Archive for RB

Tech Regulatory Capture

ATech Regulatory Captures I have noted from my Bach Seat, the revolving door or regulatory capture between the federal government and the tech titans isn’t new. The tech titans like Google (GOOG), Facebook, and Apple (AAPL) hire former feds to protect their turf while their web 2.0 applications attract attention from lawmakers and regulators concerned about issues like privacy, competition, pricing, and other aspects of the online economy.

Tech Firms Capture White House Staffers

Tech Firms Hiring White House Staffers“These companies are at the crosshairs of privacy and policy issues and they see people in the White House and federal government as protectors of their plans to expand into new markets,” Jeffrey Chester, an online privacy advocate and executive director of the Center for Digital Democracy told the Washington Post. “These are uber influence-makers they are hiring.”

Three examples of this in the Washington Post article are:

  • Google’s green energy initiative hired consultant Colin Crowell, who is both a former senior adviser to the FCC’s chairman and a former aide to Rep. Edward J. Markey (D-Mass.).
  • AT&T’s (T) lobbying leader James Cicconi, is a former staffer for George W. Bush. Mr. Cicconi has a long track record of regulatory success at the FCC and approval of several mergers for AT&T.
  • AT&T also hired Bill Clinton spokesman Mike McCurry heads Arts & Labs, a group that has lobbied against Internet access rules known as net neutrality, for AT&T, Verizon and cable companies.

Facebook Hires Former Clinton Spokesman

Facebook logoThe Washington Post reports that Facebook recently hired former Clinton White House spokesman Joe Lockhart to its communications team, as the company faces increased scrutiny caused by the company’s global expansion and treatment of data shared by the site’s more than 600 million users and its privacy practices. Mr. Lockhart, who served as press secretary for President Bill Clinton will be vice president of global communications. Mr. Lockhart will be located at the company’s Silicon Valley headquarters and report to Elliott Schrage, VP of global communications, marketing, and public policy.

Facebook has also hired former George W. Bush deputy chief of staff, Joel Kaplan, to head its D.C. federal lobbying and policy shop. The Facebook office had just one employee in 2007 and now has a dozen on staff.

Larry Summers to Join VC Firm

Andreesen Horowitz logoSilicon Valley venture fund Andreesen Horowitz has added former White House economic director Larry Summers as an exclusive “long-term” special adviser. The Washington Post reports. Marc Andreesen, a co-founder of the venture capital investment firm, said the appointment brings the former government official’s international economic expertise to a fast-changing high-tech industry where Internet companies are quickly expanding overseas and fundamentally changing the way business markets work. Summers doesn’t have experience in tech, but that’s not why the venture firm wants him, they said. As the former Treasury secretary and a noted economist, the venture firm wants his economic knowledge to help companies think more broadly about how they can break into new markets and bring their services to various industries.

Andreesen Horowitz, with investments in Facebook, Digg, and Zynga, said Mr.Summers will receive “long-term” compensation, which would probably include a stake in companies or the fund, but Andreesen declined to give more details on their arrangement.

AT&T Gave Cash to Merger Backers

ATT logoEliza Krigman at POLITICO.com reports that AT&T (T) is lining up support for its acquisition of T-Mobile from a slew of groups with no obvious interest in telecom deals, except that they’ve received big piles of AT&T’s cash.

AT&T says it supports nonprofit groups because it’s the right thing to do — and not because of any quid pro quo. “For decades, AT&T has proudly supported numerous diverse groups and organizations,” a company spokesperson told POLITICO.

But not everyone’s buying it according to the article, “The money that nonprofits receive from their corporate sponsors sticks not only in their bank accounts but in their minds,” Ellen Miller, executive director of the Sunlight Foundation, told POLITICO.com. “This is what I think of as deep lobbying — there is an expectation that when push comes to shove, these groups will come out in favor of their benefactors.”

Politico logoAT&T’s corporate giving arm, the AT&T Foundation, doled out $62 million in 2009 to support a variety of arts and education programs, charities, and organizations according to the article. Jim Cicconi, AT&T’s senior vice president and top lobbyist, chairs the foundation. some of the payments AT&T has made include

The NAACP received a $1 million contribution from AT&T in 2009 and has received funding in the six figures dating to 2006, according to the group’s annual reports. The NAACP was one of the first groups to announce public support of the T-Mobile acquisition. William Barber, head of the North Carolina chapter of the NAACP, told POLITICO that AT&T’s financial support did not influence his group’s decision to write to the FCC in support of the merger.

GLAAD which has received $50,000 from AT&T, recently backed the merger deal. Rich Ferraro, a GLAAD official, told POLITICO, “We do not make policy decisions based on what’s best for our corporate sponsors.”

The Columbia Urban League received a $25,000 grant from the AT&T Foundation in 2009 to offer “underserved populations with resources to help their children achieve academic success,” according to the foundation’s IRS Form 990. On May 27, the group’s president and CEO, James McLawhorn, wrote to urge the FCC to approve AT&T’s acquisition of T-Mobile.

Some public interest groups question whether AT&T is now cashing in on its status as one of the country’s biggest corporate donors. I wrote about AT&T’s habit of showering everyone with money here

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

10 Security Reasons to Quit Facebook

10 Security Reasons to Quit FacebookJoan Goodchild wrote an article for CSO Online that said Baby Boomers quit Facebook faster than they join based on information from Inside Facebook. The data indicate that after a huge growth in Facebook membership among the over-55 age group that same demographic began to defect in large numbers, just months after signing up. The CSO Online article quotes Scott Wright, a security consultant based in Canada and runs the site streetwise-security-zone.com says Boomers leave Facebook because they have discretion.

10 ways Facebook does not allow discretion

Here are 10 ways that Facebook does not allow for discretion, driving Boomer permanently off of Facebook.

Facebook1. Your Privacy is History Mr. Wright recalled an academic claim that the notion of privacy differs widely among generations. “The 20-something view of privacy is basically that their parents not see what they are doing. That’s about it,” he said. Apparently, Facebook founder Mark Zuckerberg agrees. He claims that openly sharing information with many people is today’s social norm. He went on to say “We view it as our role in the system to constantly be innovating and be updating what our system is to reflect what the current social norms are.” Many have translated this to mean Facebook doesn’t think its users want much privacy, and the policies of the site show that view. “If you can’t maintain privacy online and off, then you can’t speak freely,” said Bethan Tuttle, an Washington-based independent consultant and privacy advocate. Tuttle says in the article that the massive and quick growth Facebook has experienced, coupled with a lack of privacy-centric leadership has left end-user privacy as casualty.

2. They don’t have your best interests in mind Tom Eston, creator of the website socialmediasecurity.com points out, the business model of Facebook and Twitter, is to make user information as public as possible to generate new ways to make money. Mr. Eston said in the article;

They are really startups if you think about it. They don’t have a true business model … Their philosophy is the more you share, the more information they have to make money with. With that in mind, can you really count on them to protect you?

And do you know just how much information you are sharing that can be used not only by Facebook, but by the application developers that create those fun quizzes and games? Wright says most people don’t. (I wrote about this problem here).

3. Frequent redesigns affect privacy settings Mr. Wright in the CSO Online article said,

Just when people figure out the privacy settings on Facebook, they go and change them again … It always seems like it is being done in everyone’s best interest, but if you really examine it, they have never done anything other than to try to get people to share more information.

Facebook redesigns often make public, and searchable, certain user information that was previously private, and many of the features you can make private are left public unless you go in and adjust your privacy settings. This is no small task, according to Ms. Tuttle, “I am really good online but it took me several tries to get my Facebook privacy settings where I needed them to be.”

Phishing4. Social engineering attacks are getting more targeted Most Facebook users have received messages on their wall asking “Have you seen this video?” or “Is this you in this photo?” By clicking on the link, the user runs the risk of being infected by malware. These are known as social engineering attacks, and they are becoming more sophisticated said Mr. Wright. “They are becoming very targeted. Even seasoned security professionals are falling for them,” he said. The more information you share, coupled with a decrease in privacy, only means it is even easier for cyber criminals to get information about you that can be used to trick you into clicking on a bad link.

5. You can’t trust the ads Most web users think advertisements are harmless, unfortunately, some contain malicious links. One common scenario involves a pop-up from the ad that claims your computer is infected and prompts you to download software to fix it. Instead of helpful software, you end up downloading something nasty. This is now commonly known in the security community as “scareware,” and it’s still a very effective way to snare unsuspecting users.

6. Spam Spam claiming to be from Facebook has increased according to the article. “I think it’s a security concern,” said Mr. Eston. “Mostly because spammers can use that vulnerability to make you think the message is coming from Facebook when it is not. Many users simply wonder “Why is Facebook sending me this?” and instinctively open the message and log in to what turns out to be a fake screen that steals credentials.

7. You don’t really know your friends The author cites a report from security firm Cloudmark which concluded that close to 40 percent of new Facebook profiles are fakes.  Having lots of friends is dangerous because it opens you up to more security risks. Mr. Wright said those who get targeted for hacking are the users who have lots of friends (here is an example). The more friends you have, the more reach a criminal will have when he breaks into your profile and sends out a bad link to everyone.

8. You can’t help yourself from being dumb The attention around the site pleaserobme.com brought to light the safety concerns around social networking. Pleaserobme aggregates the Twitter feeds of people who play Foursquare, a location-sharing application. The problem is while playing the game, many users are also publicly broadcasting that their home is likely unattended and a good “opportunity” (as the site terms it) for thieves. As Ms. Tuttle put it, you need to think about what you are doing and many people are not. You’re putting yourself out there in potentially dangerous ways, particularly if you don’t know all of your “friends” that well.

9. The great unknown CSO Online says there is a lot of speculation about a Facebook IPO and future business strategy. What does this mean for users? Mr. Wright said some fear it means an increase loss of privacy as the social networking site inevitably looks for ways to make money by offering up valuable user information to advertisers and developers. Mr. Wright said,

One of the things I find most interesting is that there are still many people who are scared to death of social networking sites. These are usually the people who don’t see value in them. In the end, they may be the wisest of us all.

Bill Clinton i angry at you for using social media

10. Ex’s, creeps and parents Facebook is making it possible for people to be cyber stalked, even if they aren’t friends anymore, said Mr. Eston. Although the physical and virtual connections are broken, having mutual friends makes it easier for your ex to keep tabs on you. The same goes for any creepy guy or girl you are trying to avoid. Or you may get a friend request from a parent, which Mr. Wright claims many 20-something users consider the worst thing that could ever happen in the history of social networking. “That is a big driver for quitting,” he said. “Once the parent friends some of these people they immediately think ‘I’ve got to get out of this!

What do you think?

Are you concerned about your privacy on Facebook?

View Results

Loading ... Loading ...
Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Jay Leno Most Dangerous Celebrity in Cyberspace

There are many late nights when I sit in the Bach Seat after a long day of coordinating shared technical services and need some silliness. Tonight Show funny-guy Jay Leno was my late-night source of silliness until BitDefender told me he is the Most Dangerous Celebrity in Cyberspace.

Jay Leno is BitDefenders 2011 Most Dangerous Celebrity in CyberspaceAccording to an analysis of 25 million spam messages by the Bucharest, Romania-based anti-malware firm, comedian and TV host Jay Leno is the most dangerous Hollywood celebrity in cyberspace. BitDefender found Mr. Leno mentioned in the subject line of 38,000 spam messages most of which focused around medicine and the purchasing of pills but come with enticing subjects such as ‘Jay Leno found taking drugs.’

“Cybercriminals follow the latest trends just as consumers do and they use these and the names of popular celebrities in their campaigns to lure people to websites that are full of malicious software (malware),” said Catalin Cosoi, Head of the BitDefender Online Threats Lab.

AfBitDefender logoter Mr. Leno, the article at InfosSec Island says that cybercriminals next most often used Madonna and Cameron Diaz to spread spam. (I noted Cameron Diaz’s reign as the McAfee “Most Dangerous Celebrity on the Web” here). The rest of the top 10 personalities used by spammers include:

Other notables on the list are:

Notable for their absence from the list are:

rb-

The use of celebrities to promote malware and spam is deeply rooted in social networking and Web 2.0. In 2009, Barracuda Networks identified a ‘Twitter crimewave’ on Twitter after popular celebrities joined the service to tweet to fans. Criminals followed the celebrities to the new service sensing a new population of easy-to-fool users, using a range of techniques including impersonation and simple link spamming to draw people to malware-infested websites. Facebook still has a major problem with celebrity abuse.

This may seem trivial because most firms have set up gateways to filter these spam-mails from hapless users’ inboxes. However, there are enough users that ignore the warnings and open spam-mails to make spamming on a vast scale worthwhile to the spammers.

Related articles

What do you think?

Who is your favorite late nigt host?

View Results

Loading ... Loading ...

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Notes

Tablet NotesTablet adoption is reportedly outpacing the take-up rates of smartphones, computers, mp3 players, or game consoles. Adoption is underway in a variety of sectors beyond the consumer segment, into retail, industrial, education and business. The demands for mobility and real-time access to data are driving the tablet market.  Sales are expected to exceed 147 million by 2015.

Microsoft: It’s Not Too Late To Win In Tablets

Microsoft logoThe financial geniuses at Citi (C) that brought us the housing bubble also believe that Microsoft (MSFT) can still win the tablets wars. The BusinessInsider cites a report by Citi that says despite being late into the market Microsoft can become “#2 behind iPad” for these reasons:

Tablets are too expensive – Citi notes gadgets need to fall below $300 before they really take off. Until they reach that cost, Microsoft has time to reach people who haven’t jumped on the iPad bandwagon.

Android tablets are not very good – Citi believes that Android tablets won’t take off like Google’s (GOOG) Android Smartphones.

Android faces legal challenges – Android tablet makers are already facing a bunch of intellectual property suits from Apple (AAPL), Nokia (NOK), Oracle (ORCL), and Microsoft. Citi thinks Microsoft is hoping for royalties of $7.50 to $12.50 per unit. That would erase some of the cost-advantage of shipping Android.

Apps – Microsoft has an army of 6 million .NET developers who could start developing touch-optimized apps for Windows tablets. Plus, Citi says Microsoft can make Office an exclusive for its tablet and exploit its Xbox business to offer exclusive big-ticket games.

Enterprise – IT departments already know how to deploy, update, and push apps out to Windows PCs, so a Windows-based tablet should be easier to deal with than other tablets. Microsoft will also probably make Office an exclusive to its tablets and could create a technology where a tablet can “extend” a PC by giving them access to locally stored files. Citi does note that the “bring your own device” trend might favor the iPad instead, but this trend is still in the early days and not proven.

Citi predicts that about 75 million tablets will ship in 2013 and that Microsoft will have a “meaningful share” of those.

GigaTrust Brings Enterprise Rights Management To Apple’s iPhone And iPad

GigaTrust logoGigaTrust, a publisher of Enterprise Rights Management (ERM) content protection software that enhances and extend Microsoft (MSFT) Active Directory Rights Management Services (AD RMS) announced the release of the GigaTrust for iPhone and iPad mobile devices. The product consists of a client and “Mobility Server” that enables persistent content protection for the Apple (AAPL) iPhone and iPad equivalent to that provided by GigaTrust for the Research In Motion’s (RIMM) BlackBerry smartphone and Windows Desktop according to DarkReading.

Reportedly GigaTrust for iPhone and iPad protects content at rest, in transit, and in use, allowing users to securely deliver and persistently protect emails while they are being read on the device. Additionally, iPhone and iPad users can apply GigaTrust protection to outgoing emails and email responses.

Mobile Security: The Great Misconception

Smartphone securityResearch from Kaspersky Lab shows that many users feel more secure using mobile devices than PCs to surf the Internet and that most consider the risk of losing personal data higher on computers than on their mobile devices. The report noted by ITnewsLink says there has been a recent increase in the number of attacks on mobile operating systems like Google’s (GOOG) Android and Apple’s (AAPL) iOS, and experts expect to see considerably more in the future. Despite this, users in the Kaspersky Lab survey feel more secure accessing the Internet via a mobile device.

In the survey, users consider the risk of losing personal data lower on a mobile device than on a PC – despite the fact that around a fifth of all smartphone users has already experienced the loss or theft of a mobile device. The majority of users reported they store personal data, such as photos, emails or contact details, on their mobiles. Around one-third also save login information, such as PIN codes or passwords, for services on their mobile devices, demonstrating a large gap between secure reality and user perception

Next! Turns Your iPad into a Real Productivity Tool

Leftturn Labs logoAppScout says Next! For iPad is proof that the iPad can do work The app is a getting-things-done (GTD) styled app that will help keep your projects organized, keep your tasks from overwhelming you, and keep you moving towards your goal.

Next! can help you organize your to-dos and projects. AppScout says it doesn’t have the same features as a project management suite like Microsoft Project, it’s perfect for those projects that are essentially a long series of tasks to be completed with due dates and dependencies for each of them.

You can take notes, store documents relevant to your project, and tag items that you want to review with others, all from your iPad. Next! will even serve as a light document management system, giving you a central place for all of your project-associated documents, images, and files that you’ll need to refer to as you do the work.

Since the app follows the GTD philosophy it allows you to create action lists based on when the tasks will be completed as opposed to an arbitrary priority list. Your tasks can be adjusted as they get nearer or come into focus. You also get overall project status and health bars that show how far you’ve progressed towards completing your tasks and how closely you’re tracking to your schedule.

Next! is available in the iTunes App Store for the introductory price of $9.99.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Alternative Energy for Tech

Alternative Energy Ideas for TechA couple of recent articles about greener alternative energy sources for tech caught my eye as I sat in my Bach Seat. First, TES NewEnergy, based in Osaka Japan has come up with a new way to charge your mobile phone by heating a pot of water over a campfire according to the Sydney Morning Herald.

Hatsuden-Nabe thermo-electric cookpotThe Hatsuden-Nabe thermo-electric cookpot turns heat from boiling water into electricity The pot features strips of ceramic thermoelectric material that generate electricity through temperature differentials between 550 degrees Celsius at the bottom of the pot and the water boiling inside at 100 degrees. The pot feeds the electricity via a USB port into digital devices such as Apple (AAPL) iPhones, iPods, and Garmin (GRMN) GPS‘s.

Chief executive Kazuhiro Fujita said the invention was inspired by Japan’s March 11 earthquake and tsunami, “When I saw the TV footage of the quake victims making a fire to keep themselves warm, I came up with the idea of helping them to charge their mobile phones at the same time,” Mr. Fujita said.

“Unlike a solar power generator, our pot can be used regardless of the time of day and weather while its small size allows people to easily carry it in a bag in case of evacuation,” said director and co-developer Ryoji Funahashi.

The company says the device takes three to five hours to charge an iPhone and can heat up your lunch at the same time.

rb- The thermo-electric cookpot sells for 24,150 yen ($305) which seems sort of expensive to charge an iPhone when the towers are also put of power and down. TES NewEnergy also plans to market it later in developing countries with unreliable power grids. Their best bet is probably REI for all the extreme suburbanites.

Aussie greener alternative energy idea

According to PCAuthority.com Aussie scientists have developed a way to power electronics by harnessing the energy of the keyboard. Using piezoelectrics, which converts pressure into an electric current, and a thin-film technology found in microchips, researchers at RMIT University in Melbourne believe laptops could become self-powered just by their user’s typing.

power electronics by harnessing the energy of the keyboardThe new energy source needs more work before it’s practical for low-cost laptop integration, but Dr. Mandu Bhaskaran, the co-author of the research, believes the development is a step in the right direction. “With the drive for alternative energy solutions, we need to find more efficient ways to power microchips,” said Bhaskaran.

TechEye correctly identifies the biggest challenge to this alternative energy source will be to get the power demands of computer chips down to be able to use the technology. Despite the best efforts of chipmakers like Intel (INTC) and AMD (AMD), the power drain for chips is still too high for this sort of technology.

rb- Maybe the Aussies want to bring back WordPerfect and DOS so you have to type all the time otherwise your laptop will run out of power. Image the rush to buy these devices as the green police get credits for taking more computers off the grid.

TV as an alternative energy source

Researchers from the Georgia Institute of Technology have created a self-powered, wireless paper-based device that runs on scavenged ambient energy from the environment. The GATech alternative energy system collects electromagnetic energy transmitted by television transmitters, mobile phone networks, and satellite communications systems. Manos Tentzeris, a professor in the GATech School of Electrical and Computer Engineering told Gizmag the new technology can be used to power small electronic devices such as networks of wireless sensors, microprocessors, and communications chips.

energy scavenging technology can take advantage of frequencies from FM radio to radarThe GATech team has been able to build the system by combining sensors, antennas, and energy scavenging capabilities on paper by using inkjet printing technology According to the article, the energy scavenging technology can take advantage of frequencies from FM radio to radar. So far the team has been able to generate hundreds of milliwatts by harnessing the energy from TV bands. Gizmag reports that multi-band systems would generate over one milliwatt, which is enough to run small electronic devices, including microprocessors. The Professor explains that multi-band systems can exploit a range of electromagnetic bands to capture more energy.

The Gizmag article says the system works. The researchers have successfully operated a temperature sensor using electromagnetic energy captured from a television station more than half a kilometer away. They are now preparing another demonstration where a microprocessor-based microcontroller would be activated by holding it in the air.

The researchers say the technology could be used with other electricity-generating technologies like solar. Scavenged energy could help a solar element charge a battery during the day while at night, scavenged energy would continue to charge the battery.

The Georgia Tech team believes that self-powered, wireless paper-based sensors will soon be widely available at a very low cost. Gizmag says the autonomous, inexpensive sensors would be attractive for a range of applications, such as chemical, biological, heat and stress sensing, RFID and monitoring for the military, manufacturing, shipping, communications, and smart grid applications.

rb-

I wrote about something similar here. It is important to realize that this new alternative energy source has so far been wasted.

Related articles

What do you think?

Which alternate energy source for tech looks most promising to you?

View Results

Loading ... Loading ...

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.