sâmbătă, 3 aprilie 2010

Developer claims Apple stole, patented game control idea



Craig Rothwell, inventor of the iControlIpad perpheral for jailbroken iPhones, has taken issue with a recently-published Apple patent application that appears to describe a device much like his own. Entitled .Accessory Fr playing games with a portable electronic device the application describes a controller-like accessory—with standard game controller buttons—with a recess in the center into which a user can place a touchscreen gaming device. Variations on the design include one with a rotating dock connector for connection to the device, one which connects wirelessly, and one that offers wireless connectivity to other devices.

In a post titled “An extremely sinister development,” Rothwell said he and his colleagues “were very very surprised to see that Apple have [sic] allegedly filed a patent for our original iControlPad design some 6 months after we revealed it,” promising to give “More updates once we get a more clear picture of what the h—- is going on.” Development on the iControlPad dates back to May 2008, while Apple’s application was filed in September 2008

joi, 1 aprilie 2010

How Android Security Stacks Up


An Android phone's approach to security is radically different from an iPhone's--but is it better?
Today's smart phones have all the speed, storage, and network connectivity of desktop computers from a few years ago. Because of this, they're a treasure trove of personal information--and likely the next battleground for computer security.
What makes smart phones attractive--the ability to customize them by downloading applications--is what makes them dangerous. Apps make the mobile phone a real computer, and Apple's App Store has been a key factor in the phone's success. But apps also make smart phones a target for cyber criminals.

Apple knows that it wouldn't take more than a few malicious apps to tarnish the iPhone's reputation. That's why the App Store is a walled community. The only apps that get listed are those that have been approved by Apple. To get approved, developers must create a developer account and pay an annual fee. A team at Apple evaluates and approves each version of each application that is made available. Apple reportedly turns down roughly 10 percent of applications submitted to the App Store because they would steal personal data, they contain "inappropriate content," or are designed to help a user break the law.

Google has taken a fundamentally different approach to ensuring the security of smart phones running Android. Like Apple, Android also has a store, called the Android Marketplace, from which users can download applications. But unlike Apple, any application can be uploaded to the Android Marketplace--Google doesn't evaluate them first. What protects Android users from malicious applications is a security model based on "capabilities."

Each Android app must tell a phone's OS what capabilities it requires. When

you install the application, the operating system lists the capabilities that the application needs to run. You can then decide if those capabilities are consistent with what the application claims it will to. For example, the TaxCaster Mobile application from Intuit requires "full Internet access" because it needs to take your input, send it to Intuit's servers, and show you the results. On the other hand, the Slacker Radio application from Slacker requires Bluetooth, full Internet access, modify/delete access to your SD card, the ability to change audio settings, the ability to read the identity of incoming phone calls, the ability to change Wi-Fi state, and the ability to prevent your phone from sleeping
The capabilities-based system has the advantage of being enforced by the operating system. There is simply no way for an application to do more than it says. It also doesn't depend upon the vigilance of human screeners.
The problem with capabilities is that there is no way to be sure that an application will act appropriately with the trust that it's given. For example, back in December a Web banking application was posted in the Android Marketplace that appeared to be for the First Tech Credit Union. It turned out that the application was fraudulent--just another phishing scam. Google removed the rogue app shortly after it was discovered, but it's unclear how many people fell for the scam. Capabilities can't protect users from this kind of attack because the rogue application asked for the same privileges that a legitimate application would--that is, the ability to accept a person's username and password and to communicate that information over the Internet with a remote server.

Another problem with the capability-based system is that it requires users to think carefully about security. Many users are unable to properly evaluate the risks of the software that they want to download and run--even when they suspect that the software might be malicious.

There are other important security differences between the iPhone and Android-based phones. Both can be set to automatically lock after a period of inactivity and require a passcode before they can be used again. But the iPhone can be set up to erase all of the data that it contains after 10 failed passcode attempts. The iPhone also supports remote wipe. Google's Android has neither of these features, making the system fundamentally less secure. (A third-party application called Wave Secure offers some of these features, but I've found them to be poorly integrated with the Android system.)

Another important iPhone security advantage is a user-settable delay for the lock code. If you set an "unlock pattern" with an Android phone, you need to provide that pattern every time you turn on the phone's screen. With the iPhone, you can set a delay so that the unlock code does not need to be entered if the phone has only been asleep for one minute, five minutes, 15 minutes, one hour, or four hours. The shorter the time period, the more secure your data, of course. But being able to set the delay for five minutes or even 15 minutes makes it far less onerous to actually use this feature. With my Android phone, I am constantly entering the unlock code, even at the end of a one-minute phone call. It's so annoying that I am seriously considering turning it off.

I wish that the iPhone had Android's capabilities-based security architecture, because that extra layer of protection provides important security guarantees. But even without it, the iPhone's range of security features make it a better choice for people who need to keep sensitive information on their phone. That said, I'm hopeful that Google will make big improvements with the next release of the Android operating system.

miercuri, 31 martie 2010

Are You Saying Thank You to Your Customers or Clients?


If you aren’t, you’re in good company. Although I’m not sure it’s the company you’d like to be in! Most other businesses aren’t either. However, don’t you want to stand out from those other businesses? Of course you do! I’m here to tell you how to do it for the ridiculously low price of 44 cents!!Think about it. When was the last time you received a handwritten card from someone that you recently did business with? Can’t remember? Probably because you haven’t! However, think how good you would feel if you did. Now how about making YOUR customers or clients feel good? Feeling good = stronger relationships. Stronger relationships = more referrals. More referrals = more business. Get it?

Invest in a package of cards. Not standard “Thank you” cards, but a box of cards that resonate with you. I personally have several boxes, one has flowers on them, and the other has beautiful landscapes. Then start sending them. Every time you get a new customer or client, send them a card thanking them for choosing to do business with your company. Because they did choose to do so, didn’t they? They probably could have gotten the product or service from another company. However, they chose to get it from you. Aren’t you glad they did? Of course you are! So tell them.

I don’t know about you, but when I see a personal handwritten card in my mail, I open it first. It sure beats a bill, and it makes me feel valued and special. Is that a feeling you’d like YOUR customers or clients to have? I thought so.

Follow these quick tips to show some love to your customers or clients. I promise they’ll love you back! Be timely. Send a personal thank you note in the mail within seven days of receiving business from a customer or client.

Don’t send a cheesy corporate card. Instead – find something that represents you or your customer or client!

If all you’re going to write is “Thanks for your business” and sign the card, don’t bother, you are wasting a stamp. Write a short note thanking them specifically for the product or service they have bought or the referral that they made.

Don’t skimp and send an e-mail. While it’s free and easy to do, it won’t stand out like a handwritten card would. And don’t you want to stand out from the competition??

It’s nice to thank someone for contacting you about your products or services, even if it didn’t result in a sale……today! However, the buying process could be long. And if a buyer is thinking about making a purchase, what do you think he’ll be thinking about YOU if he gets a card from you. Hmmmm….

Don’t let another day go by without thanking your customers or clients as well as the many people that help you. We all remember those who are appreciative of our business and help – and we quickly forget those who don’t. Which do you want to be?

luni, 29 martie 2010

Geely to buy Volvo from Ford for $1.8 billion


STOCKHOLM – Zhejiang Geely Holding Group signed a binding deal Sunday to buy Ford Motor Co.'s Volvo Cars unit for $1.8 billion, representing a coup for the independent Chinese automaker which is aiming to expand in Europe.

The stock purchase agreement is subject to regulatory approvals and is expected to be completed in the third quarter, representatives of the two automakers said as they presented the deal at a news conference at Volvo Cars headquarters in Goteborg, on Sweden's west coast.

The agreement was signed by Geely's chairman, Li Shufu and Ford Chief Financial Officer Lewis Booth, and witnessed by Li Yizhong, the Chinese minister of industry and information technology, as well as Swedish Minister for Enterprise and Energy Maud Olofsson.

The transaction will be made through a $200 million note, while the remainder will be paid out in cash, Booth said at the Webcast news conference.

"We think it's a fair price for a good business, and yes, we're happy with the deal we've achieved with Geely," he said, adding that his company believes that, under Geely, "Volvo can continue to build its business and return to profitability."

The deal also covers further agreements on intellectual property rights, supply, and research and development arrangements between Volvo Cars, Geely and Ford.

Li, whose comments were translated by an interpreter, described the deal as "a milestone" for both Geely and Volvo, adding his group will make a Volvo CEO public "in due course."

In a statement, Geely said it has secured all the financing necessary to complete the deal, as well as "significant working capital facilities to fund Volvo Cars' ongoing business."

Geely said it aims to keep Volvo's existing manufacturing facilities in Sweden and Belgium, but that it will also explore manufacturing opportunities in China.

"China, the largest car market in the world, will become Volvo's second home market. Volvo will be uniquely positioned as a world-leading premium brand, tapping into the opportunities in the fast-growing China market," Li said.

Ford, which bought Volvo Cars from AB Volvo in 1999 for $6.45 billion, has been trying to sell the unit since late 2008 to focus its resources on managing its core Ford, Lincoln and Mercury brands.

As Western automakers unload unprofitable assets, they are finding keen buyers in Asia.

In 2008, Ford sold its Jaguar and Land Rover brands to India's Tata Motors Ltd. for $1.7 billion, a third of what it paid for them. In addition, General Motors Co. attempted to sell its rugged Hummer brand to a Chinese heavy equipment maker, but is now winding that brand down as the deal collapsed.

China's Beijing Automotive Industry Holdings has also agreed to buy some powertrain technology from GM's Swedish Saab unit.

Geely, an independent automaker that has struggled to upgrade its image in overseas markets, has long coveted a bigger foothold in Europe and has earlier been rumored to be bidding for Opel and Saab. The long-awaited Volvo acquisition is therefor important for the company, which has gradually built its business with little government support.

Analyst Zhang Xin, with Guotai Junan Securities in Beijing, said Geely has pledged to keep Volvo's factory and business teams in Sweden after the takeover, limiting its leeway to cut costs.

"Reality is always much crueler than what people would wish. Geely wants to build itself as a new 'international Geely,' so they sought a strong foreign brand like Volvo," Zhang said.

"Geely should foresee many difficulties. How will it manage to run Volvo well? How will it deal with the factory and employees? How much more will Geely have to spend to operate Volvo?"

Volvo, whose first car left its Swedish factory in 1927, employs nearly 20,000 workers, most of them based in Sweden. The group, initially a subsidiary of ballberaing maker SKF, was listed on the stock exchange in 1935.

In 2009, it sold 334,808 cars. It currently has 10 models on the global market, with its cross-over XC60 being the best-seller. The United States, Sweden and Britain account for its three biggest markets.

duminică, 28 martie 2010

As Congress takes break, Obama names 15 recess appointments


WASHINGTON — President Barack Obama reignited a partisan fight over appointments Saturday when he announced his intention to fill 15 key vacant administration positions -- that normally require Senate approval -- while Congress is adjourned for vacation.

Saying he was tired of obstructionist Republican senators blocking his nominees for political purposes, Obama said he would resort to recess appointments to fill the jobs.

"The United States Senate has the responsibility to approve or disapprove of my nominees," Obama said Saturday. "At a time of economic emergency, two top appointees to the Department of Treasury have been held up for nearly six months. I simply cannot allow partisan politics to stand in the way of the basic functioning of the government."

But Republicans say it's Obama who's playing a partisan game. They accused him of trying to score political points with labor unions and others who supported his 2008 presidential campaign.

Of the 15 appointments, Obama's choice of Craig Becker for a seat on the National Labor Relations Board generated the most criticism. Republicans and business groups have steadfastly opposed Becker, who served as a lawyer for the Service Employees International Union and the AFL-CIO , contending that he's too cozy with unions.

"The president's decision to override bipartisan Senate rejection of Craig Becker's nomination is yet another episode of choosing a partisan path despite bipartisan opposition," Senate Minority Leader Mitch McConnell , R- Ky. , said Saturday. "The president previously held that appointing an individual in this manner meant that the nominee would have 'less credibility,' and that assessment certainly fits this nomination."

The Senate failed to advance Becker's nomination in February when Democrats came eight votes short of ending debate on his nomination and allowing it to proceed to a final vote.

Senate Republicans wrote Obama a letter Thursday asking him not to name Becker to the board. The letter came after some Democrats close to the administration predicted it would happen, but also after Chief Justice John G. Roberts , a Republican nominee, questioned why Obama hadn't yet used his recess powers to fill the five-member board, which, with three vacancies, hasn't been able to function.

Business groups Saturday blasted Obama's selection of Becker, while pro-union groups hailed the president's action.

"Overriding the will of the Senate and providing this special interest payback contradicts the president's claim to change the tone in Washington ," said Randel Johnson , a U.S. Chamber of Commerce senior vice president. "The business community should be on red alert for radical changes that could significantly impair the ability of America's job creators to compete."

But Kimberly Freeman Brown , executive director of the pro-union American Rights at Work said "America's workers need a fully functioning NLRB to mediate their claims for better wages, benefits and other rights now more than ever - and after two long years they have one."

Presidents seldom opt for recess appointments because of the political fallout generated. They use the process either to install someone too controversial to overcome a Senate filibuster, or to fill key spots being held up for unrelated reasons by senators who are trying to secure local projects or use the nominee as leverage in an ideological fight.

President George W. Bush bypassed the Senate confirmation process this way at least 171 times, the Congressional Research Service found. President Bill Clinton did it 139 times.

In 2005 when he was a senator, Obama criticized Bush's recess appointment of John Bolton as U.S. ambassador to the United Nations . Last month, however, Obama indicated that he'd consider his own recess appointments for critical jobs where he felt noncontroversial nominees were being help up.

As of Thursday, White House aides said 558 judicial and civilian nominees had been confirmed, but another 208 are pending before the Senate . Of those, 73 have cleared the committee process but await a final vote.

The power for recess appointments derives from Article II, Section 2, clause 3 of the Constitution, which provides for continuity of government when the Senate isn't in session. Recess appointments are in effect only through the end of the Senate's next session. A recess appointee now could stay on the job only through late December 2012 , unless the Senate confirms him or her in the meantime.

Paul C. Light , a professor of public service and a governance expert at New York University , said it is "somewhat of a surprise that Obama has waited this long, especially given the frequent use of Senate personal-prerogative holds to delay confirmations. He's right to be frustrated by it all, and government is suffering from the lack of movement on key posts."

At the same time, Light said, recess appointments constrain both the president and the nominee and should be "a last resort."