Tag Archive for IBM

Foxconn – The Empire Apple Made

Foxconn - The Empire Apple MadeFoxconn is now the biggest exporter out of China. The firm churns out products like iPads, iPhones and PlayStations for Americans. Among its clients are Apple, Cisco (CSCO), Dell, HP, IBM, Microsoft (MSFT), Nokia (NOK) and Sony (SNE). Most American consumers never head of Foxconn, which is also known as Hon Hai Precision Industry, until employees began to commit suicide by leaping off its buildings. However, the firm has a long history.

Apple Computers logoTerry Gou aka the ‘general’ founded Foxconn in 1974 with a $7,500 loan from his mother. According to a recent BusinessWeek article, his first world headquarters was a rented shed in a gritty Taipei suburb called Tucheng, which means Dirt City in Mandarin. Mr. Gou, then 23, had done three years of vocational training and served in the military. He then worked for two years as a shipping clerk, where he got a firsthand view of Taiwan’s booming export economy and figured he ought to stop pushing paper and get into the game. With the cash from his mother, he bought a couple of plastic molding machines and started making channel-changing knobs for black-and-white televisions. His first customer was Chicago-based Admiral TV, and he soon got deals to supply RCA, Zenith, and Philips (PHG).

Atari 2600Mr. Gou’s first step into American consumer electronics came in 1980 when he started supplying Atari with connectors that linked the joystick cable to its 2600 video-game console. At the height of the Atari craze, Hon Hai was producing connectors for the 15,000 video-game consoles that Atari’s Taiwanese plant made daily. BusinessWeek says Mr. Gou wasn’t content to be a mere supplier of dumb parts. He applied for patents on the technology his company developed, and he kept pressing into new areas.

In the early ’80s, Mr. Gou took an 11-month tour of the U.S. covering 32 states, during which he dropped in on companies unannounced. BuisnessWeek reports that during this trip, he spent three days in Raleigh, N.C., motel close to an IBM (IBM) facility to get an appointment after which he came away with a firm order for connectors. “He is really one of the top sales guys in the world,” Max Fang, the former head of procurement for Dell in Asia who did business with Mr. Gou and was his regular golf partner told BuisnessWeek. “He is very aggressive and always on your tail.”

IBM logoMr. Gou was early to recognize that China offered an almost limitless supply of cheap labor and was not deterred by the primitive infrastructure or the Communist government. He set up shop in a suburb of Shenzhen across the border from Hong Kong.  In 1991, Mr. Gou listed Hon Hai Precision on the Taiwan Stock Exchange to fund expansion, mostly into China. By 1996, Mr. Gou told BuisnessWeek, it was clear to him that China would become a manufacturing juggernaut, and he started investing heavily in his facilities at Longhua Science & Technology Park aka “Foxconn City.”

Compaq logoIn 1996, Mr. Gou offered to build the chassis for Compaq‘s desktop computers at a fraction of what it would cost Compaq to do the job itself.  “He had this vision and the guts to do anything in a big way,” Mr. Fang is quoted in BuisnessWeek. “When I first visited the factory, I saw the whole value chain nicely and effectively designed, starting from a big coil of sheet metal at one end that was cut, formed, welded, and stamped to make the top and bottom of the chassis. Then they did the in-line subassembly, adding a floppy drive, the power supply, and cables. It was all shipped to customers who only had to install the motherboard, CPU, memory, and hard drive. After this revolution by Terry, final computer assembly was easy.”

BuisnessWeek says that to sustain an efficient Chinese workforce, Mr. Gou quickly discovered that he had to offer housing, food, and health care, additional costs that kept most of his competitors out of the country. He had to do everything himself. Michael Marks, then chief executive officer of contract-manufacturing giant Flextronics (FLEX), saw Foxconn’s Shenzhen operations taking shape in the late 1990s, “They were making wire out of ingots of copper,” says Mr. Marks. “They had chicken farms to lay the eggs for the cafeteria. One building had 2,000 toolmakers. We had none at the time. But we did after that.”

Dell logoFoxconn was transforming the industry. It was shipping bare-bones computers to IBM, Hewlett-Packard (HPQ), and Apple (AAPL). In 1998, when Mr. Gou won his first order from Dell (DELL) to make the chassis for its desktops, Dell insisted he do it in the U.S., close to the final market. “I bought a company in Kansas City. We quickly needed tooling shops and stamping,” Mr. Gou told BuisnessWeek. “That factory was a money loser, but Terry had to build it to accommodate Dell against his own will,” recalls Mr. Fang. “For Foxconn, it bought a ticket into the Dell business.”

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Big Blue Wants to Patent Patent Trolling

Big Blue Wants to Patent Patent TrollingConceivably Tech reports that IBM (IBM) has filed a patent application with the US Patent and Trademark Office (USPTO) to automates the management of intellectual property. The system that would manage Big Blue’s intellectual property (and others who could afford IBM’s costs) comes with a “defend” module to formulate a strategy in the case of patent infringement.

IBM logo TechEye says that Big Blue’s patent is designed to automate the patent process from beginning to end including suing other companies that the computer believes are infringing on a copyright. The patent components are divided into a “direct” part, which includes the overall strategy such as R&D, portfolio, filing, budgeting, and forecasting. “Control” covers factors such as market alignment, invention evaluation, IP valuation, and inventor training. “Execute” includes trade secret protection, trademark creation, IP landscaping, technology monitoring, and competitive intelligence. Conceivably Tech quotes the “defend”, “influence” and capitalize modules of the application:

“defending against infringements and invalidations of said IP rights based on said business strategies and monitoring market and competitor actions to develop risk management plans; an influence computer module including a standards influencing unit, a legal and regulatory influencing unit, and a policy influencing unit; and capitalize computer module for identifying potential licensees and potential assignees of said IP rights, and managing licensing negotiations, cross-licensing negotiations, and assignment negotiations based on said business strategies.”

TechEye points out the irony of how the software was created. They point out that an IBMer collected all the experience IBM gained from filing more than 100 patents every week and put the data into a chart. From there Big Blue decided that given the way the IP world is shaping up these days, they should patent IP themselves. Thus IBM has patented the patent process. What they came up with is:

TechEye concludes that IBM’s patent application is really an automated troll. They conclude that if the patent office approves this, then it means that every time you patent something you have to give IBM a fee to see if you did it differently from Big Blue’s process. Otherwise, its software might send you a subpoena.

rb-

This must seem like a god-send to organizations whose business model has de-evolved into patent trolling. Some of these cases I have written about are the CSIRO Wi-Fi patent activities, all the craziness in the smartphone market, and MSFT co-founder Paul Allen’s attempts to sue most of the web.

Gotta give it to IBM, its like TechEye says, “If you can’t beat the trolls, patent the process that creates them.”

Do you believe the U.S. Patent Office is still useful?

Does IBM deserve to collect a tax from every innovator?

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Big Tech Increases Lobbying

Big Tech Increases LobbyingThe Business Insider has a great post that lays out the lobbying spending by most of the techs stalwarts. Arik Hesseldahl at All Things D compiled the data. The data says that the telecom’s spent the most on lobbying last year. The biggest spender was Verizon (VZ) which spent $3.83 million, an increase of nearly $1 million over last year. AT&T (T) spent $3.47 million on lobbying.

Hewlett-Packard (HPQ) spent $1.6 million on lobbying in 2010, which is nearly double what it spent last year. Microsoft (MSFT), Oracle (ORCL), Google (GOOG), IBM (IBM), and Yahoo (YHOO) also increased the dollars spent on lobbying from 2009 to 2010. Only Intel (INTC) decreased its lobbying spending in 2010.

Tech Spending on Lobbying 2010

The Business Insider points out that despite their incredible influence in the world of tech, Apple (AAPL) and Facebook are hardly spending anything on lobbying. The post speculates that while Apple is influential, it doesn’t dominate anything other than mp3 players, so the government has had little reason to mess with it. (Apple rules the tablet world, but that’s an 8-month-old market.) Also, Apple doesn’t do big blockbuster acquisitions that the government looks at.

Facebook spent the least of anyone with just $120,000. The author expects this will change soon as the company’s power is growing quickly, drawing the eye of regulators.

rb-

The telecom monoliths spent $7.3 million on lobbying, which is more than HP, MSFT, Google and IBM combined what are they up to? I wrote about AT&T’s activities previously, clearly, these firms expect something back from the politicians they bribe donate to. History has proven that the politicians on the receiving end of the bribes donations generate results for their largest contributors and not the SMB or end-user.

What do you think? What are these tech stalwarts getting for their money in Washington DC?

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Social Networks Are Risky

Social Networks Are RiskyAccording to the Czech security firm TrustPort, social networking’s popularity and ease of use can cause users to forget its risks.  These risks include the loss of private personal data and malware infection.  Even though social networking is new, a recent IBM (IBM) X-Force report says the threats are not.  According to IBM, traditional threats like phishing, malware, 419 fraud schemes, identity theft, data harvesting, and botnets now use social networks as attack vectors.

FacebookMany social networking users fall victim to attackers offering new apps or features for joining the group.  Net Security.org cites the Facebook Stalker Catcher as an example of such a scam.  Even though this malicious app appeared in 2009, Facebook users still fall victim to it.  To start a Stalker Catcher attack, Net Security.org says users are lured to the group on the pretext that they will see exactly who and when is visiting their personal profile.  The alleged instructions for feature activation result in nothing more and nothing less than sending group invitations to all contacts of the victim.

Sunbelt Software reports that the latest scam targeting Facebook users specifically targets kids.  The scam promises a free proxy service for those who want to bypass parental controls and blocks set up by schools.  The scam tempts the victims to try the service at hxxp://myfatherisonline.com to access Facebook in school.  Of course, when the victims visit the website, they can’t find the advertised service.  The researchers instead found a plethora of scam attempts.  The victims are faced with an affiliate site containing malware, surveys, quizzes, and offers for free iPhones that will try to get them to subscribe to a premium rate service or sign up for spam.

The number of users who voluntarily join fraudulent groups and send invitations to all their contacts is strikingly high.  In the Net Security.org article, IBM says the informal feel of social networks is the real risk.

We’re all friends here,” you’re thinking to yourself, and you’re mind chooses to ignore the things that would usually set off alarm bells in your head. Who knows – maybe it’s our inherent sense of safety that we get when surrounded by lot of people? Safety in numbers, so to speak. In any case, most of us are just less careful.

SPAM

These same users then access Facebook at work, exposing their employers to more risks.  The anti-malware firm Sophos recently found that reports (PDF) by companies of spam and malware derived from social networks were up 70 percent from a year earlier and concludes that “Because of this, social networks have become one of the most significant vectors for data loss and identity theft.”

Due to this carelessness, the criminals behind the scams quickly gain large databases of contacts.  These databases are later sold to other cybercriminals and used for sending spam or for further phishing scams.  Some fraudulent groups explicitly invite users to install a particular application, which is even more dangerous.  According to the article, the risk of malware infection should never be underestimated.

rb-

So the important message here is:

  1. Keep your computer up to date
  2. Use regularly updated antivirus and antispyware software
  3. Verify what you are doing before you do it
  4. If it is too good to be true, it probably is

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005.  You can follow him on LinkedInFacebook, and Twitter.  Email the Bach Seat here.

Tech Layoffs

Tech LayoffsIt has been just over a year since Wall $treet and the Bankers lead the global economy to the edge of collapse. Thanks to Obama-money our money Wall $treet and the Bankers are making million-dollar bonus’ again while worker layoffs continue. All must be right in the economy, right?

According to my information, nearly 550,000 tech-related jobs have been eliminated since October 2008. January 2009 saw almost 164,000 jobs eliminated by the biggest names in tech. Ericsson. Google, IBM, Intel, Microsoft, NEC, and Sprint-Nextel all eliminated 5,000 or more jobs in January 2009. While this is old news, unless you are still trying to live through one of these “right-sizing” it is also important because we are coming back around to the lay-off season.

Global Tech Layoffs

This year’s lay-off season is trending up after several months of decline. From a record high in January tech layoffs declined to a modest 4,336 layoffs in June 2009. Since reaching that bottom the tech layoff rate has increased to levels not seen since May 2009. August 2009 had almost 5,000 layoffs. The number of layoffs in September doubled to 10,246. The trend has been increasing since with 12,704 layoffs in October and in the first half of November, there have been already been 12,749 layoffs. Some of the same firms that had “resource reduction actions” in January had laid off more people in November, including Ericsson (700), Microsoft (800), and Sprint-Nextel (2,500).

Tech Layoffs Last Quater 2009

It appears to me that despite Wall $treet bonus’. the rest of us are still in for at least 12 more months of questionable job prospects

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.