24 Mayıs 2008 Cumartesi

2mm thick USB Flash Drive


Freecom USB

The basic function of all the flash drives is to store data. But there’s a distinguishing factor or rather the form factor of the drive which makes us to buy a particular one. A new flash drive in the rat race is from Freecom which is as sleek as your credit card making it the slimmest flash drive available in the market. Available in storage sizes from 256MB to 4GB, this can be ideal for those who often forget to pocket their flash drives pretty frequently.

Pricing starts from 23.49 Euros ($33) to 69.99 Euros ($100).

Sony Walkman A910 Series Players


Walkman A910



Sony Corp. has announced a new Walkman series which will hit the Japanese shores in the first week of November. The A910 Walkman series has a large 2.4” display and plays music, video and also broadcasts TV (1Seg, Japan’s equivalent to DMB) and FM. There’s also an Electronic Programming Guide (EPG) which can help user to schedule upcoming TV shows and also record them.

As for the storage, it will come in 4, 8 or 16GB options and can play 36 hours of music, watch 6 hours of TV or record for 16 hours. Regarding the price: NW-A916 (4GB) for 30,000 Yen ($261), NW-A918 (8GB) for 35,000 Yen ($305) and NW-A919 (16GB) for 45,000 Yen ($392).

LG’s lightweight E200 series notebooks


LG E200 Notebooks


Laptops are meant for carrying around. That’s what LG Electronics is trying to convey with its new X Note E200 notebook series. The exact specifications are not known but E200 will feature a 12” screen and it weighs just 1.8kg. LG managed to shove off extra pounds by including a detachable optical disk drive. Apart from that, the notebook is based on Intel’s Napa platform which means that it is 20% faster than the existing lot. It is priced at around $1500.

Are you ready for SMS2.0?


SMS2.0


UK based Affle and one of the leading GSM operators in India, Airtel have been pilot testing SMS 2.0 which says that it can revolutionize the text messaging experience. To be precise, it is an application for Series 60 phones which replaces the default SMS application with SMS2.0.



Source:www.sms2.com

KeUpper helps you grow hair the hard way


KeUpper


Japan is the mecca of gadgets. Or I would rather put it as a mecca of quirky gadgets. The image you see above is a headphone resembling hair growing device. The KeUpper has to be worn as a headphone and the spikes sit on the head. Ouch! The spikes then magically do something to make your hair grow. It is surely a pain on the head as well as the pocket. It costs $1000.

The new Google Reader (with search)


G Reader Small

I use Google Reader extensively. And as every day, I logged into my account only to find this message. Unfortunately I couldn’t try the new look as the link was not clickable in Opera. Anyone else got the same message?

If you haven’t noticed the screenshot, it now features a search bar too. Hit the more button for a larger view.

Acer buys Gateway


Acer & Gateway



Taiwanese computer maker, Acer has announced that they will acquire the third largest US PC maker, Gateway for a whopping sum of $710 million. Acer will buy all the shares of Gateway for a price of $1.90 which is 57% higher than Gateway’s closing price on Friday. This acquisition will make Acer the third largest PC maker in the world putting Lenovo in the fourth place.


J.W. Wang, Chairman of Acer:

This strategic transaction is an important milestone in Acer’s long history. The acquisition of Gateway and its strong brand immediately completes Acer’s global footprint, by strengthening our US presence. This will be an excellent addition to Acer’s already strong positions in Europe and Asia. Upon acquiring Gateway, we will further solidify our position as number three PC vendor globally.

Source:www.acer.com

Yahoo My Web 2.0

Yahoo My Web 2.0


Launched: June 29, 2005

What is it?

MyWeb2.0 is a social search engine “that complements web search by enabling users to search the knowledge and expertise of their friends and community in addition to the web.” We’ve used and abused it for a day, and in our opinion it’s good - a bit like regular yahoo plus furl . It was launched today as an early beta version “for a limited number of users.” There could be a cutoff, so it’s a good idea to sign up soon if you want an early look (what a great marketing idea).



Once you sign up (you can use an existing yahoo account), you can do a number of things. If you want to bookmark web pages, we recommend downloading the yahoo toolbar, which will allow you to bookmark pages you are browsing. Otherwise, you can only bookmark pages found on normal Yahoo search. We don’t like toolbars very much because nearly half our screen is taken up with them, but if you want to use MyWeb2.0 it’s going to have to be a part of your life (and hey, maybe you already use the Yahoo toolbar).


When you bookmark a page a popup appears that allows you to enter meta-data on the site, including title, notes, tags, access controls and a “save page” option (again, all of this looks and feels very much like furl:



You can also invite friends (feel free to add us - archimedesventures@yahoo.com) (techcrunch was taken :-)), and see their bookmarked pages. The whole idea is that stuff that is relevant to your friends, could very well be relevant to you, too.


This is user tagging in action (see our profiles on Celebrity Flicker and Feedster for a discussion of the perils of this), but here you have real incentives (like delicious and furl) to do it properly - both to find stuff later and to share with your friends.


Yes, it is yet another service to add friends and go to the trouble of bookmarking sites, but it does have in inport option (including RSS feeds) (yeah!) to decrease the burden. I imported my personal delicious page RSS feed and it seemed to work reasonably well.


There’s a ton thats been written about this (see links below), so our recommendation is try read the reviews and try it out for yourself. Thanks, Yahoo, for launching this experiment in Web 2.0.

Screen Shots:








Source:www.yahoo.com

iTunes 4.9



Launched: June 28, 2005

What is it?

As was widely anticipated, iTunes 4.9 launched today (22 mb download) for both windows and mac platforms. It includes significant new and enhanced features, including, most notably, support for podcasts.


Michael Gartenberg writes a wonderful post on iTunes 4.9: “I can download one, subscribe to a feed, keep a set number on my device and have them automatically deleted after I’ve listened. In short Apple’s done for podcasting the same thing they did with RSS in Tiger. They made it usable by the mass markets and at the same time, they have the what is going to be the most widely used podcasting client on both Macintosh and Windows and that will make their directory the one to be listed in. But there’s more. Apple also tweaked the firmware in all the iPod so there’s no a separate podcasting category, which means podcasts won’t get shuffled with my music and will support bookmarks so I can listen to podcasts and resume where I left off. So it’s not just the premier podcast PC client, the iPod itself is now first among devices with integrated podcast support. Combine this news and the new pricing and the integration of iPod photo into the core white iPod line and you see why Apple remains the player to beat in this space.”


The software is excellent and includes notable features:

- all podcasts are currently free
- downloaded podcasts show up in a single iTunes folder called “podcasts”
- easy search/find
- one click subscription to a new podcast
- option to have all future podcasts download automatically
- Tools for submitting publisher podcasts on iTunes
- stays separate in iPod, so not shuffled with music
- autodelete after listening (awesome!)

Screen shots:




IceRocket



What’s New?

We wrote in our previous profile on IceRocket that they were changing their name to BlogScour (based on something Mark Cuban said at AlwaysOn).

Blake Rhodes, IceRocket’s CEO, called to tell me that our facts were not quite right (he also thanked us for the post). They are not going to change their name to BlogScour, but they are going to launch a site called BlogScour that will contain all of their blog search capabilities.

I saw this at Blogherald a few minutes ago (I cannot locate the mentioned SEW article), and emailed Blake to confirm the facts. He confirmed what he told me on Friday -

“Mike-

We WILL launch a site called Blogscour.com. I dont have a date for that. Basically it will be our blog search we currently have minus all the web and image search features we have on IceRocket currently. It is going to be blogs only. Have a great evening.

Blake”

So there you have it.

Personally, I don’t give a damn, I just love their search engine. They could call it searchcrap.com and we’d still use it twenty times a day to research companies.

MSN Virtual Earth



What is it?

MSN Virtual Earth is an excellent mapping/satellite imagery application. Much like Google Earth , it is fascinating to look at, and very useful as well. There is no download required (whereas Google Earth has a 10 meg download).



In addition to excellent search features, you can autolocate via your IP address (although I am in San Francisco today and it says I am in Seattle based on IP) or via a small download, which works very well. There is also a scratch pad to keep notes (there needs to be a print function added to this though).



Mandatory first searches, of course, were of my home in Manhatan Beach and my parents home in Anacortes. The picture quality in MSN Virtual Earth was better than Google Earth, and the picture quality of my parents home in Anacortes was decent, whereas Google had nothing to show for them. Overall, MSN wins in this very limited test:




Jeremy Wright posted an excellent review of the service and comparison to Google maps:

“First, MSN’s Virtual Earth is 10 times easier to use than Google Maps. Between the little compass in VE that you can drag and it’ll just scroll with you (instead of Google Maps’ “click, drag, click, drag, click, drag”) and the ability to zoom much more easily in VE (you can scroll, you can hit the +/- keys on your keyboard OR you can double click), this is an app that is much more thought out.�?


“At the same time, Virtual Earth is much easier to use from an “exploring�? point of view. Hop off a plane, hit “Locate Me”, look for rental cars, then look for hotels, then look for somewhere to eat and then look for somewhere to catch a show. Boom, your whole day is planned and in your Scratch Pad.?

MySpace: A Place for Developers


In a move echoing one made by rival Facebook earlier this year, MySpace plans to open its platform to third-party application developers. The wildly popular social networking company owned by News Corp. plans to formalize its relationships with developers and will release a MySpace application programming interface development platform in the coming months, the company confirmed Thursday. It will also allow developers to monetize their applications, MySpace cofounder and CEO Chris DeWolfe reportedly said at O'Reilly Media's Web 2.0 conference in San Francisco on Wednesday.

In a move echoing one made by rival Facebook earlier this year, MySpace plans to open its platform to third-party application developers.

The wildly popular social networking company owned by News Corp. plans to formalize its relationships with developers and will release a MySpace application programming interface (API) development platform in the coming months, the company confirmed Thursday.

It will also allow developers to monetize their applications, MySpace cofounder and CEO Chris DeWolfe reportedly said at O'Reilly Media's Web 2.0 conference in San Francisco on Wednesday.


Sandbox Testing

Before the doors are officially opened, however, MySpace will first compile a list in the next few weeks of all widgets and tools available on the site so far, the company said. In a few months, it will make industry-standard APIs available through a new platform in which developers can try new ideas out in a sandbox environment.

Down the road, users will be able to participate in an opt-in beta test program to determine usability and vote to determine which widgets get tightly developed into MySpace. The best ones will be formally introduced by MySpace into the community with highly developed integration, the company said.

'Something They Had to Do'

Facebook, which is MySpace's principal rival, announced in May its Facebook Platform, which allows developers to build applications that integrate with its social networking site and enables them to make money by selling advertising on what's known as their canvas pages.

"This is something MySpace had to do," Paul Gillin, blogger, podcaster and author of The New Influencers, told TechNewsWorld. "The amazing popularity of Facebook and the stunning success of its decision have raised the barriers to play."

MySpace is lagging behind Facebook in public opinion, Gillin noted, with a reputation for being not quite as innovative or open as Facebook. As a result, MySpace is "naturally trying to build on Facebook's success with its decision to open up."


Customers Benefit

The result will be a great benefit for customers, Gillin added, as new applications are brought into the environment, building the value of the community as a whole. "

This will make MySpace more of a destination and a real platform," Gillin said.

"What Facebook is trying to do is make itself the place where people spend their day," he explained. "The closer they can get to that goal, the more valuable they become as an advertising venue."

Yet while MySpace's move may be motivated at least in part by Facebook's past decision, there may be more to it than that, Andrew Frank, research vice president with Gartner (NYSE: IT) Group, told TechNewsWorld.


Openness vs. Protection

"I think there's been a bit of a pendulum swinging back and forth between wanting widget platforms to be more open and concern about protecting revenue streams like advertising and also the overall integrity of the platform from a security standpoint," Frank said.

"Right now, largely because of the success of Facebook, we're starting to see more pressure to open up," he explained. "But I'm pretty sure this isn't the end of that oscillation -- there's definitely the potential that we haven't seen the end of the balancing between openness and control."

'Distinctive Experiences'

Though they are often viewed as head-to-head competitors, MySpace and Facebook "still offer pretty distinctive experiences," Frank added. "They may compete for time share among people with accounts on both sites, but I think people use them differently."

MySpace, like all such sites, "has to continue to innovate to compete," Frank noted. "But I don't think this move is all about competing with Facebook."

MySpace boasts 110 million active users worldwide. Facebook says it has more than 47 million.

IBM Developing Wicked-Fast Wireless Data Transfer Chip



IBM and MediaTek have announced a joint effort to develop ultra-fast chipsets that will be able to blast a full-length high-definition movie faster than most people can read this sentence. For example, IBM says, a consumer could upload a 10 gigabyte file in five seconds with the new technology versus the 10 minutes it takes using current WiFi technology. The new technology will be based on the 60 GHz band, which is a free and unlicensed band of radio spectrum. Most home wireless networks utilize bands in the single-digit range, such as the popular 2.4 GHz band.

IBM (NYSE: IBM) and MediaTek have announced a joint effort to develop ultra-fast chipsets that will be able to blast a full-length high-definition movie faster than most people can read this sentence. For example, IBM says, a consumer could upload a 10 gigabyte file in five seconds with the new technology versus the 10 minutes it takes using current WiFi technology.

The new technology will be based on the 60 GHz (gigahertz) band, which is a free and unlicensed band of radio spectrum. Most home wireless networks utilize bands in the single-digit range, such as the popular 2.4 GHz band.

IBM and MediaTek will collaborate to integrate IBM's new millimeter wave (mmWave) radio technology chips, antennas and package technology with MediaTek's expertise in digital baseband and video processing chips. The partnership is also intended to leverage MediaTek's influence in the consumer electronics market. IBM first demonstrated a prototype chipset as small as a dime in February of 2006.

A Whole New Living Room

The idea is to let media devices transmit or receive large amounts of data quickly, making the millimeter wave radio technology particularly useful for PCs, digital video recorders (DVRs), handheld devices like iPods or iPhones and HDTVs. Synchronization between the devices could occur in seconds and without a mess of cables.

Aside from speeding up home networks, there are other uses in store, such as file transfers from kiosks that a consumer might find in common retail spaces.

"[A kiosk would be] more like a point-and-shoot application," Mehmet Soyuer, IBM lead researcher on the mmWave project, told TechNewsWorld.

"It could be used to download DVDs and movies, things like that, in a train station or airport," he explained.

High Frequencies Are the Key

Higher frequencies -- 60 GHz in this case -- tend to allow greater bandwidth for data transmission than lower frequencies like the popular 2.4 GHz used in many home wireless networks. While transmission speeds at 60 GHz are super fast, "the signal doesn't travel too far," Soyuer noted. "It typically stays in a room, so it would be a good match for personal area network -- PAN-types of applications. It's like a much higher data rate version of Bluetooth , in some respects."

Using higher frequencies for the transmission of very large media files is a more logical solution for wireless applications, Soyuer said. "For the application of uncompressed video, we are talking about needing two, maybe three GHz per second, and it's almost impossible to achieve those data rates using the conventional lower frequencies," he added.

Years Away

Wicked-fast movie downloads using IBM's and MediaTek's mmWave technology is a few years away. In addition to nailing down wireless networking standards -- critical so that a variety of devices can talk to each other in the same language, so to speak -- device manufacturers need to build and ship products with mmWave features.

Progress is happening, however. The IEEE (Institute of Electrical and Electronics Engineers) 802.15.3c is a working group that was formed in 2005 to standardize the use of the 60 GHz band.


Link:http://www.technewsworld.com/story/59941.html

MySpace-Skype Deal



MySpace and Skype are partnering to bring free voice-calling capability to the social networking site. The deal makes sense for both MySpace and Skype, Rob Enderle, president and principal analyst with Enderle Group, told TechNewsWorld. "Skype needs some good news, and this adds one more service that MySpace can use to showcase its site as a platform."

MySpace users will soon be able to chat by phone thanks to a new partnership between Skype and the popular social networking site, the companies announced Wednesday.

MySpaceIM with Skype is a new product that integrates MySpace's instant messaging client with Skype's free voice-calling capability using Voice over Internet Protocol (VoIP). Launching next month in 20 countries with localized MySpace communities, MySpaceIM with Skype will enable millions of users to place free Skype Internet calls to other MySpace or Skype users.

"Skype has the leading technology in Internet voice communications and an enormous international user base that we're thrilled to connect with our existing community," said Chris DeWolfe, cofounder and CEO of MySpace, which is owned by News Corp. "Our network has no geographical boundaries -- Internet calling is the natural next step for how our members communicate with each other."

MySpace claims more than 110 million monthly active users, while Skype boasts 220 million registered users. Financial terms of the deal were not disclosed.

Privacy Protection

MySpace users will not be required to download any additional Skype software to take advantage of the feature, which will give users more ways to easily connect with friends and family around the world, the company said.

The new functionality will also tap into the personal privacy settings available on MySpace. Users who have a MySpace profile set to "private," for example, will not be able to receive Skype calls from people not on their friends lists. Users can also choose to allow only people on a select Skype personal contact list to call them. They can prescreen incoming callers and block any MySpaceIM with Skype call or user at any time.

Two-Way Connection

Another new feature enabled by the MySpace-Skype partnership will allow users to link their MySpace profiles and photos or avatars to their accounts on Skype. Skype's VoIP service is available in 28 languages and is used in almost every country around the world, the company says, and the new feature will be available globally except in Japan, China and Taiwan.

"Both MySpace and Skype have become a part of people's lives by bringing people closer together, no matter where they live in the world," said Michael Van Swaaij, interim CEO of Skype. "This partnership reiterates that Skype is the platform of choice for Internet communications because we make it simpler and easier for people to place free calls to one another whether they are on Skype or within the MySpace network."

A Communications Medium

The deal makes sense for both MySpace and Skype, Rob Enderle, president and principal analyst with Enderle Group, told TechNewsWorld.

"Skype needs some good news, and this adds one more service that MySpace can use to showcase its site as a platform," Enderle explained.

Indeed, social networks in general and MySpace in particular are increasingly becoming a communications medium, added John Barrett, director of research with Parks Associates . "I think social networks are the dial tone for the next generation. People plug in when they want to, they exchange messages openly or privately, and then they unplug again. Adding voice to that is a really smart move."

'A Dead Heat'

Whether or not Facebook, MySpace's principal competitor, will offer something similar remains to be seen. "I think Facebook is able to move a little more quickly and to be a little more nimble because it doesn't have a large corporate parent," Barrett said.

The percentage of people using Facebook is increasing at a faster rate than that using MySpace, he noted. "A lot of the chatter suggests MySpace has become slightly less cool, with a tarnish that Facebook hasn't yet acquired," he said.

Will VoIP provide the proverbial magic bullet to fend off competition from Facebook? "It could make MySpace more appealing, but I doubt it could do that," Barrett said.


"MySpace is in a dead heat with Facebook, and both are trying to add more and more capabilities," Enderle concluded. "It will be interesting watching these guys compete going forward."


Link:http://www.technewsworld.com/story/voip/59884.html

Yahoos at Yahoo


Suppose that Anne Frank had maintained an e-mail account while in hiding in 1944, and that the Nazis had asked Yahoo for cooperation in tracking her down. It seems, based on Yahoo's behavior in China, that it might have complied.

Fred R. Conrad/The New York Times

Nicholas D. Kristof.

Granted, China is not remotely Nazi Germany. But when members of Congress pilloried executives of Yahoo, Google, Microsoft and Cisco Systems at a hearing about their China operations on Wednesday, there were three important people who couldn't attend. They were Shi Tao, Li Zhi and Jiang Lijun, three Chinese cyberdissidents whom Yahoo helped send to prison for terms of 10 years, 8 years and 4 years, respectively.

Only Mr. Shi, a Chinese journalist, has gotten much attention. But Chinese court documents in each case say that Yahoo handed over information that was used to help convict them. We have no idea how many more dissidents are also in prison because of Yahoo.

It's no wonder that there's an Internet campaign to boycott Yahoo, at www.booyahoo.blogspot.com. But it's a mistake to think of all the American companies as equal sinners, for Google appears to have done nothing wrong at all. Here's my take on the four companies:

Yahoo sold its soul and is a national disgrace. It is still dissembling, and nobody should touch Yahoo until it provides financially for the families of the three men it helped lock up and establishes annual fellowships in their names to bring Web journalists to America on study programs.

Microsoft has also been cowardly, but nothing like Yahoo. Microsoft responded to a Chinese request by recently shutting down the outspoken blog of Michael Anti (who now works for the New York Times Beijing bureau). Microsoft also censors sensitive words in the Chinese version of its blog-hosting software; the blogger Rebecca MacKinnon found that it rejected as "prohibited language" the title "I Love Freedom of Speech, Human Rights and Democracy."

Cisco sells equipment to China that is used to maintain censorship controls, but as far as I can tell similar equipment is widely available, including from Chinese companies like Huawei. Cisco also enthusiastically peddles its equipment to the Chinese police. In short, Cisco in China is a bit sleazy but nothing like Yahoo.

Google strikes me as innocent of wrongdoing. True, Google has offered a censored version of its Chinese search engine, which will turn out the kind of results that the Communist Party would like (and thus will not be slowed down by filters and other impediments that now make it unattractive to Chinese users). But Google also kept its unexpurgated (and thus frustratingly slow) Chinese-language search engine available, so in effect its decision gave Chinese Web users more choices rather than fewer.

Representative Chris Smith, who called the hearing and drew the Anne Frank analogy, has introduced a bill to regulate Internet companies abroad, but that's an overreaction. For, as Mr. Anti noted in his own critique, the legislation would just push out foreign companies and leave Chinese with rigidly censored search engines like Baidu.

That said, American companies shouldn't be abjectly surrendering. Microsoft could publish a list of the political terms that it blocks as "prohibited language." Google could post a list of all the Web sites it blocks. They can push back.

In any case, the tech companies are right about a fundamental truth: the Internet is a force for change in China. There are already 110 million Internet users in China, and 13 million bloggers — hugely outnumbering the 30,000-odd censors.

China's security forces try to filter out criticisms, but they often fail. A study by the Berkman Center for Internet and Society at Harvard Law School found that China managed to block 90 percent of Web sites about the "Tiananmen massacre," 31 percent of sites about independence movements in Tibet, and 82 percent of sites with a derogatory version of the name of former President Jiang Zemin. In other words, some is stopped but a lot gets through.

So think of the Internet as a Trojan horse that will change China. Yahoo has acted disgracefully, but the bigger picture is that the Internet is taking pluralism to China — and profound change may come sooner rather than later, for unrest is stirring across the country.

It's the blogs that are closed that get attention and the cyberdissidents who are arrested who get headlines, just as in America it's the planes that crash that make the evening news. But millions of Chinese blogs and podcasts are taking off, and they are inflicting on the Communist Party the ancient punishment of "ling chi," usually translated as "death by a thousand cuts."

Link:http://select.nytimes.com/2006/02/19/opinion/19kristof.html

$100,000? Too High. $120 Million? Fine.



The efforts of federal regulators to curtail cronyism on corporate boards have led to some odd outcomes. The case of Michael K. Powell, a new director of Cisco Systems, is a prime example.


Mr. Powell, the former chairman of the Federal Communications Commission, happens to be a son of Colin Powell, the former secretary of state. Cisco happens to have paid the senior Mr. Powell more than $100,000 to deliver two speeches in 2005.

Under guidelines established by the Nasdaq stock market, that connection disqualifies the younger Mr. Powell as an independent director, so he cannot sit on the company’s audit, compensation or governance committees. But by the same definition, Richard M. Kovacevich, the chairman of Wells Fargo, is an independent director of Cisco, even though his company has promised to lend Cisco $120 million.

The difference is that Cisco’s line of credit is deemed too small a part of Wells Fargo’s overall business to present a conflict of interest, while the payments to the senior Mr. Powell exceeded the allowable annual limit of $100,000 to any family member of an independent director. PATRICK McGEEHAN

PLAYING DEFENSE? The former National Football League player Dwight Sean Jones may have met his toughest opponent yet: federal securities regulators. The Securities and Exchange Commission ordered Mr. Jones, a former Los Angeles Raiders defensive end, to answer complaints that his investment firm, Amaroq Asset Management, has flouted federal securities law.

The commission’s order said Mr. Jones, who went on to become a players’ agent after winding up his pro career in 1996, had refused to produce or permit the inspection of business records at Amaroq, a registered investment adviser. Such examination is required by the Investment Advisers Act.

According to the S.E.C., Mr. Jones told the commission in 2003 that he was managing more than $44 million in assets for his clients, mostly athletes. He said at different times that company records had been destroyed in a fire, that they were on a moving truck and that they had inadvertently been sold by a storage company.

Securities regulators also said that although Mr. Jones contended that Amaroq discontinued business in 2004, he had never notified the commission.

The S.E.C. said Mr. Jones does not have a lawyer representing him. Mr. Jones, 44, did not reply to phone messages asking for comment. ELIZABETH OLSON

BRIDGING THE PAY GAP The average chief executive of a large corporation makes 400 times the pay of his company’s average worker, and that gap has quadrupled in less than two decades, says Senator Carl Levin, Democrat of Michigan. He wants to close the difference by ending a corporate tax break for executive stock options.

“The single biggest factor responsible for this massive pay gap is stock options,” said Mr. Levin, who introduced legislation on Friday to require the federal corporate tax deduction for stock option compensation to match the expense shown on corporate financial reports filed with the S.E.C.

Now, companies can show one stock option expense on their books and another on their tax returns, said Mr. Levin, whose legislation is supported by several consumer and labor groups.

The mismatch permitted companies in 2004 to claim $43 billion more in stock-option tax deductions than the expenses shown on their books, he said. That “shortchanges the Treasury,” said Mr. Levin, and “provides a windfall to companies doling out huge stock options.” ELIZABETH OLSON

RED AND GREEN IN AFRICA Red, a marketing program started last year by Bono, the singer, and Bobby Shriver, son of the first director of the Peace Corps, Sargent Shriver, evidently is doing more than raising money to fight AIDS in Africa through sales of Motorola, Gap, Converse, Emporio Armani and other products.

Speaking last week at an Advertising Club luncheon in New York honoring Mr. Shriver’s efforts, Ngozi Okonjo-Iweala, a Brookings Institute fellow and a former finance minister of Nigeria, praised Red for employing Africans, who make cloth for Converse sneakers and packaging for Motorola cellphones. “You’re creating so many jobs, and when you do that, they have money in their pockets, they can buy the antiretrovirals, they can send their children to school, they can feed themselves,” she said.

Ms. Okonjo-Iweala said Mr. Shriver was “not someone who just discovered Africa,” but “someone who started discovering it a long time ago.” In his youth, Mr. Shriver often visited Africa with his family.

Russell Simmons, the hip-hop impresario, said Red had inspired his jewelry company’s Green Initiative collection, which donates a percentage of profits to a fund for education programs in diamond-producing African nations. JANE L. LEVERE

LİNK:http://www.nytimes.com/2007/09/30/business/30suits.html?_r=1&oref=slogin

Vista vs. Leopard: Battle of the new Features


Leopard introduces lots of new apps and interface features to Mac OS X. Can Vista match up?





Let the Battle Begin!

Every time Apple rolls out a new big-cat-themed release of OS X, it manages to pack in a few interface features and useful apps that eventually make their way across the OS world. Now that Leopard is here, let's take a look through its key features and see how the built-in features in Windows Vista measure up.


Recommend this story?


Architecting e-mail storage



The following is excerpted from a transcription of the Sept. 11 Wikibon.org Peer Incite Meeting, focused on issues surrounding an article titled "Architecting e-mail storage," by Wikibon community member and consultant Kashik Das. The meeting was a discussion of specific issues by four recognized subject-matter experts and Wikibon.org community members: Josh Krischer, David Floyer, Peter Burris and David Vellante.


Krischer: There is no point in compliance if you don't keep e-mail. In Germany, for example, e-mail is official business paper, and companies have to put in the footer all the company details. All business e-mail has to be kept for 10 years.

Floyer: A lot of business is done with e-mail. About 10% of an average IT user's working life is spent on e-mail; for some people, it's a lot more than that. And there are huge deposits of e-mail and of instant messaging that leave a very strong audit trail of how organizations and people have been acting. This is a good thing, and it's also a risk.

What we have found in our discussions with people is [that] the primary driver with e-mail archiving is reducing risk. It's usually top-down, either from the CEO or board or from the legal department -- legal counsel [deciding] that e-mail archiving with mitigation systems needs to be deployed.

The courts have been emphasizing that e-mail should be captured. One of the primary objectives of e-mail archiving is just literally being able to prove in a court of law that [the e-mails] have all been captured and none have been changed. The secondary requirement for an e-mail archive is that it allows the exploitation of that data to help reduce risk to the organization.

Krischer: I identify three kinds of risk: compliance requirements for preserving e-mail, the risk of punitive damages if you can't produce the e-mails in a court case and [personal] protection. For instance, in [the Enron case], some defendants [as part of their defense] showed they were ordered to do illegal things ... in e-mails from company officers. Enron investigators found a lot of relevant information in deleted and recovered e-mails. See the $1.45 billion judgment against Morgan Stanley in the Ronald Perelman case because Morgan Stanley could not reliably produce e-mails for the court.

Floyer: If you think of a spectrum of risk, at one end, you have organizations at high risk with a lot to lose, usually highly regulated, so for example banking environments or trading environments in particular. The fundamental risk is that they can be closed down if the regulators find they are not complying with the regulatory requirements -- and there are a lot of requirements in that area. Obviously, to them, reduction of risk is very important.

Vellante: There are certain industries that are regulated. For instance SEC Rule 17A came out and essentially mandated that all electronic communicationd be archived in the financial services industry -- you have to keep everything.

Floyer: At the other end, you might take for example retail operations, which have razor-thin profits and have enormous pressures on just staying in business. What's interesting was [that] the fundamental strategy was one of minimizing the risk by minimizing the number of e-mails kept. So they kept e-mail for less than a month and then got rid of them altogether. They kept [the e-mails] of only about 200 key executives of all the people in a large organization.

Is the second approach legal? The new federal rules say you have to have solid procedures in place and that
those procedures have to be kept -- reasonable procedures. Whether reasonable is getting rid of stuff after 30 days, well, time will tell. But their argument is "the less kept the better."

Burris: This raises a very interesting question. Let's talk for one second about what we mean by risk. It sounds as though in Germany there are statutory edicts that dictate what you are supposed to do from an archiving standpoint. Whereas in the U.S., there have been some edicts, but for the most part, the biggest concerns stems from what we have learned from case law over the past few years -- namely the discovery process and how that is going to work. The risk issue then becomes different in the two places. In Germany, you either are in compliance or you are not, whereas in the U.S. ... you never know because case law is going to evolve over the next few years, and some very high-priced law firms are going to find some loopholes and screw some companies in the process.

So, does that ... change the nature of risk? [It] certainly suggests that in the U.S., because of the uncertainty of how this will play out over the next few years, that this will absolutely be decided by corporate legal minds as opposed to anybody else.

Krischer: Some of the companies I surveyed a few months ago said they plan to keep all their e-mails forever. When we ask, "Why you do that?" then normally the answer is because we don't know what we may need in a few years.

1. Focus on the issue of risk when selecting the technology for the base archive.

Floyer: From an infrastructure point of view, what I've seen is sometimes people are very focused on that risk, but other times, the project gets muddied up with a large number of wish lists that get added into the project around e-mail and around disks and around lots of things.

Then, what are the risk mitigation systems that are going to be put into place? Some of those will be technology-driven: The ability to do e-discovery more quickly or completely, for example, may reduce risk. The ability to search for rogue e-mails, the ability to ensure compliance, etc. But an awful lot of what the people we talked to were talking about -- the general training, awareness, stuff like that -- are part of that project but not the responsibility of IT.

So my point is that if you focus e-mail archiving on those two things, you may well come up with a much simpler and easier type of solution than many that are on the market. This focus will tell you which things to maximize and put significant value on in these solutions and which things to discount in the context of risk.

I think some of the current "magic quadrants" that are out there put far too much emphasis on e-mail functionality and fancy systems and fancy technology, and far too little on the core reason for doing it, which is risk reduction.

Architecting the e-mail archive to be flexible, to have access to that data, is incredibly important. And I think that alone can eliminate a number of vendors from any short list. And much simpler solutions then come into play that previously would not have been considered because they don't have all the fancy bells and whistles on them.

2. Good procedures are more important than access speed.

Floyer: What was interesting for example was that from a legal risk point of view, having good procedures was much, much more important than speed of access to it. As long as you could produce [the e-mail required in a legal discovery] within 48 hours, that was fine. Speed of access was not the important criteria for reducing risk. But good procedures that could be shown in court that were being followed were much more important.

For many companies, the reason for outsourcing e-mail archiving was that the outsourcing company showed world-class procedures that they felt would be much better than their own and would hold up much better in a court of law and therefore would be reducing risk, even though the functionality of the actual solution was not as high as others on the marketplace.

So taking that risk reduction I think can significantly simplify that whole process and therefore the whole focus of IT.

3. Do not archive e-mails from before the archive was created

Floyer: That brings me to one other point. Vendors are often pushing to include historical e-mails. One of the key points of reducing risk is to ensure that you've captured all e-mails and that nothing's been changed. That is a big reduction in risk -- just being able to prove in court that it is a complete record. For historical e-mails, it is going to be very difficult to do that.

Is putting historical e-mails into an e-mail archive going to reduce risk? The answer to that is probably not. It is extremely difficult to do [and] very, very labor-intensive -- extremely disliked by the users themselves. Probably it is better to draw a line in the sand and say from this point onward, all the data is being captured in the e-mail archive. Use the current procedures to go back and look for e-discovery on a best can-do basis and don't try to solve the historical problem by putting it into an e-mail archive. It doesn't reduce risk, and it's extremely expensive.


4. Design for secure transfer from one medium to another.

Krischer: If you want to keep something for 10 years, you can't put it on the same media for 10 years. I mean theoretically you can do that, but it will cost you a lot of money. For example, because of the price erosion of disk subsystems, it is cheaper to buy a new subsystem after three to four years than it is to pay the maintenance fee for the next six years for the old one. In addition, due to constant technology developments, new subsystems will usually be more reliable, deliver better performance and require less energy. Therefore, in 10 years, at least one media change has to be done, and this migration should be designed to and audited [to prove] that nothing was deleted and nothing was modified during this migration.


5. Build to support derivative uses of the data.

Burris: What [does] it mean to build an information store that could be used by derivative applications and create derivative types of value? So, for example, [these could include data] mining activities on e-mail archives to identify pockets of expertise or pockets of activities or pockets of relationships that might have significant business value in an upcoming sales activity or a critical support issue. The storage administrators need to be sensitive when they set up that archive so that there will be derivative uses of that information. It's guaranteed that the business will find ways to use [the archive].

Floyer: This e-mail archive infrastructure ... will live for 10 years, probably more. It's very likely to have a long life because the processes and procedures around it are going to be honed in, going to be assessed by auditors, etc., and you won't want to change those very quickly. What that means is the data held in that archive should be accessible, should not be a format that, to put it crudely, is a vendor lock-in. For example, it should be in some sort of way, either database or file-based system, where you can utilize [the data] for other functions.

Link

Microsoft considers opening up Device Manager


Door left open to support for non-Windows Mobile devices


SAN FRANCISCO -- Microsoft Corp.'s new Mobile Device Manager faces a shortcoming because it is exclusive to Windows Mobile devices, but that might change, an executive said today.

Scott Horn, general manager of Microsoft's mobile and embedded device group, left the door open to potential future support for devices that aren't based on Windows Mobile.

"Today, we have nothing to announce," he said. "But we're looking at it, we're thinking about it. Who knows what the future brings." Horn spoke during a press lunch at the CTIA Wireless IT and Entertainment conference here.

He mentioned that Microsoft has in the past licensed Active Sync as a way to extend services to non-Microsoft devices.

Microsoft introduced System Center Mobile Device Manager at the conference. The software lets IT administrators manage and secure Windows Mobile phones. Unlike some other management products on the market, including Nokia Corp.'s Intellisync, it is only compatible with phones running the Windows Mobile operating system.

AT&T Inc., which is supporting Mobile Device Manager, has encountered inertia among IT administrators when it comes to supporting mobile devices. IT managers are worried about security and management issues, said Mike Woodward, vice president for business marketing at AT&T. He said the System Center Mobile Device Manager software and the services of Enterprise Mobile, a new company supported by Microsoft, will spur more enterprise use of mobile phones. Woodward could not offer specifics about how AT&T will support Mobile Device Manager or how it will work with Enterprise Mobile.

For now, the new software and the services from Enterprise Mobile, which helps organizations deploy and manage mobile phones, are designed for large operations. Mobile Device Manager, which is expected to come out next year, could support as many as 5,000 users. Enterprise Mobile doesn't expect to begin thinking about serving smaller businesses for another 12 to 18 months, because it will be focused on making sure it knows what large organizations need, said Steve Moore, president of Enterprise Mobile.

Source:http://www.computerworld.com/

How the Job Description for US President Has Gotten Longer Over Time

The White House
The White House

A listener in Cambodia heard our recent call for questions about the process of electing an American president. Tath Sok in Phnom Penh wants to know about the duties and responsibilities of the president.

This question touches on a continual debate in American society. The separation of powers in the federal government was designed to create a system of checks and balances. Experts could argue for hours about the limits to the powers of the president, Congress and the courts. But we just wanted a few facts, so we looked in the World Book Encyclopedia.

The Constitution gives the president the duties of chief administrator of the nation and commander of the armed forces. But developments including court decisions, laws and customs have expanded those duties. Today the president has seven major areas of responsibility.

First, as chief executive, the president is responsible for enforcing federal actions and developing federal policies. The president is also responsible for preparing the national budget and appointing federal officials.

The president nominates cabinet members, Supreme Court justices and other officials who must be confirmed by the Senate. There are other jobs in government agencies that the president can fill without Senate approval.

As commander in chief, the president shares some military powers with Congress. Under the Constitution only Congress has the power to declare war.

The president also serves as foreign policy director, as the encyclopedia calls it. For this job, the Constitution gives the president the power to appoint ambassadors, make treaties and receive foreign diplomats. Treaties and appointments of ambassadors require Senate approval.

As legislative leader, the president has influence over many laws passed by Congress. The president has the power to veto any bill. But if a vetoed bill is passed again, this time by a two-thirds majority in both houses, the bill can still become law.

The president is also the head of a political party and has responsibilities as popular leader and chief of state.

So these are the main duties of the president. But our listener in Cambodia would also like to know how much the president earns. The job currently pays four hundred thousand dollars a year.

Just this week, in a blog at washingtonpost.com, political reporter Peter Baker wrote about the current debate over presidential powers. He noted criticisms of President Bush's claims of powers by Hillary Clinton, the Supreme Court and others.

But he also wrote about the long history of battles over presidential powers, or what is known as "executive privilege." Presidents have expanded their powers during wartime and also during times of peace. Peter Baker noted that before Thomas Jefferson was president, he was an activist for limited central government. But then he more than doubled the size of the country on his own with the purchase of the Louisiana territory.

And that's IN THE NEWS in VOA Special English, written by Brianna Blake. I'm Bob Doughty.

High-tech consumer products



High-tech consumer products and services of all kinds are making their way into the workplace. They include everything from smart phones, voice-over-IP systems and flash memory sticks to virtual online worlds. And as people grow more accustomed to having their own personal technology at their beck and call -- and in fact can't imagine functioning without it -- the line between what they use for work and what they use for recreation is blurring.


In a recent survey of corporate users by Yankee Group Research Inc., 86% of the 500 respondents said they had used at least one consumer technology in the workplace, for purposes related to both innovation and productivity.

Unfortunately, this trend poses problems for IT organizations. For one thing, the use of these technologies increases the risk of security breaches. Moreover, users expect IT to support these devices and services, especially once they interact with applications in the corporate environment.

But in many companies, it would be against corporate culture to simply ban the devices or to block employees from accessing consumer services. At the same time, companies can't depend wholly on policy to maintain the level of security they need.

"I don't know of any business where employees have the time to read and comprehend every single policy related to a computer in their environment -- they're busy doing their jobs," says Sharon Finney, information security administrator at DeKalb Medical Center in DeKalb County, Ga. "I consider it my responsibility to implement things that make security seamless, easy and completely in the background."

Others, like Michael Miller, vice president of security at telecommunications services provider Global Crossing Ltd., wait until the devices or services affect productivity or otherwise cause a business problem, such as the security department battling worms or dealing with bandwidth issues. But no matter what companies decide to do, the response always involves a balance of enabling employee productivity, abiding by the corporate culture, not eating up too much of IT's own resources and ensuring a level of security that's right for the company.

"Consumerization will be a nightmare for IT departments, creating maintenance and support problems that will swiftly overwhelm IT resources, unless they embrace new approaches to managing the rogue employees," says Josh Holbrook, an analyst at Yankee Group. Holbrook equates banning the use of consumer technologies in the workplace with "an endless game of whack-a-mole." At the same time, ignoring the adoption of such technologies would lead to a potentially hazardous mix of secured and unsecured applications within a corporate enterprise, he says. He proposes ceding control to end users via an internal customer care cooperative model. (See "Zen and the art of ceding control of consumer tech to end users.")

To help you decide how to respond, below we look at eight popular consumer technologies and services that have crept into the workplace and provide some insight into how companies are achieving the balance of security, productivity and sanity.

1. Instant messaging

People use instant messaging for everything from making sure their kids have a ride home from practice to communicating with co-workers and business partners. In the Yankee study, 40% of respondents said they use consumer IM technology at work. Instant messaging present numerous security challenges. Among other things, malware can enter a corporate network through external IM clients and IM users can send sensitive company data across insecure networks.

One way to combat threats is to phase out consumer IM services and use an internal IM server. In late 2005, Global Crossing did just that when it deployed Microsoft Corp.'s Live Communications Server (LCS). Then in August 2006 it blocked employees from directly using external IM services from providers such as AOL, MSN and Yahoo. Now, all internal IM exchanges are encrypted, and external IM exchanges are protected, as they're funneled through the LCS server and Microsoft's public IM cloud.

Adopting an internal IM server also gave Global Crossing's security team more control. "Through the public IM cloud, we're able to make certain choices as to how restrictive or open we are. We can block file transfers, limit the information leaving our network or restrict URLs coming in," which was a common method for propagating worms, Miller says. "That takes away a huge component of malicious activity."

You can also take a harder line. DeKalb's security policy, for instance, bans IM use altogether. "It's mainly chat-type traffic, not personal health information, but it's still a concern," Finney says. As backup to the restrictive policy, she blocks most sites where IM clients can be downloaded, although she can't block MSN, AOL or Yahoo because many physicians use those sites for e-mail accounts. Her team also uses a network inventory tool that can detect IM clients on employee PCs. If one is found, the employee is reminded of DeKalb's no-IM policy and notified that the IM client will be removed. Finney is also considering various methods of blocking outbound IM traffic, but for now, she also uses a data loss prevention tool from Vericept Corp. to monitor IM traffic and alert the security team about any serious breaches. To do that, Finney's team needs to shut down most of its Internet ports, which forces IM traffic to scroll to Port 80 for monitoring.

DeKalb is looking into the idea of implementing the IM add-on of IBM's Lotus Notes or even an internal freeware IM service like Jabber for business users who want to communicate across campus. "Nothing is 100%," Finney says. "IM is always a huge concern from a security as well as a productivity perspective."

Source:http://www.computerworld.com/