Vegas last week, Samsung Electronics Co. Ltd. unveiled its t709 phone capable of seamlessly accessing Wi-Fi and cellular networks. Nokia's 6136 and Motorola Inc. (MOT)'s A910 were introduced in February at a conference in Spain.

ABI Research expects the market for Wi-Fi enabled mobile handsets to reach 100 million units annually by 2009.

Carriers in Europe have expressed interest. France Telecom (FTE) SA has said it will be Nokia's first European customer for its UMA phones, while Nordic operator TeliaSonera AB said in February it is moving ahead with trials for business customers.

But U.S. carriers were tightlipped about when they might roll out the service and at what price, despite Nokia and Samsung representatives saying they would start selling functioning handsets in the country this year.

T-Mobile USA, a unit of Deutsche Telekom AG (DT), was widely expected to be among the first by tapping its 7,400 Wi-Fi hotspots at hotels, airports and Starbucks coffee shops nationwide.

Its logo also adorned Samsung's new model on display here, but a T-Mobile USA spokesman said the company had no comment.

Cingular Wireless LLC, jointly owned by landline giants AT&T Inc. (T) and BellSouth Corp. (BLS), said it was looking at the technology and already supports a personal digital assistant that receives data on Wi-Fi and cellular networks.

But analysts said Cingular is concerned that offering Wi-Fi calls inside a home could hurt its parent companies' landline businesses.

Plus, there's the question of how to charge customers, who might expect free calls.

"Pricing is always an issue," said Cingular spokesman Ritch Blasi. "Who's network are you going to be using, and do you share minutes? ... People might expect that because they're calling on a Wi-Fi that they're paying for a broadband connection into their home already."

But such offerings could help traditional landline phone companies retain customers who are increasingly using VoIP phones enabled by eBay Inc. (EBAY)'s Skype or Vonage Holdings Corp., industry executives and analysts say.

"This is a proactive response from them to get out of this threat of Voice over IP," said Steven Shaw, director of marketing for Kineto Wireless, a Milpitas, Calif.-based company developing UMA technology.

"You see this giant bucket of minutes called fixed-network minutes going toward zero because of Skype and Voice over IP," he said. "You've now got the option to take those minutes and put those on the mobile network as fast as possible. That's what UMA does."

UMA works by tunneling cellular information packets through the Internet when Wi-Fi is available and reverting to cellular towers when it is not. A back-end controller inside the network makes the switch.

Voice minutes over Wi-Fi networks are far cheaper than minutes on cellular networks because they use free radio spectrum and the Internet and do not require large cell towers.

Nearly 200 U.S. cities have announced plans to offer Wi-Fi hotspots free of charge. Last week, Google Inc. (GOOG) and EarthLink Inc. (ELNK) became the leading bidders for building a Wi-Fi network in San Francisco, a project that would make it the largest city in the nation to offer a free service.

Frank Hanzlik, managing director of the Wi-Fi Alliance, a global nonprofit industry group, said cost savings will drive growth in Wi-Fi-enabled mobile phones.

"They're keeping you connected in the best way at the lowest cost. And that's really good for the consumer."

But he said technical and business issues may slow progress. Some raised concerns that users with computer-like devices may be able to switch voice carriers once they get Wi-Fi access.

"It's not going to be for everyone and it's not going to happen overnight," Hanzlik said. "This is absolutely a journey and it's going to take place in several steps."
http://apnews1.iwon.com//article/200...D8GSN4V00.html





Pay to payphones
Web copy

PeerBox is a peer-to-peer file sharing application for the next generation mobile devices.

PeerBox allows searching for files in open P2P networks, downloading the files onto the phone and sharing the files with other users.

PeerBox also allows downloading premium content from Nareos servers. PeerBox is integrated with 3rd party Robust Audio Hashing (fingerprinting) technology to recognize copyrighted content and collect payments for it.

PeerBox home screen gives access to various PeerBox screens, as well as to featured and recommended songs.

For each one of the songs, you can view the details, and download the songs.

In PeerBox beta, all the songs are free.
http://www.peerboxmobile.com/peerboxmobile/Whatis.aspx





Looking at the Free Market, and Seeing Red
Randall Stross

LOU DOBBS is a master of the sinister tease. Last month, he was in top form. Previewing a story, he told viewers of his nightly CNN newscast that when the State Department seeks secure network communications, it "turns to Communist China," and thus renders the United States "perhaps more vulnerable than ever."

The story turned out to be another Lou Dobbs exercise in bashing immigrants, or, more precisely, bashing a single immigrant: Lenovo, the PC maker originally based in China that last year acquired I.B.M.'s PC division and is now based in Raleigh, N.C. Lenovo recently won a competitive bid to sell the State Department $13 million worth of personal computers. Mr. Dobbs, like some politicians on Capitol Hill, suggests that those PC's could provide shadowy spooks in the Chinese government with an ideal means of conducting espionage.

Merely hinting at such a possibility is enough to hurt Lenovo's reputation. This is a potentially serious impairment in the highly competitive, commoditized PC business. What is happening to Lenovo, the most internationalized company in the industry, is a drive-by smearing.

Mr. Dobbs is not the only practitioner of the hit-and-run attack. In his segment about Lenovo he called upon Michael R. Wessel, a member of the U.S.-China Economic and Security Review Commission, an advisory body to Congress. Mr. Wessel said that the State Department would use the Lenovo computers in offices around the world, potentially providing China access to "some of our deepest secrets," a "treasure trove of information they could use against us."

Mr. Wessel's segment was too brief to explain how China's agents would be able to grab hold of the machines to install the software for clandestine data transmission back to the party's Central Committee. The Lenovo desktops headed for the State Department will be assembled in facilities in North Carolina, not a People's Liberation Army compound in China. Also unexplained was how infected machines would meet General Services Administration security standards and get past the State Department's two computer security groups, which oversee the administration of their own test suites and install firewalls and other security software.

Last week, I spoke with Mr. Wessel to learn more about the basis for his alarm. It turned out that he was not able to describe how Chinese agents could gain access to the Lenovo machines, undetected, while they were being assembled.

When I asked why he thought the State Department's security procedures were inadequate, he suggested that he could not say because the State Department had been less than forthcoming with him. "We don't fully know" what the procedures are, he said. But when I asked him if he had requested information from the department about its protocols before he publicly voiced his concerns about the Lenovo deal, he said he had not.

Larry M. Wortzel, the chairman of the security review commission on which Mr. Wessel serves, was even more animated in asserting that there were security risks in the Lenovo sale to the State Department. When I spoke with him, he professed to be mystified as to "why the State Department would take the risk." What had the State Department told him about its security procedures? He, too, had yet to speak with anyone there; the commission's request for a briefing had been drafted but not yet sent.

Both commissioners assume that Lenovo is managed by puppets whose strings are pulled in Beijing. Mr. Wessel said he was certain that "a major portion" of Lenovo was "controlled by the Chinese government." State enterprises are placed in the hands of "princelings," who are the children of government leaders, he began to explain before I interrupted.

Princelings installed at the meritocratic Lenovo? When I asked Mr. Wessel to identify a Lenovo princeling, he said, "I haven't done a research of Lenovo." He said he had merely "raised questions" and had "never purported to have answers." This was similar to the reply from Mr. Wortzel when he was asked to substantiate his allegations with details.

The fact is that Lenovo is a living repudiation of the system that these critics assume it represents. It was born in 1984 from un-Communist entrepreneurial impulses among a group of Chinese computer scientists who wanted to start their own company. Their employer, the Chinese Academy of Sciences, gave them $25,000 in venture capital, and off they went. It was among the first Chinese companies to issue employee stock options.

The Academy of Sciences retains a minority ownership position, but so do I.B.M. and three American private-equity firms. The largest block of shares is owned by public shareholders. (Its shares are traded on the Hong Kong exchange.) Lenovo is headed not by a princeling but by an American, William J. Amelio — a former senior vice president for Dell, as it happens.

Perhaps the security concerns could be validated by an authority on China's military. I spoke with James C. Mulvenon, deputy director of the Center for Intelligence Research and Analysis, which is based in Washington and run by Defense Group Inc.

Dr. Mulvenon said he had many concerns about China's state-sponsored espionage activities, but Lenovo was not on his list. He described the controversy about Lenovo as "xenophobia and anti-China fervor dressed up as a technology concern."

Rob Enderle of the Enderle Group, a technology consulting firm in San Jose, Calif., said he also saw the criticism of Lenovo as lacking in substance. With an executive staff split between Chinese and Americans, Lenovo is the most global company in the PC industry, he said. The real story, he said, was that these critics were "really torqued that China is out-executing the U.S."

Lenovo is an inviting magnet for all sorts of free-floating American anxieties about global competition. The visceral nature of these concerns can be seen in other remarks by Mr. Wortzel of the U.S.-China Economic and Security Review Commission. He said, "As a taxpayer, I have a serious concern about why my tax money is spent on a computer made by a company owned by the government of the People's Republic of China." Why, he asked, couldn't the State Department place its order with a "100 percent American-owned company"?

The cold-war template of us versus them, capitalist versus Communist, does not fit the geography of the globalized supply chain that underpins the computer industry. All players, even the "100 percent American-owned" vendors, have a major presence in China. Roger L. Kay, the president of Endpoint Technologies Associates, a consulting firm in Natick, Mass., said China had attracted so many companies based in the United States that the PC ecosystem there had reached a critical mass. Low-cost production is not the draw. "Now the reason you want to be in China," he said, "is because that's where everyone else is."

Wishing wistfully for a return to the past — in which I.B.M. was still in the PC business — is not likely to improve American competitiveness here and now. Mr. Enderle said that ignoring the discomfiting fact that technology companies based in the United States are losing leadership positions to their counterparts in east Asia — not just China, but also Taiwan and South Korea — does not make the problem go away. "It's still going to hit us," he said.

NEVERTHELESS, Mr. Dobbs and members of the U.S.-China Economic and Security Review Commission have tarred Lenovo with suspicion of espionage — and the State Department with being their willing dupe. Mr. Kay says the damage to Lenovo has been done, even if the State Department purchase proceeds.

"The next time," Mr. Kay predicted, "the government bureaucrat will say: 'Do I want to go through this? No, I'll go with the company that is perceived as American.' "

The smears will linger, he fears. "Facts don't matter," he said. "Perception matters."
http://www.nytimes.com/2006/04/09/bu...ey/09digi.html





Alarm Over Shopping Radio Tags
David Reid

Supermarkets have already brought everything under the sun under one roof, and along the way been accused of denuding the High Street of butcher, baker and candlestick-maker.

Now they are introducing a new technology that some say threatens a fundamental invasion of our privacy.

We are all familiar with barcodes, those product fingerprints that save cashiers the bother of keying in the code number of everything we buy.

Now, meet their replacement: the RFID tag, or radio frequency ID tag.

These smart labels consist of a tiny chip surrounded by a coiled antenna.

Good tracking

While barcodes need to be manually scanned, RFID simply broadcasts its presence and data to electronic readers.

It means the computer networks of companies can track the position and progress of billions of products on rail, road, sea and shelf.

Albrecht Von Truchsess, from the German supermarket chain Metro Group, which uses this technology, says: "RFID really brings a revolution to everything that is transported from one point to the other, and in the future you will have it really on everything.

"That means that we don't have to do anything while the goods are on the way from the production site to our stores. It is just done automatically."

For all the benefits the technology promises, the roll-out of RFID is in danger of being derailed by the public's perception of it.

A Christian author in the US, for example, has just published a book claiming RFID will evolve into the mark of the beast featured in Revelations and presage the end of the world.

'Big Brother'?

The technology has also attracted criticism from more moderate voices.

Among these is Vint Cerf. He is one of the inventors of the internet and is now employed by Google as the company's internet evangelist.

He told Click: "What everybody worries about is that these identifiers will be used not to keep track of the object, but of the person associated with the object and then there's a Big Brother scenario that everybody worries about.

"But when the economics get to the point where the readers are inexpensive and the chips are inexpensive, then you start to ask yourself who has the ability to read the chips and what do they do with the information?"

Metro sees RFID working for it by having food traceable back to the farm, queues cut to nothing, and shelves that shout when they are empty.

But with remotely readable tags on everything from boots to beans, is it the customers or what they buy that is being labelled?

Former Australian privacy commissioner Malcolm Crompton says: "If done wrongly, it really is possible that I can buy things in one shop and be tracked in another shop, that the data, once collected, stays there for someone to come in and collect and use under circumstances that I don't know about or that I don't approve of.

"I think that is when society is on a slippery slope."

The fear is that what we buy will be forever linked to us. In the nightmare scenario, an innocently discarded soft drink can could end up in what later becomes a crime scene.

RFID could open a whole new field of forensics where the tag on the can removes any reasonable doubt.

Taking steps

Concerns about RFID have been taken up by Viviane Reding, the European commissioner for information society and media.

She has recently launched a public consultation process with a view to seeing whether RFID needs to be regulated.

She says: "A new technology that is bound to be multiplied by 10 to 15 times in the next coming years in numbers of sales will not fly, and will not be of benefit to the community and to the economy if the consumers are afraid that this technology might be a threat to their privacy."

One solution being floated is the idea of killing the code on the chip as customers leave the shop.

Whatever comes out of the European Commission's consultation, it looks likely that your Saturday shop will never be the same again.
http://news.bbc.co.uk/go/pr/fr/-/1/h...ne/4886598.stm





Kanguru's 64GB King Kong Flash Drive



Kanguru has dropped the bomb on the USB 2.0 flash drive market with a whopping 64 GB of storage space on a flash drive about the size of a pack of gum. The drive is called the Kanguru Flash Drive Max. How does storing 10,666 6MB MP3s sound? What about an entire Windows XP install along with applications? All on a small flash drive with a 10 year data retention rate.

With all that storage space, you may want to encrypt some large more important files, luckily KanguruShield encryption software is included. You can encrypt not only the entire drive, but you can also set up partitions and encrypt only the ones you choose.

What's the catch when it come to this drive? Cost is the first big factor, you could actually buy an awesome laptop for what this thing retails for at an MSRP of $2799.95. Kanguru also does not mention the speed of the drive, the more cynical may see that as an admission of slow speed. Compatible with Windows, Mac and Linux the King Kong of flash drives is sure to please, if you can stomach the cost.
http://www.everythingusb.com/kanguru..._max_64gb.html

Read/write speeds are up to 9MB/5MB/sec respectively, according to the manufacturer – Jack.





From February

Officer Lost Memory Stick With Details Of Afghan Mission

The Dutch military is red-faced following the revelation it has let confidential information slip through its fingers - twice.

The military recently had to own up to losing a USB memory stick with sensitive information. Then the news division of broadcaster RTL reported on Wednesday it had come into possession of top-secret information from a second misplaced memory stick.

This information was compiled by the military about Afghanistan. Parliament is expected to give the green light on Thursday to the controversial deployment of 1,200 Dutch troops to southern Afghanistan.

A captain in the Air Force, who had spent five months in Afghanistan, left the unencrypted USB stick in a rented car two weeks ago. Two young men found it and copied the contents onto a computer.

The USB stick was returned to the captain a week ago and the finders received a gift certificate in return. The captain, according to RTL, said nothing about the incident and it only came to light when RTL received the information.

It included highly-sensitive recommendations on how Dutch troops should react when confronted with aggression. It also contained details on reconnaissance missions and security measures for Defence Minister Henk Kamp.

Kamp said on Thursday afternoon the captain has been discharged from the military.

This incident bears striking similarities to one last year when an employee of the intelligence service left computer disks in a lease car.

The disks included information about the sex life of murdered populist politician Pim Fortuyn. Crime journalist Peter R. de Vries featured the disks on his television programme.

The Public Prosecutor's Office (OM) announced on Wednesday De Vries would not be prosecuted for revealing State secrets.
http://www.expatica.com/source/site_...story_id=27303





All About NSA's and AT&T's Big Brother Machine, the Narus 6400
bewert

Earlier today we found out that the EFF had sued AT&T over their secret work with the NSA on surveillance of millions of US citizens without wiretaps. We learned that paragraph 65 of this complaint shows EFF is trying to turn it into a nationwide Class Action suit covering all current and former customers (any after 9/2001) of AT&T. And we learned that a retired AT&T technician had stepped forward and disclosed the installation of secret NSA spy equipment in the San Francisco trunk facility. As well as the belief that similar equipment is in place in Seattle, San Jose, Los Angeles and San Diego.

Specifically, this equipment was the Narus ST-6400, a machine that was capable of monitoring over 622 Mbits/second in real time in May, 2000, and capturing anything that hits its' semantice (i.e. the meaning of the content) triggers. The latest generation is called NarusInsight, capable of monitoring 10 billion bits of data per second.

Follow me over the jump and let's learn some more about the private company Narus, it's founder Ovi Cohen, and board member Bill Crowell. Shall we?
bewert's diary :: ::

Narus is a private company founded in 1997 by Ori Cohen, who had been in charge of technology development for VDONet, an early media streaming pioneer. It has venture funding from an all-star team of investors including JP Morgan Partners, Mayfield, NeoCarta, Presidio Venture Partners, Walden International, Intel, NTT Software and Sumisho Electronics.

Of note is that while Hoover's company factsheet on Narus continues to list Mr. Cohen as Chairman, while Narus's own website listing of the Board of Directors no longer mentions Mr. Cohen.

Prior to 9/11 Narus worked on building carrier-grade tools to analyze IP network traffic for billing purposes, to prevent what they term "revenue leakage". Post-9/11 they have continued down that path while adding more semantic monitoring abilities for surveillance purposes. They even brought in former Deputy Director of the NSA William P. Crowell as an addition to their Board of Directors. From the Press Release announcing this:

Crowell is an independent security consultant and holds several board positions with a variety of technology and technology-based security companies. Since 9/11, Crowell has served on the Defense Advanced Research Projects Agency (DARPA) Task Force on Terrorism and Deterrence, the National Research Council Committee on Science and Technology for Countering Terrorism and the Markle Foundation Task Force on National Security in the Information Age.

His past positions have included president and chief executive officer of Cylink, a leading provider of e-business security solutions, as well as a series of senior positions at the National Security Agency, including deputy director of operations and deputy director of the Agency. Crowell has served as chairman of the President's Export Council (PEC) Subcommittee on Encryption, which worked with the Administration, Congress and private industry to substantially loosen restrictions on the export of encryption products and technology.

"Narus has an impressive track record of working with tier-one carriers to keep their networks running safely, continuously and profitably," said William Crowell. "I look forward to helping Narus as they forge new strategic partnerships and continue to break new ground in the telecommunications industry."

So these guys (1) build hugely cool network monitoring devices and (2) are tied into US (at least) national security organizations at the highest levels. What are these hugely cool machines capable of?

From the Key Features list of NarusInsight

-Universal data collection from links, routers, soft switches, IDS/IPS, databases, etc. provides total network view across the world's largest IP networks.

-Normalization, Correlation, Aggregation and Analysis provide a comprehensive and detailed model of user, element, protocol, application and network behaviors, in real time.

-Seven 9s reliability from data collection to data processing and analysis.

-Industry-leading packet processing performance that supports network speeds of up to OC-192 at layer 4 and OC-48 at layer 7, enabling carriers to monitor traffic at either the edge of the network or at the core.

-Unsurpassed and limitless scalability to support the world's largest, most complex IP networks.

-Unparalleled flexibility -- NarusInsight's functionality can easily be configured to meet any specific customer requirement (Narus Software Developer Kit -SDK).

-Unparalleled extensibility -- NarusInsight's functionality can easily be configured to feed a particular activity or IP service such as security, lawful intercept or even Skype detection and blocking.

How powerful is this? OC-192 carries about 10 gigabits of data per second. Ten billion bits per second, monitored in real-time. That is stunning. This is one damned powerful machine, one of the most powerful I've ever heard of in 25 years in IT.

And what does it monitor while looking at this 10 billion bits of IP data per second? First lets take a look at what the network model is, the OSI model of seven layers. NarusInsight focuses on two layers: number four, the transport layer, built on standards like TCP and UDP, the physical building blocks of internet data traffic, and number seven, the application layer, built on standards like HTTP and FTP, which are dependent on the application using them, i.e. Internet Explorer, Kazaa, Skype, etc. It monitors 10 billion bits per second at level four and 2500 million bits per second at level seven. For reference, the 256K DSL line I am using equals .24 million bits per second. So one NarusInsight machine can look at 10,000 million DSL lines at once in great detail. That is a pretty damn big number. This is some really serious hardware with equally serious software. Which is our next subject.

So what exactly is done to and with this data? That's kind of a grey area, so let's try to find what we can. The starting point is called the Internet Protocol Detail Record, which Narus helped found. From that FAQ I just linked to, we learn that

IPDR stands for the Internet Protocol Detail Record, the name comes from the traditional telecom term CDR (Call Detail Record), used to record information about usage activity within the telecom infrastructure (such as a call completion).

NDM-U stands for Network Data Management - Usage. It refers to a functional operation within the Telecom Management Forum's Telecom Operations Map. The NDM function collects data from devices and services in a service providers network. Usage refers to the type of data which is the focus of this document.

IPDR.org is the non-profit organization that promotes use of the IPDR NDM-U and other related standards. The principle deliverable for IPDR.org is the NDM-U specification and related development tools.

And is it actually being used?

IPDR.org has been in existence since 1999 and more than a dozen vendors have actual IPDR implementations "etched in code". Their systems are actually able to talk to each other and interoperate. Version 2.5 and up of the NDM-U represents a stable basis for development. IPDR.org's Interoperability Pavilion is a working demonstration of multiple companies exchanging service usage data in that format.

Service usage data. That would be data on the actual usage of the Internet. And what kind of data would this be? Way back in 1999, this article stated

In an effort to provide more complex network traffic analysis, Narus is introducing its semantic network traffic service. The company cites research which predicts the fast-growing ISP sector will become stagnant without the ability to offer differentiated services. In order to gain significant revenues from these services, a technology was necessary to allow usage based pricing.

"We realized that, at the heart of the data that is needed to accurately measure usage and enable 'pay-as-you-go' business models for Internet service providers, is what we call the 'semantics' of network traffic," said Ori Cohen, Narus' founder and chief executive officer.

"In short, by seeing the 'semantics' of network traffic, service providers can see 'inside' the data, providing much more detailed insight about the use of the Internet and the perceived value of specific applications than existing technologies allow."

Semantic Traffic Analysis uses network technology to consistently capture and analyze all IP data streams on heavily trafficked networks remotely and non-invasively. In addition, the semantics of the data stream are determined also, as well as the protocol used and the application taking place. A variety of other data is available as well.

Remember that semantics is not just the data, but rather the meaning of the data. It looks at the the data in a more comprehensive way than looking for keywords. Each NarusInsight machine does this at 2500 million bits per second, in real-time.

You really wonder why BushCo doesn't want to talk about this stuff? It's the biggest invasion of privacy in history by several orders of magnitude.

How can we know? From Narus' Lawful Intercept and Regulatory Compliance page:
Explosive Internet growth in recent years has transformed worldwide communications, yielding tremendous efficiencies and benefits, as well as many risks.

For example, terrorist attacks around the globe have been carefully orchestrated through Internet-based forms of communications such as e-mail, messaging, hidden Web pages and now VoIP, forcing governmental organizations and law enforcement agencies to re-evaluate how they are providing public security as it becomes so much easier and faster to communicate electronically.

Recent mandates and the resulting standards referenced under CALEA in the United States and ETSI in Western Europe aim to preserve the right of law enforcement agencies to conduct authorized electronic surveillance in an effort to protect the public and its right to privacy. However, these mandates create IT headaches for carriers as they struggle to meet the requirements.

With a suite of products targeted at meeting lawful intercept requirements, Narus simplifies lawful intercept tasks helping carriers and agencies meet requirements without experiencing any degradation in service quality.

Key benefits

-Packet-mode data intercepts for Service Providers and Carriers.
-Wireline to wireless and WiFi or dialup to broadband.
-"Instant Compliance" with CALEA and ETSI for simple, fast and hands-free compliance.
-Carrier-grade speeds, performance and scalability.
-Supports all of your services, out-of-the-box.
-Securely manages resources while simplifying audits and reporting.
-Network and vendor agnostic.
-Enables additional application for revenue generation or revenue protection.

This data flows right into NarusInsight Intercept Suite, which enables

Packet-level, flow-level, and application-level usage information is captured and analyzed as well as raw user session packets for forensic analysis, surveillance or in satisfying regulatory compliance for lawful intercept.

The Lawful Intercept module offers carriers and service providers compliance with regulatory requirements regarding lawful intercept. The Lawful Intercept module provides an end-to-end solution consisting of Administration, Access and Delivery functions. The Lawful Intercept module is compliant with CALEA and ETSI standards. It can be seamlessly integrated with third party products for testing/validation or as a complete law enforcement solution.

The Directed Analysis module seamlessly integrates with NarusInsight Secure Suite or other DDoS, intrusion or anomaly detection systems, securely providing analysts with real-time, surgical targeting of suspect information (from flow to application to full packets). The Directed Analyis module provides industry standard formats and offers tools for archival and integration with third party investigative tools.

These capabilities include playback of streaming media (i.e. VoIP), rendering of web pages, examination of e-mail and the ability to analyze the payload/attachments of e-mail or file transfer protocols. Narus partner products offer the ability to quickly analyze information collected by the Directed Analysis or Lawful Intercept modules. When Narus partners' powerful analytic tools are combined with the surgical targeting and real-time collection capabilities of Directed Analysis and Lawful Intercept modules, analysts or law enforcement agents are provided capabilities that have been unavailable thus far.

Imagine how great a tool "instant compliance" with the Communications Assistance for Law Enforcement Act could be with this kind of reach and detail. Especially if a secret Presidential Directive allows it to be used without the warrants required under the Act.

That's what it appears we are up against, folks. Real-time semantic data monitoring on a huge scale. A scale beyond what most of us can even comprehend. It's scarey.
http://www.dailykos.com/storyonly/2006/4/8/14724/28476





This Boring Headline Is Written for Google

EXTRA EXTRA READ ALL ABOUT IT
Steve Lohr

JOURNALISTS over the years have assumed they were writing their headlines and articles for two audiences — fickle readers and nitpicking editors. Today, there is a third important arbiter of their work: the software programs that scour the Web, analyzing and ranking online news articles on behalf of Internet search engines like Google, Yahoo and MSN.

The search-engine "bots" that crawl the Web are increasingly influential, delivering 30 percent or more of the traffic on some newspaper, magazine or television news Web sites. And traffic means readers and advertisers, at a time when the mainstream media is desperately trying to make a living on the Web.

So news organizations large and small have begun experimenting with tweaking their Web sites for better search engine results. But software bots are not your ordinary readers: They are blazingly fast yet numbingly literal-minded. There are no algorithms for wit, irony, humor or stylish writing. The software is a logical, sequential, left-brain reader, while humans are often right brain.

In newspapers and magazines, for example, section titles and headlines are distilled nuggets of human brainwork, tapping context and culture. "Part of the craft of journalism for more than a century has been to think up clever titles and headlines, and Google comes along and says, 'The heck with that,' " observed Ed Canale, vice president for strategy and new media at The Sacramento Bee.

Moves to accommodate the technology are tricky. How far can a news organization go without undercutting its editorial judgment concerning the presentation, tone and content of news?

So far, the news media are gingerly stepping into the field of "search engine optimization." It is a booming business, estimated at $1.25 billion in revenue worldwide last year, and projected to more than double this year.

Much of this revenue comes from e-commerce businesses, whose sole purpose is to sell goods and services online. For these sites, search engine optimization has become a constant battle of one-upmanship, pitting the search engine technologists against the marketing experts and computer scientists working for the Web sites.

Think of it as an endless chess game. The optimizer wizards devise some technical trick to outwit the search-engine algorithms that rank the results of a search. The search engines periodically change their algorithms to thwart such self-interested manipulation, and the game starts again.

News organizations, by contrast, have moved cautiously. Mostly, they are making titles and headlines easier for search engines to find and fathom. About a year ago, The Sacramento Bee changed online section titles. "Real Estate" became "Homes," "Scene" turned into "Lifestyle," and dining information found in newsprint under "Taste," is online under "Taste/Food."

Some news sites offer two headlines. One headline, often on the first Web page, is clever, meant to attract human readers. Then, one click to a second Web page, a more quotidian, factual headline appears with the article itself. The popular BBC News Web site does this routinely on longer articles.

Nic Newman, head of product development and technology at BBC News Interactive, pointed to a few examples from last Wednesday. The first headline a human reader sees: "Unsafe sex: Has Jacob Zuma's rape trial hit South Africa's war on AIDS?" One click down: "Zuma testimony sparks HIV fear." Another headline meant to lure the human reader: "Tulsa star: The life and career of much-loved 1960's singer." One click down: "Obituary: Gene Pitney."

"The search engine has to get a straightforward, factual headline, so it can understand it," Mr. Newman said. With a little programming sleight-of-hand, the search engine can be steered first to the straightforward, somewhat duller headline, according to some search optimizers.

On the Web, space limitations can coincide with search-engine preferences. In the print version of The New York Times, an article last Tuesday on Florida beating U.C.L.A. for the men's college basketball championship carried a longish headline, with allusions to sports history: "It's Chemistry Over Pedigree as Gators Roll to First Title." On the Times Web site, whose staff has undergone some search-engine optimization training, the headline of the article was, "Gators Cap Run With First Title."

The Associated Press, which feeds articles to 11,000 newspapers, radio and television stations, limits its online headlines to less than 40 characters, a concession to small screens. And on the Web, there is added emphasis on speed and constant updates.

"You put those demands, and that you know you're also writing for search engines, and you tend to write headlines that are more straightforward," said Lou Ferrara, online editor of The Associated Press. "My worry is that some creativity is lost."

Whether search engines will influence journalism below the headline is uncertain. The natural-language processing algorithms, search experts say, scan the title, headline and at least the first hundred words or so of news articles.

Journalists, they say, would be wise to do a little keyword research to determine the two or three most-searched words that relate to their subject — and then include them in the first few sentences. "That's not something they teach in journalism schools," said Danny Sullivan, editor of SearchEngineWatch, an online newsletter. "But in the future, they should."

Such suggestions stir mixed sentiments. "My first thought is that reporters and editors have a job to do and they shouldn't worry about what Google's or Yahoo's software thinks of their work," said Michael Schudson, a professor at the University of California, San Diego, who is a visiting faculty member at the Columbia University Graduate School of Journalism.

"But my second thought is that newspaper headlines and the presentation of stories in print are in a sense marketing devices to bring readers to your story," Mr. Schudson added. "Why not use a new marketing device appropriate to the age of the Internet and the search engine?"

In journalism, as in other fields, the tradition of today was once an innovation. The so-called inverted pyramid structure of a news article — placing the most important information at the top — was shaped in part by a new technology of the 19th century, the telegraph, the Internet of its day. Putting words on telegraph wires was costly, so reporters made sure the most significant points were made at the start.

Yet it wasn't all technological determinism by any means. The inverted pyramid style of journalism, according to Mr. Schudson, became standard practice only in 1900, four decades or more after telegraph networks came into use. It awaited the rise of journalists as "an avowedly independent, self-conscious, professionalizing group," confident of their judgments about what information was most important, he said.

The new technology shaped practice, but people determined how the technology was used — and it took a while. Something similar is the likely path of the Internet.

"We're all struggling and experimenting with how news is presented in the future," said Larry Kramer, president of CBS Digital Media. "And there's nothing wrong with search engine optimization as long as it doesn't interfere with news judgment. It shouldn't, and it's up to us to make sure it doesn't. But it is a tool that is part of being effective in this medium."
http://www.nytimes.com/2006/04/09/we...pagewanted=all





But the crank’s so cool!

Negroponte: Slimmer Linux Needed For $100 Laptop
Stephen Shankland

The One Laptop Per Child organization will use Linux on its inexpensive machines, but the operating system suffers the same code bloat as Windows, the project's leader said Tuesday.

"People aren't thinking about small, fast, thin systems," said Nicholas Negroponte, chairman of the One Laptop Per Child nonprofit association, in a speech at the LinuxWorld Conference and Expo here. "Suddenly it's like a very fat person (who) uses most of the energy to move the fat. And Linux is no exception. Linux has gotten fat, too."

The association hopes to distribute 5 million to 10 million of the systems to children in India, China, Brazil, Argentina, Thailand, Egypt, and Nigeria in the first quarter of 2007, somewhat later than the late 2006 launch Negroponte predicted at the World Economic Forum last year. He hopes the project will help supply the world's billion children with an education that undertrained teachers often can't supply. "At least 50 percent of those children don't get anything that even approximates what you and I would call an education," he said.

Microsoft Chairman Bill Gates criticized the initiative's products earlier this year, saying they should use more powerful machines with better displays, though Gates subsequently offered a warmer opinion. Negroponte chafed at Gates' view nonetheless.

"It's not about a weak computer. It's about a thin, slim, trim, fast computer," he said. Not only that, Microsoft is even involved in the effort. "We are also talking to Microsoft constantly. We are going to ship them development boards. They are going to make a Windows CE version (that supports the hardware). So jeez--why criticize me in public?"

System specs
The system will use a 500MHz processor from Advanced Micro Devices with 128MB of memory. It will use 512MB of flash memory and no hard drive, he said. The biggest remaining cost is the display.

The system will use a dual-mode display with a black-and-white, 1110-by-830-pixel mode in sunlight and a 640-by-480-pixel color mode otherwise.

Negroponte said one meeting with an unnamed display manufacturer spotlighted the importance of high-volume manufacturing.

"I said, 'We'd like to work with you on the display. We need a small display. It doesn't have perfect color uniformity, it can have pixel or two missing, it doesn't have to be that bright," Negroponte recounted. "The manufacturer said, 'Our strategic plan is to make big displays with perfect color uniformity, zero pixel defects and to make it very bright for the living room.'"

"I said, 'That's too bad, because I need 100 million a year.' They said, 'Well, maybe we can change our strategic plan.' That's the reason you need scale," Negroponte said.

As initially envisioned, the laptops sported a hand crank on the side to generate power, but Negroponte has scrapped that idea because the twisting forces that would be bad for the machine. Instead, some form of power generation device, likely a pedal, will be attached to the AC power adapter, he said.

"I was the longest holdout for the crank being on the laptop. I was wrong," he said, adding, "If you're a 10-year-old, maybe you can get your four-year-old to pedal for you."

The organization's goal is to sell $135 laptops in 2007, then cut the price to $100 in 2008 and $50 in 2010, he said.

The machines will consume 2 watts of power when running, 1 watt for the display, Negroponte said.

He's not worried about connecting the machines to the Internet because networking will develop on its own, he said, but later added that the vision relies on a built-in "mesh" network that links all the machines, even when the rest of the computers are shut down.

"I think between WiFi, WiMax and 3G, that's going to happen," Negroponte said. "We're heading to the point where 50 percent of the world will have a cell phone or some kind of (communication device) within 18 months. It's too voice-centric, and I could campaign to make it more data-centric, but that's going to happen, too."

The laptops mesh networks will be anchored by data cached locally on $100 servers to be housed at schools, he added.

Once children have the laptops, they'll teach themselves, he predicted, making teacher training beside the point. "Teachers teach the kids? Give me a break," he said. "Give any kid an electronic game and the first thing they do is throw away the manual and the second thing they do is use it."
http://news.com.com/Negroponte+Slimm...3-6057456.html





Few Buyers At Patent Auction
Michael Kanellos

It looked like it was going to be Gary's lucky day.

An inventor, engineer and co-owner of a two-person company in Cleveland, he offered up a suite of patents for varying the valve timing in car engines at the Ocean Tomo Patent Auction here Thursday. The night before the auction, he said he has tried to commercialize the invention for several years. Ford Motor called him for a meeting in Detroit, but nothing happened. He also went to England to meet another manufacturer, but no licensing deal transpired.

"I am sort of ambivalent about selling," said Gary, who asked that he be identified only by his first name to preserve anonymity. "This has been six or seven years of my life."

Bidding climbed fast. "$1.1 million I am bid," said British auctioneer Charles Ross. "$1.3 million," he bellowed. "$1.4 million. Do I hear $1.5 million."

Then something occurred that seemed to happen quite a bit at the auction: No further bids came in. The last $1.4 million bid didn't meet the reserve, and the lot was withdrawn. No sale.

"We had the second highest bid out there," Gary said after the auction. He was upbeat and said he and his partner would continue to try to sell it.

Buyers and sellers had a tough time connecting at the highly publicized auction. Seventy-four lots of patents were offered up for auction, but only around 25 sold. Most of the time, the bids failed to meet the minimum reserve set by the seller, causing the item to be withdrawn.

A few auctions generated a fanfare of drama. A patent submitted by inventor Douglas J. Ballantyne for compressing movies for distribution on TVs went on the block at $300,000. "$450,000 I'm now bid. The bid is $500,000" said Ross. It climbed to $650,000 and stalled, but then ratcheted up rapidly to $900,000.

After crossing $1 million, only two bidders were left. It went to $1.1 million, then $1.2, followed by $1.3 million. The room of more than 300 attendees went silent. Ross stared at one of the bidders. Seconds passed. Ross didn't smile or change his expression, but he shifted his gaze to the other bidder.

"I will sell the lot for $1.4 million," he bellowed, notifying the room that the last bidder has just raised the sale price during that last exchange of stares. "Going once for $1.4 million. Going twice...Sold for $1.4 million."

A few rounds before that, a bidding duel between a woman and a man I couldn't pick out in the crowd drove the price of a set of patents for a flash memory module from 3Com from $350,000 to $950,000 in just a few minutes. The audience burst into applause.
Auction highs and lows
But those were the rare highlights. Most of the other patents sold for between $8,000 and $10,000, many to an anonymous bidder over the phone. An unidentified woman in the crowd also 'hoovered' in a few patents in this price range from a variety of fields. The running suspicion among people at the cocktail party that followed was that she came from a patent firm that earns revenue from licensing or suing others. (No one wore name tags to preserve anonymity.)

Some patents didn't even get bidders. Ross started the bidding on a patent for preventing air conditioners from overheating at $500,000. "Will someone bid me $500,000? $300,000...$200,000," he said. "I don't like going backward." When no bids emerged, the lot was withdrawn.

"When you're selling paintings or cars, you rarely go below $300,000," Ross, who also appears on Antiques Roadshow in England, said after the auction. "But patents are different. No one is going to come in and say, 'That is going for three-quarters of a million dollars. I think I will give it a punt.'"

The wide variety of the offerings did make it tough for sellers, many said after the auction. When the automotive patents were on the block, the bidders from semiconductor companies sat on their hands. Material science companies bid on things like the patent for Estrified propoxylated glycerols (a fat substitute invented by Arco Chemical) while the parties who showed up for the patent from inventor Andrea Rose for sizing clothes online sat on their hands.

Still, many bids came close to the reserve, said Jim Malackowski, CEO of Ocean Tomo, and eight sellers said they would stick around to hammer out deals with the potential buyers.

"The serious bidders did their homework," Malackowski said. "The result was kind of what we expected."

Future auctions will likely have to be better calibrated, said Stuart Soffer, an intellectual property consultant and technical expert witness from Menlo Park, Calif. Most sellers overvalued the value of their patents. Many, he added, will also likely have trouble getting more money through licensing their patents than they would have obtained by selling at the auction for a price that was below their reserve. The auctions should also more tightly follow a theme so the majority of the bidders who attend will be interested in most of the patents, he added.

The slow pace and low bids on some of the lots surprised him. "I wanted to get up and say, 'Ok. I bid $1,000," Soffer laughed.

But, like on eBay, the sellers who managed to offload something were glad they participated. Jeff Rosedale, an attorney at Woodcock and Washburn in Philadelphia, managed to sell a patent that grew out of his doctoral thesis. He got $10,000 for it. It will have to be split four ways, and he spent about $1,000 in attending the auction, he said.

"So I made a little money. Now, that's not counting the hours I put in (evaluating the value of the patent," he said. "But it was worth it."

Thursday's auction, he added, is likely only a first step in a process that will become more common.
http://news.com.com/Few+buyers+at+pa...3-6058737.html





Some Worries as San Francisco Goes Wireless
Laurie J. Flynn

When Mayor Gavin Newsom announced 18 months ago that he intended to provide free wireless access to all of the city's 760,000 residents, Chris Vein said he felt sorry for the "poor guy" who would have to carry out the complex task. Today, nine months after taking the job as head of the city's technology department, Mr. Vein is the point person in negotiations over the details.

Last week, the city announced it had selected Google and EarthLink to build the wireless network, which it hopes will be in operation early next year. The two companies, along with Tropos Networks and Motorola, which will help build the infrastructure for the network, beat out five other bidding teams in a six-week review process.

The exact terms and business model are to be decided in negotiations that are expected to begin next month between the city and EarthLink, the lead company.

But in the few days since the winning bidder was announced, the city, along with Mr. Vein, has found itself at the center of debate about the role of advertising, the implications of the network on consumer privacy and the effect on telecommunications companies that today sell Internet access in the city.

The San Francisco service will be EarthLink's fourth municipal wireless network. The plan is to blanket the city's 49 square miles so that all residents can connect to the Internet from their homes and offices and even from their neighborhood park.

Mr. Vein said that, from the start, the project's mission had been to help bridge the so-called digital divide by providing wireless access to residents who could not get it otherwise.

"This is really intended to help those people first, and everybody else second," said Mr. Vein, San Francisco's executive director of telecommunications and information services.

The other companies that submitted bids for the city contract were SF Metro Connect, a collaboration between Cisco Systems; I.B.M. and SeaKay Inc., a nonprofit group; Communications Bridge Global; MetroFi; NextWLAN; and Razortooth Communications.

Mr. Vein, who was not on the review committee, said the group led by EarthLink narrowly beat out MetroFi. Mr. Vein said that EarthLink's experience building a similar high-profile wireless network under construction in Philadelphia may have contributed to its winning the San Francisco contract.

Users of the network in San Francisco will be able to choose from two options. From Google, at no cost, they will be able to connect to the Internet at the modest speed of 300 kilobits a second, about six times as fast as a dial-up connection but slower than cable service. The trade-off is that they will see a variety of on-screen advertising, though exactly what that will look like is part of the negotiations.

Or, for an estimated $20 a month, subscribers will be able to connect through EarthLink at roughly four times that speed and see no advertising at all.

Mr. Vein said he thought the typical San Francisco resident, and the additional 400,000 who commute into the city every weekday, would take advantage of the free service, but that the city's many small businesses would likely pay for the faster service.

San Francisco already has more wireless hot spots than most other American cities — about 800 of them, nearly 400 of them free, according a recent report by JBoss, a research company — but the new network would extend throughout the entire city.

For Google, the San Francisco network is indicative of the company's move to expand well beyond search, into areas like local advertising and real estate listings.

But even before the city announced the winning bidder, privacy advocates had begun to criticize the Google approach for what they say is its potential to violate consumer privacy. Early last week, the Electronic Frontier Foundation and the Electronic Privacy Information Council released a joint report calling the EarthLink and Google proposal "privacy-invasive," because it would involve "cookies" that track users from session to session to enable customized delivery of ads.

Mr. Vein said the criticism was premature given that the city and the companies had not yet negotiated the details of the network.

"While we have picked somebody, we haven't necessarily agreed to the details of the proposal," Mr. Vein said. "It is just a starting point."

Mr. Vein said the city would make decisions related to privacy as the issues came up during negotiations. "I will be pushing to maintain the privacy and security of citizens as best I can as I put this deal together," he said.

Megan Quinn, a Google spokeswoman, said the company intended to work closely with the city and EarthLink to allay any concerns. "Always our users' privacy and security are of utmost importance to us," she said. "This is a planning process."

At the formal announcement of the project last October, Mr. Newsom told reporters he feared that telecommunication companies serving San Francisco would try to block the building of the network. At the time, SBC Communications (now AT&T), Comcast and other companies in California argued that low-cost access to the Internet was already widely available to the public in San Francisco.

In addition to Philadelphia, EarthLink is building wireless citywide networks in Anaheim and Milpitas, Calif., all priced at $20 a month. Dozens of other cities have various wireless networks under development or in the planning stages, including Chicago, Boston and Austin, Tex.

MetroFi already offers citywide wireless access in several midsize Silicon Valley cities including Cupertino, Sunnyvale and Santa Clara.

Esme Vos, who writes about municipal wireless projects at muniwireless.com, estimates that cities, towns and counties in the United States will spend nearly $700 million over the next three years to build citywide wireless networks.

William Tolpegin, vice president for development and planning at EarthLink in Atlanta, said the EarthLink-led consortium expected to spend $8 million to $10 million to build the network in San Francisco.
http://www.nytimes.com/2006/04/10/te...gy/10wifi.html





A Web Site Born in U.S. Finds Fans in Brazil
Seth Kugel

RIO DE JANEIRO — Ask Internet users here what they think of Orkut, the two-year-old Google social networking service, and you may get a blank stare. But pronounce it "or-KOO-chee," as they do in Portuguese, and watch faces light up.

"We were just talking about it!" said Suellen Monteiro, approached by a reporter as she gossiped with four girlfriends at a bar in the New York City Center mall here. The topic was the guy whom 18-year-old Aline Makray had met over the weekend at a Brazilian funk dance, who had since found her on Orkut and asked her to join his network.

Orkut, the invention of a Turkish-born software engineer named Orkut Buyukkokten, never really caught on in the United States, where MySpace rules teenage cyberspace. But it is nothing short of a cultural phenomenon in Brazil.

About 11 million of Orkut's more than 15 million users are registered as living in Brazil — a remarkable figure given that studies have estimated that only about 12 million Brazilians use the Internet from home. (And that 11 million does not include people like Ms. Makray, who clicked on Hungary as a nod to her heritage, or someone named Mauricio who wrote in Portuguese but jokingly registered as being from Mauritius.)

Expect Brazilian Portuguese dictionaries to add "orkut" to upcoming editions. O Globo, Rio's biggest daily newspaper, refers to it without further explanation. And the Brazilian media routinely measures the popularity of music groups and actors by the number of user communities dedicated to them on Orkut.

"Surto," a popular comedic play showing in Rio de Janeiro, is peppered with references to Orkut. And the site's jargon has entered the Brazilian lexicon, like "scrap" (pronounced "SKRAH-pee" or "SHKRAH-pee"), meaning a note that one user leaves in another's virtual scrapbook for everyone — including jealous boyfriends and girlfriends and curious suitors — to see.

But the sheer popularity of Orkut, which people can join by invitation only, has had several unexpected consequences. Almost as soon as Brazilians started taking over Orkut in 2004 — and long before April 2005, when Google made Orkut available in Portuguese — English-speaking users formed virulently anti-Brazilian communities like "Too Many Brazilians on Orkut."

And, more darkly, Orkut's success has made it a popular vehicle for child pornographers, pedophiles and racist and anti-Semitic groups, according to Brazilian prosecutors and nonprofit groups. Hatemongering on Orkut has also been decried in the United States and elsewhere, but it is in Brazil where the biggest effort is under way to halt the problem and confront Google's seemingly tight-lipped attitude.

SaferNet Brasil, a nongovernmental organization founded late last year, tracks human rights violations on Orkut and has generated much press coverage of illegal activity on the site. (Many forms of racist speech are outlawed in Brazil.)

SaferNet's president, Thiago Nunes de Oliveira, a professor of cyberlaw at the Catholic University of Salvador, said the problem had exploded in the last few months. "In 45 days of work, we identified 5,000 people who were using the Internet, and principally Orkut, to distribute images of explicit sex with children," he said. And that was aside from the racists, neo-Nazis and other hate groups the organization found.

In February, after several failed attempts to contact Google's Brazil office, Mr. Nunes de Oliveira said, SaferNet Brasil filed a complaint with federal prosecutors in Sγo Paulo. Prosecutors summoned Google's Brazilian sales staff to a meeting on March 10 and asked them for help identifying users breaking Brazilian human rights laws.

Google declined a reporter's requests for a direct interview with Mr. Buyukkokten, but a spokeswoman forwarded some of Mr. Buyukkokten's responses by e-mail. The Brazilian office, he said, handles ad sales and does not even work with Orkut, which produces no revenue. "Orkut prohibits illegal activity (such as child pornography) as well as hate speech and advocating violence," he wrote. "We will remove such content from Orkut when we are notified."

But Mr. Nunes de Oliveira said that removing the content was not what they were asking for. "The incapacity of the authorities to investigate these crimes is principally the lack of cooperation by Google in identifying those users," he said. He also worried that Google was not archiving evidence of crimes as it deleted offending pages.

Thamea Danelon Valiengo, part of a team of federal prosecutors working on cybercrime cases in Sγo Paulo, agreed. She said that prosecutors had asked judges to order Google to turn over information on users who perpetrate crimes. So far, she said, Google has agreed to send a lawyer to Brazil for a meeting in May.

Mr. Buyukkokten wrote by e-mail that Google would cooperate with the authorities, but did not specify whether, for example, it would provide logs allowing users to be traced by their Internet address, as prosecutors have asked. A Google spokeswoman, Debbie Frost, said by e-mail that in four to six weeks, Orkut would deploy a tool that would "better identify and remove content that violates our terms of use."

In general, though, Orkut fanatics seem undisturbed by illegal activity on the site, which most of those interviewed said they had never come across personally. They were more interested in finding long-lost classmates and friends, one of the site's most lauded abilities. Schools, workplaces, even residential streets have "communities" joined by people who have studied, worked or lived there.

And everyone has stories of romance foiled by a telltale posting. Ms. Makray once found the page of a man who had flirted with her in a club. "He hadn't told me that he had children or that he was married," she said. "I discovered it on Orkut."

Erika Laun, 23, checks Orkut every day from work to keep an eye on her boyfriend. "When we were first going out," she said, "a girl who liked him was always sending messages and making fun of the messages that I sent him." The rival's sister, whom he didn't even know, helped out, sending messages like "Hey big boy, love you, 1,000 kisses."

"I was really angry," Ms. Laun said.

No one quite knows why Orkut caught on among Brazilians and not Americans, although the fact that it is an invitation-only network might explain why it exploded in Brazil. In a 2005 interview with the newspaper Folha de Sγo Paulo, Mr. Buyukkokten said it might be because Brazilians were "a friendly people," and perhaps because some of his own friends, among the first to join the network, had Brazilian friends.

Fernanda Leon, an architecture student eating at a Middle Eastern restaurant here with her boyfriend, said she thought Brazil had gravitated toward Orkut because of the country's inherently social culture. "Brazilians really want to interact with other people, both old friends and new people," she said. She has 379 friends on her network.

Mr. Nunes de Oliveira of SaferNet stressed that he was only against the illegal uses of Orkut. "It's a fantastic tool, an excellent service," he said. "We do not want it gone."
http://www.nytimes.com/2006/04/10/te...y/10orkut.html





As Katrina Recedes, Newspapers Still Float
Katharine Q. Seelye

Glenn Currie, an architect, slid 50 cents into a coin box here the other morning and pulled out a copy of The Sun Herald, the local daily published in nearby Gulfport.

"I read it every day," he said. "They report what we need to know."

Mr. Currie, 59, said he especially appreciated the paper's before-and-after series, which features a building before Hurricane Katrina struck seven months ago, and after, often to shocking effect.

Less than 80 miles west in New Orleans, a similarly intense reader interest is taking place. At CC's coffeehouse on Magazine Street one morning last week, there were so many people absorbed in that day's Times-Picayune that the scene looked like a commuter train.

"These writers are energized and passionate," said Angele Thionville, 34, a mother of three boys, as she glanced up from the paper. She was not a big fan of The Times-Picayune before Katrina, she said, but now if she misses the paper one day, "I feel so out of touch."

While much of the country has moved on from coverage of Katrina, considered the largest natural disaster in modern American history, both The Sun Herald and The Times-Picayune remain all Katrina, all the time. For their role in covering and enduring the storm, both papers have received accolades, and next week both may well receive Pulitzer Prizes.

Both papers have struggled along with their communities, and during the recovery have faced some similar issues and adopted similar approaches to their new reality. But there are major differences, too. Both have taken on a new importance as news sources and as advocates in their communities. With buildings along 70 miles of the Gulf Coast reduced to matchsticks and parts of New Orleans abandoned and still without reliable electricity or phone service, The Sun Herald and Times-Picayune are connecting with readers the way newspapers did before the arrival of television.

The big question, ultimately tied to the economic fortunes of their areas, is what kind of future these newspapers will have as news organizations and businesses. Here their stories diverge. The Sun Herald, which before the storm had a circulation of 47,000 daily and 55,000 on Sunday, has rebuilt its circulation and advertising base; it is just 400 shy of its prestorm circulation and a few percentage points short of its prestorm ad revenue.

Even as many homes and buildings remain skeletal or in mounds of debris, the presence of casinos here and the likelihood that more will come has instilled confidence in the region.

The Times-Picayune, which had more than five times the circulation of The Sun Herald, now has regained about two-thirds of its readers, with a circulation of 176,000 daily and 196,000 on Sunday. But readers are returning faster than advertisers. Only 10 percent of the city's businesses have reopened. "We're suffering significant revenue losses," said Ashton Phelps Jr., publisher of the newspaper, which is owned by Advance Publications.

The obstacles that New Orleans and its newspaper faced in the storm and continue to face are on a different order of magnitude from the Gulf Coast as a whole. More than 200 people died in Mississippi, and 300 are still missing. In New Orleans, more than 1,100 died, and 2,000 are missing.

New Orleans faces bigger challenges, too, in part because of its terrain. The water remained in New Orleans, while it quickly drained from other communities along the coast. New Orleans is scrambling to reinforce the levees as the next hurricane season approaches, and residents are still waiting for flood maps before they decide whether to rebuild, leaving a cloud of uncertainty over the city. It is also in the midst of a chaotic mayor's race with two dozen candidates, making its leadership seem unstable and its direction unclear.

The tiny Sun Herald, indeed much of the Gulf Coast, has been overshadowed by the attention paid to New Orleans. But recognition may be at hand. Editor & Publisher, which reports on the newspaper business, said last month that The Sun Herald was in line to receive the Pulitzer Prize for public service.

The Times-Picayune, according to Editor & Publisher, is a Pulitzer finalist in two categories: commentary (by Chris Rose, one of its columnists) and breaking news, for reporting that a major levee had been breached and the city was being flooded while other media were reporting that New Orleans had been spared.

The Pulitzer board, which does not comment on finalists at this stage of the process, is meeting in New York later in the week to vote on the winners, and is to announce them next Monday.

The report that The Sun Herald may be under consideration for the public service award, journalism's highest honor, has already been something of a victory for the paper — and something of a disappointment for The Times-Picayune, stoking a newfound competition between the two. The Sun Herald likes to emphasize that it did not miss a day of print publication, while The Times-Picayune points to the scope of the disaster in New Orleans and its near-impossible reporting conditions.

The Pulitzer board can move finalists to different categories, so no one can say if either paper will make the cut or in which category. But the head-to-head competition over Katrina coverage suggests that the board will have to grapple with the very definition of public service.

The spotlight on New Orleans after Katrina has been a sore point for Mississippi. The Sun Herald has editorialized to that effect, complaining that the national media had left the broader Gulf Coast a footnote in the New Orleans story.

Before the storm, The Sun Herald, which is owned by Knight Ridder, had an emergency plan in place. The paper, in advance, sent four of its news staff members and two Knight Ridder designers to its sister paper, The Ledger-Enquirer in Columbus, Ga., while most of the staff reported along the coast and hunkered down in the Sun Herald building.

The building was built after Hurricane Camille destroyed the region in 1969. It sustained little damage from Katrina, and its presses remained dry, but it lost all power and communications. Shortly, the Knight Ridder cavalry arrived in Gulfport.

"They showed up with sat phones, chain saws, food and water," said Stan Tiner, The Sun Herald's editor and a former marine. "The logistics were very well organized." Even P. Anthony Ridder, the company's chief executive, showed up.

The Times-Picayune staff evacuated its building in delivery trucks as the floodwaters rose, and headed to Baton Rouge, La. A small band of reporters and editors felt sick at the thought of leaving and commandeered a delivery truck to return to New Orleans, defying martial law to report the news. The Times-Picayune suspended publication for three days.

Staff members at both papers experienced much of the grief that their readers did, but while many lost their houses, no employees died. Some lost loved ones, and all have their own harrowing tales.

Jean Prescott, 64, a features writer at The Sun Herald, said that her sister and her sister's husband drowned in their house. The authorities subsequently misplaced the bodies, she said, then they cremated someone else instead of her sister. The family did not receive her sister's ashes for three months.

"It wasn't unique," Ms. Prescott said. "So many people were found dead, they just couldn't keep track."

Workers at both papers said they are throwing themselves into telling their readers' stories instead of coping with their own.

"We're journalists and we just pack it away," said James O'Byrne, 46, features editor of The Times-Picayune, whose home was ruined. "You don't get a special badge of courage for losing your home," he said; it was a common event.

Anita Lee, 49, a reporter at The Sun Herald, said, "We're just not dealing with a lot of it," as she stepped around the debris of her former home and showed off the government-issued trailer where she lives now. "Our insurance is up in the air, our S.B.A. loan is not finalized, our house has not been torn down, and we're writing about other people in the same situation."

In some ways, she said, the shared experience with her readers has made her job easier. "I always tried to get to a level of understanding with the people I was interviewing," she said. "Now I get there a lot quicker."

The experience has given the pages of both papers a new urgency, and both seem less constrained by traditional objectivity, to the point of printing front-page editorials.

"We're far more direct in getting at what we think matters," said Jim Amoss, the editor of The Times-Picayune. "The urgency is palpable."

Mike Perlstein, 45, a criminal justice reporter at The Times-Picayune, said that articles about underhanded dealings and "good-old-boy New Orleans ways of doing things" that once drew ho-hum reactions are now "drawing howls of outrage from readers and keeping the news staff really engaged."

"There are issues on the business side, as there are with any newspaper," he added. "But we're still riding a riveting and unbelievable story about the rebuilding of a major American city."

Part of that rebuilding for the city and the paper depends on the return of advertisers. "It's a chicken-and-egg thing," said Tod Smith, who directs advertising plans for major clients in New Orleans. "What comes first, the services that people need? Or the people who support the services? There are a lot of unanswered questions."

The paper has many ads for car dealers (many people had car insurance, so practically all cars in New Orleans look brand new). The paper also is running small ads for services like mold remediation and air-duct cleaning. And its big department store, Dillard's, is open and buying full-page ads.

On the Gulf Coast, Dillard's remains shuttered. But Vicki Barrett, the advertising director at The Sun Herald, said that what the paper had lost in retail advertising, it had gained in classified ads. Perhaps one measure of the comeback status of both regions is an ad in The Sun Herald that would seem unthinkable in New Orleans — a company promising to meet "all your swimming pool needs."

The Sun Herald is optimistic about its future. South Mississippi, with its miles of white sandy beachfront and new casinos being built inland, expects more than $30 billion in new investment in the next few years.

"It's going to be a boom like no newspaper market has ever seen," said Ricky R. Mathews, The Sun Herald's publisher.

Gary Pruitt, the chief executive of McClatchy, which recently agreed to buy Knight Ridder, agrees. Mr. Pruitt is selling 12 of Knight Ridder's 32 papers, but he is keeping The Sun Herald, saying it meets his criteria for a growth market.

"We're basing our decision on our readings of the business and population projections and the resiliency of the local economy," he said.

Mr. Phelps, of The Times-Picayune, addressed the matter at a meeting of newspaper executives recently.

"The $64,000 question for us is this: What is the economy going to look like 18 months, two years from now, when most of the insurance checks have been cashed and the federal relief efforts taper off?" Mr. Phelps asked.

"We just don't know," he said, adding later: "The truth is that it's so big, we have still not found the bottom of how life has changed for us. We're still riding Katrina's winds."
http://www.nytimes.com/2006/04/10/bu...hurricane.html





How to

Capture HDTV Using Your Firewire-Equipped Cable Box
HDJunkie

According to FCC regulations, all DVRs that cable companys rent must have an active firewire port. While unfortunately you likely won't be able to record premium channels such as HBO, INHD, DiscoveryHD. All broadcast channels must be open. If any broadcast channels are encrypted a quick call to your cable company will fix this. This is a dream come true for all you TV archivers.

While I use this method primarily for recording 720p, and 1080i HDTV sources, this will work for standard definition digital channels as well.

Method and links.





Are Software Patents Evil?
Paul Graham

A few weeks ago I found to my surprise that I'd been granted four patents. This was all the more surprising because I'd only applied for three. The patents aren't mine, of course. They were assigned to Viaweb, and became Yahoo's when they bought us. But the news set me thinking about the question of software patents generally.

Patents are a hard problem. I've had to advise most of the startups we've funded about them, and despite years of experience I'm still not always sure I'm giving the right advice.

One thing I do feel pretty certain of is that if you're against software patents, you're against patents in general. Gradually our machines consist more and more of software. Things that used to be done with levers and cams and gears are now done with loops and trees and closures. There's nothing special about physical embodiments of control systems that should make them patentable, and the software equivalent not.

Unfortunately, patent law is inconsistent on this point. Patent law in most countries says that algorithms aren't patentable. This rule is left over from a time when "algorithm" meant something like the Sieve of Eratosthenes. In 1800, people could not see as readily as we can that a great many patents on mechanical objects were really patents on the algorithms they embodied.

Patent lawyers still have to pretend that's what they're doing when they patent algorithms. You must not use the word "algorithm" in the title of a patent application, just as you must not use the word "essays" in the title of a book. If you want to patent an algorithm, you have to frame it as a computer system executing it. Then it's mechanical; phew. The default euphemism for algorithm is "system and method." Try a patent search for that phrase and see how many results you get.

Since software patents are no different from hardware patents, people who say "software patents are evil" are saying simply "patents are evil." So why do so many people complain about software patents specifically?

I think the problem is more with the patent office than the concept of software patents. Whenever software meets government, bad things happen, because software changes fast and government changes slow. The patent office has been overwhelmed by both the volume and the novelty of applications for software patents, and as a result they've made a lot of mistakes.

The most common is to grant patents that shouldn't be granted. To be patentable, an invention has to be more than new. It also has to be non-obvious. And this, especially, is where the USPTO has been dropping the ball. Slashdot has an icon that expresses the problem vividly: a knife and fork with the words "patent pending" superimposed.

The scary thing is, this is the only icon they have for patent stories. Slashdot readers now take it for granted that a story about a patent will be about a bogus patent. That's how bad the problem has become.

The problem with Amazon's notorious one-click patent, for example, is not that it's a software patent, but that it's obvious. Any online store that kept people's shipping addresses would have implemented this. The reason Amazon did it first was not that they were especially smart, but because they were one of the earliest sites with enough clout to force customers to log in before they could buy something. [1]

We, as hackers, know the USPTO is letting people patent the knives and forks of our world. The problem is, the USPTO are not hackers. They're probably good at judging new inventions for casting steel or grinding lenses, but they don't understand software yet.

At this point an optimist would be tempted to add "but they will eventually." Unfortunately that might not be true. The problem with software patents is an instance of a more general one: the patent office takes a while to understand new technology. If so, this problem will only get worse, because the rate of technological change seems to be increasing. In thirty years, the patent office may understand the sort of things we now patent as software, but there will be other new types of inventions they understand even less.

Applying for a patent is a negotiation. You generally apply for a broader patent than you think you'll be granted, and the examiners reply by throwing out some of your claims and granting others. So I don't really blame Amazon for applying for the one-click patent. The big mistake was the patent office's, for not insisting on something narrower, with real technical content. By granting such an over-broad patent, the USPTO in effect slept with Amazon on the first date. Was Amazon supposed to say no?

Where Amazon went over to the dark side was not in applying for the patent, but in enforcing it. A lot of companies (Microsoft, for example) have been granted large numbers of preposterously over-broad patents, but they keep them mainly for defensive purposes. Like nuclear weapons, the main role of big companies' patent portfolios is to threaten anyone who attacks them with a counter-suit. Amazon's suit against Barnes & Noble was thus the equivalent of a nuclear first strike.

That suit probably hurt Amazon more than it helped them. Barnes & Noble was a lame site; Amazon would have crushed them anyway. To attack a rival they could have ignored, Amazon put a lasting black mark on their own reputation. Even now I think if you asked hackers to free-associate about Amazon, the one-click patent would turn up in the first ten topics.

Google clearly doesn't feel that merely holding patents is evil. They've applied for a lot of them. Are they hypocrites? Are patents evil?

There are really two variants of that question, and people answering it often aren't clear in their own minds which they're answering. There's a narrow variant: is it bad, given the current legal system, to apply for patents? and also a broader one: it is bad that the current legal system allows patents?

These are separate questions. For example, in preindustrial societies like medieval Europe, when someone attacked you, you didn't call the police. There were no police. When attacked, you were supposed to fight back, and there were conventions about how to do it. Was this wrong? That's two questions: was it wrong to take justice into your own hands, and was it wrong that you had to? We tend to say yes to the second, but no to the first. If no one else will defend you, you have to defend yourself. [2]

The situation with patents is similar. Business is a kind of ritualized warfare. Indeed, it evolved from actual warfare: most early traders switched on the fly from merchants to pirates depending on how strong you seemed. In business there are certain rules describing how companies may and may not compete with one another, and someone deciding that they're going to play by their own rules is missing the point. Saying "I'm not going to apply for patents just because everyone else does" is not like saying "I'm not going to lie just because everyone else does." It's more like saying "I'm not going to use TCP/IP just because everyone else does." Oh yes you are.

A closer comparison might be someone seeing a hockey game for the first time, realizing with shock that the players were deliberately bumping into one another, and deciding that one would on no account be so rude when playing hockey oneself.

Hockey allows checking. It's part of the game. If your team refuses to do it, you simply lose. So it is in business. Under the present rules, patents are part of the game.

What does that mean in practice? We tell the startups we fund not to worry about infringing patents, because startups rarely get sued for patent infringement. There are only two reasons someone might sue you: for money, or to prevent you from competing with them. Startups are too poor to be worth suing for money. And in practice they don't seem to get sued much by competitors, either. They don't get sued by other startups because (a) patent suits are an expensive distraction, and (b) since the other startups are as young as they are, their patents probably haven't issued yet. [3] Nor do startups, at least in the software business, seem to get sued much by established competitors. Despite all the patents Microsoft holds, I don't know of an instance where they sued a startup for patent infringement. Companies like Microsoft and Oracle don't win by winning lawsuits. That's too uncertain. They win by locking competitors out of their sales channels. If you do manage to threaten them, they're more likely to buy you than sue you.

When you read of big companies filing patent suits against smaller ones, it's usually a big company on the way down, grasping at straws. For example, Unisys's attempts to enforce their patent on LZW compression. When you see a big company threatening patent suits, sell. When a company starts fighting over IP, it's a sign they've lost the real battle, for users.

A company that sues competitors for patent infringement is like a a defender who has been beaten so thoroughly that he turns to plead with the referee. You don't do that if you can still reach the ball, even if you genuinely believe you've been fouled. So a company threatening patent suits is a company in trouble.

When we were working on Viaweb, a bigger company in the e-commerce business was granted a patent on online ordering, or something like that. I got a call from a VP there asking if we'd like to license it. I replied that I thought the patent was completely bogus, and would never hold up in court. "Ok," he replied. "So, are you guys hiring?"

If your startup grows big enough, however, you'll start to get sued, no matter what you do. If you go public, for example, you'll be sued by multiple patent trolls who hope you'll pay them off to go away. More on them later.

In other words, no one will sue you for patent infringement till you have money, and once you have money, people will sue you whether they have grounds to or not. So I advise fatalism. Don't waste your time worrying about patent infringement. You're probably violating a patent every time you tie your shoelaces. At the start, at least, just worry about making something great and getting lots of users. If you grow to the point where anyone considers you worth attacking, you're doing well.

We do advise the companies we fund to apply for patents, but not so they can sue competitors. Successful startups either get bought or grow into big companies. If a startup wants to grow into a big company, they should apply for patents to build up the patent portfolio they'll need to maintain an armed truce with other big companies. If they want to get bought, they should apply for patents because patents are part of the mating dance with acquirers.

Most startups that succeed do it by getting bought, and most acquirers care about patents. Startup acquisitions are usually a build-vs-buy decision for the acquirer. Should we buy this little startup or build our own? And two things, especially, make them decide not to build their own: if you already have a large and rapidly growing user base, and if you have a fairly solid patent application on critical parts of your software.

There's a third reason big companies should prefer buying to building: that if they built their own, they'd screw it up. But few big companies are smart enough yet to admit this to themselves. It's usually the acquirer's engineers who are asked how hard it would be for the company to build their own, and they overestimate their abilities. [4] A patent seems to change the balance. It gives the acquirer an excuse to admit they couldn't copy what you're doing. It may also help them to grasp what's special about your technology.

Frankly, it surprises me how small a role patents play in the software business. It's kind of ironic, considering all the dire things experts say about software patents stifling innovation, but when one looks closely at the software business, the most striking thing is how little patents seem to matter.

In other fields, companies regularly sue competitors for patent infringement. For example, the airport baggage scanning business was for many years a cozy duopoly shared between two companies, InVision and L-3. In 2002 a startup called Reveal appeared, with new technology that let them build scanners a third the size. They were sued for patent infringement before they'd even released a product.

You rarely hear that kind of story in our world. The one example I've found is, embarrassingly enough, Yahoo, which filed a patent suit against a gaming startup called Xfire in 2005. Xfire doesn't seem to be a very big deal, and it's hard to say why Yahoo felt threatened. Xfire's VP of engineering had worked at Yahoo on similar stuff-- in fact, he was listed as an inventor on the patent Yahoo sued over-- so perhaps there was something personal about it. My guess is that someone at Yahoo goofed. At any rate they didn't pursue the suit very vigorously.

Why do patents play so small a role in software? I can think of three possible reasons.

One is that software is so complicated that patents by themselves are not worth very much. I may be maligning other fields here, but it seems that in most types of engineering you can hand the details of some new technique to a group of medium-high quality people and get the desired result. For example, if someone develops a new process for smelting ore that gets a better yield, and you assemble a team of qualified experts and tell them about it, they'll be able to get the same yield. This doesn't seem to work in software. Software is so subtle and unpredictable that "qualified experts" don't get you very far.

That's why we rarely hear phrases like "qualified expert" in the software business. What that level of ability can get you is, say, to make your software compatible with some other piece of software-- in eight months, at enormous cost. To do anything harder you need individual brilliance. If you assemble a team of qualified experts and tell them to make a new web-based email program, they'll get their asses kicked by a team of inspired nineteen year olds.

Experts can implement, but they can't design. Or rather, expertise in implementation is the only kind most people, including the experts themselves, can measure. [5]

But design is a definite skill. It's not just an airy intangible. Things always seem intangible when you don't understand them. Electricity seemed an airy intangible to most people in 1800. Who knew there was so much to know about it? So it is with design. Some people are good at it and some people are bad at it, and there's something very tangible they're good or bad at.

The reason design counts so much in software is probably that there are fewer constraints than on physical things. Building physical things is expensive and dangerous. The space of possible choices is smaller; you tend to have to work as part of a larger group; and you're subject to a lot of regulations. You don't have any of that if you and a couple friends decide to create a new web-based application.

Because there's so much scope for design in software, a successful application tends to be way more than the sum of its patents. What protects little companies from being copied by bigger competitors is not just their patents, but the thousand little things the big company will get wrong if they try.

The second reason patents don't count for much in our world is that startups rarely attack big companies head-on, the way Reveal did. In the software business, startups beat established companies by transcending them. Startups don't build desktop word processing programs to compete with Microsoft Word. [6] They build Writely. If this paradigm is crowded, just wait for the next one; they run pretty frequently on this route.

Fortunately for startups, big companies are extremely good at denial. If you take the trouble to attack them from an oblique angle, they'll meet you half-way and maneuver to keep you in their blind spot. To sue a startup would mean admitting it was dangerous, and that often means seeing something the big company doesn't want to see. IBM used to sue its mainframe competitors regularly, but they didn't bother much about the microcomputer industry because they didn't want to see the threat it posed. Companies building web based apps are similarly protected from Microsoft, which even now doesn't want to imagine a world in which Windows is irrelevant.

The third reason patents don't seem to matter very much in software is public opinion-- or rather, hacker opinion. In a recent interview, Steve Ballmer coyly left open the possibility of attacking Linux on patent grounds. But I doubt Microsoft would ever be so stupid. They'd face the mother of all boycotts. And not just from the technical community in general; a lot of their own people would rebel.

Good hackers care a lot about matters of principle, and they are highly mobile. If a company starts misbehaving, smart people won't work there. For some reason this seems to be more true in software than other businesses. I don't think it's because hackers have intrinsically higher principles so much as that their skills are easily transferrable. Perhaps we can split the difference and say that mobility gives hackers the luxury of being principled.

Google's "don't be evil" policy may for this reason be the most valuable thing they've discovered. It's very constraining in some ways. If Google does do something evil, they get doubly whacked for it: once for whatever they did, and again for hypocrisy. But I think it's worth it. It helps them to hire the best people, and it's better, even from a purely selfish point of view, to be constrained by principles than by stupidity.

(I wish someone would get this point across to the present administration.)

I'm not sure what the proportions are of the preceding three ingredients, but the custom among the big companies seems to be not to sue the small ones, and the startups are mostly too busy and too poor to sue one another. So despite the huge number of software patents there's not a lot of suing going on. With one exception: patent trolls.

Patent trolls are companies consisting mainly of lawyers whose whole business is to accumulate patents and threaten to sue companies who actually make things. Patent trolls, it seems safe to say, are evil. I feel a bit stupid saying that, because when you're saying something that Richard Stallman and Bill Gates would both agree with, you must be perilously close to tautologies.

The CEO of Forgent, one of the most notorious patent trolls, says that what his company does is "the American way." Actually that's not true. The American way is to make money by creating wealth, not by suing people. [7] What companies like Forgent do is actually the proto-industrial way. In the period just before the industrial revolution, some of the greatest fortunes in countries like England and France were made by courtiers who extracted some lucrative right from the crown-- like the right to collect taxes on the import of silk-- and then used this to squeeze money from the merchants in that business. So when people compare patent trolls to the mafia, they're more right than they know, because the mafia too are not merely bad, but bad specifically in the sense of being an obsolete business model.

Patent trolls seem to have caught big companies by surprise. In the last couple years they've extracted hundreds of millions of dollars from them. Patent trolls are hard to fight precisely because they create nothing. Big companies are safe from being sued by other big companies because they can threaten a counter-suit. But because patent trolls don't make anything, there's nothing they can be sued for. I predict this loophole will get closed fairly quickly, at least by legal standards. It's clearly an abuse of the system, and the victims are powerful. [8]

But evil as patent trolls are, I don't think they hamper innovation much. They don't sue till a startup has made money, and by that point the innovation that generated it has already happpened. I can't think of a startup that avoided working on some problem because of patent trolls.

So much for hockey as the game is played now. What about the more theoretical question of whether hockey would be a better game without checking? Do patents encourage or discourage innovation?

This is a very hard question to answer in the general case. People write whole books on the topic. One of my main hobbies is the history of technology, and even though I've studied the subject for years, it would take me several weeks of research to be able to say whether patents have in general been a net win.

One thing I can say is that 99.9% of the people who express opinions on the subject do it not based on such research, but out of a kind of religious conviction. At least, that's the polite way of putting it; the colloquial version involves speech coming out of organs not designed for that purpose.

Whether they encourage innovation or not, patents were at least intended to. You don't get a patent for nothing. In return for the exclusive right to use an idea, you have to publish it, and it was largely to encourage such openness that patents were established.

Before patents, people protected ideas by keeping them secret. With patents, central governments said, in effect, if you tell everyone your idea, we'll protect it for you. There is a parallel here to the rise of civil order, which happened at roughly the same time. Before central governments were powerful enough to enforce order, rich people had private armies. As governments got more powerful, they gradually compelled magnates to cede most responsibility for protecting them. (Magnates still have bodyguards, but no longer to protect them from other magnates.)

Patents, like police, are involved in many abuses. But in both cases the default is something worse. The choice is not "patents or freedom?" any more than it is "police or freedom?" The actual questions are respectively "patents or secrecy?" and "police or gangs?"

As with gangs, we have some idea what secrecy would be like, because that's how things used to be. The economy of medieval Europe was divided up into little tribes, each jealously guarding their privileges and secrets. In Shakespeare's time, "mystery" was synonymous with "craft." Even today we can see an echo of the secrecy of medieval guilds, in the now pointless secrecy of the Masons.

The most memorable example of medieval industrial secrecy is probably Venice, which forbade glassblowers to leave the city, and sent assassins after those who tried. We might like to think we wouldn't go so far, but the movie industry has already tried to pass laws prescribing three year prison terms just for putting movies on public networks. Want to try a frightening thought experiment? If the movie industry could have any law they wanted, where would they stop? Short of the death penalty, one assumes, but how close would they get?

Even worse than the spectacular abuses might be the overall decrease in efficiency that would accompany increased secrecy. As anyone who has dealt with organizations that operate on a "need to know" basis can attest, dividing information up into little cells is terribly inefficient. The flaw in the "need to know" principle is that you don't know who needs to know something. An idea from one area might spark a great discovery in another. But the discoverer doesn't know he needs to know it.

If secrecy were the only protection for ideas, companies wouldn't just have to be secretive with other companies; they'd have to be secretive internally. This would encourage what is already the worst trait of big companies.

I'm not saying secrecy would be worse than patents, just that we couldn't discard patents for free. Businesses would become more secretive to compensate, and in some fields this might get ugly. Nor am I defending the current patent system. There is clearly a lot that's broken about it. But the breakage seems to affect software less than most other fields.

In the software business I know from experience whether patents encourage or discourage innovation, and the answer is the type that people who like to argue about public policy least like to hear: they don't affect innovation much, one way or the other. Most innovation in the software business happens in startups, and startups should simply ignore other companies' patents. At least, that's what we advise, and we bet money on that advice.

The only real role of patents, for most startups, is as an element of the mating dance with acquirers. There patents do help a little. And so they do encourage innovation indirectly, in that they give more power to startups, which is where, pound for pound, the most innovation happens. But even in the mating dance, patents are of secondary importance. It matters more to make something great and get a lot of users.
http://www.paulgraham.com/softwarepatents.html





Apple vs. Me
Jason D. O'Grady

Would you ever want to be on the business end of legal action from a company with US$9 billion in cash? What about being targeted for deletion by one of most powerful multi-national corporations in the world? What if a company with US$14 billion in revenue and 14,000 employees wanted a piece of your ass?

Welcome to my world.

On December 13, 2005 Apple filed suit against "Does 1-20" in a Santa Clara California court. The company obtained a court order that allows it to issue subpoenas to PowerPage (and AppleInsider) for the names of the "Does" who allegedly leaked information. A nice Christmas card from the company that I have loved and supported for years.

But Apple didn't subpoena me directly, they instead set their legal sights on the low hanging fruit - my ISP - a small company that was handling my email and Web hosting in addition to a few other clients. What's sad about Apple's approach here was that their attorneys attempted to intimidate a small host/developer/ISP with legal threats that look pretty daunting when coming from a company with US$14B in revenue on their balance sheet.

At issue was a series of stories that I ran in October 2004 about an upcoming product that was in development. Was it the next great PowerBook? Maybe the a red hot iPod? Maybe a killer new version of the OS? Nah. The stories about a FireWire breakout box for GarageBand, code-named "Asteroid." Yawn.

After the subpoenas were issued the Electronic Frontier Foundation (EFF) approached me and offered to defend me pro bono, arguing that the anonymity of my sources are protected by the same laws that protect sources who leak information to journalists.

A Santa Clara County judge decided that journalists and their sources lose constitutional protection when they publish information that a business classifies as a "trade secret." The irony here is that a large corporation can claim that their cafeteria menu is a "trade secret" then sue your ass off if you post it on your blog. The EFF filed a petition to have that decision overturned. (You can read the details of the case on the EFF Web site.)

On April 20, 2006 the Electronic Frontier Foundation (EFF) will have that petition heard by the California Court of Appeal. The purpose of the hearing is so that a judge can decide whether the Santa Clara County court made a mistake when it refused to protect my rights under the First Amendment.

A friend made one of the best analogies about the situation that I've heard: He told me that the reason why a house cat doesn't eat you is because it's smaller than you. He went on to say that if the cat was larger than you it sure as hell would eat you. It appears that Apple used to be a small, friendly cat and now (thanks in large part to the success of the iPod) it's a whole lot bigger - and starting to eat people. "Tiger" indeed.

My position on the Asteroid postings is that I didn't steal the information and I didn't ask for it. Someone volunteered it to me and it looked credible, so I posted it. It wasn't marked confidential, trade secret or any such thing but it looked legit to me, so I ran it. When Apple later asked me to remove it, I complied.

Apple feels that independent online journalists are not protected by the First Amendment of the U.S. Constitution and that a journalists confidential communications and sources should be exposed to them or any large corporation that doesn't like what they publish - at will. I think that this is completely wrong on several levels.

Here's why you should be scared:

This case is not about me, it's not about Apple and it's not about the technology industry. It's about the First Amendment. If we don't have a free press and protection under the First Amendment large corporations can sue any journalist publishing something that they don't agree with. The last time I checked, this was the United States of America - not communist China - and we are protected by a wonderful document called The Constitution.

Imagine if Apple wanted to raid your email in-box then sue you for saying something they didn't like. Something has to be done to protect the press from paranoid corporations bent on controlling the media. This case doesn't affect me, it affects every citizen in the United States.

Blogger and fellow at Harvard's Berkman Center, Derek Slater, wrote on Thursday that the lower court's decision threatens all journalists.

"EFF petitioned to correct the trial court's manifest error and restore the previously well-settled constitutional protections for a journalist's confidential information, upon which the practice of journalism and the freedom of press depend."

This decision will have a profound affect on the rights to free speech we all enjoy. Support the EFF and bloggers rights.

But don't take my word for it, read the Amicus Briefs filed in this case by several industry luminaries, including:

- Jack M. Balkin, professor of Constitutional law and the First Amendment and Director of The Information Society Project at Yale Law School.
- Eugene Volokh, professor of law at UCLA School of Law, where he teaches and writes about First Amendment law.
- A. Michael Froomkin, professor of Law at the University of Miami School of Law and well-known expert on issues of Internet governance.
- Julian Dibbell, contributing editor at Wired magazine
- Rebecca MacKinnon, journalist, media consultant, blogger and former CNN correspondent and Bureau Chief in Beijing and Tokyo.
- Glenn Harlan Reynolds, law professor at the University of Tennessee, publisher of InstaPundit and writer for MSNBC and The Wall Street Journal.
- Jay Rosen, NYU faculty member, press critic and writer whose primary focus is the media's role in a democracy.
- Scott Rosenberg, Senior Editor of Technology at Salon.com.

Some of the organizations that have supported me in this case include:

- The Associated Press
- The Hearst Corporation
- Los Angeles Times Communications
- The San Jose Mercury News
- The Copley Press
- The Mcclatchy Company
- Gawker Media Inc.
- Society Of Professional Journalists
- The First Amendment Project

http://blogs.zdnet.com/Apple/?p=170





Run Windows and Mac OS Both at Once
David Pogue

ONLY a week ago, Apple released what seemed like an astonishing piece of software called Boot Camp. This program radically rewrote the rules of Macintosh-Windows warfare — by letting you run Windows XP on a Macintosh at full speed.

Now, some in the Cult of Macintosh were baffled by the whole thing. Who on earth, they asked, wants to pollute the magnificence of the Mac with a headache like Windows XP?

Back in the real world, though, there was plenty of interest. Lots of people are tempted by the Mac's sleek looks and essentially virus-free operating system — but worry about leaving Windows behind entirely. Others would find happiness with Apple's superb music, photo and movie-making programs — but have jobs that rely on Microsoft Access, Outlook or some other piece of Windows corporate-ware.

Even many current Mac fans occasionally steal covert glances over the fence at some of the Windows-only niceties they thought they'd never have, like QuickBooks Online, AutoCad for architects, high-end 3-D Windows games, or the occasional bullheaded Web site that requires Internet Explorer for Windows.

Few could have guessed that only days later, Boot Camp would be eclipsed by something even better.

Boot Camp remains a free download from Apple.com. It's a public beta, meaning it's not technically finished. It's available only for Mac models containing an Intel chip. (So far that's the 2006 Mac Mini, iMac and MacBook Pro laptop.)

The uncomplicated installation process takes about an hour, and entails burning a CD, inserting a Windows XP installation CD (not included), and waiting around a lot.

Then you designate either Mac OS X or Windows as your "most of the time" operating system. You can also choose an operating system each time you start up the computer.

If you choose Windows, then by golly, you're in Windows. You can install and run your favorite Windows programs — speech recognition, business software, even games — and, incredibly, they run as fast and well as they ever did.

Correction: they run faster than they ever did. Most people comment that an Intel Mac runs Windows faster than any PC they've ever owned. And if the Windows side ever gets bogged down with viruses and spyware, you can flip into Mac OS X and keep right on being productive.

Boot Camp's problem, though, is right there in its name: You have to reboot (restart) the computer every time you switch systems. As a result, you can't copy and paste between Mac and Windows programs. And when you want to run a Windows program, you have to close everything you were working on, shut down the Mac, and restart it in Windows — and then reverse the process when you're done. You lose two or three minutes each way.

NO wonder, then, that last week, the corridors of cyberspace echoed with the sounds of high-fiving when a superior solution came to light. A little company called Parallels has found a way to eliminate all of those drawbacks — and to run Windows XP and Mac OS X simultaneously.

The software is called Parallels Workstation for Mac OS X, although a better name might be No Reboot Camp. It, too, is a free public beta, available for download from parallels.com. You can pre-order the final version for $40, or pay $50 after its release (in a few weeks, says the company).

Parallels, like Boot Camp, requires that you supply your own copy of Windows. But here's the cool part: with Parallels, unlike Boot Camp, it doesn't have to be XP. It can be any version, all the way back to Windows 3.1 — or even Linux, FreeBSD, Solaris, OS/2 or MS-DOS. All of this is made possible by a feature of Intel's Core Duo chips (called virtualization) that's expressly designed for running multiple operating systems simultaneously.

In the finished version, the company says, you'll be able to work in several operating systems at once. What the heck — install Windows XP three times. If one becomes virus-ridden, you can just delete it and smile.

But before your head explodes, consider the most popular case: running one copy of Windows XP on your Mac.

Suppose you're finishing a brochure on your Mac, and you need a phone number from your company's Microsoft Access database. You double-click the Parallels icon, and 15 seconds later — yes, 15 seconds — Windows XP is running in a window of its own, just as you left it. You open Access, look up and copy the contact information, click back into your Mac design program, and paste. Sweet.

Using Boot Camp, you'd restart the computer in Windows, look up the number — but then what? Without the ability to copy and paste, what would you do with the phone number once you found it? Write it on an envelope?

Parallels is very fast — perhaps 95 percent as fast as Boot Camp. (It's definitely not a software-based emulator like Microsoft's old, dog-slow Virtual PC program.) It's even fast enough for video games, although not the 3-D variety; for now, those are still better played in Boot Camp.

So if Parallels' side-by-side scheme is so superior, should Apple just fold up its little Boot Camp tent and go home? It's much too soon to say. Turns out Apple's and Parallels' definitions of "beta" differ wildly.

The Boot Camp beta feels finished and polished. Parallels, on the other hand, is obviously a labor of love by techies who are still novices in the Macintosh religion of simplicity. Its installation requires fewer steps than Boot Camp (there's no CD burning or restarting the Mac), but even its Quick Installation Guide is filled with jargon like "virtual machine" and "image file." (Parallels says it's completely rewriting its guides.)

The dialogue boxes look a little quirky, too. And to get the best features — like copying and pasting between operating systems and enlarging the Windows window to nearly full-screen size — you're supposed to install something called Parallels Tools. They ought to be installed automatically.

Even then, as of the current version (Beta 3), some features are missing in the Windows side: your U.S.B. jacks won't work, for example, and DVD's won't play (CD's do). Sometimes, beta really means beta.

Note, too, that while it's easy to copy text between Mac OS X and Windows programs, copying files and folders is trickier. You don't actually see a Windows "hard drive," as you do when using Mac OS X with Boot Camp. To drag icons back and forth, you have to share the "Mac" and the "PC" with each other over a "network" that you establish between them. Things sure get weird fast when you're running two computers in one.

Now, if you're a Mac fan, knowing that you can run Windows software so easily in Mac OS X might make your imagination run wild with possibilities. One of them, unfortunately, is a buzz killer of epic proportions: If such a feat becomes effortless, will the world's software companies lose their incentive to write Mac versions of their programs?

No one can say. But if that fate can be avoided, then the Uni-Computer will be a win-win-win. The Mac will be known as the computer that can run nearly 100 percent of the world's software catalog. Microsoft will sell more copies of Windows. Consumers will enjoy the security, silent operation and sophisticated polish of the Mac without sacrificing mission-critical Windows programs.

Apple, no doubt, is also gleefully contemplating the reaction of the masses when they experience Mac OS X and Windows side by side, day in and day out. Its Web site makes the point without much subtlety: "Windows running on a Mac," it says, is "subject to the same attacks that plague the Windows world. So be sure to keep it updated with the latest Microsoft Windows security fixes." Ouch!

So in the course of seven days, the brilliant but technical Windows-on-Mac procedure written by a couple of hackers last month — OnMac.net — has become obsolete, and two more official ways to do the unthinkable have been born. You can use Boot Camp (fast and feature-complete, but requires restarting) or, in a few weeks, the finished version of Parallels (fast and no restarting, but geekier to install, and no 3-D games).

Can't decide? Then install both. They coexist beautifully on a single Mac.

Either that, or just wait. At this rate of change and innovation, something even better is surely just another week away.
http://www.nytimes.com/2006/04/13/te...y/13pogue.html





What Killing Politicians Has to Do with Computing
Thom Holwerda

I'm from the Netherlands. That may sound like a weird statement to start a column with-- don't worry, at the end of this week's Sunday Eve Column you'll understand why I put my nationality so bluntly up front.

You see, being Dutch implies a few things. Besides it implying you are a know-it-all, it also implies a certain pride in knowing that in your country, everybody is legally equal, whether he or she be black, white, or polka dot; whether he or she be heterosexual, homosexual, or both; whether he or she be a rich banker, a hard working carpenter, or a chronic patient of whatever disease unemployed at home. That equality stems from the first article of the Dutch Constitution [.pdf], which states:

"All who are in The Netherlands, will in equal cases be treated as equals. Discrimination on the grounds of religion, way of life, political orientation, race, sex, or any other ground, is prohibited."

This is the very basis on which this little country is built. This 1st Article can be seen shining through Dutch society everywhere; be it same-sex marriage, euthanadicsia, or our liberal (but very successful) drug policies.

However, there's enough to complain about too, of course. And this brings me to two Dutch people who complained a lot, in the past few years, and got murdered because of it. You have all heard about them; politician Pim Fortuyn, and film maker Theo van Gogh. Even though I highly disagreed with both of them on fundamental issues, I respected, and still respect them, for their guts, honesty, and openness. They were not afraid to say what they thought, even though they had to pay for it with their lives.

You might not realise it, but in the tech world today, there's something going on that bears a striking resemblance to the above cases. It might not be as far-fetching on a personal level (as in, nobody is getting murdered), but if you break the three cases (the two murders in The Netherlands, and the case I'm currently talking about) down to their bare essentials, they are practically the same.

Pim Fortuyn got murdered because of what he said. Someone, and in The Netherlands we all know his name, murdered someone else because he did not agree with him. In essence, the murderer attacked the very concept of democracy. The killer got what he deserved, a life sentence, but that of course does not reverse the suffering he has caused among Fortuyn's family, and his followers.

Theo van Gogh also got murdered because of his opinions. He made films which spouted critique, and because of that, he was murdered. His murderer also got a life sentence, but again, this does not bring Theo van Gogh back to his family and friends.

And the case in the tech world is about the same. Certain websites, certain individuals and journalists, have said certain things which a certain company didn't like. These websites, individuals, and journalists got their hands on information which wasn't supposed to be out yet; new products, future plans for the company, you name it. For the company in question, secrecy and mystery concerning its products is part of its marketing campaign, and as such, anything that dispels that secrecy and mystery is considered dangerous to sales and thus to shareholders.

Hence, this company is doing something which, as I said, on the personal level might not compare in any way to what the two murderers have done, but in purpose and results is the same: to silence people, to stymie the concept of free speech, not only of the said individuals, but also of any individuals who in the future might have information they want to share.

You all know, by now, who I'm talking about. I'm talking about the tech world's teddy bear, the goody two-shoes of computing, the big innocent of .mp3 players: Apple Computer. Apple is trying to silence people, trying to work its butt around free speech, just because the company itself is failing in keeping information from leaking to the outside world.

The deal is this: Apple lets its employees sign an NDA. People break this NDA by giving information under that NDA to certain websites such as AppleInsider and ThinkSecret. Apple then wanted those websites to disclose their sources, to "tell mom", so to speak, because websites do not deserve the same protections as the "legitimate press". They succeeded.

But what constitutes as the "legitimate press"? A university degree? Publication method? Number of readers?

And that is where the problem lies. In the modern day world of the internet and blogging, anyone can be a journalist. Every blog, no matter how small or insignificant, is a little newspaper in its own right. Therefore, they deserve the exact same protection as the New York Times or De Volkskrant. Charles Cooper of CNET News.com put it best:

"The real subtext is this: Apple is directed by a collection of control freaks who would have found themselves quite at home in the Nixon White House. The big difference being that reporters had the constitutional freedom to report on the Nixon White House."

---

Later this month, Apple will face an appeal on behalf of blogs and online journalists, who demand the same protection from subpoenas that the "legitimate press" enjoys.

---

As managing editor of OSNews.com, and as Dutchman who experienced first-hand what attacking the freedom of speech can lead to, I am very, very, deeply worried about the current chain of events in this case. Apple is attacking the freedom of speech as well as the freedom of press, and they must not succeed in doing so.

http://www.osnews.com/story.php?news_id=14282
JackSpratts is offline   Reply With Quote